Nod32, Kaspersky,Norton,McAfee,F-Prot,AVG,Avast! Most effective?

  • Thread starter Thread starter Buffalo
  • Start date Start date
Art said:
On Mon, 5 Sep 2005 18:57:15 -0400, "Roger Wilco"

I should add that AV gave up on their original idea - the idea that a
world of users capable of correctly implementing on-demand scanning as
part of safe practice was possible - and decided on automatic
intervention by on-access scanning. Now with that as the norm, the
software developers think it is a good idea to use application
extensions to allow mobile code to be automatically installed and
executed without the user having any point to intervene. This makes
on-access scanning of executables almost mandatory and yet still
inadequate because of automatic de-archiving and executing of content
within an already active process.
I was not looking at this from the POV of prevention but from the POV
of a user who gets a vague detection report.

All they really need to know is that a file is probably malicious, and
they probaly don't want to allow it to execute. This is an on-access
alert most likely as a result of them trying to do just that. If they
need more information the alerting program could
make the sample ready for submission, or if online could make submission
a point and click operation that they should be able to handle.
One wonders how effective
a product can be that can't pinpoint and ID a particular malware and
variant. What are you supposed to do next when you scan your drive on
demand and it reports something vague, and it's unable to do anything
about it? That sucks :)

Sure does - especially if the alert is on an already installed system
hosted malware which necessitates identification for removal.

But even the little information the good AVs offer locally sucks - some
cryptic name that means little to the user. The user is going to have to
get more info from a remote location anyway, so why not offer a
submission service?

It would be interesting to see the difference in size between a good
detector/def set and an identifier/def set - let alone the added code
need to affect a removal once identified. Library files were created to
avoid populating storage with redundant routines that many programs
used, .NET if I understand it correctly makes an application library
available as mobile code. Why not move the identification and removal
software away from the local detection software to avoid populating
user's system with redundant code they may never need?
I think your web app idea might have some merit, but my first critical
thought is of the many malwares nowdays for which the user shouldn't
be on line .... RATs and Worms.

I thought of that too, that is why I suggested the AV application could
offer to package a copy of the suspect for submission.
And he may need to be in Safe mode
or using a alternate OS for removal.

The return correspondence from submission could be an identification,
description (for the curious), avoidance measures for the future (user
education*) manual removal method, and auto-removal tool for that
malware and would all still fit on a floppy - if they still use those
old things anymore :))
But think it and work it through
some more and then elaborate :)

Thinking doesn't come as easily as it used to :)
The crux of your idea or thought seems to involve the use of a
hypothetical heuristic-heavy scanner that's "lightweight" in both
defs and bloat .... that somehow turns over the chore to "something
else" to determine exactly what it is that it found ... a fp or a
actual malware ... and pinpoint the malware and its variant. But
again, that "something else" can't require a connection to the
internet. Maybe a rf (radio waves) link to that "something else". Who
knows what might evolve in the future.

The "something else" may be a refrigerator, coffeepot, or toaster by
then. :)

My thought was that there are always other ways to submit suspect
files - someone else's network access or a clean boot w/network access
from the affected machine. Say I've got a AV capable of identifying a
couple hundred thousand malware programs, but all I need is for it to do
is detect 70,000. It alerts me to the existence of a backdoor.dropper in
some file a get from kazaa. I delete it. I don't need to know it was
dropping backdoor.garagedoor.aqz, so I didn't need to have a def that
specifically identified that version of the software unless the
detection was for the active backdoor itself (installed). The truth is,
that I probably don't need the specific identification data or the
accompanying removal data and code for any of the couple hundred
thousand malwares that I never will come in contact with - it just
seemed to me that detection is enough to have locally stored capability
for.

*user education is sadly missing from most AV help these days,
especially locally. Oh, you've got [malware name]- here's a removal
tool - see ya.
 
On Wed, 7 Sep 2005 11:25:52 -0400, "Roger Wilco"

My thought was that there are always other ways to submit suspect
files - someone else's network access or a clean boot w/network access
from the affected machine. Say I've got a AV capable of identifying a
couple hundred thousand malware programs, but all I need is for it to do
is detect 70,000. It alerts me to the existence of a backdoor.dropper in
some file a get from kazaa. I delete it. I don't need to know it was
dropping backdoor.garagedoor.aqz, so I didn't need to have a def that
specifically identified that version of the software unless the
detection was for the active backdoor itself (installed). The truth is,
that I probably don't need the specific identification data or the
accompanying removal data and code for any of the couple hundred
thousand malwares that I never will come in contact with - it just
seemed to me that detection is enough to have locally stored capability
for.

Sorry for the snippage, but I just don't have time to respond to your
long post. I just want to mention in this context that I've not
complelely lost interest in the old idea of developing means of
internet communication via alternate OS. Back in the Win 98 days
the holy grail was a DOS emergency boot disk arrangement that
would download av updates. I notice there's been quite a bit of
evolution in DOS capabilities and available items ... packet drivers
for broadband, etc. Since I'm a "old DOS guy" this sort of thing
intrigues me :)

Art

http://home.epix.net/~artnpeg
 
| From: "Morgan Ohlson" <[email protected]>
|
|
||
|| For the paying conumer that is not really acceptable. The antivirus
is an
|| assurance to have a working pc... reaching the internet for news,
debate and
|| as a essential office tool.
||
|| A future virus-scanner must... constantly identify almost all
existing
|| virus. Only a free scanner can be accepted to perform less then
"close to
|| perfect".
||
|| Morgan O.
|
| No !
|
| You put too much emphasis on the software. The most effective and
powertool is the user !
|
| One *must* practice Safe Hex and not just rely on software.
|
| --
| Dave

I've never seen any AV product that gives advice or help to users on how
to avoid malware problems!

I say it again:

A course in growing crops can't solve an ongoing starvation... But next
time...

A drowning man can naturally be greatful for the advice to take a life
jacket the next time ashore.

Its 2 totally differnt problems, although related... but not more then
related.
# Avoid problems
# Solve a problem that HAVE occured.

Occured problems are solved with quality scanners otherwise they may grow
unnoticed.

Morgan O.
 
Art said:
I've not
complelely lost interest in the old idea of developing means of
internet communication via alternate OS.

OS/2 is still alive and well and works quite well for this... <g>
 
Never looked into it. A primary objective would be that all utils,
etc., would be legit freeware. Seems that's possible now with DOS,
according to some posts I saw recently on alt.comp.freeware.

While OS/2 is not free, although it can be found on the cheap at ebay etc,
there is a real treasure trove of legit freeware utils for OS/2... If you
have any interest take a look at:

http://hobbes.nmsu.edu/pub/os2

Also firebird, mozilla, and thunderbird are current for OS/2
 
Back
Top