Not only Matthew
You give a wonderful series of explanations that I find very helpful
Thanks for your knowledge
Keep Smiling,
Janie Degenshein

Access Tech Consultant
Facilitator of ECHO
Co-host of OTBS On The Bright Side
www.thruoureyes.org/brightside.html
[email protected]
-----Original Message----- From: Jackie McBride
Sent: Tuesday, December 28, 2010 11:49 AM
To: [email protected]
Subject: Re: [Blind-Computing] realtime antivirus & antispyware protection

Glad u found my explanations helpful, Matthew.

On 12/28/10, matthew <[email protected]> wrote:

Thank you for
that helpful information Jackie. I planned on doing what you said when
others mentioned something similar. Your detailed explanation helped a lot.

On 12/27/2010 11:19 PM, Jackie McBride wrote:
Mike, u wrote:
Hi Jackie;

I am going to take this topic back to one from earlier today. There was a
discussion about whether or not to run Microsoft Security Essentials&
Super
Anti Spyware in Real Time  mode at the same time.  In your professional
opinion, if you were running both of these programs how would you run the
2?
Meaning, would you run 1 in Real Time& not the other or, run both in Real
Time?

Mike, much depends on what the 2 programs do. Let me give a bit of
background,&  then perhaps, by way of that, address your question.

In the not so very distant past, spyware&  viruses were pretty much
distinct entities,&  the programs designed to protect the computer
from each did quite different things. Antivirus programs tended to
look for what's called "file signatures", e.g., certain strings in
files that were suggestive of a virus, while antispyware programs
tended to monitor things like registry changes, where the browser was
being taken to, etc. That's fairly oversimplified, but the crux was
that 1 antivirus&  1 antispyware program could generally run together
in realtime w/o conflict.

Malware has, unfortunately, become much more sophisticated. Viruses
drop trojans which create a backdoor into your computer&  allow all
kinds of information to be passed to some1, e.g., spyware. Thus, the
distinction between viruses&  spyware--&  other types of malware, for
that matter--have blurred considerably over the past few years. The
result is that antivirus programs have evolved to become
antivirus/antispyware programs, trying to become, as it were, all
protection for all malware, all things to all people, etc.

The answer to your question is that it really depends on what the
programs do. If the antivirus program confines itself to looking for
file signatures, etc., while the antispyware program monitors registry
changes&  browser redirects, then it's probably safe. If, on the other
hand, the 2 programs monitor for similar things, then conflict can&
does result. The problem further arises when both try to quarantine
something at the same time, obviously,&  it is for this reason that
malware experts suggest running only 1 realtime security suite type
program, e.g., antivirus/antispyware program, at any given time. What
I personally do is to run my antivirus/antispyware program (Avast) in
realtime. Then I scan w/Superantispyware or MalwareBytes weekly or so,
just to get rid of tracking cookies&  other annoying nasties that may
have popped up. BTW, 1 thing that can really help keep the bugs in
check is to simply delete your temporary internet files often--lots&
lots of crap-ola gets in there.

So what I personally would do would be to run Microsoft Security
Essentials in realtime,&  let SAS be an on-demand scanner. I know some
listers have run both w/o difficulty, but I can't help wondering what
would happen if both try to quarantine the same threat--neither 1
might win&  your protection may well be compromised. I remember
getting this as a first exercise of my malware removal training,&
this is pretty much how I answered it then, too,&  passed, so
hopefully it'll suffice.

I hope I've made myself sufficiently clear,&  invite further queries
if I haven't.

Blessings for a wonderful holiday season.

