Aces High Bulletin Board
General Forums => Hardware and Software => Topic started by: TequilaChaser on July 27, 2008, 03:35:03 PM
-
In the past I have used Zone alarm ( and ZA Pro ) for my software firewall as a back up to the Firewall in my router
along with using NOD32......
I have heard others say Comodo is good, or that Kaspersky is good.........
I would like to hear others thoughts on this.
what is the better setup, smaller footprint/lowest processor usage in the background?
or should I stick with my NOD32 and ZoneAlarm Pro and my routers Fire Wall
or what about Comodo & Nod32 as a setup along with my Router's Firewall
any suggestions would be appreciated
-
Stick with NOD 32.
Let the ZA Pro license expire, then switch to Outpost Pro.
My $0.02
-
TC, FWIW, I use NOD32 and Comodo (but i turn the annoying 'safe search' and defence+ off). From what i have read Comodo scores pretty high in leak tests and is consistently one of the best. But it has started to become more 'bloaty' recently with 'value-added' 'features' etc etc which are a bit annoying - to me anyway.
ZA (Non-pro version) always seem to score pretty low in leak tests that I've seen.
But hey, im no expert on these sorts of things. Im sure Vulcan will chip in soon with his thoughts.
-
Im sure Vulcan will chip in soon with his thoughts.
LOL, I doubt we'll hear more than sales pitch for Sonicwall.
-
NOD32 seemed to work pretty good for me. It didn't take up a lot of resources in the background like some other. However, I did get a pretty good trojan a while back (my fault) and NOD32 couldn't stop all of it. I had to boot into safe mode and back everything up.
-
Comodo (free) for the software firewall.
AVG Free for Antivirus.
Spybot Search & Destroy for anti-adware/spyware.
Proximotron - proxy software for reducing displayed ads, to almost none. (speeds up page loading)
Wabbit
-
Comodo (free) for the software firewall.
AVG Free for Antivirus.
Spybot Search & Destroy for anti-adware/spyware.
Proximotron - proxy software for reducing displayed ads, to almost none. (speeds up page loading)
Wabbit
I agree with # 1-3 for sure, dont have any experiance with the last. I'd also consider threatfire as a compliment to AVG, its not a bad program at all and gives a bit of added "zero day" threat protection...an area AVG is historically week in.
-
If you're behind a hardware firewall, I would just uninstall the software firewall altogether.
IMHO, if your software firewall is complaining about something bad trying to phone home, then you're already infected. At best, it acts like a canary in the mine. Meh. I do concede that such software makes people feel better, so if you feel better about having it, then keep it.
NOD32 is still the best thing out there for lightweight, hard-core AV protection. Stick with it.
I recently reviewed SonicWall's low-end "home" intelligent router for CPU Magazine: the SonicWall TZ-180. Actually I looked at 4 different UTM devices, with a 5th being reviewed privately for its manufacturer. Though the SonicWall is a fine, very-high-end router with lots of useful features for the networking nerd, it is most definitely NOT a useful layer of AV and AS protection. Sorry.
The low-end sonicwall (and indeed, most of the low-end UTMs) only have definitions for about 8000 viruses, compared to more than 100,000 for even the free AV software. From a relatively small test zoo of 50 viruses, the TZ-180 only blocked ONE. It blocked exactly ZERO drive-by-downloads. It did block most of the worms on an infected machine from phoning home, which I don't consider to be terribly useful, since you're already seriously infected at that point. It blocked EXE attachments for any email, which is a good practice, but it's just a simple filtering rules instead of smart AV detecting threats. It merely "closes" outbound TCP/IP ports instead of "stealthing" them unless you change its default behavior.
Perhaps in a few years, these home-level devices will be a valid antivirus tool, but certainly not today.
If you're a subscriber, you can read all about it at http://www.computerpoweruser.com/editorial/article.asp?article=articles%2Farchive%2Fc0808%2F07c08%2F07c08%2Easp&articleid=48903&guid=6B00BFDE9CEF47B7A794A93281415571&searchtype=0&WordList=SONICWALL&bJumpTo=True (http://www.computerpoweruser.com/editorial/article.asp?article=articles%2Farchive%2Fc0808%2F07c08%2F07c08%2Easp&articleid=48903&guid=6B00BFDE9CEF47B7A794A93281415571&searchtype=0&WordList=SONICWALL&bJumpTo=True)
-Llama
-
If you're behind a hardware firewall, I would just uninstall the software firewall altogether.
Depends. In today's average home you got hanging more than one PC and/or Laptop and as such more than one point of entry. There's still benefit of having both hardware and software firewall.
-
If you're behind a hardware firewall, I would just uninstall the software firewall altogether.
IMHO, if your software firewall is complaining about something bad trying to phone home, then you're already infected. At best, it acts like a canary in the mine. Meh. I do concede that such software makes people feel better, so if you feel better about having it, then keep it.
NOD32 is still the best thing out there for lightweight, hard-core AV protection. Stick with it.
I recently reviewed SonicWall's low-end "home" intelligent router for CPU Magazine: the SonicWall TZ-180. Actually I looked at 4 different UTM devices, with a 5th being reviewed privately for its manufacturer. Though the SonicWall is a fine, very-high-end router with lots of useful features for the networking nerd, it is most definitely NOT a useful layer of AV and AS protection. Sorry.
The low-end sonicwall (and indeed, most of the low-end UTMs) only have definitions for about 8000 viruses, compared to more than 100,000 for even the free AV software. From a relatively small test zoo of 50 viruses, the TZ-180 only blocked ONE. It blocked exactly ZERO drive-by-downloads. It did block most of the worms on an infected machine from phoning home, which I don't consider to be terribly useful, since you're already seriously infected at that point. It blocked EXE attachments for any email, which is a good practice, but it's just a simple filtering rules instead of smart AV detecting threats. It merely "closes" outbound TCP/IP ports instead of "stealthing" them unless you change its default behavior.
-Llama
The AV sig set is supposed to reflect the active stuff out there. Even the bigger boxes only have around 28000 signatures. And to be honest the active stuff is probably less than 50 virus's, most of those being variants of about 5 core virus's. The boxes are always sold as a secondary line of AV/AS defence (if you search my posts you'll see that, and that I always recommend Nod32).
That odd with the drive by downloads, I see loads of stuff blocked on active sites.
The other thing I found to be a great malware killer is the content filter blocking advertising sites which seems to be the biggest vector for malware.
What do you mean about closing vs stealthing outbound ports? If spyware or a signature triggers a ips block outbound it sends a tcp rst.
-
Aye, Both manufacturer (Zyxel and Sonicwall) advertise virus defense for "in the wild" viruses.
Also, all 4 products are not even closely in the same class, nor the features correspond the price listed.
At best you may compare zywall USG100 and tz180 and even here is a "class" gap. In terms of capabilities USG100 is step above the tz180. TZ190 comes a bit closer.
Don't know why are you listing number of CPUs (all different specs), but not the memory (very important)
Testing throughput on 6Mbps connections is not adequate. Many users have 10Mbps down or more. Would be bugger to buy TZ180 just to find out it limits your 15Mbps connections to 10Mbps when you turn everything on.
-
Doesn't NOD32 handle adware and spyware in addition to virus files and trojans? Their web page says it does and I hope so, since I dumped my Adware awhile ago.
-
Doesn't NOD32 handle adware and spyware in addition to virus files and trojans? Their web page says it does and I hope so, since I dumped my Adware awhile ago.
Spyware, yes, adware no.
-
Aye, Both manufacturer (Zyxel and Sonicwall) advertise virus defense for "in the wild" viruses.
Also, all 4 products are not even closely in the same class, nor the features correspond the price listed.
At best you may compare zywall USG100 and tz180 and even here is a "class" gap. In terms of capabilities USG100 is step above the tz180. TZ190 comes a bit closer.
