Posted 09 November 2016 - 09:14 AM
Hi, shelf life!
Thank you for the prompt and insightful reply, as well as the heads-up!
Your link makes for interesting reading!
Indeed, this is an aspect of malware that should not be overlooked, however I suppose generally most, if not all Anti-Virus vendors do already know.
It is possible to manually check open TCP and UDP ports by running NETSTAT -a from an elevated command prompt (CMD).
BTW, as for AV/AM/AE/AR, I personally have EAM Pro, SpywareBlaster, WinPatrol PLUS, HitmanPro.Alert with CryptoGuard, MBAM Free, Acronis True Image 2017 and Secunia PSI as my real-time multi-layered software defence security against malware.
Thank you very much for the help!
Edited by midimusicman79, 10 November 2016 - 07:01 AM.
MS Win 10 Pro 64-bit, EAM Pro/EEK, MB 3 Free, WPP, SWB Free, CryptoPrevent Free and Unchecky, WFW, FFQ with uBO, Ghostery, Grammarly Free and HTTPS Ew. Acronis TI 2018, K. Sw. Upd. AM-tools: 9-lab RT BETA, AdwCleaner, Auslogics AM, aswMBR, Avira PCC, BD ART, catchme, Cezurity AV, CCE, CKS, ClamWin P., Crystal Sec., DDS, DWCI, EMCO MD, eScan MWAV, ESS/EOS, FGP, FMTB, FRST, F-SOS, FSS, FreeFixer, GMP, GMER, hP BETA, HJT, Inherit, JRT, K. avz4, KVRT, K. TDSSKiller, LSP-Fix, MB 3 Free, MBAR BETA, MA Stinger, NMC, NoBot, NPE, NSS, NVT MRF (NMRF), OTL, PCC, QD, RCS, RSIT, RKill, Rs, SC, SR, SAP, SVRT, SAS, SL, TMHC, TSA ART, UHM, Vba32 AR, VRS, WR (AiO), Xvirus PG, ZAM, ZHPC, ZHPD and Zoek. I have 23 Years of PC Experience. Bold = effective.