Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Needed: "Thrifty" Anti-virus

Needed: "Thrifty" Anti-virus

Scheduled Pinned Locked Moved The Lounge
algorithmsbusinesshelpquestionannouncement
25 Posts 11 Posters 4 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N Nicholas Marty

    Yeah, I know. Hence the Joke Icon ;-)

    D Offline
    D Offline
    DaveX86
    wrote on last edited by
    #21

    Too bad it can't detect all that new Windows 10 spying :laugh:

    1 Reply Last reply
    0
    • W W Balboos GHB

      So I've been using/suggesting AVG free for any number of machines. Comes Oct 15th and they'll become spyware. Set up my firewall to keep it locked down, except for the occasional update - but they may be when they grab all the private data they've cached - so that seems like a poor option. Replacing it. I looked at a number of other on-line items with decent reputations, but, upon reading the TOS I found them to all be similarly busy minding my business. Any suggestions about thrifty (==free) alternatives (Mostly Win7)?

      "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

      "As far as we know, our computer has never had an undetected error." - Weisert

      "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

      L Offline
      L Offline
      ledtech3
      wrote on last edited by
      #22

      I just use Microsoft Security Essentials, it is free and does a pretty good job. No single antivirus is 100 %. but you can not run 2 at the same time or they may end up fighting with each other, and or just slowing the system down.

      1 Reply Last reply
      0
      • D den2k88

        All this brought me to my mind: some time ago I was working for a morally dubious site, and part of the job was to keep updated on the competitors. Now, I wouldn't want those datas collected and sold and receive that content based avertisements...

        GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++*      Weapons extension: ma- k++ F+2 X If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver "When you have eliminated the JavaScript, whatever remains must be an empty page." -- Mike Hankey

        W Offline
        W Offline
        W Balboos GHB
        wrote on last edited by
        #23

        den2k88 wrote:

        I was working for a morally dubious site,

        . . . noted . . .

        "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

        "As far as we know, our computer has never had an undetected error." - Weisert

        "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

        D 1 Reply Last reply
        0
        • N Nicholas Marty

          W∴ Balboos wrote:

          Downside - since it's open source - is that figuring out how to circumvent it could be easier.

          This pretty much sums up the whole argument about open vs. closed source. :laugh: The open source folks countering that "with open source good people can check the source code and submit bugfixes before they are exploited by bad people". Which then gets countered by the closed source people that "nobody that's using open source software is actually looking at the source code but only uses it because it's free".

          W Offline
          W Offline
          W Balboos GHB
          wrote on last edited by
          #24

          This is not an argument with your reasoning, per se, but just more clearly explains how my post fits into and out of your comment. I was addressing the code's availability as a liability only in that it's availability enables the 'bad guys' to know their target explicitly. It's like a bank vault who's lock designs are publicly available. For most open-source items (Gimp2, Audacity, &etc) this is not a problem. One should always download from the parent site (or mirrors they supply) to avoid imitation versions, but that's true of everything. Since I don't rely upon these for security, knowledge of their code is not a weakness if I've a genuine version. And then, of course, one wonder how really unknown are the working of non-open-source AV products? A clever hacker wouldn't announce cracking it - just quietly exploit it.

          "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

          "As far as we know, our computer has never had an undetected error." - Weisert

          "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

          1 Reply Last reply
          0
          • W W Balboos GHB

            den2k88 wrote:

            I was working for a morally dubious site,

            . . . noted . . .

            "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

            "As far as we know, our computer has never had an undetected error." - Weisert

            "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

            D Offline
            D Offline
            den2k88
            wrote on last edited by
            #25

            W∴ Balboos wrote:

            . . . noted . . .

            I was young and needed the money!

            GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++*      Weapons extension: ma- k++ F+2 X If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver "When you have eliminated the JavaScript, whatever remains must be an empty page." -- Mike Hankey

            1 Reply Last reply
            0
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Don't have an account? Register

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups