Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Essential Protection Tools for Computer


  • Please log in to reply
4 replies to this topic

#1 rogersjo

rogersjo

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 20 January 2011 - 06:57 AM

Firstly, sorry mods if this has been answered elsewhere, I'm new to the site and new to this type of tech stuff.

I recently had a virus from one of those fake antivirus scams (malware) which completely stopped me from
using any program on my laptop. Using this site I was able to get rid of said virus.

Just wondering what would be the best way to ensure protection on your computer? I have McAfee
Security Centre which has the usual Anti-Virus, Anti-Spam, Site Advisor etc. I also used Malwarebytes'
Anti-Malware to remove the malware problem I previously mentioned, so have that installed too.

I suppose my real question is what other applications should I install on my system to help protect
even more? I've read through some topics on this site and realise there is so many but I'm unsure
as to which to use and which work together etc. What would be the essential stuff that I'd need?

Sorry if this post isn't making much sense :blush:

Thank you in advance for any help at all!

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,399 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:57 PM

Posted 20 January 2011 - 09:31 AM

This is what I tell most folks who ask the question you have.

Choosing a security toolkit with anti-virus, firewall and anti-malware programs is a matter of personal preference, your needs, your technical ability and experience, features offered, user friendliness, ease of updating (and upgrading to new program release), ease of installation/removal, available technical support from the vendor and price. Other factors to consider include detection rates and methods, scanning engine effectiveness, how often virus definitions are updated, the amount of resources the program utilizes, how it may affect system performance and what will work best for your system. A particular anti-virus that works well for one person may not work as well for another. You may need to experiment and find the one most suitable for your use and your system. There is no universal "one size fits all" solution that works for everyone and there is no best anti-virus. For more specific information to consider, please read Choosing Your Anti-virus Software.

No single product is 100% foolproof and can prevent, detect and remove all threats at any given time. The security community is in a constant state of change as new infections appear. Each vendor has its own definition of what constitutes malware and scanning your computer using different criteria will yield different results. The fact that each program has its own definition files means that some malware may be picked up by one that could be missed by another. Thus, a multi-layered defense using several anti-spyware products (including an effective firewall) to supplement your anti-virus combined with common sense, safe computing and safe surfing habits provides the most complete protection.

As a general rule, using more than one anti-spyware program like Malwarebytes' Anti-Malware, SuperAntispyware, Windows Defender, Spybot S&D, Ad-Aware, Spyware Terminator, etc. will not conflict with each other or your anti-virus if using only one of them for real-time protection and others as stand-alone scanners. In fact, doing so increases your protection coverage without causing the same kind of conflicts or affecting the stability of your system that can occur when using more than one anti-virus. The overlap of protection from using different signature databases will aid in detection and removal of more threats when scanning your system for malware. However, competing tools may provide redundant alerts which can be annoying and/or confusing as a result of the overlap in protection.

If using multiple real-time resident shields (TeaTimer, Ad-Watch, MBAM Protection Module, Spyware Terminator Shields, etc.) together at the same time, there can be conflicts when each application tries to compete for resources and exclusive rights to perform an action. They may identify the activity of each other as suspicious and produce alerts. Further, your anti-virus may detect suspicious activity while these programs are scanning (reading) files, especially if it uses a heuristic scanning engine, regardless if they are running in real-time or on demand. The anti-virus may even detect as threats, any malware removed by these programs and placed into quarantined areas. This can lead to a repetitive cycle of endless alerts or false alarms that continually warn a threat has been found if the contents of the quarantine folder are not removed before beginning a new security scan.

Keep in mind that you can overkill a system with resource heavy security programs that will slow down performance. Sometimes you just have to experiment to get the right combination for your particular system.

Use trustworthy security tools like:I recommend taking advantage of the Malwarebytes Anti-Malware (Pro) Protection Module in the full version which uses advanced heuristic scanning technology to monitor your system and provide real-time protection to prevent the installation of most new malware. This technology runs at startup where it monitors every process and helps stop malicious processes before they can infect your computer. The database that defines the heuristics is updated as often as there is something to add to it. Keep in mind that Malwarebytes does not act as a real-time protection scanner for every file like an anti-virus program so it is intended to be a supplement, not a substitute. Enabling the Protection Module feature requires registration and purchase of a license key that includes free lifetime upgrades and support. After activation, Malwarebytes can be set to update itself and schedule scans automatically on a daily basis. The Protection Module is not intrusive as the program utilizes few system resources and should not conflict with other scanners or anti-virus programs. If you choose the free version, you can just use it as a stand-alone scanner, however, Malwarebytes' service (mbamservice.exe) will still show in Task Manager which is normal.

If any conflicts between Malwarebytes' and another security program are reported, suggested solutions are usually provided in the Common Issues, Questions, and their Solutions, FAQs thread. I know and have worked with some members of the research team so I can attest that they make every effort to resolve issues as quickly as possible.

List of Virus & Malware Resources:
You can also get a second opinion by performing an an Online Virus Scan.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 rogersjo

rogersjo
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 20 January 2011 - 01:25 PM

Can't thank you enough! Really cleared up what I needed to know and pointed me in the right direction.

Thanks so so much!

John

#4 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,685 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:10:57 PM

Posted 20 January 2011 - 01:53 PM

@rogersjo

One essential tool is the operating system you use. Are you using Windows Vista or Windows 7?
They offer you much more protection by making it easy to run as a Least-privilege User Account (LUA, or in other words, not an admin account).
That is, assuming you keep UAC enabled.

Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Senior Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2019
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"


#5 rogersjo

rogersjo
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 21 January 2011 - 08:37 AM

I'm using Windows 7 Didier. I see what you mean by using a User Account without admin rights would be safer. Thanks




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users