-
November 9th, 2011, 09:24 PM
#1
SpyBot S&D
Anyone still using SpyBot S&D? I downloaded it from download.com to run on an infected machine... but when I started to update the definitions, I noticed that the def update was dated 2009. I am not sure if it really hasn't been updated since then... but that would make it painfully out of date. The immunization defs were pretty recent [at least 2011]... Anyone have any information on this? Should I consider it EOL?
\"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"
-HST
-
November 9th, 2011, 09:49 PM
#2
-
November 10th, 2011, 01:36 AM
#3
Always helpful, nihil - Many thanks!
\"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"
-HST
-
November 10th, 2011, 02:21 AM
#4
I still use it.
As already mentioned yes they are still releasing regular updated definition files.
on win7 you need to right click the spybot icon and select "Run as Administrator" otherwise it runs the app with restrictions.
also run it in safe mode with networking. I have found in the past i was able to always get better "cleaning" results when i run these sorts of applications via safemode, then once finished reboot into a normal user session.
-
November 10th, 2011, 02:57 PM
#5
Same thing with Windows 8, you must start it "As Administrator" even though you have logged in with an "administrator" account.
-
November 16th, 2011, 02:45 PM
#6
I generally use filehippo.com as my preferred D/L site
and SpyBot S+D is still a goodie
but some of the bad guys are aware of it
and can hide from it, even disable it
I found the malwarebytes antimalware is a goodie
http://www.filehippo.com/download_ma..._anti_malware/
doesn't seem to have too much overhead, and as a new toy on the block, not all of the bad guys are aware of it, and therefore cannot hide from it
and if you are using SpyBot, don't forget to use the immunize option too
so now I'm in my SIXTIES FFS
WTAF, how did that happen, so no more alterations to the sig, it will remain as is now
Beware of Geeks bearing GIF's
come and waste the day :P at The Taz Zone
-
November 17th, 2011, 06:12 AM
#7
I have been using MBAM for a while. I love it. That is usually my first attack on an infected machine [after running ccleaner, of course]. I have also been using some of the bootable rescue CDs. I hadn't used spybot in a year or more, and the definitions date confused me. Nihil cleared that up though. On occasion I will also pull out Combofix if it is a particularly nasty infection. If that combination doesn't remove all of the junk, time for an OS reinstall.
\"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"
-HST
-
November 17th, 2011, 03:28 PM
#8
The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
Albert Einstein
-
November 18th, 2011, 11:04 PM
#9
I am not saying that the infection cannot be cleaned. I am saying that at that point, it is less time consuming [generally speaking] to reload the OS than it is to be sure that the infection is gone.
I definitely agree with your second statement. I have some very strict policies in place on my network which prevent executable files from running out of temp folders, application whitelisting, no users run as admin, etc. I have not had one infection since I started implementing these [the machine that I mentioned in my original post belonged to a friend of a co-worker's]. This setup is a bit of a pain to get set up at first, but well worth it.
Last edited by westin; November 18th, 2011 at 11:08 PM.
\"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"
-HST
-
November 21st, 2011, 09:28 AM
#10
Originally Posted by westin
I am not saying that the infection cannot be cleaned. I am saying that at that point, it is less time consuming [generally speaking] to reload the OS than it is to be sure that the infection is gone.
I definitely agree with your second statement. I have some very strict policies in place on my network which prevent executable files from running out of temp folders, application whitelisting, no users run as admin, etc. I have not had one infection since I started implementing these [the machine that I mentioned in my original post belonged to a friend of a co-worker's]. This setup is a bit of a pain to get set up at first, but well worth it.
I am liking your policies (I have seen you mention them in a previouos post). Care to share your implementation or should I just google it?
The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
Albert Einstein
Similar Threads
-
By Goitz in forum Newbie Security Questions
Replies: 10
Last Post: April 19th, 2006, 11:02 PM
-
By deadfreeze in forum Spyware / Adware
Replies: 52
Last Post: September 1st, 2004, 05:23 PM
-
By netspyder in forum Spyware / Adware
Replies: 6
Last Post: May 9th, 2004, 07:03 AM
-
By AngelicKnight in forum Spyware / Adware
Replies: 11
Last Post: January 6th, 2004, 03:13 PM
-
By cutty in forum Newbie Security Questions
Replies: 9
Last Post: October 16th, 2003, 08:13 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|