On 12/27/10, Mike&  Barbara In Arcadia<[email protected]>  wrote:
Hi Jackie;

I am going to take this topic back to one from earlier today.  There was
a
discussion about whether or not to run Microsoft Security Essentials&
Super
Anti Spyware in Real Time  mode at the same time.  In your professional
opinion, if you were running both of these programs how would you run the
2?
Meaning, would you run 1 in Real Time&  not the other or, run both in
Real
Time?  Personally I am not a heavy user of the Internet except for
emailing
and would like to hear a professional opinion on what the pros&  cons
might
be.  I am not trying to discredit any of the ideas/opinions of others
that
contributed to this topic earlier but, as a amateur computer user and
having
learned most of what I've learned via trial&  error,&  lists' like this,
I
would like to hear from someone who deals with this type of issue on a
professional basis.  All advice/information will be greatly appreciated.
Thanks much.  Take care.
Mike

   ----- Original Message -----
   From: Jackie McBride
   To: [email protected]
   Sent: Monday, December 27, 2010 7:56 PM
   Subject: Re: [Blind-Computing] removing a virus


Andre, if I were working in the environment your nephew is working in,
   I'd do it that way as well. But u&  I both know that most residential
   &  soho customers do not walk around w/recent images of their OS or
   even backups of their data on a thumb or even an external drive.&
   it's not possible for us to have clean installation discs of all
   windows versions, never mind trying to use Magic Jellybean or some
such to retrieve the key, cuz half the folks lost their restore discs. & then there's data to back up, etc. Then there's always the rare but
   interesting forensics issues of some1 trying to sabotage a company&
   has a virus set to reformat the particular hard drive to try to
   destroy evidence or bring down a network when certain actions are
performed. The best thing to do in cases like this is just to dismount
   the drive. The way u suggest is easiest but not always practical.

   On 12/27/10, Betsy Whitney, Dolphin Press<[email protected]>
wrote:
   >  Hi Andre,
   >  I suspect that Jackie may work for multiple clients who have their
   >  individual networks and configurations. My brother-in-law does the
   >  same kind of work that I think Jackie does, and he also cleans up
   >  these things the way she does. He says it is because each of the
   >  networks is different and he finds it faster. He also said that
   >  everyone has their preferred way of doing things, and if he were
> working on his own network, he might very well do it your way if he
   >  didn't have an alternative.
   >
   >  Recently Andre Williams wrote:
   >>Interesting. My nephew works for our city's power company and he
says
they
   >>don't bother with any of those procedures as they take too long. He
says
   >>  his
   >>tools consist of a bag full of operating system images and a thumb
drive
   >>with hundreds of serial keys including a password override for
terminated
   >>employees that "can't" remember their passwords. He said he carries
a
very
   >>durable but very slow 10-hour battery life  laptop when he's out on
the
>>streets, but when it comes to monitoring computers at work he uses a
laptop
   >>that breaks into 2 parts and becomes a type of mobile unit.
   >>Andre
   >>
   >>----- Original Message -----
   >>From: "Jackie McBride"<[email protected]>
   >>To:<[email protected]>
   >>Sent: Monday, December 27, 2010 7:02 PM
   >>Subject: Re: [Blind-Computing] removing a virus
   >>
   >>
   >>Andre, I *routinely* fix these problems because that is what I do
for
   >>a living. As I said, I don't connect my computer that I use to
repair
   >>others' machines to a network&  therefore the integrity of that
   >>network is not in question. I'm trained both in computer forensics
as
   >>well as in malware removal. While I agree that there are times when
   >>reformatting the operating system is necessary, it often is not. It
>>depends on the type of malware infection, how good the tools one has
   >>for doing such removal, the operator's proficiency w/those tools,&
a
   >>variety of other factors.
   >>
   >>On 12/27/10, Andre Williams<[email protected]>  wrote:
   >>  >  While it might appear all is fine it might not be. You are the
best
   >>  >  judge
   >>  >  of
   >>  >  the integrity of your network. I would be concerned about
"routinely"
   >>  >  having
   >>  >  to fix these problems. I'll act on the advice of security
experts and
do
   >>  >  my
   >>  >  best to insure any virus whether seemingly harmless to very
destructive
   >>  >  is
   >>  >  not an unknown factor in any of the often strange quirks in
Windows
   >>  >  world.
   >>  >  After an infection a reformat or image recovery gives me this
peace
of
   >>  >  mind.
   >>  >  Andre
   >>  >  ----- Original Message -----
   >>  >  From: "Jackie McBride"<[email protected]>
   >>  >  To:<[email protected]>
   >>  >  Sent: Monday, December 27, 2010 6:16 PM
   >>  >  Subject: Re: [Blind-Computing] removing a virus
   >>  >
   >>  >
>> > I routinely fix these sorts of problems by taking the drive out
of
the
   >>  >  computer, hooking it up to an external device,&  then putting
it on
   >>  >  another computer&  running malware scans. I very very seldom
have to
   >>  >  reformat an OS.
   >>  >
   >>  >  Sometimes I do it in Linux, sometimes in Windows. Generally I
   >>  >  disconnect the machine from the network. It's also a "fix it"
drive
   >>  >  w/nothing important in the event it becomes infected, but I've
never
   >>  >  had that happen, either.
   >>  >
   >>  >  On 12/27/10, Andre Williams<[email protected]>
wrote:
   >>  >>  Yep, I'm right there with you 100%!
   >>  >>  Andre
   >>  >>  ----- Original Message -----
   >>  >>  From: "Don Marang"<[email protected]>
   >>  >>  To:<[email protected]>
   >>  >>  Sent: Monday, December 27, 2010 4:28 PM
   >>  >>  Subject: Re: [Blind-Computing] removing a virus
   >>  >>
   >>  >>
>> >> I agree with Andre completely! Reformatting the hard disk and
   >>  >>  reinstalling
   >>  >>  the Operating System or recovering from a known good disk
image is
the
   >>  >>  only
>> >> way to be sure the malware is removed. Anything short of that
will
   >>  >>  likely
   >>  >>  have a small remnant left over that will infect the whole
computer
   >>  >>  again
   >>  >>  or
   >>  >>  will damage necessary system files in the process.
   >>  >>
   >>  >>  Most likely, your computer will run faster anyway, since
Windows
really
   >>  >>  needs to be reinstalled about once a year just to clean out
the
clutter
   >>  >>  and
   >>  >>  the registry.
   >>  >>
   >>  >>  Don Marang
   >>  >>
   >>  >>  There is just so much stuff in the world that, to me, is
devoid of
any
   >>  >>  real
   >>  >>  substance, value, and content that I just try to make sure
that I am
   >>  >>  working
   >>  >>  on things that matter.
   >>  >>  Dean Kamen
   >>  >>
   >>  >>
   >>  >>  --------------------------------------------------