Don't know why are you listing number of CPUs (all different specs), but not the memory (very important)
Testing throughput on 6Mbps connections is not adequate. Many users have 10Mbps down or more. Would be bugger to buy TZ180 just to find out it limits your 15Mbps connections to 10Mbps when you turn everything on.
A TZ180 is basically a TZ190 less the card slot, a couple of ethernet ports, and standard OS. Throughput levels are the same. With the TZ180/190 throughput is around 6Mbps with everything turned on. True UTM processing is very CPU intensive. However I would expect the TZ180/190 to be replaced towards the end of the year with the new platform running OS5, and that typically has yielded a threefold performance increase.
Wow just scanned the review, who did it needs a kick in the pants : "Content filtering is based on the administrator (that is, you) entering URLs and IP addresses rather than selecting topics and letting the UTM decide what’s acceptable."
That is in blatantly incorrect.
-
Lots of questions from lots of folks: I'll answer what I can.
Vulcan: "That odd with the drive by downloads, I see loads of stuff blocked on active sites."
Maybe with more advanced SonicWall gear, but not with this one. I was really looking forward to this level of blocking, but Norton blocked the exact same number of drive-bys when the test PC was hooked up behind the sonicwall and when it wasn't. To be fair, no home-level UTM did very well.
Vulcan: "What do you mean about closing vs stealthing outbound ports? If spyware or a signature triggers a ips block outbound it sends a tcp rst."
I mean when you do a portscan of an IP address where the Sonicwall is connected, all the inactive ports are reported as "they exist and are closed" rather than "these ports don't exist, so there's no point in looking for a response."
Vulcan: "The AV sig set is supposed to reflect the active stuff out there. Even the bigger boxes only have around 28000 signatures. And to be honest the active stuff is probably less than 50 virus's, most of those being variants of about 5 core virus's."
Yes, it is supposed to, but even variants of the Storm worm were allowed through. I had a mix of both old and very VERY new viruses, and I can't say that any of the units did very well. Bottom line: 8000 signatures just isn't enough, even when focusing on new threats. Oddly, the SonicWall blocked a virus when it was zipped up, but let it through when it was a straight uncompressed EXE.
Vulcan: "The boxes are always sold as a secondary line of AV/AS defence (if you search my posts you'll see that, and that I always recommend Nod32)."
I got these lines from the vendors after sharing my results with them. When I was acquiring them, they really were being sold as a primary line of defense. That's disingenuous. More on this later.
2BigHorn: "Aye, Both manufacturer (Zyxel and Sonicwall) advertise virus defense for "in the wild" viruses."
True. Sonicwalls' homepage says "SonicWALL's family of network security appliances combines robust UTM security services with high-speed deep packet inspection to provide small, mid-size and enterprise-class organizations the best protection possible." CheckPoint says "Safe@Office keeps your network safe with proven technology. " Stonger statements are made deeper in their websites. That's the standard I held these devices to.
2BigHorn: "Also, all 4 products are not even closely in the same class, nor the features correspond the price listed."
Also agreed. But we sent the same parameters to many vendors, and these are the 4 that responded in time to meet deadlines, and these are the products they sent in response to the testing parameters. On top of that, most of the vendors knew what the other vendors were sending me when they sent me theirs. In other words, I didn't select these products. The vendors selected them based on our review criteria, which they knew about ahead of time.
2BigHorn: "Don't know why are you listing number of CPUs (all different specs), but not the memory (very important)"
"CPUS" refers to the CPU Magazine scoring system, where 1 star is terrible, 5 stars are perfect, and 2.5 stars average. The magazine refers to the scoring in language like "This product earns 3.5 CPUs." Not my system, BTW, but its is required in all reviews.
2BigHorn: "Testing throughput on 6Mbps connections is not adequate. Many users have 10Mbps down or more. Would be bugger to buy TZ180 just to find out it limits your 15Mbps connections to 10Mbps when you turn everything on."
