FlyerTalk Forums

FlyerTalk Forums (https://www.flyertalk.com/forum/index.php)
-   Travel Technology (https://www.flyertalk.com/forum/travel-technology-169/)
-   -   Is this security routine overkill? (https://www.flyertalk.com/forum/travel-technology/1118447-security-routine-overkill.html)

ScottC Aug 23, 2010 10:58 am


Originally Posted by star_world (Post 14530255)
I am completely opposed to using any program that requires itself to be continually running in the background for AV / security. I haven't run any in at least 5 years and have never once found anything even remotely suspicious on any Windows PC I run. I do one-off scans every few months as a precaution but I've yet to come across anything to be concerned about.

The number one priority has got to be to stop running IE. With a modern OS (eg: Win7) plus a modern browser such as Firefox, you really have to go out of your way to let any sort of spyware get onto a PC. A few generations back (XP / IE7 / FF2) I'd only recommend this approach for people who were very aware of what they were doing, but these days I think the situation is somewhat different.

The performance drain caused by any of these "active" scanners is still simply too great, even on a relatively high-performance machine, IMHO.

I've always lived by this system too - until I installed MSE. It runs so smoothly in the background that it is the first app I don't mind running.

I'd feel perfectly safe without it, but I don't mind running something that doesn't bother me.

cordelli Aug 23, 2010 11:07 am

To me that's like saying you will only put your seatbelt on when you get into an accident, there's no need for it the rest of the time as you have gone years without needing it.

In the case of virus and malware, it's way better to deal with it before it gets to your machine, than it is to try to fix it later. I'm all for prevention instead of cure in this case.

ScottC Aug 23, 2010 11:11 am


Originally Posted by cordelli (Post 14531135)
To me that's like saying you will only put your seatbelt on when you get into an accident, there's no need for it the rest of the time as you have gone years without needing it.

In the case of virus and malware, it's way better to deal with it before it gets to your machine, than it is to try to fix it later. I'm all for prevention instead of cure in this case.

No -to me it is like sitting in my car with no seatbelts on, when it is in the garage :)

I know where malware and spyware comes from, so if I don't drive into it, It won't infect me. I keep up to date on things that need patching.

raistlin Aug 23, 2010 11:16 am


Originally Posted by star_world (Post 14531052)
I don't get your point - I certainly don't have a collection of "nasty stuff" on the hard drive.

How do you know, exactly ? Unless you are running a weird operating system where most malware cannot work (say, a customized version of QNX), possibly on customized hardware as well, or unless you never put any media on your machine and never, ever connected it to the Internet, there's no way on Earth you can know your machine is NOT infected.

You can know your machine is not BLATANTLY infected by COMMON malware. Which is a completely different thing than being sure you are not infected at all :)

You would be surprised at how some things out there are nasty, stealthy and quite good at tricking people into infecting themselve.

deubster Aug 23, 2010 11:18 am


Originally Posted by cordelli (Post 14531135)
To me that's like saying you will only put your seatbelt on when you get into an accident, there's no need for it the rest of the time as you have gone years without needing it.

In the case of virus and malware, it's way better to deal with it before it gets to your machine, than it is to try to fix it later. I'm all for prevention instead of cure in this case.

Agreed, but many have found that pure anti-virus and most commercial internet suite type products are not very good at catching and preventing Trojans, and Trojans (like the fake anti-virus programs) are creating more problems than viruses lately. Almost all the anti-malware products that can catch these seem to provide a major performance hit, as was previously mentioned regarding TeaTimer.

I'm glad MSE looks at both and seems to take little or no toll on performance. But I'm not yet certain how good it is, as I haven't seen it take on a serious Trojan or rootkit infestation. So I continue to recommend MSE with a weekly run of MalwareBytes.

raistlin Aug 23, 2010 11:19 am


Originally Posted by cordelli (Post 14531135)
To me that's like saying you will only put your seatbelt on when you get into an accident, there's no need for it the rest of the time as you have gone years without needing it.

In the case of virus and malware, it's way better to deal with it before it gets to your machine, than it is to try to fix it later. I'm all for prevention instead of cure in this case.

Totally agree. Except that anti-viruses are not a very good seat belt ;)

A good security practice would be to run a less-common operating system (say, Linux, or BSD), possibly with a browser using a no-scripting extension.

Sadly, antiviruses today are less and less effective. A single antivirus will catch, on average, more or less half of the threats you may run into.

I could lecture on this for hours, mind you. It's my job :p

raistlin Aug 23, 2010 11:50 am


Originally Posted by deubster (Post 14531203)
I'm glad MSE looks at both and seems to take little or no toll on performance. But I'm not yet certain how good it is

It's a generally difficult thing to say how good antivirus X is, or even how good it is compared to Y.

