Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 28 April 2013

Is there such a thing is being too secure?

Posted on 08:11 by Unknown
One thing that I seem to notice about a few computer security geeks (including me at one point) often try to get you to adopt an unrealistic amount of computer security. Well guess what? If people did what they said, there would be no issue with malware anymore.

On one online forum, I found someone talking about doing all of the following things. Here are some of the things he recommended doing, along with some of my objections.

Have a router which is focused on security. (Costs quite a pretty penny)

Have a firewall that prompts you to allow or deny all traffic. (So you would have to make all of the decisions. Go ahead if you want to spend hours learning what to allow and what to deny.)

Have your computer set to download all updates automatically. (Bad updates can be released, like the Patch Tuesday bad update that prevented some Windows 7 machines from booting.)

Have high end antivirus software. (Which most users don't need because it contains too much stuff that they don't use and may be a resource hog, slowing down the computer.)

Always have the latest Operating System available for your platform. (I know some Windows XP users who would object to this, so I'm not even gonna comment on this.)

Always have the heuristics on your antivirus set to maximum if possible. (This means that your antivirus program will be so sensitive that it will detect quite a few false positives. And if it detects a critical system file as malware, it's game over.)

Never connect the the internet. (This prevents most malware infections as well as prevents infections from spreading. Of course, this also means no internet, which means that the normal user would not be able to enjoy their computer.)

Did you read down the list of just 7? At that point I just had to stop. Really, are you going to do all of that and more? So, is there such a thing as being too secure? Your call on that. Thanks for reading, be sure to sound off in the comments.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ▼  April (15)
      • Those silly scammers.
      • Is there such a thing is being too secure?
      • Passwords: Too Tough to Crack: Step 5 and The Wrap...
      • Passwords: Too Tough to Crack: Part 2
      • Shameless Plug: I talk about my new YouTube video.
      • Passwords: Too Tough to Crack: Part 1
      • Java: No more coffee for you.
      • The pen (or keyboard) is mightier then the malware!
      • Why events that get massive media coverage are a b...
      • URGENT Warning: Do not install MS13-036
      • My list of the top 3 free pieces of software.
      • What does it mean: Sandbox
      • Using Windows XP? Here comes the end.
      • What Does It Mean: Firewall
      • Haters Gotta Hate, Noobs Gotta Imitate.
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile