![]() |
Is this security routine overkill?
Here's what I currently do for security (and to try to keep crud from building up in the Registry)
1. Am running Microsoft Security Essentials (have tried the other freewares, and even though I didn't want to like it, MSE gives the least performance hit by far) 2. Every time I uninstall a program (and once a week anyway) I run CC Cleaner to cleanse the Registry and the detritus from programs (temp files, etc.) 3. I run SpyBot Search and Destroy once a week, and also have its TeaTimer function engaged along with passive immunization (I am also using their .hosts file to divert crapware calls) Even thought my ThinkPad x100e (Windows 7 Home Premium) is speedy for its form factor, I want as little overhead in terms of services, etc., but not at the expense of security. Is the SpyBot routine overkill? Ever since starting to use MSE, Spybot very seldom finds any spywares. Any other suggestions? |
Install Ubuntu. It will double your speed and reduce security risks to almost zero. It can setup a dual boot for windows if you want.
|
Thank you, but that really isn't going to be an option here.
|
Sounds pretty much like my routine. I used to run Spybot, Adaware, and Spyware Blaster regularly, along with CCleaner and NIS 20XX, but after at least two years of finding nothing but cookies I'm down to NIS and CC, along the Linksys router's protections.
|
This sounds pretty normal and about what I do. I actually add a bi-weekly scan with malwarebytes to the mix and I use web root spy sweeper instead of S&D since I found that it picks up slightly more stuff and the run time overhead seems negligible. No issues in years.
|
Sounds normal for anyone using IE :p
I find Spybot S&D to be useless when you are already running Malwarbytes & a Top Rated Virus/malware program. CCleaner is a good bi-weekly run. Of course none of this is matters if your not updating them weekly at a minimum. |
Threads like these make me glad I do not waste countless hours trying to find and delete viruses and spyware from windows.
|
Originally Posted by cblaisd
(Post 14519459)
Here's what I currently do for security (and to try to keep crud from building up in the Registry)
1. Am running Microsoft Security Essentials (have tried the other freewares, and even though I didn't want to like it, MSE gives the least performance hit by far) 2. Every time I uninstall a program (and once a week anyway) I run CC Cleaner to cleanse the Registry and the detritus from programs (temp files, etc.) 3. I run SpyBot Search and Destroy once a week, and also have its TeaTimer function engaged along with passive immunization (I am also using their .hosts file to divert crapware calls) Even thought my ThinkPad x100e (Windows 7 Home Premium) is speedy for its form factor, I want as little overhead in terms of services, etc., but not at the expense of security. Is the SpyBot routine overkill? Ever since starting to use MSE, Spybot very seldom finds any spywares. Any other suggestions? As always, the prime source of spyware and visruses is yourself - keep your OS up to date, don't download stuff from weird locations and avoid crappy browsers like IE. |
Originally Posted by Jim055
(Post 14525461)
Threads like these make me glad I do not waste countless hours trying to find and delete viruses and spyware from windows.
The steps the OP outlined are not "countless hours". With the exception of running CC cleaner, it all happens behind the scenes and scheduled. I spend no more than 5 minutes a month on my AV/spyware software. |
Originally Posted by ScottC
(Post 14525499)
Lemme guess - you use a Mac?
The steps the OP outlined are not "countless hours". With the exception of running CC cleaner, it all happens behind the scenes and scheduled. I spend no more than 5 minutes a month on my AV/spyware software. |
I'd call it a bit of overkill for a cautious, savvy user. Spybot S&D doesn't work nearly as well as Malwarebytes these days, and I've found TeaTimer to be intrusive. On my desktop machine, I run Norton AV 2010 behind a good hardware firewall/router (Netopia ENT-3386), and every other week or so I run Malwarebytes. I also have a modified HOSTS file to speed up page loading. On my laptop (dual-boot Vista Business / Windows 7 Pro) I run Microsoft Security Essentials.
Oh, I do keep a desktop computer, separated on its own VLAN, that I use to try risky web things or run risky programs, and I sometimes mount other hard drives in it to scan them (e.g., they have a Trojan or virus that prevents them from booting or running normally). |
If it's working for you I say stick with it. Teatimer brings my machines down to zero speed and 100% utilization, so that wouldn't work for me.
The spybot on top of the MSE may be a bit overboard for a normal system in non high risk use, but if it's working for you I say stick with it. |
I am completely opposed to using any program that requires itself to be continually running in the background for AV / security. I haven't run any in at least 5 years and have never once found anything even remotely suspicious on any Windows PC I run. I do one-off scans every few months as a precaution but I've yet to come across anything to be concerned about.
The number one priority has got to be to stop running IE. With a modern OS (eg: Win7) plus a modern browser such as Firefox, you really have to go out of your way to let any sort of spyware get onto a PC. A few generations back (XP / IE7 / FF2) I'd only recommend this approach for people who were very aware of what they were doing, but these days I think the situation is somewhat different. The performance drain caused by any of these "active" scanners is still simply too great, even on a relatively high-performance machine, IMHO. |
Originally Posted by star_world
(Post 14530255)
I am completely opposed to using any program that requires itself to be continually running in the background for AV / security. I haven't run any in at least 5 years and have never once found anything even remotely suspicious on any Windows PC I run.
But you have a point in the fact that you COULD have a nice collection of nasty malware even with a continuously running AV. |
Originally Posted by raistlin
(Post 14530330)
Which is quite different from not having a nice collection of nasty stuff on the hard drive, of course :rolleyes:
But you have a point in the fact that you COULD have a nice collection of nasty malware even with a continuously running AV. |
Originally Posted by star_world
(Post 14530255)
I am completely opposed to using any program that requires itself to be continually running in the background for AV / security. I haven't run any in at least 5 years and have never once found anything even remotely suspicious on any Windows PC I run. I do one-off scans every few months as a precaution but I've yet to come across anything to be concerned about.
The number one priority has got to be to stop running IE. With a modern OS (eg: Win7) plus a modern browser such as Firefox, you really have to go out of your way to let any sort of spyware get onto a PC. A few generations back (XP / IE7 / FF2) I'd only recommend this approach for people who were very aware of what they were doing, but these days I think the situation is somewhat different. The performance drain caused by any of these "active" scanners is still simply too great, even on a relatively high-performance machine, IMHO. I'd feel perfectly safe without it, but I don't mind running something that doesn't bother me. |
To me that's like saying you will only put your seatbelt on when you get into an accident, there's no need for it the rest of the time as you have gone years without needing it.
In the case of virus and malware, it's way better to deal with it before it gets to your machine, than it is to try to fix it later. I'm all for prevention instead of cure in this case. |
Originally Posted by cordelli
(Post 14531135)
To me that's like saying you will only put your seatbelt on when you get into an accident, there's no need for it the rest of the time as you have gone years without needing it.
In the case of virus and malware, it's way better to deal with it before it gets to your machine, than it is to try to fix it later. I'm all for prevention instead of cure in this case. I know where malware and spyware comes from, so if I don't drive into it, It won't infect me. I keep up to date on things that need patching. |
Originally Posted by star_world
(Post 14531052)
I don't get your point - I certainly don't have a collection of "nasty stuff" on the hard drive.
You can know your machine is not BLATANTLY infected by COMMON malware. Which is a completely different thing than being sure you are not infected at all :) You would be surprised at how some things out there are nasty, stealthy and quite good at tricking people into infecting themselve. |
Originally Posted by cordelli
(Post 14531135)
To me that's like saying you will only put your seatbelt on when you get into an accident, there's no need for it the rest of the time as you have gone years without needing it.
In the case of virus and malware, it's way better to deal with it before it gets to your machine, than it is to try to fix it later. I'm all for prevention instead of cure in this case. I'm glad MSE looks at both and seems to take little or no toll on performance. But I'm not yet certain how good it is, as I haven't seen it take on a serious Trojan or rootkit infestation. So I continue to recommend MSE with a weekly run of MalwareBytes. |
Originally Posted by cordelli
(Post 14531135)
To me that's like saying you will only put your seatbelt on when you get into an accident, there's no need for it the rest of the time as you have gone years without needing it.
In the case of virus and malware, it's way better to deal with it before it gets to your machine, than it is to try to fix it later. I'm all for prevention instead of cure in this case. A good security practice would be to run a less-common operating system (say, Linux, or BSD), possibly with a browser using a no-scripting extension. Sadly, antiviruses today are less and less effective. A single antivirus will catch, on average, more or less half of the threats you may run into. I could lecture on this for hours, mind you. It's my job :p |
Originally Posted by deubster
(Post 14531203)
I'm glad MSE looks at both and seems to take little or no toll on performance. But I'm not yet certain how good it is
Let's say that, from what data I have, it is at very least in the league of all the major vendors. |
Originally Posted by raistlin
(Post 14531186)
How do you know, exactly ? Unless you are running a weird operating system where most malware cannot work (say, a customized version of QNX), possibly on customized hardware as well, or unless you never put any media on your machine and never, ever connected it to the Internet, there's no way on Earth you can know your machine is NOT infected.
