Pastor Dave said:
That's why one should run antivirus software.
Because that's what people do on computers.
They execute code.
Yes, but you said 'real time' scanning was needed not 'scanning' was
needed - there is a difference.
Really? That's interesting, since an antivirus
scanner cannot scan, as an example, every
file that will be installed before installation
proceeds, with every app out there, given
the way that they are distributed.
Why not?
And
sometimes just the act of decompression
of a package can cause a virus to execute.
Could you show me an example of this. I haven't heard of any that do
this - it sounds very unlikely to me.
But then it's too late. More than once, a
virus scanner has given a clean bill of health,
They can NEVER do this! At best they can say they found nothing.
only to alert to a virus during an installation,
if one is running a real time scanner.
The real time (on access) scanner will only alert during installation if
new executable content is placed in a file and that file is then
accessed. If the malware is runtime unpacked it will either have been
detected when the installer was scanned or not at all. Yes, malware can
sneak onto a system as part of an installation of software, but there is
no guarantee that real time scanning will be any better at detecting it
than on-demand scanning will. After installation the system can be
scanned again for malware to see if any malware files known to the
scanner were created during installation. The best way to avoid this
would be to extract files from the archives the installer uses and scan
them prior to installation. Many scanners will automate the extraction
when aksed to scan an archive filetype.
I've been a tech for over 20 years and I know
whereof I speak.
Were you using real time scanners twenty years ago?
And while the nutcase that likes to attack me
and claim I don't know what I'm doing and
needed help with something basic, let it be
noted, that he is a liar.
Okay said:
The problem I brought up was in no way basic
and I had tried many things before posting
and I had put my problem up on some of the
better known sites for this kind of thing. Not
one response. No one knew what it was
and Google and Yahoo gave zero hits on
the file name. Not only that, but after I
blocked it from entering the registry, it would
find a new way to load and not leave one entry
in the registry.
You saw my response, no?
No one was able to even offer a suggestion
and that idiot blasted me for pointing out
a web site that showed some of what I had
already done as well as my list of other
things that I had tried, when he asked me
what I had tried.
Hey, I commended you on trying to supply good information. The problem
was that you used search engine results for that file as a basis for
correcting your problem when the procedures were written for someone
else (apparently) with more problems than just the existence of the ottr
file. It's too bad the HJT guru's didn't explain why they suggested
deleting the file.
But hey, if that's how people want to judge
my competency, then have at it.
Don't worry about it - it takes all kinds of people to form a group.
Back to the diverted thread topic - the main difference between real
time scanning and on-demand scanning is that real time scanning scans
the file when it is accessed, and on-demand scanning scans the file when
asked to by the user. If you know when (and how) to ask, the two are
equivalent. When using the on-demand scheme - you don't have background
CPU cycles being used (almost constantly) and you need not be concerned
about RAM footprint because it is only in RAM when you asked it to be.
It is indeed possible to be reasonably assured that no malware is on a
system if you use safe practices with on-demand scanning as a part of
that practice - real time AV is not absolutely necessary.
Generally AV is reactive - someone has to get bit before a new malware
gets noticed. The real time AV users are like the penguins that must
check the waters for predators before the rest of the penguins can
forage. Proper use of safe practices and on-demand scanning allows you
to let others be the sacrificial penguins.