Choosing a security toolkit with anti-virus, firewall and anti-malware programs is a matter of personal preference, your technical ability and experience, features offered, user friendliness, ease of updating (and upgrading to new program release), ease of installation/removal, available technical support from the vendor and price. Other factors to consider include detection rates and methods, scanning engine effectiveness, how often virus definitions are updated, the amount of resources the program utilizes, how it may affect system performance and what will work best for your system. A particular anti-virus that works well for one person may not work as well for another. You may need to experiment and find the one most suitable for your use and your system. There is no universal "one size fits all" solution
that works for everyone. For more specific information to consider, please read Choosing Your Anti-virus Software
.No single product is 100% foolproof
and can prevent, detect and remove all threats at any given time. The security community is in a constant state of change as new infections appear. Each vendor has its own definition of what constitutes malware and scanning your computer using different criteria will yield different results. The fact that each program has its own definition files means that some malware may be picked up by one that could be missed by another. Thus, a multi-layered defense using several anti-spyware products (including an effective firewall) to supplement your anti-virus combined with common sense
, safe computing
and safe surfing habits
provides the most complete protection.
As a general rule
, using more than one anti-spyware program like Malwarebytes' Anti-Malware, SuperAntispyware, Spybot S&D, Ad-Aware, Spyware Terminator, etc. will not conflict with each other or your anti-virus if using only one
of them for real-time protection and others as stand-alone scanners. In fact, doing so increases your protection coverage without
causing the same kind of conflicts or affecting the stability of your system that can occur when using more than one anti-virus. The overlap of protection from using different signature databases will aid in detection and removal of more threats when scanning your system for malware. However, competing tools may provide redundant alerts which can be annoying and/or confusing as a result of the overlap in protection.
If using multiple real-time resident shields (TeaTimer, Ad-Watch, MBAM Protection Module, Spyware Terminator Shields, etc.) together at the same time, there can be conflicts
when each application tries to compete for resources and exclusive rights to perform an action. They may identify the activity of each other as suspicious and produce alerts. Further, your anti-virus may detect suspicious activity while these programs are scanning (reading) files, especially if it uses a heuristic scanning
engine, regardless if they are running in real-time or on demand. The anti-virus may even detect as threats, any malware removed by these programs and placed into quarantined areas. This can lead to a repetitive cycle of endless alerts or false alarms that continually warn a threat has been found if the contents of the quarantine folder are not removed before beginning a new security scan.
Keep in mind that you can overkill a system with resource heavy security programs that will slow down performance. Sometimes you just have to experiment to get the right combination for your particular system.
Use trustworthy security tools like:
I recommend taking advantage of the Malwarebytes Anti-Malware (Pro) Protection Module
in the full version which uses advanced heuristic scanning technology
to monitor your system and provide real-time protection to prevent
the installation of most new malware. This technology runs at startup where it monitors every process and helps stop malicious processes before they can infect your computer
. The database that defines the heuristics is updated as often as there is something to add to it. Keep in mind that Malwarebytes does not act as a real-time protection scanner for every file like an anti-virus program so it is intended to be a supplement, not a substitute
. Enabling the Protection Module
feature requires registration and purchase of a license key
that includes free lifetime upgrades and support. After activation, Malwarebytes can be set to update itself and schedule scans automatically on a daily basis. The Protection Module is not intrusive as the program utilizes few system resources and should not conflict with other scanners or anti-virus programs. If you choose the free version, you can just use it as a stand-alone scanner, however, Malwarebytes' service (mbamservice.exe) will still show in Task Manager which is normal.
Usually if there are conflicts with between Malwarebytes' and another security program, they are reported in the Common Issues, Questions, and their Solutions, FAQs
thread.Free Antivirus programs: (choose and install only one)
. I recommend any of the first three.
Note: There have been numerous complaints about AVG 2011 causing issues and conflicts with other security tools like Malwarebytes' Anti-Malware. Read the related discussions at AVG:
There have also been reported problems with computers after using new features like PC Analyzer
and PC Tuneup
which purport to fix registry errors in order to make the system more stable and various optimizing tools which can make changes to system settings.I do not recommend the routine use of registry cleaners/optimizers
as they are extremely powerful applications that can damage the Windows registry
by using aggressive cleaning routines and cause your computer to become unbootable. The registry is a central repository (database) for storing configuration data, user settings and machine-dependent settings, and options for the operating system. It contains information and settings for all hardware, software, users, and preferences. Whenever a user makes changes to settings, file associations, system policies, or installed software, the changes are reflected and stored in this repository. The registry is a crucial component
because it is where Windows "remembers
" all this information, how it works together, how Windows boots the system and what files it uses when it does. The registry is also a vulnerable subsystem, in that relatively small changes done incorrectly can render the system inoperable
. Using registry cleaning tools unnecessarily
could lead to disastrous effects on your operating system such as preventing it from booting properly. For routine use, the benefits to your computer are negligible while the potential risks
For these reasons, I no longer recommend AVG as a free alternative.
For a list of more tools, please see Bleeping Computer's:
Edited by quietman7, 07 December 2010 - 07:29 PM.