scissorhands7

Members
  • Content Count

    72
  • Joined

  • Last visited

Posts posted by scissorhands7

  1. Lol that AdAware is a step above malwarebytes due to its higher popularity. And bounds beyond SpywareSweeper.

    Best all in one utility = Advanced System Care

    Just because something is more popular doesn't mean it's necessarily always better. Example, just look at Norton Anti-Virus. It is very popular, but, not necessarily the best.

    B

    haha its sure as heck isn't on CNET

    http://www.download.com/Norton-AntiVirus-2...html#userreview

  2. Yes I typically startup it up and give it a scan weekly if not more.

    Additionally I regularly check my processes tab and I know what every process is and how many I regularly have.

    It allows me to have many more system resources to do functionality improvements and have optimal speed which I enjoy.

  3. In fact, MBAM is number 8 currently for most popular software and number 5 for most popular security software.

    B

    And AdAware is number 3

    Which proves they're all excellent software. I recommend having them all if you have the drive space.

    Just on AdAware I recommend going to start - run - services.msc and setting the lavasoft agent to manual.

  4. I would just like to point out that phishing and XSS can both lead to drive-by installations of malware on a machine in addition to potential identity theft. So my original point was that even if you are a safe surfer, you can still fall victim to an infection which is why every windows user who is connected to the internet should have anti-virus software.

    1. Phishing rarely leads to malware drive by installations

    2. Indirect Logic isn't equatable to direct logic

    3. User's should always have AntiVirus Software installed (As I agreed in my original post) However advanced users don't need to have it actively running in their background and can instead have it for when or if they get attacked

  5. I agree with the MalwareByte. It's excellent software and I have it in addition to the ones I listed. I suppose I degrade SpywareBlaster because it doesn't fit my style.

    I'm a Defend after attack type of guy instead of try to prevent infections.

    Additionally (back to CNET)

    AdAware and Spybot Search and Destroy are way more popular and have higher reviews both user and editor wise.

  6. Spybot Search and Destroy + AdAware > SpywareBlaster

    They aren't actively on and scanning however I'm sure SpywareBlaster consumes a decent amount of CPU usage and pages a good bit of Ram.

    I personally would rather defend my computer when attacked instead of slowing it down by constantly shielding it.

  7. I'm not denying that phishing is uncommon. I'm just saying for web browsing typically you don't get phished just by browsing the internet. Mostly its through emails.

    So you're saying Microsoft and Mozilla implemented Anti-Phishing techniques in their browsers for the hell of it (e.g. a semi-non-existent problem)?

    B

    Yes links in the emails techincally use the browser (that's generally why the filter is there)

    However I was referencing more going online through searches rather than clicking links in emails.

    If your talking about searching sites through google etc. there's not that good of a possibility you will get phished as less clicked posts tend to fall to the back pages.

  8. I'll start it out with the best defragmenter.

    In my opinion the best defragmenter that is free is IOrbit's Smart Defrag.

    Has a wide variety of excellent options

    A. Power Down after defragment

    B. Auto Defragment

    C. Optimizes files (Moves most commonly used to the front)

    It's also razor fast and can get the job done way faster than even auslogistic defrag.

  9. You are comparing yourself to someone who has limited knowledge of computers and Internet security - you cannot do that (well, you could, but it's not fair as most people do not have the same skill set as you, me, or most people on this forum). As you acknowledged in another post most of computer users are ignorant and do not know what they are actually doing other than perhaps checking their email and playing Slingo online. How do you think those Paypal/bank/credit card scams work? People do not know any better.

    I completely agree that people don't know any better.

    However I was talking site-wise. Not really internet security wise. I do now understand what he was saying though and I agree, phishing sites are particularly dangerous and perhaps more so that porn sites because they steal information (though you could say backdoor trojans do as well).

    However I was referencing more just browsing online. Usually if your just on a web browser and you're visiting sites on google etc. Porn sites are going to be the most dangerous and the most common for users. I deal with college students so that is generally what I see. Additionally downloading random executables from frostwire is another biggie. I'm not denying that phishing is uncommon. I'm just saying for web browsing typically you don't get phished just by browsing the internet. Mostly its through emails.

  10. "OS A is better than OS B" arguements are stupid. This thread is about posting screenshots, not debating which OS is better. If you want to do that, start a new thread. If that new thread becomes a flame war, it will be closed.

    Understood mr. moderator. I really didn't intend it to turn into a flame war or an OS war. It was more to explain that my OS was actually an xp OS because from the video you can't really tell what it is.

  11. I too have seen a general consesus at 10ish however when I ran this test I got better results "Good data stream (no/few rexmits)" when having 16 connections vs 10.

    Those registry keys don't affect that particular test. Java applets manage their own network connections and the applet that drives that test only creates two connections, only one of which is active at any given time. You can confirm this by watching netstat while the test is running -- look for connections on remote ports 8085 and 8086 -- or by disassembling the applet.

    Also, your hack set the maximum number of connections to twenty-two, not sixteen. DWORD values are expressed in hex.

    Thanks, I wasn't aware of that before jcl.

    I appreciate when you actually discuss the hacks and don't degrade them because of "Danger"

    Registry tweaking can be extremely useful if your business is time oriented. Yes I completely realize 90% of these hacks can easily be done by doing them windows. I do registry hacking for pure speed because it allows to me to change the settings very quickly. Since I charge by the hour, being quick produces a happy customer and thusly i get more business.

    Are there any other contextual errors I made or registry hacks that don't do what they say?

    And what does the maxconnections do by the way, could you explain it?