Let's say that, from what data I have, it is at very least in the league of all the major vendors.

star_world Aug 23, 2010 1:14 pm


Originally Posted by raistlin (Post 14531186)
How do you know, exactly ? Unless you are running a weird operating system where most malware cannot work (say, a customized version of QNX), possibly on customized hardware as well, or unless you never put any media on your machine and never, ever connected it to the Internet, there's no way on Earth you can know your machine is NOT infected.

You can know your machine is not BLATANTLY infected by COMMON malware. Which is a completely different thing than being sure you are not infected at all :)

You would be surprised at how some things out there are nasty, stealthy and quite good at tricking people into infecting themselve.

But that's the purpose of scanning on a regular basis. I've made the determination that scanning every month or two and confirming what I already believe to be true (i.e. no malware exists on the PC) is sufficient, compared with the (often drastic) overhead of a continually running AV / anti-malware program.

Believe me - the risk of being infected by malware, on a modern OS kept up to date, with a modern browser kept up to date and on a typical LAN connected behind any half decent router running NAT is tiny. I really do mean it - you'd have to go out of your way to end up with malware on the PC.

To ScottC - interesting point about MSE - I'd looked at it when it first came out and was somewhat sceptical, I may re-visit this though.

raistlin Aug 23, 2010 2:12 pm


Originally Posted by star_world (Post 14531959)
I've made the determination that scanning every month or two and confirming what I already believe to be true (i.e. no malware exists on the PC) is sufficient

You're obviously free to make your own risk assessments, but you seem to be working on some seriously wrong assumptions:


Believe me - the risk of being infected by malware, on a modern OS kept up to date, with a modern browser kept up to date and on a typical LAN connected behind any half decent router running NAT is tiny. I really do mean it - you'd have to go out of your way to end up with malware on the PC.
False. Witness the aurora incident:
http://www.symantec.com/connect/blog...-0-day-exploit

Those were all up-to-date pcs, running corporate antiviruses, behind a firewall and NAT.

Some of those were on state-of-the-art corporate networks (e.g., Google).

You are working under severely misguided assumptions. In today's corporate world, zero-day drive-by downloads are common and scary.

This is what I study for a living ;-)

star_world Aug 23, 2010 2:52 pm


Originally Posted by raistlin (Post 14532372)
False. Witness the aurora incident:
http://www.symantec.com/connect/blog...-0-day-exploit

Those were all up-to-date pcs, running corporate antiviruses, behind a firewall and NAT.

Some of those were on state-of-the-art corporate networks (e.g., Google).

You are working under severely misguided assumptions. In today's corporate world, zero-day drive-by downloads are common and scary.

This is what I study for a living ;-)

I have a good technical knowledge of the subject, believe me :)

We could debate this all day, but the fact is that for the type of event you mention above, you have virtually the same issue regardless of what security software you are running (or not). And further to that - the risk is kept small by applying general common sense with regards to what links are clicked on, what websites are visited, etc.

On that basis, how are my assumptions misguided? :)

ScottC Aug 23, 2010 2:56 pm


Originally Posted by raistlin (Post 14532372)
You're obviously free to make your own risk assessments, but you seem to be working on some seriously wrong assumptions:



False. Witness the aurora incident:
http://www.symantec.com/connect/blog...-0-day-exploit

Those were all up-to-date pcs, running corporate antiviruses, behind a firewall and NAT.

Some of those were on state-of-the-art corporate networks (e.g., Google).

You are working under severely misguided assumptions. In today's corporate world, zero-day drive-by downloads are common and scary.

This is what I study for a living ;-)

But wouldn't that one mean you'd need to be using IE? The first lesson in security is to never use IE.

cblaisd Aug 23, 2010 3:06 pm

Didn't realize this would provoke such a colloquy ;)

I also didn't mention that I don't use IE (but do use FF) because I simply can't imagine why anyone who is serious about not catching crap would ever use such a virus/malware magnet.

ScottC Aug 23, 2010 3:08 pm


Originally Posted by cblaisd (Post 14532730)
Didn't realize this would provoke such a colloquy ;)

You new to this forum? :D

The only thing missing is someone telling you to "buy a Mac" :D

cblaisd Aug 23, 2010 3:14 pm


Originally Posted by ScottC (Post 14532744)
The only thing missing is someone telling you to "buy a Mac" :D

The day is young.

raistlin Aug 23, 2010 3:24 pm


Originally Posted by star_world (Post 14532649)
We could debate this all day, but the fact is that for the type of event you mention above, you have virtually the same issue regardless of what security software you are running (or not).

I completely agree on that, if you look back to my posts ;-)

What I take issue with is the other part of your assumption:


And further to that - the risk is kept small by applying general common sense with regards to what links are clicked on, what websites are visited, etc.
The risk is not really small. It is, indeed, quite significant. It may be subjectively acceptable to you, but for sure it would not be for any large organization employing you.

I.E. you would never be allowed anywhere near a network whose security policies I write :)


All times are GMT -6. The time now is 8:21 pm.


This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.