• Content Count

  • Joined

  • Last visited

Everything posted by scissorhands7

  1. Just because something is more popular doesn't mean it's necessarily always better. Example, just look at Norton Anti-Virus. It is very popular, but, not necessarily the best. B haha its sure as heck isn't on CNET
  2. Or something like this Edit: Removed link to circumvent software regulations. - Matt LULZ!
  3. Yes I typically startup it up and give it a scan weekly if not more. Additionally I regularly check my processes tab and I know what every process is and how many I regularly have. It allows me to have many more system resources to do functionality improvements and have optimal speed which I enjoy.
  4. It's not free. B For those with morals no. Lol. However: *slightly frowns due to expense*
  5. Lol that AdAware is a step above malwarebytes due to its higher popularity. And bounds beyond SpywareSweeper. Best all in one utility = Advanced System Care
  6. Switching to Avast was implying that users should use antivirus protection. Ergo no contradiction. And point taken on the demand thing. I'm working on it.
  7. And AdAware is number 3 Which proves they're all excellent software. I recommend having them all if you have the drive space. Just on AdAware I recommend going to start - run - services.msc and setting the lavasoft agent to manual.
  8. Additionally I'd like an explanation in the MSCONFIG thread.
  9. 1. Phishing rarely leads to malware drive by installations 2. Indirect Logic isn't equatable to direct logic 3. User's should always have AntiVirus Software installed (As I agreed in my original post) However advanced users don't need to have it actively running in their background and can instead have it for when or if they get attacked
  10. No CNET doesn't do rankings based on total downloads but rather based on downloads this week. Therefore up and coming software is recognized quickly. Example: IOrbit's SmartDefrag.
  11. Best Virus Scanner = Avast Was AVG before AVG decided that it wanted to replicate Norton's hogging.
  12. I agree with the MalwareByte. It's excellent software and I have it in addition to the ones I listed. I suppose I degrade SpywareBlaster because it doesn't fit my style. I'm a Defend after attack type of guy instead of try to prevent infections. Additionally (back to CNET) AdAware and Spybot Search and Destroy are way more popular and have higher reviews both user and editor wise.
  13. Just double click your avg icon and make sure "Safe Search" is turned on.
  14. No safe search comes with AVG 8. It's built into AVG 8 and turned on by default. When you do a google search AVG scans each site for you and posts a green checkmark if its ok. Or a red check mark if it is phishing or malware.
  15. Spybot Search and Destroy + AdAware > SpywareBlaster They aren't actively on and scanning however I'm sure SpywareBlaster consumes a decent amount of CPU usage and pages a good bit of Ram. I personally would rather defend my computer when attacked instead of slowing it down by constantly shielding it.
  16. They probably will. AVG already does this for you if you have it. "Safe Search" On google and other site it prescans the site for phishing/malware and posts a green check mark or a red X next to it.
  17. oOo ultramon. *adds to set of freeware* My summertime boss will love this.
  18. So you're saying Microsoft and Mozilla implemented Anti-Phishing techniques in their browsers for the hell of it (e.g. a semi-non-existent problem)? B Yes links in the emails techincally use the browser (that's generally why the filter is there) However I was referencing more going online through searches rather than clicking links in emails. If your talking about searching sites through google etc. there's not that good of a possibility you will get phished as less clicked posts tend to fall to the back pages.
  19. I'll start it out with the best defragmenter. In my opinion the best defragmenter that is free is IOrbit's Smart Defrag. Has a wide variety of excellent options A. Power Down after defragment B. Auto Defragment C. Optimizes files (Moves most commonly used to the front) It's also razor fast and can get the job done way faster than even auslogistic defrag.
  20. He's Mr. Admin to you. B *Sighs* My bad *Tips hat to Mr. Prez*
  21. You are comparing yourself to someone who has limited knowledge of computers and Internet security - you cannot do that (well, you could, but it's not fair as most people do not have the same skill set as you, me, or most people on this forum). As you acknowledged in another post most of computer users are ignorant and do not know what they are actually doing other than perhaps checking their email and playing Slingo online. How do you think those Paypal/bank/credit card scams work? People do not know any better. I completely agree that people don't know any better. However I was talking site-wise. Not really internet security wise. I do now understand what he was saying though and I agree, phishing sites are particularly dangerous and perhaps more so that porn sites because they steal information (though you could say backdoor trojans do as well). However I was referencing more just browsing online. Usually if your just on a web browser and you're visiting sites on google etc. Porn sites are going to be the most dangerous and the most common for users. I deal with college students so that is generally what I see. Additionally downloading random executables from frostwire is another biggie. I'm not denying that phishing is uncommon. I'm just saying for web browsing typically you don't get phished just by browsing the internet. Mostly its through emails.
  22. Understood mr. moderator. I really didn't intend it to turn into a flame war or an OS war. It was more to explain that my OS was actually an xp OS because from the video you can't really tell what it is.
  23. You can change your computer to run off of static IP if you'd like. Its personal preference. If you would like to go static IP i can explain how to do so.
  24. Those registry keys don't affect that particular test. Java applets manage their own network connections and the applet that drives that test only creates two connections, only one of which is active at any given time. You can confirm this by watching netstat while the test is running -- look for connections on remote ports 8085 and 8086 -- or by disassembling the applet. Also, your hack set the maximum number of connections to twenty-two, not sixteen. DWORD values are expressed in hex. Thanks, I wasn't aware of that before jcl. I appreciate when you actually discuss the hacks and don't degrade them because of "Danger" Registry tweaking can be extremely useful if your business is time oriented. Yes I completely realize 90% of these hacks can easily be done by doing them windows. I do registry hacking for pure speed because it allows to me to change the settings very quickly. Since I charge by the hour, being quick produces a happy customer and thusly i get more business. Are there any other contextual errors I made or registry hacks that don't do what they say? And what does the maxconnections do by the way, could you explain it?