I initially tested throughput speed reductions by setting up servers on a 100 MB internal LAN, and partially though testing, editors wanted my tests changed to a "real" internet connection. The neighborhood where I can test with a FIOS connection was having problems due to water damage that month from a sewage problem (murphy's law), so a 6mbit DSL connection was it. I agree that a 6MBit connection is not the fastest connection a power user might have in this day and age. This is indeed a shortcoming of the review.
Vulcan: "Wow just scanned the review, who did it needs a kick in the pants : 'Content filtering is based on the administrator (that is, you) entering URLs and IP addresses rather than selecting topics and letting the UTM decide what’s acceptable.' That is in blatantly incorrect."
The categorized content filter/monitor was not included in the unit I received from SonicWall, where I understand it to be an extra-cost option and subscription at this price point. The lack of its presence was noted, but it didn't affect scoring. Our initial request for units did not specify the need for this feature, but when it was present in all the other models, is absence was merely noted, as the initial paragraphs stated it would.
Needless to say, all the vendors got in touch with us after the review went out. None were very happy, as you can imagine. Some requested changes, and where they were right, we made them. Sonicwall did not request a change to the content filtering statement.
Not everyone was unhappy, however.
Watchguard sent me a similar unit, but it arrived too late for the review. Here's what one of their product managers wrote me when I said I would be happy to play with it, but it probably wouldn't lead to a printed review:
"Yes, I did read the article, and it looks as if you pulled no punches,
which is exactly why I'd like to share any feedback you have with our PM
team. Even if it doesn't make it into print, it's always helpful for us
to get real-world feedback. And, especially since you beat up the other
players, I know you'll be giving us the same, fair pounding!"
I'll close with this: tech journalists and reviewers are normally bashed for not testing thoroughly enough, or going too easy on non-performing products. It was nice not to be accused of this for a change. ;-)
-Llama
-
Llama, I know what you're trying to say, but no matter what they have sent to you, those aren't consumer grade products (with exception of D-link).
Consumer grade are TZ150 or Zywall 2+.
Nobody is going to buy $600 device + $170 (per year) for AV+IDP card just to filter some web content.
AV software + decent personal firewall are way cheaper (per year) and more effective for the typical consumer.
Those are SOHO products with emphasis on NAT, VPN (for 10 or more clients), QoS, DMZ, Failover WAN or dialup, loadbalancing and decent stateful (and/or DP inspection) firewall, with enough memory and CPU power for few thousands concurrent sessions.
For that reason you can't get most out of them over web GUI, they provide console port with powerful CLI.
Avg consumer can't even properly configure those.
AV and content filtering are just an extra candy (and extra $$).
If you want to test econobox car and manufacturer is sending you a pickup instead, you're not going to evaluate it as such.
-
I mean when you do a portscan of an IP address where the Sonicwall is connected, all the inactive ports are reported as "they exist and are closed" rather than "these ports don't exist, so there's no point in looking for a response."
Just the matter of configuration, usually under firewall/security, called anti-probing or similar with option not to respond to requests for unauthorized services. If you have some servers on your network, you want to respond to service requests at least during testing.
Yes, it is supposed to, but even variants of the Storm worm were allowed through. I had a mix of both old and very VERY new viruses, and I can't say that any of the units did very well. Bottom line: 8000 signatures just isn't enough, even when focusing on new threats. Oddly, the SonicWall blocked a virus when it was zipped up, but let it through when it was a straight uncompressed EXE.
How new the virus is doesn't matter. What matters is if it is in the wild (circulating). Most of the times you have 100 to 200 variants of 3-4 viruses. That's it. If you don't test with samples matching those in the wild, then your test is flawed.
I got these lines from the vendors after sharing my results with them. When I was acquiring them, they really were being sold as a primary line of defense. That's disingenuous. More on this later.
Disingenuous only to those who don't understand the primary function of UTM devices and requirements of small businesses. Firewall filtering, securing LAN, VPN and wireless are primary concerns.
