Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About Tinstaafl

  • Rank
    New Member
  1. Yes, that would be helpful. Thanks! I noticed that two basic repair actions are checked by default: 1. Delete tracing keys 2. Reset Winsock I am guessing that "Delete tracing keys" does some sort of registry cleaning, as "keys" seems to imply registry keys? I Googled "Reset Winsock" and got a few answers. It seems that command will remove any providers not included in "winsock,dll" by default, so you may need to install some things like USB network connections if you run that.
  2. On v7.2.7.0 now, and still no detailed explanation for what these basic repair actions do. The help icons (?) in the settings page only opens the manual. The available repair actions are listed in the manual, but provide only a terse description for each. There is no help regarding what/when/where/why to use them.
  3. If you run an AV like Avast, Avira, or Bitdefender on a modern PC, you are not likely to 'feel' any impact of running an AV. Those tools are real-time file scanners that will scan any file you access, so there is some system overhead, but most are likely to be better performers than Defender. Real-time anti-exploit measures such as MalwareBytes, or HitmanPro.Alert, use different mitigation and risk reduction methods that don't necessarily eat as much CPU time. So it is more likely that your choice of primary AV (and the PC hardware) that determines your overall performance.
  4. I believe your best defense is a good imaging program. The AV and anti-malware programs are useful to alerting you to an infection. But once you know you have been compromised, the best course of action is to wipe and re-image the PC, or perform a clean re-install if you don't have a recent system image. In the last company I worked for the IT team did not mess around with trying to clean infected PCs. They immediately wiped and re-imaged the PC with the standard company issued image. All of the user profiles including current docs were kept on servers, so the downtime and interruptio
  5. Yup. That is why I laugh when somebody claims that all they run is Windows Defender...
  6. I will agree that in theory the Malwarebytes team has some advanced technology that may not be readily tested with current methodologies. But unfortunately, the naysayers may be getting the upper hand lately due to the poor "optics" regarding the reluctance of the team to participate and shed these doubts. I would think that making this happen should become a priority effort from the executive offices down to the front line.
  7. Well that MRG report confirmed my thoughts on Avira, Bitdefender, and Kaspersky being the best 1st line defense against malware. I use Avira. I also feel better knowing that I use HitmanPro as a 2nd line layered defense scanner, in addition to Malwarebytes and Zemana.
  8. I am now allowing updates again, as the problem seems to have been fixed. Have not seen any new updates yet, as seems to be the current version.
  9. The new version of MBAE tested fine for me on WinXP SP-3, 32-bit. The issues I was previously having with browsers appears to have been corrected.
  10. Well you actually only need protection on your Windows hosts and Windows VM guests. Linux will do just fine without.
  11. That's exactly what I am doing. I have old applications that will no longer run on Windows 10. I have run XP in a Virtualbox host on both Linux and Windows 10. Works great! At this point I am dependent on Avast and MBAE to protect the XP VM. Even so, I try to keep away from the net as much as possible. I rarely download and run anything new. If anything bad does happen I will just re-pave the VM with a clone.
  12. Win XP-SP3 here as well, same issue others have reported with their web browsers. Rolled back to v.24 and all is well again, disabled auto-updates. V.41 running OK on Windows 7.
  13. I agree with the arguments for a behavior based defensive layer, and the limitations of traditional signature based approaches. But I think the claim that this is all you need today has created a credibility gap for the product (based on comments I read in public forums). While your scientific data may prove this point to be correct, there is apparently a majority public opinion that has not yet shifted over to this viewpoint. This is not yet perceived to be a proven approach, and most security minded folks generally choose to err on the side of caution. I use multiple layers
  14. Based on the data, I would think that MB should be considering a partnership with an established AV company. That would allow for a multi-level protection product, that in the real world, could be an actual replacement for an AV suite. This would be in recognition of the understanding that traditional AV products can let a lot of today's exploits slip past the defensive perimeter. But IMHO, you should still use an active signature based AV scanner running in real-time. Obviously, that is not enough to catch all of today's malware threats, but combining the two approaches in a layered defe
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.