Hello Guest, welcome to torrentinvites.org - Your #1 source for Torrent Invites!
CLICK HERE to register for free and gain full access to TI.org!
Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!
23Likes
-
-
I'm also using Malwarebytes for several years on 5 computers and very satisfied.
-
Used them all but would have to be Malwarebytes
-
User
My experience is the best for detectión and quickly is avast
-
I think the best Anti Virus is ESET Nod32. Too.
-
Best Antiviurs East Nod32 All Time
-
Back when I use to use windows 7 (I use ubuntu now) I use to and still run Malwarebytes(It just simply works) on most of my windows boxes. Back in the day it was avast/mbam combo which worked very well, But the job of a antivirus is just basically a glorified IDS(Depending on features) with the ability to detect worms/malware/trojans/etc via filehash, So really when picking "The best av" is to pick one with a high detection rate etc, So far mbam has done this perfectly
However if the file source is a stub/encrypted then the antivirus wont be able to pick it up at runtime because the code has had obfuscation applied, Helping the malware evade AV, A lot(if not all) of it will be written into memory (Typically via DLL injection) to evade detection(Disk writing will normally alert a av). Typically researchers will perform Static Analysis of the malware first to get a good-overview of what the malware is trying to do, This could be looking for certain strings(string extraction) This way we can analyze a malware sample without actually executing it. Researchers can also do Dynamic Analysis to learn the behaviour of malware, which requires live execution. Then studying the behaviour of what it does upon/after execution, i.e Did that malware just drop something in my Documents folder? Did it just try to make a log file, config file, etc?
If anyone is interested in windows malware, Make sure to check out the Flare-VM project:https://github.com/fireeye/flare-vm
You can also build the vm from scratch your self, But they make take time to setup properly.
I also tend to use CCleaner and Rougekiller when cleaning infected computers, As well as some boot time scan disks for a deeper clean. I also tend to do all of this in safe mode(WITH NO NETWORKING)
Also social engineering: If it is to good to be true then it prob is.
Last edited by Darkzy; 12-10-2020 at 09:19 AM.
Reason: More info for malware analysis
-
kaspersky is killing ram.. i am using eset nod32
-
BitDefender Total Security, but I admit I am subjective. So, don't hit me too hard.
-
User
My li'l brother is. Kaspersky is a close second.
Tags for this Thread
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules