Nod32 seems to work fine for me. I haven't had any virus or any other attacks during the time i've been using it.
Nod32 seems to work fine for me. I haven't had any virus or any other attacks during the time i've been using it.
Last edited by BawA; 08-01-2008 at 07:49 AM.
"You can be mad as a mad dog at the way things went; you can swear and curse the fates, but when it comes to the end, you have to let go"Benjamen button
ya that's right , I noticed these features after I i get rid off NOD32 .
Kaspersky look great , but it's heavy on my PC , I started scanning my PC yesterday and it takes 12 hour to finish it ( have 350 giga hard drive ) .
Great advices ...
I have experienced some of them ,and I will put the others in my mind .
me too , but the problem is : did u try kaspersky ? did u scanned ur pc after NOD32 scanned them ?
I did and i found hundred of viruses .
so i advice u to try b4 somethin happened to ur PC
Even if a person entered safe sites , i'm sure that viruses come from other sources , like i said my flash disk contains 55 viruses that's after NOD32 has scanned it .
those aren't average users setting, if it isnt auto set up then 90% of its users wont dare going near to those setting. changing one of those setting may prevent a needed program to access the rights.
from what i understand from those pics is that you can apply rules to certain application, well when a virus hits you; you wont get time to set the parameters
Last edited by BawA; 08-01-2008 at 03:35 PM.
"You can be mad as a mad dog at the way things went; you can swear and curse the fates, but when it comes to the end, you have to let go"Benjamen button
I've never had a problem removing infected files detected by KIS. Sometimes the system will need to be rebooted but that's only when I've installed it on an already infected system.
Kaspersky is also very good at disinfecting files - where the original Windows file (executable, dll or whatever) has been infected then it's usually recoverable but if it's been replaced by a custom built file then it's a case of delete and replace with the original version.
This is a moot point, to be honest, since if KIS was running in the background anyway, the virus is almost always caught before it can take hold.
Remove infected IE? How would you manage that on Vista?
Sounds like this happened to someone you know and they didn't know what to do about it so just bumbled along blindly.
Since a crack will need to modify or replace files, they cannot be in use at the time it is applied. This would indicate that NOD32 wasn't running when you applied the crack.
How can NOD32 be to blame for not detecting it when it was applied?
Now you're just talking out of your arse.
AVG apparently detects and deletes keygens but I haven't heard of any other AV doing this.
Most AV programs will detect riskware such as P2P programs or those that can drop ad-/spy-ware and sometimes patches but this is not enabled by default.
How can you know what are standard settings when you haven't seen the program in action? KIS has always used standard settings for known programs/processes so the user doesn't need to approve every action of every process the first time it's run.
The exclamation symbols mean that when a process attempts to perform the action, the user will be asked to allow or deny it. There's an option in the requester for the action taken to be permanent.
This means that an unknown process such as a new virus will, when attempting to access startup settings for instance, activate the application control module in KIS so your argument that you don't have time to react is completely inaccurate.
There isn't a bargepole long enough for me to work on [a Sony Viao] - clocker 2008
cuz the crack it self was bundled in a exe archive, once run the virus was applied then it was caught, by the time it was late.Since a crack will need to modify or replace files, they cannot be in use at the time it is applied. This would indicate that NOD32 wasn't running when you applied the crack.
How can NOD32 be to blame for not detecting it when it was applied?
no buddy you replied out of your arse, if you had not seen such dont be sure about what you think, ive experienced NOD32 detecting and deleting my game cracks which were as clean as a water, and am not talking about one or two.Now you're just talking out of your arse.
AVG apparently detects and deletes keygens but I haven't heard of any other AV doing this.
Most AV programs will detect riskware such as P2P programs or those that can drop ad-/spy-ware and sometimes patches but this is not enabled by default.
that only IF virus is caught.This means that an unknown process such as a new virus will, when attempting to access startup settings for instance, activate the application control module in KIS so your argument that you don't have time to react is completely inaccurate.
anyway since you insets so much i must try KIS
"You can be mad as a mad dog at the way things went; you can swear and curse the fates, but when it comes to the end, you have to let go"Benjamen button
I like many malware programs but prefer Nod32 , its just user friendly . I switched to XP Pro 64 BIT O/S and found Eset just seems so quiet and uses so little resources and lets me go about my way .
I still use a Trojan program to protect me tho , as you can't be too careful . As others have pointed out if your just surfing the net any would be fine . I try maybe 3 or 4 cracked programs a week which include ken gens or cracks , so have to be on guard .
I use a site too that scans files for crap or malware , you just upload the folder in question and there you go . In 15 years of computing I'v never had a virus , Trojans are another matter .
Link : http://virusscan.jotti.org/
You'll notice that it has twenty or so programs that scan for malware but gives you a few false positives so its really a trade off , use at your own risk of course .
Last edited by peat moss; 08-02-2008 at 05:16 AM.
It doesn't matter how the trojan is delivered in this case. The point is that a crack CANNOT patch files that are in use; this is why the nfo always tells you to make sure the program isn't running when applying the patch.
You're talking out of your arse when you tell the world that MOST AV software behaves in this manner, which it does not, while basing your assumption on personal experience of a single program - one, it has to be said, that has a reputation for the least false-positives and an unmatched run of 100% detection rate in respected professional tests.
What do you mean "IF"? That's how malware unknown to the AV is caught FFS.
There isn't a bargepole long enough for me to work on [a Sony Viao] - clocker 2008
Bookmarks