|
Post by Darkjester on Sept 8, 2008 22:31:49 GMT -5
Hey Anybody got anygood antivirus software? Or a way of killing my nfected computer got traptdoored and Someone tried to hack me twice now? any ideas?
|
|
|
Post by James :) (aka Madcow) on Sept 9, 2008 9:29:53 GMT -5
tried avg?
|
|
|
Post by Darkjester on Sept 9, 2008 14:57:54 GMT -5
Not yet but im sure it would help. Ive got the backdoor dead now and im fight multiplication ive got some speed back but those freaking trojins keep undooing my fixes
|
|
|
Post by James :) (aka Madcow) on Sept 10, 2008 1:55:31 GMT -5
hhmmmm last time i had the problem i had to reinstall windows.
but heres what to do in the order of usefullness;
1. try avg loads of times
2. if viruses still their disconnect from internet and run avg
3. if their still their repeat steps 1 and 2 as many times as you like with diffrent anti virus prgrams (norton, mc afey, kapaski, panda)
4. if it still dosn't work your last resort is to reinstall windows
|
|
|
Post by Tom Mulgrew on Sept 10, 2008 5:30:30 GMT -5
Hey Anybody got anygood antivirus software? Or a way of killing my nfected computer got traptdoored and Someone tried to hack me twice now? any ideas? AVG, Spybot Search-and-destroy & Lavasoft-Adaware are the free tools I generally use. -Tom
|
|
|
Post by Darkjester on Sept 10, 2008 6:18:56 GMT -5
Thnx Tom  Im getting it worked out now.
|
|
|
Post by STT on Sept 16, 2008 6:49:53 GMT -5
While we're on the topic, what's a good firewall?
|
|
|
Post by Darkjester on Sept 17, 2008 15:49:49 GMT -5
Threatfire is ok its not 100 percent 97(100 if you dont look at Adult websites or download files from Torrent sites *like i did  *)
|
|
|
Post by matthew on Sept 17, 2008 16:13:33 GMT -5
On my computer which runs Vista I'm using the built-in Windows Firewall, Windows Defender & Avira AntiVir. I've had no problems to report so far. 
|
|
|
Post by Darkjester on Sept 17, 2008 16:30:00 GMT -5
I will have to check out that antivir program (im still infected to some exten, quarantined but AVG cant delete the files)
|
|
|
Post by Pizzasgood on Sept 17, 2008 16:33:25 GMT -5
Dig trench in circle of 15 meter radius around computer. Fill with tall spiked upright logs (say, three-four meters), soaked in the accelerant of your choice. Place all MS-containing-media in trench for good measure. Ready stick and marshmallows. Light match and drop into trench. Roast marshmallows while enjoying firewall.
|
|
|
Post by Darkjester on Sept 17, 2008 16:35:08 GMT -5
Lol nice one MS(Microsoft?)  Puppy Linux?
|
|
|
Post by Pizzasgood on Sept 18, 2008 10:36:35 GMT -5
Any Linux will do better than Windows. Sure, Windows can be made as secure as Linux, but that takes a lot of work and continuous maintenance.
I think one of the biggest differences, security-wise, is that it's extremely difficult for malware to simply install itself in Linux. Linux people get really grouchy about that sort of thing, and since Linux is created for and by Linux people, there are few apps that make that possible. The user must initiate any installation. The main weakness in that regard is the browser, but there are ways around this (such as setting the browser to run as a completely different and severely limited user, thus isolating it from the bulk of the system). That leaves trojans and remote access as the main vectors of attack. Remote access can be blocked easily by not running remote access daemons if you don't need to. You cannot ssh into my machine if sshd is not running, period. When you do need them running, you can limit them to specific IP ranges, set things up to block people after a specific number of failed attempts, etc. You can also devise a gauntlet of sorts, such that after logging in through ssh you're left a limited user who must answer a series of passwords and questions in order to gain privileges. That sort of thing is only needed by the truly paranoid. I intend to set one up just for fun, but am not actually paranoid enough to use it. Too lazy.
So that leaves trojans. Not a whole lot you can do to avoid a program written from the ground up to be a trojan. You can however minimize the chances that an otherwise good program has had a trojan slipped in by a third party by obtaining the source code directly from the developer's website and compiling it yourself (not a very difficult process, generally just consists of running three standard commands: ./configure, make, and make install).
If you were really paranoid you could read the source yourself but that isn't very practical. It is a nice option to have if the program does something to make you suspicious though.
|
|
|
|
Post by smc44 on Oct 2, 2008 17:05:42 GMT -5
hey did anybody think of making an anti virus in basic4gl everyone could help................ maybe.............
|
|