True. Sonicwalls' homepage says "SonicWALL's family of network security appliances combines robust UTM security services with high-speed deep packet inspection to provide small, mid-size and enterprise-class organizations the best protection possible." CheckPoint says "Safe@Office keeps your network safe with proven technology. " Stonger statements are made deeper in their websites. That's the standard I held these devices to.
Apart from some buzz words, they are secure if properly configured. Keep on mind UTM appliance are just first line of defense, but not the last.
"CPUS" refers to the CPU Magazine scoring system, where 1 star is terrible, 5 stars are perfect, and 2.5 stars average. The magazine refers to the scoring in language like "This product earns 3.5 CPUs." Not my system, BTW, but its is required in all reviews.
Very misleading for the first time readers when thrown in the specs table.
The categorized content filter/monitor was not included in the unit I received from SonicWall, where I understand it to be an extra-cost option and subscription at this price point.
Just another proof it is not 'consumer' grade product.
Apart from all this, nice article...
-
Let's be clear about the context of this discussion.
The subject is "Best Firewall/Antivirus."
I warn that UTM devices that a home user is likely to consider are terribly ineffective at antivirus duties, but as firewalls they are a networking nerd's dream come true. And I base this on actually using the UTMs and subjecting them to real-world tests.
If the argument is that the UTMs I tested were too "high end," then I think we can all assume that lesser UTMs would do even worse against viruses. And about the "high end." This issue, we're reviewing high-end PCs, some of which are more than $15,000, for example. That's not a typo. Some of our readers have no problem spending big bucks on the best, or what they perceive as being the best, so $600 for a UTM or router is not a huge expense for some of them if they think it's doing for them what is advertised. In this case, i think I revealed these UTMs aren't doing it enough to justify the price.
If you're looking for "average computer user" stuff, there are a lot of other magazines out there that may interest you instead.
One final word about viruses. I've been reviewing AV software since 1996 for various magazines. I have a virus zoo that's now over 120,000 files, with more than 60,000 unique variants (counts vary, depending on the scanner). I've been collecting since the mid 90's, and I have several honeypot servers that keep adding to my collection while I sleep. I never reveal to anyone but my editor what the virus samples are, because I don't need vendors of anything cherry-picking their definitions for my reviews. For example, I won't ever say "I tested with Trojan.Brisv.A, Downloader.Zlob!gen.3, VBS.Repulik.A, Backdoor.Lusillon, and W32.Xpiro viruses to see what was caught" because next time I'm gonna get a product that catches all of these because someone packed in a custom definition file. This has happened to me before. At any rate, all I can tell you is that a wide variety of threats, both old and recent, were thrown at these devices. You can see from the list of what was caught that in many cases it wasn't even the newest stuff.
Critiques make the next reviews better, so by all means, keep 'em coming.
-Llama
-
TC, FWIW, I use NOD32 and Comodo (but i turn the annoying 'safe search' and defence+ off). From what i have read Comodo scores pretty high in leak tests and is consistently one of the best. But it has started to become more 'bloaty' recently with 'value-added' 'features' etc etc which are a bit annoying - to me anyway.
I believe this blog, that reviews software firewalls, mentioned that the 3.0 version of Comodo does not have any leak protection if you turn off Defense+. Comments from Comodo seemed to sort of imply this as well. The blogger said this isn't true for prior versions of Comodo.
http://blog.scotsnewsletter.com/2008/01/20/do-not-rely-on-comodo-3s-basic-firewall/
On another note: does anyone besides me feel a bit queasy using "free" software? I can't shake my suspicions that "free" software is hiding something not nice. :noid I can't see why they give it away. I gravitate towards paid software- but then maybe I'm naive as it could also contain bad stuff.
-
Lots of questions from lots of folks: I'll answer what I can.
1 - Maybe with more advanced SonicWall gear, but not with this one. I was really looking forward to this level of blocking, but Norton blocked the exact same number of drive-bys when the test PC was hooked up behind the sonicwall and when it wasn't. To be fair, no home-level UTM did very well.
2 - I mean when you do a portscan of an IP address where the Sonicwall is connected, all the inactive ports are reported as "they exist and are closed" rather than "these ports don't exist, so there's no point in looking for a response."
3 - Yes, it is supposed to, but even variants of the Storm worm were allowed through. I had a mix of both old and very VERY new viruses, and I can't say that any of the units did very well. Bottom line: 8000 signatures just isn't enough, even when focusing on new threats. Oddly, the SonicWall blocked a virus when it was zipped up, but let it through when it was a straight uncompressed EXE.
4 - I got these lines from the vendors after sharing my results with them. When I was acquiring them, they really were being sold as a primary line of defense. That's disingenuous. More on this later.
5 -The categorized content filter/monitor was not included in the unit I received from SonicWall, where I understand it to be an extra-cost option and subscription at this price point. The lack of its presence was noted, but it didn't affect scoring. Our initial request for units did not specify the need for this feature, but when it was present in all the other models, is absence was merely noted, as the initial paragraphs stated it would.
1 - nah I've seen good pickups on the entry level stuff. IIRC my TZ190 at home collected some spyware from advertising on a certain magazine site I visited once.
2 - not a biggie imho. IPS can deal to portscans anyway
3 - odd once again. As part of training we download a variety of worms/virus's, in zipped, exe, etc format. This is done behind tz190s.
4 - dunno bout the USA. But in NZ and Australia it's made very clear what the limitations of the AV/AS sig set are.
5 - in the smaller units the pricing is negligible to get Content Filtering. Lets look at the pricing based on the RRP US List I have from the July pricelist:
TZ180 Wireless/10 $654
IPS/GAV/GAS Renewal $174
Support Renewal $138
OR TZ180 Wireless/10 Totalsecure $840
(this includes 1 Year of IPS/GAV/GAS, 1 Year of Content Filtering, 1 Year of 8x5 Support, and a ViewPoint license)
CGSS 2nd year $252
(this includes 1 Year of IPS/GAV/GAS, 1 Year of Content Filtering, 1 Year of 8x5 Support, and a ViewPoint license)
I notice no mention was made of reporting functionality such as ViewPoint either. TBH the person at sonicwall who supplied the unit needs a kick in the backside for not including CFS - but I still think the article is misleading. And am disappointed the reporting functionality was not covered as this is a big feature for me (esp in the SOHO market).
Also not mentioned was any of the IPS/application management?
-
3 - odd once again. As part of training we download a variety of worms/virus's, in zipped, exe, etc format. This is done behind tz190s.
I have a theory about this, which you can correct me on. You said it happened during training. Did YOU supply the viruses, or did the trainer from SonicWall supply viruses? If the latter, it is a good example of the cherry picking of viruses I mentioned earlier.
Intrusion prevention wasn't covered mainly due to a lack of space, and given space constraints, my editor wanted focus on classic AV/AS.
If it were *my* magazine, things would be different. ;-)
-Llama
-
I have a theory about this, which you can correct me on. You said it happened during training. Did YOU supply the viruses, or did the trainer from SonicWall supply viruses? If the latter, it is a good example of the cherry picking of viruses I mentioned earlier.
Intrusion prevention wasn't covered mainly due to a lack of space, and given space constraints, my editor wanted focus on classic AV/AS.
If it were *my* magazine, things would be different. ;-)
-Llama
Random virus'y/spyware infested webpages. In fact theres usually at least one bit of malware that gets through too.
TBH the main driver for purchase for the sonicwall is not the AV/AS capabilities. It's the IPS application management, content filtering. in NZ these are driven by:
- Data caps/high int'l bandwidth costs. SOHO/SMB users here have experienced what we call billshock, where they get a multi-thousand dollar bill for traffic overuse - quite often due to a P2P app. The most recent case I've dealt with was in Jan for $25000 bill. With SOHO/residential caps they usually get slowed to dial up speeds until the cap rollover date.