   >>  >>  From: "Andre Williams"<[email protected]>
   >>  >>  Sent: Monday, December 27, 2010 6:34 PM
   >>  >>  To:<[email protected]>
   >>  >>  Subject: Re: [Blind-Computing] removing a virus
   >>  >>
>> >>> Tell him to reformat and reinstall the operating system. With
viruses
   >>  >>>  now
   >>  >>>  a
   >>  >>>  days you can never be sure if they're cleaned off completely
In the
   >>  >>>  hours
   >>  >>>  and possibly days he's going to spend trying to figure this
out and
   >>  >>>  trying
   >>  >>>  to clean his computer he can save himself the time and
trouble and
   >>  >>>  reformat
   >>  >>>  and reload windows in about 2 hours. This happened to me
sometime
back
   >>  >>>  and
   >>  >>>  from the time I realized I had a virus placing 300 items on
my
system
   >>  >>>  tray
   >>  >>>  until the time I reinstalled and image of my hard drive it
must
have
   >>  >>>  been
   >>  >>>  an
>> >>> hour. Image for Windows to the rescue! He also poses a danger
to
other
   >>  >>>  computers on the network at his job.
   >>  >>>  Andre
   >>  >>>  ----- Original Message -----
   >>  >>>  From: "Lenny McHugh"<[email protected]>
   >>  >>>  To: "blind computing"<[email protected]>
   >>  >>>  Sent: Monday, December 27, 2010 3:23 PM
   >>  >>>  Subject: [Blind-Computing] removing a virus
   >>  >>>
   >>  >>>
   >>  >>>  I am trying to help a friend remove a virus from his work
computer.
   >>  >>>  Avg
   >>  >>>  did
>> >>> identify it and reported that it could not be removed because
it
was
   >>  >>>  in
   >>  >>>  memory. He did not write the name down  but it is in win32.
The
   >>  >>>  computer
   >>  >>>  can
>> >>> only be started in safe mode and if he lets it run it gives a
message
   >>  >>>  that
   >>  >>>  chkdsk should be run with the f switch. That also will not
run when
   >>  >>>  the
   >>  >>>  machine is restarted. He turn system restore off and ran avg
and it
   >>  >>>  did
   >>  >>>  not
   >>  >>>  help.
   >>  >>>  He is using xp professional. He also ran kapersky and it did
not
help.
   >>  >>>  Any
   >>  >>>  quick suggestions?
   >>  >>>  Thanks
   >>  >>>  ---
   >>  >>>  Please visit my home page, it is motivational, educational,
   >>  >>>  inspirational
   >>  >>>  with a touch of humor. There is also a very extensive
resource list
   >>  >>>  for
   >>  >>>  the
   >>  >>>  blind.
   >>  >>>  http://www.LennyMcHugh.com
   >>  >>>  For answers to frequently asked questions about this list
visit:
   >>  >>>  http://www.jaws-users.com/help/
   >>  >>>
   >>  >>>
   >>  >>>  For answers to frequently asked questions about this list
visit:
   >>  >>>  http://www.jaws-users.com/help/
   >>  >>>
   >>  >>
   >>  >>  For answers to frequently asked questions about this list
visit:
   >>  >>  http://www.jaws-users.com/help/
   >>  >>
   >>  >>
   >>  >>  For answers to frequently asked questions about this list
visit:
   >>  >>  http://www.jaws-users.com/help/
   >>  >>
   >>  >
   >>  >
   >>  >  --
   >>  >  Change the world--1 deed at a time
   >>  >  Jackie McBride
   >>  >  Scripting Classes: http://jawsscripting.lonsdalemedia.org
   >>  >  homePage: www.abletec.serverheaven.net
   >>  >  For technophobes: www.technophoeb.com
   >>  >
   >>  >  For answers to frequently asked questions about this list
visit:
   >>  >  http://www.jaws-users.com/help/
   >>  >
   >>  >
   >>  >  For answers to frequently asked questions about this list
visit:
   >>  >  http://www.jaws-users.com/help/
   >>  >
   >>
   >>
   >>--
   >>Change the world--1 deed at a time
   >>Jackie McBride
   >>Scripting Classes: http://jawsscripting.lonsdalemedia.org
   >>homePage: www.abletec.serverheaven.net
   >>For technophobes: www.technophoeb.com
   >>
   >>For answers to frequently asked questions about this list visit:
   >>http://www.jaws-users.com/help/
   >>
   >>
   >>For answers to frequently asked questions about this list visit:
   >>http://www.jaws-users.com/help/
   >
   >
   >  For answers to frequently asked questions about this list visit:
   >  http://www.jaws-users.com/help/
   >


   --
   Change the world--1 deed at a time
   Jackie McBride
   Scripting Classes: http://jawsscripting.lonsdalemedia.org
   homePage: www.abletec.serverheaven.net
   For technophobes: www.technophoeb.com

   For answers to frequently asked questions about this list visit:
   http://www.jaws-users.com/help/
For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/



For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/
Send any questions regarding list management to:
[email protected]



--
Change the world--1 deed at a time
Jackie McBride
Scripting Classes: http://jawsscripting.lonsdalemedia.org
homePage: www.abletec.serverheaven.net
For technophobes: www.technophoeb.com

For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/
Send any questions regarding list management to:
[email protected]

For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/
Send any questions regarding list management to:
[email protected]

Reply via email to