Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Needed: "Thrifty" Anti-virus

Needed: "Thrifty" Anti-virus

Scheduled Pinned Locked Moved The Lounge
algorithmsbusinesshelpquestionannouncement
25 Posts 11 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • W W Balboos GHB

    The problem lies in that, of the several options I looked into, they all seemed to have the same plan. The key is reading the privacy terms during install before you accept them. I was just looking a BitDefender - and couldn't seem to find their privacy terms anywhere on their site. Probably, yet again, an install-time option.

    "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

    "As far as we know, our computer has never had an undetected error." - Weisert

    "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

    D Offline
    D Offline
    den2k88
    wrote on last edited by
    #16

    All this brought me to my mind: some time ago I was working for a morally dubious site, and part of the job was to keep updated on the competitors. Now, I wouldn't want those datas collected and sold and receive that content based avertisements...

    GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++*      Weapons extension: ma- k++ F+2 X If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver "When you have eliminated the JavaScript, whatever remains must be an empty page." -- Mike Hankey

    W 1 Reply Last reply
    0
    • W W Balboos GHB

      So I've been using/suggesting AVG free for any number of machines. Comes Oct 15th and they'll become spyware. Set up my firewall to keep it locked down, except for the occasional update - but they may be when they grab all the private data they've cached - so that seems like a poor option. Replacing it. I looked at a number of other on-line items with decent reputations, but, upon reading the TOS I found them to all be similarly busy minding my business. Any suggestions about thrifty (==free) alternatives (Mostly Win7)?

      "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

      "As far as we know, our computer has never had an undetected error." - Weisert

      "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

      M Offline
      M Offline
      Max Methot
      wrote on last edited by
      #17

      I've been using AVG for years as well and when I saw that news, I promptly uninstalled the hell out of it. I went for an open-source AV, in this case ClamWin and so far I like what I see. It isn't hard on the PC's resources and the virus database is updated automatically almost daily. The simple fact that it is open-source makes me feel safe. I even downloaded the source-code to have a look at it before installing. At least I know that it will not try to sell my personal information to a gazillion third-parties. Hope that helps!

      "It's hard to beat someone who never quits".

      W 1 Reply Last reply
      0
      • W W Balboos GHB

        http://www.zdnet.com/article/avg-releases-transparent-privacy-policy-yes-we-will-sell-your-data/[^] Better: google "avg privacy policy" - they turned up at the bottom half of the page. I also received a message from them about their new easy-to-read terms. I read them. They will be collecting de facto personally identifying information as it will include unique identifiers for you PC, ISP, etc. This, aside from anything you surrender to them on their site which can naturally be linked right back to you.

        "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

        "As far as we know, our computer has never had an undetected error." - Weisert

        "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

        F Offline
        F Offline
        Forogar
        wrote on last edited by
        #18

        I don't care. I used to (briefly) work for an actual "official" spyware company (it is used to do surveys for CNN and many other people). After seeing what they captured and the results of the software I wrote for them to link user's (Victim's?) bio-metric data to web activity histories I am not really worried about my data that much.

        - I would love to change the world, but they won’t give me the source code.

        1 Reply Last reply
        0
        • M Max Methot

          I've been using AVG for years as well and when I saw that news, I promptly uninstalled the hell out of it. I went for an open-source AV, in this case ClamWin and so far I like what I see. It isn't hard on the PC's resources and the virus database is updated automatically almost daily. The simple fact that it is open-source makes me feel safe. I even downloaded the source-code to have a look at it before installing. At least I know that it will not try to sell my personal information to a gazillion third-parties. Hope that helps!

          "It's hard to beat someone who never quits".

          W Offline
          W Offline
          W Balboos GHB
          wrote on last edited by
          #19

          This looks like a road upon which I'd like to travel. +5 I'll look into it. Downside - since it's open source - is that figuring out how to circumvent it could be easier.

          "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

          "As far as we know, our computer has never had an undetected error." - Weisert

          "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

          N 1 Reply Last reply
          0
          • W W Balboos GHB

            This looks like a road upon which I'd like to travel. +5 I'll look into it. Downside - since it's open source - is that figuring out how to circumvent it could be easier.

