MBAM 1.34 Released Today.

A

Ari©

Then the individuals are trusting the advise they are given. They may
not understand the risks but it is still their responsibility to make
the decision.

John

Watching this "debate" is like a room full of Christian women who are
commenting about each others blue hair.
 
B

~BD~

Hello Pete :)

Thank you for your email message, short and sweet though it was! I had hoped
that you would have responded to my reply but ............... ah, well!
Paranoid?

A long time ago someone said to me " Just because you are paranoid, it
doesn't mean that someone is *not* following you!" - Think on that!

No - I am not paranoid. I am seeking only the truth and a better
understanding of what bad guys do and why they do it. Oh yes ...... and
*how*!

Almost a bit like Conficker, huh? Reads like good, safe computing and
realtime antimalware applications are needed Dave.


I have tried many anti-virus and anti-spyware programmes - free ones, trial
ones and some I have purchased from a retail store on disk. I have also been
to many dark and nasty places on the 'net and have no doubt at all that my
PC has been attacked. I've experimented with 'cleaning' with the help of
helpers on forums (some say fora!). I have experimented with Hijackthis
without help. I have played with Combofix, ATF Cleaner, SmitfraudFix etc.

I have also looked inside every file in System 32 using Notepad ('cause I
could and had the time!)

I have flattened both this and a previous machine many, many times and have
also used Norton Ghost from time to time too.
Reputation leads to trust. If David Lipman suggested an MBAM scan for a
particular infection you described in /your/ computer, what would you do?

In essence, do I trust David H Lipman?

In spite of all the bad things said about pcbutts1 - the *only* person ever
to send me pornographic filth by email was Mr Lipman himself.

Intrusion Detection Systems (IDS), realtime antimalware scans, or
flatten, rebuild, restore from backups.


My point is, Pete, that if all appears to operate normally, a user will not
seek out rogue programmes which may be running on their machine. A machine
could be compromised without their knowledge.

You already know that answer.


I *do* know - it can and does happen. The question remains, though
............. are some of those purporting to be good guys actually bad guys
in cognito?

Trust must start somewhere and some paranoia is useful.

MBAM has our trust through its reputation Dave. A bogus MBAM /could/ be
downloaded from a disreputable source of course. But by only
downloading from MalwareBytes.com, it comes as close to 100% trust as is
possible.

Some software authors will provide md5/sha1 hashes or PGP/GPG signed
files that accompany the download and this is welcomed by some, but some
reluctance on the part of authors and users is making that level of
verification difficult. How then do we implement: trust but verify?

If one is paralyzed by so much suspicion and doubt, then it's probably
best to leave your computer turned off or only surf the net and do email
through LiveCDs.

What will you do now Dave?


I really appreciate your help and advice, Pete. I read posts which you make
to others experiencing difficulty and I have no concerns about anything
*you* say. Although I still know little about computing matters I have a
sixth sense when it comes to noticing how some who post react and/or do not
tell the truth or who are inconsistent in their answers.

My strong inclination is to use Linux on this PC (when I can master things
better) ....... and buy myself an iMac after this years boating season!
 
B

~BD~

Btw - it's not just me who thinks these things

An integrated approach to endpoint protection

The IT threat landscape has changed dramatically over the past few years. In
the past, the

majority of attacks were meant simply to make headline news. Today, attacks
have become more

sophisticated and stealthy, targeting specific organizations to reap
financial gain. Professional

hackers continuously develop new tactics to gain unauthorized, undetected,
and ongoing access

to an organization's systems and information. One gauge of the growing
sophistication of attacks

is the appearance of blended threats, which integrate multiple attack
methods such as worms,

Trojan horses, and zero-day threats.

Antivirus, antispyware, and other signature-based protection measures, which
are primarily

reactive, may have been sufficient to protect an organization's vital
resources a few years ago,

but not so today. Organizations now need proactive endpoint security
measures that can

protect against zero-day attacks and even unknown threats. They need to take
a structured

approach to endpoint security, implementing a comprehensive solution that
not only protects

from threats on all levels, but also provides interoperability, seamless
implementation, and

centralized management.


From: SymantecT Endpoint Protection
A unified, proactive approach to

endpoint security
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top