FAO: Microsoft Security Essentials lovers...

If UAC pops up with this message:

"Norovirus requests permission to anally rape you"

It's normally a give away that you shouldn't allow it access.
 
Common sense and not clicking on things you don't know not enough for you?

99% of "infections" happen because the user has said it ok for it to happen!
 
The last virus to get me was "CIH" (it was a big'un back in the late 90's) and I got it from a PC Pro magazine CD-ROM disc (!). It infected all my files and even tried to destroy my BIOS. Nasty piece of work.

Fortunately it was a simple "file replicator" strain of virus for which AV tools were perfectly suited to dealing with back then, and I duly used one, from a MS-DOS boot disk.

I remember that one, it got me too
 
Common sense and not clicking on things you don't know not enough for you?

99% of "infections" happen because the user has said it ok for it to happen!

Even "safe" websites have been known to serve up bad stuff from time to time and unfortunately malware generally doesn't ask nicely for permission to install.
 
UAC isn't a security boundary so shouldn't really be relied upon.

UAC isn't, no. But Windows NT's security is. And UAC is merely an added convenience on top of that.

UAC simply provides a "split token" that allows an administrator account to operate as a standard user and then partially elevate as and when needed by applications. It also provides cryptographic services by verifying any code signatures on the program you are about to execute which gives the user a greater ability to make an informed decision.
 
So without AV what tips you off that you have a problem? For the less in your face malware of course.

Autoruns, Rootkit Revealer et al? And then there's non direct approaches like listening to what your computer is telling you. Is it running slow? Are apps randomly crashing with no obvious pattern? Has your bandwidth suddenly taken a severe drop? Is the Event Viewer full of suspicious activity? If any of these suspicions seem founded then it takes 5 minutes to boot into a Recovery Console prompt and take a peep at your System32 folder for any strange looking .sys files. Even the most advanced rootkits can't hide themselves if you don't boot from the OS on which they're installed ;)

Generally though if a virus is sophisticated enough then no tool, and certainly not some poxy "anti virus", will be able to detect it. Just look at the Iranians. I'm sure they were running AV on their nuke lab computers but it didn't save them did it?
 
Back to basics, when my parents surf the net.. and my dad looks a dodgy site then who's going to protect him? Superman? No, an anti virus program

No it won't. An AV cannot provide a consistent and predictable level of security.

Lock your dad's machine down with a standard user account. And set Windows Update to the recommended settings. Remove vulnerable crap like Java JRE, Flash, Acrobat. Job done.
 
Back to basics, when my parents surf the net.. and my dad looks a dodgy site then who's going to protect him? Superman? No, an anti virus program

No. We wouldn't have a malware problem if AV protected people. He should be protected from drive-by exploit kits if his system is fully patched.

Patch his OS and set updates to automatic.
Remove Java if installed.
Download latest version of Flash, default option is automatic updates.
Download & install the latest version of Adobe reader or install a superior alternative such as Sumatra.
Install Secunia PSI, let it scan and update any out-of-date software.

Do the above for him to get him going and it'll provide way more protection than any AV.
 
My parents live 150 miles away. In the last 5 years they have discovered the internet and love it - but viruses galore. My brother works in IT and says don't bother with anti virus programs, he fixes their machine when it goes wrong. And it goes on.

Mum gets fed up. God knows what Dads looking at.

So anyway, to cut a long story short, I'm fed up with them running into problems with viruses. I Installed Kaspersky on the laptop, and honestly, no problems for a year and a half.
 
Just take the situation out of their hands by locking the machine down. Simples.

What OS is this btw? And what steps have you taken to remedy the situation before just reaching for the tin foil hat that is an AV product?
 
Ignorance is bliss. :)

Use LogMeIn or TeamViewer for remote support. A common misconception is that one has to browse "dodgy" sites to get infected, not true. Legit sites are compromised all the time.
 
UAC isn't, no. But Windows NT's security is. And UAC is merely an added convenience on top of that.

UAC simply provides a "split token" that allows an administrator account to operate as a standard user and then partially elevate as and when needed by applications. It also provides cryptographic services by verifying any code signatures on the program you are about to execute which gives the user a greater ability to make an informed decision.

If the security value in verifying image signatures is based on gathering information to make an informed decision, then antivirus software and/or services can contribute to that information.

1. UsefulProgram.exe has a verified signature

2. UsefulProgram.exe has a verified signature and also checks clean against hundreds of thousands of known malware definitions.

The second scenario is logically more informed than the first and can aid decision making in a positive way.
 
Ignorance isn't bliss. That's why I installed Kaspersky on their laptop last year. I'm not an expert. But Updating to an new OS would be a good idea

User education is far more powerful and effective than paying for an AV product and assuming it'll protect them from all ills. Did you sit down and explain about the web, email attachments etc?
 
Back
Top Bottom