            "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

            "As far as we know, our computer has never had an undetected error." - Weisert

            "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

            N Offline
            N Offline
            Nicholas Marty
            wrote on last edited by
            #20

            W∴ Balboos wrote:

            Downside - since it's open source - is that figuring out how to circumvent it could be easier.

            This pretty much sums up the whole argument about open vs. closed source. :laugh: The open source folks countering that "with open source good people can check the source code and submit bugfixes before they are exploited by bad people". Which then gets countered by the closed source people that "nobody that's using open source software is actually looking at the source code but only uses it because it's free".

            W 1 Reply Last reply
            0
            • N Nicholas Marty

              Yeah, I know. Hence the Joke Icon ;-)

              D Offline
              D Offline
              DaveX86
              wrote on last edited by
              #21

              Too bad it can't detect all that new Windows 10 spying :laugh:

              1 Reply Last reply
              0
              • W W Balboos GHB

                So I've been using/suggesting AVG free for any number of machines. Comes Oct 15th and they'll become spyware. Set up my firewall to keep it locked down, except for the occasional update - but they may be when they grab all the private data they've cached - so that seems like a poor option. Replacing it. I looked at a number of other on-line items with decent reputations, but, upon reading the TOS I found them to all be similarly busy minding my business. Any suggestions about thrifty (==free) alternatives (Mostly Win7)?

                "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

                "As far as we know, our computer has never had an undetected error." - Weisert

                "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

                L Offline
                L Offline
                ledtech3
                wrote on last edited by
                #22

                I just use Microsoft Security Essentials, it is free and does a pretty good job. No single antivirus is 100 %. but you can not run 2 at the same time or they may end up fighting with each other, and or just slowing the system down.

                1 Reply Last reply
                0
                • D den2k88

                  All this brought me to my mind: some time ago I was working for a morally dubious site, and part of the job was to keep updated on the competitors. Now, I wouldn't want those datas collected and sold and receive that content based avertisements...

                  GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++*      Weapons extension: ma- k++ F+2 X If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver "When you have eliminated the JavaScript, whatever remains must be an empty page." -- Mike Hankey

                  W Offline
                  W Offline
                  W Balboos GHB
                  wrote on last edited by
                  #23

                  den2k88 wrote:

                  I was working for a morally dubious site,

                  . . . noted . . .

                  "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

                  "As far as we know, our computer has never had an undetected error." - Weisert

                  "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

                  D 1 Reply Last reply
                  0
                  • N Nicholas Marty

                    W∴ Balboos wrote:

                    Downside - since it's open source - is that figuring out how to circumvent it could be easier.

                    This pretty much sums up the whole argument about open vs. closed source. :laugh: The open source folks countering that "with open source good people can check the source code and submit bugfixes before they are exploited by bad people". Which then gets countered by the closed source people that "nobody that's using open source software is actually looking at the source code but only uses it because it's free".

                    W Offline
                    W Offline
                    W Balboos GHB
                    wrote on last edited by
                    #24

                    This is not an argument with your reasoning, per se, but just more clearly explains how my post fits into and out of your comment. I was addressing the code's availability as a liability only in that it's availability enables the 'bad guys' to know their target explicitly. It's like a bank vault who's lock designs are publicly available. For most open-source items (Gimp2, Audacity, &etc) this is not a problem. One should always download from the parent site (or mirrors they supply) to avoid imitation versions, but that's true of everything. Since I don't rely upon these for security, knowledge of their code is not a weakness if I've a genuine version. And then, of course, one wonder how really unknown are the working of non-open-source AV products? A clever hacker wouldn't announce cracking it - just quietly exploit it.

                    "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

                    "As far as we know, our computer has never had an undetected error." - Weisert

                    "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

                    1 Reply Last reply
                    0
                    • W W Balboos GHB

                      den2k88 wrote:

                      I was working for a morally dubious site,

                      . . . noted . . .

                      "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

                      "As far as we know, our computer has never had an undetected error." - Weisert

                      "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

                      D Offline
                      D Offline
                      den2k88
                      wrote on last edited by
                      #25

                      W∴ Balboos wrote:

                      . . . noted . . .

                      I was young and needed the money!

                      GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++*      Weapons extension: ma- k++ F+2 X If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver "When you have eliminated the JavaScript, whatever remains must be an empty page." -- Mike Hankey

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups