Hey Virgorising, if you want to learn a little more about non-typical security programs the "other anti-malware software" at wilder security forums is a good place to find out what others are using.
http://www.wilderssecurity.com/forums/other-anti-malware-software.35/
In the past I spent too much time at that forum but I did learn a lot. The sandboxing and virtualization forum is also helpful. I'm running a combo of HIPS, AV with behavior blocker, Sandboxie and I sometimes enable a light virtualization app. Using Sandboxie is like wearing a condom when you surf. I even force my download folder to be sandboxed in case I accidentally double click something before it's scanned. Everything I download is from reputable sites and it is scanned by multiple scanners.
Finding a security setup that is perfect for you and gets along with your other programs is actually kinda nice as long as you don't get OCD about it.
Wow. On a scale of 1-10, what youve evolved re protection is a 16!
😀 I will consider each element youve chosen.
Wilders looks OUTSTANDING in the data they offer! Thanks much for that:thumbsup:.
Early, on, and I think I am usually good delver and judge of software---I evolved an amalgam far more modest but, I felt, effective. As time passed, and as of now, Ive settled on Norton IS
.last 2 builds are excellent, rated in the top 3 for good reasons. Bitdefender is also highly rated, but I never tried it.
I used to run MBAM Pro or Superanti Pro in real time---one or the other, but no longer do; I scan with both every coupla days. Between those 3, it appeared a given system was OK.
I have always tracked independent reviews based on real deal benchmarks/testing for each app
.given each changes build by build.
I have carefully chosen add ons in Pale moon and even IE. But I surf safely, and in PM always temporarily allow scripts to run. I mean someone could just go nuts trying to assess that, right?
Norton automatically scans every download....fast as lightening.
And now, I have this anti keylogger. Not entirely snake oil, but polly also not necessary.
So far, Ive never had a real infection, and the number of friends infected systems I have cleaned up is beyond belief
but what Kasksperky has recently shared has catapulted me out of any former trust illusions into feeling hugely vulnerable. Even gob smacked, given, I had no clue.
For me, being smart/staying safe from external evils to the extent we CAN while also maintaining the connection speeds we pay for, I think was the goal.
But now that we know we have a spy in the firmware of our drives
.I fear I may just be flailing.:|
Thanks so much for this detailed account again, I will consider each element.
🙂