You can know your machine is not BLATANTLY infected by COMMON malware. Which is a completely different thing than being sure you are not infected at all :) You would be surprised at how some things out there are nasty, stealthy and quite good at tricking people into infecting themselve. Believe me - the risk of being infected by malware, on a modern OS kept up to date, with a modern browser kept up to date and on a typical LAN connected behind any half decent router running NAT is tiny. I really do mean it - you'd have to go out of your way to end up with malware on the PC. To ScottC - interesting point about MSE - I'd looked at it when it first came out and was somewhat sceptical, I may re-visit this though. |
Originally Posted by star_world
(Post 14531959)
I've made the determination that scanning every month or two and confirming what I already believe to be true (i.e. no malware exists on the PC) is sufficient
Believe me - the risk of being infected by malware, on a modern OS kept up to date, with a modern browser kept up to date and on a typical LAN connected behind any half decent router running NAT is tiny. I really do mean it - you'd have to go out of your way to end up with malware on the PC. http://www.symantec.com/connect/blog...-0-day-exploit Those were all up-to-date pcs, running corporate antiviruses, behind a firewall and NAT. Some of those were on state-of-the-art corporate networks (e.g., Google). You are working under severely misguided assumptions. In today's corporate world, zero-day drive-by downloads are common and scary. This is what I study for a living ;-) |
Originally Posted by raistlin
(Post 14532372)
False. Witness the aurora incident:
http://www.symantec.com/connect/blog...-0-day-exploit Those were all up-to-date pcs, running corporate antiviruses, behind a firewall and NAT. Some of those were on state-of-the-art corporate networks (e.g., Google). You are working under severely misguided assumptions. In today's corporate world, zero-day drive-by downloads are common and scary. This is what I study for a living ;-) We could debate this all day, but the fact is that for the type of event you mention above, you have virtually the same issue regardless of what security software you are running (or not). And further to that - the risk is kept small by applying general common sense with regards to what links are clicked on, what websites are visited, etc. On that basis, how are my assumptions misguided? :) |
Originally Posted by raistlin
(Post 14532372)
You're obviously free to make your own risk assessments, but you seem to be working on some seriously wrong assumptions:
False. Witness the aurora incident: http://www.symantec.com/connect/blog...-0-day-exploit Those were all up-to-date pcs, running corporate antiviruses, behind a firewall and NAT. Some of those were on state-of-the-art corporate networks (e.g., Google). You are working under severely misguided assumptions. In today's corporate world, zero-day drive-by downloads are common and scary. This is what I study for a living ;-) |
Didn't realize this would provoke such a colloquy ;)
I also didn't mention that I don't use IE (but do use FF) because I simply can't imagine why anyone who is serious about not catching crap would ever use such a virus/malware magnet. |
Originally Posted by cblaisd
(Post 14532730)
Didn't realize this would provoke such a colloquy ;)
The only thing missing is someone telling you to "buy a Mac" :D |
Originally Posted by ScottC
(Post 14532744)
The only thing missing is someone telling you to "buy a Mac" :D
|
Originally Posted by star_world
(Post 14532649)
We could debate this all day, but the fact is that for the type of event you mention above, you have virtually the same issue regardless of what security software you are running (or not).
What I take issue with is the other part of your assumption: And further to that - the risk is kept small by applying general common sense with regards to what links are clicked on, what websites are visited, etc. I.E. you would never be allowed anywhere near a network whose security policies I write :) |
Originally Posted by ScottC
(Post 14532672)
But wouldn't that one mean you'd need to be using IE? The first lesson in security is to never use IE.
However, no, on a general basis there's just as much risk* of running into an IE zero-day, as there is of running into a Mozilla zero-day. The real lesson is, a machine based on a common operating system used for browsing should never be trusted to the point of saying "I know that this machine has no malware on it". You simply cannot know. * = I am oversimplifying. |
Originally Posted by ScottC
(Post 14532744)
The only thing missing is someone telling you to "buy a Mac" :D
|
| All times are GMT -6. The time now is 9:59 pm. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.