- P2P. NZ Copyright law has been amended to enforce ISPs to act against repeat copyright infringement users (ie 3 strikes and you're out). Many people are now wanting to block P2P use within their networks. We also point out that if we can see P2P so can the ISPs, and how does it look for their business (big or small) look to be associated with traffic primarily used for illegal downloads
- CFS. Safe workplace laws, some companies have been sued. Also seeing parents wanting to pick up on this as well.
- Reporting, people want the mystery taken out of their internet use (be it home or business).
In fact my 'sales slides' only mention AV/AS very lightly, I'll dig up your email and flick you a copy. Just so you can see how we position them.
-
LOL, I doubt we'll hear more than sales pitch for Sonicwall.
Hey I love the product because I'm a geek and because it's good :) . I won't pimp stuff if I have no faith in it.
-
On another note: does anyone besides me feel a bit queasy using "free" software? I can't shake my suspicions that "free" software is hiding something not nice. :noid I can't see why they give it away. I gravitate towards paid software- but then maybe I'm naive as it could also contain bad stuff.
Not every free software is bad. Just think about open source. Then, not everything you pay for is good either. Think of Norton, McAfee, etc.
Anyways, even though Comodo is free, I'd still rate it among top five personal firewalls. Top two are still ZA pro and Outpost pro. With Outpost being slightly better in terms of resources, security and stability. Outpost's GUI is not as friendly as ZA pro, but that's not major minus. It is cheaper as well (license good for 3 PCs).
-
and because it's good :) .
I'm not saying it isn't good. It's just that if you want to make good use of it, you need enhanced OS and for the TZ series, that doubles the price. If you want support and upgrades, you need support subscription.
TZ series is also a tad aged in comparison with some competitors. Hardware is not sized properly to accommodate OS capabilities (needs faster CPU and more memory). CLI is kinda lacking too.
If we stick to products from llama's article, and if I'd have to chose, I'd pick zywall USG100 over TZ180 anytime.
-
so what antivirus/antiadware is free? i use avast antivirus home version its free and probably the best available, and for spyware i have PC Tools Spyware Doctor. Can anyone tell me of anymore free antivirus/adware software? legit please :P oh and what can a firewall do to protect me?
-
so what antivirus/antiadware is free? i use avast antivirus home version its free and probably the best available, and for spyware i have PC Tools Spyware Doctor. Can anyone tell me of anymore free antivirus/adware software? legit please :P
Unfortunately, there isn't free AV software which could match paid versions. Avast is decent, so are Avira and AVG.
Spyware Doctor is not bad, but Spybot Search&Destroy is better.
oh and what can a firewall do to protect me?
If you're NATed and if you secure your system in Skuzzy's fashion (using Lynx and surfing Gopher instead of WWW ;) ) you probably won't need it.
-
Unfortunately, there isn't free AV software which could match paid versions. Avast is decent, so are Avira and AVG.
Spyware Doctor is not bad, but Spybot Search&Destroy is better.
If you're NATed and if you secure your system in Skuzzy's fashion (using Lynx and surfing Gopher instead of WWW ;) ) you probably won't need it.
1 i run xp and the comp is basically used to surf the web and game. 2 is spybot free?
-
1 i run xp and the comp is basically used to surf the web and game. 2 is spybot free?
For the vast majority of the users, I say you need firewall anytime you're on the internet. If you need firewall and you don't want to pay, get Comodo. It's the best free firewall http://www.personalfirewall.comodo.com/download_firewall.html
Yes spybot is free http://www.safer-networking.org/en/home/index.html
-
thanks
-
I'm not saying it isn't good. It's just that if you want to make good use of it, you need enhanced OS and for the TZ series, that doubles the price. If you want support and upgrades, you need support subscription.
TZ series is also a tad aged in comparison with some competitors. Hardware is not sized properly to accommodate OS capabilities (needs faster CPU and more memory). CLI is kinda lacking too.
If we stick to products from llama's article, and if I'd have to chose, I'd pick zywall USG100 over TZ180 anytime.
The TZ is at the end of it's life, the TZs are several years old now. Enhanced ships with the 190 as standard. Support subscription... it extends the warranty, you get access to a proper call center, and sonicwall are very active in feature upgrades to firmware (if you look at the early versions of oS3 compared to OS4 or OS3.9 theres a lot been added in over the years).
The hardware is fine, I use a TZ190 at home (the 180 is the same engine), I run wireless, servers, vpn's.
Zywalls ok, but it's still an OEM'd firmware layer, which is chalk and cheese if you ask me. Most people I talk to who've used zywalls have moved away from them or use them without the l7 stuff.
-
From my experience, zywalls are rock solid (both hardware and software) and the best bang for the buck in this price class (bellow $2k).
On the enterprise level it's another story...
-
I believe this blog, that reviews software firewalls, mentioned that the 3.0 version of Comodo does not have any leak protection if you turn off Defense+. Comments from Comodo seemed to sort of imply this as well. The blogger said this isn't true for prior versions of Comodo.
http://blog.scotsnewsletter.com/2008/01/20/do-not-rely-on-comodo-3s-basic-firewall/
On another note: does anyone besides me feel a bit queasy using "free" software? I can't shake my suspicions that "free" software is hiding something not nice. :noid I can't see why they give it away. I gravitate towards paid software- but then maybe I'm naive as it could also contain bad stuff.
I actually had previously read this blog/URL link.....after Spatula recommended Comodo........ only reason I did not go with Comodo was trying to find an older version than their current one. The Reason it is free is kind of along the same principle that ZoneAlarm offered their Regular Free Zonealarm...... they get their revenue from larger companys/corportations/Enterprises providing security along the lines of what Llama/Vulcan and 2bighorn have been discussing.......
I have went ahead and purchased Outpost Pro and am using it with my NOD32 program........I did download Comodo and using a USB drive ( Virtual Machine ) to play around with different combinations........I have always used Spybot S & D but do not have it in the startup, only load it up when I do a either weekly or sometimes monthly scan/clean up o double check things....
I have picked up alot of great information from everyone who has contributed to this thread, is much appreciated.......
-
I realize you're probably got all the info you want, and I skipped what everyone else posted (sorry)..
So, some of this info may be redundant...
Here's my set-up:
I use Antivir as my antivirus...It's free, it's made in Germany, has a great heuristic engine, updates several times a day, and I have never once gotten an infection with it... I've been using Antivir for about 5 years and never an issue, ever...
I also use Spybot (which I see you do as well)..
AVG Antispyware WAS pretty good, but now AVG has rolled everything into one and it's not nearly as good.. AVG antivirus was never that good in the first place, IMHO..
I think the main reason I have not EVER had an infection is due to using Spyware Blaster... Spyware Blaster is not something that runs in the background.. It makes changes to your registry which block spyware or malware from getting in in the first place, sort of like the immunize feature in Spybot, only better...
I also use to apps that clean out temp files and tidy up the registry... CCleaner and Cleanup!....
Give these a shot...
I actually had previously read this blog/URL link.....after Spatula recommended Comodo........ only reason I did not go with Comodo was trying to find an older version than their current one. The Reason it is free is kind of along the same principle that ZoneAlarm offered their Regular Free Zonealarm...... they get their revenue from larger companys/corportations/Enterprises providing security along the lines of what Llama/Vulcan and 2bighorn have been discussing.......
I have went ahead and purchased Outpost Pro and am using it with my NOD32 program........I did download Comodo and using a USB drive ( Virtual Machine ) to play around with different combinations........I have always used Spybot S & D but do not have it in the startup, only load it up when I do a either weekly or sometimes monthly scan/clean up o double check things....
I have picked up alot of great information from everyone who has contributed to this thread, is much appreciated.......