Even things like Malwarebytes that a lot of people recommend - are now a total waste of time -- I can give you ANY number of PUPS against which which Malware bytes is totally useless. -- PUPS act as "Normal Windows programs" and can behave as a perfectly legitimate (but hideously annoying) program. Unless you have a specific block against "progname.exe" then how in the world will Malwarebytes know it's a PUP.
For example say you have PHOTOSHOP.EXE and FOTOKINO.EXE - both could be 100% legit programs -- how will Malwarebytes react.
I think people also need to know - or at least understand :
a) How executables work - i.e what windows does when a program is launched
b) what specifically are they trying to defend against.
My own view is still the same - use COMMON SENSE, have backups and use Windows defender. Anything else isn't worth it ad can just consume resources on your machine.
Avast has specific low resource routines... common sense is a no-brainer and not even part of the equation...
I posted recently how Norton classed ShowKey as PUP based on a reputation signature..and that's only 'cos I included an update check that gets info from Github.
I think the OP was referring to PAYING for AV software -- all these people mentioning the "Freebies" are OT.
However my view is still the same - Paid for or not - a waste of time.
In any case most of these databases that record against PUPS probably have very poor algorithms to decide what is a PUP and what isn't.
If you are sufficiently worried about one or two specific ones well there is a thing called the Windows FIREWALL - people IMO don't make good enough use of the (actually very good) built in Windows firewall, and of course their router logs too -- I'll bet a load here even on this very forum don't know how to acess their router logs -- IMO you should set up a job to examine these DAILY - I think you might be surprised at numbers of attempts at a login !! -- perfectly normal BTW to see these types of attempts - just make sure none actually get through. !!
How many people here have CHROMECAST - actually a very good convenient piece of kit -- but do thy realize whenever you re-boot or start it you can see it broadcasts an OPEN Wifi signal !!!. Using Chromecast conncted via an adapter to your Ethernet is better - and the open wifi signal isn't available for long - but in theory it could get exploited.
Why Google Has Yet to Fix Chromecast Flaw One Year Later
Stopping these loopholes and using the Firewall and your router properly are far better than any cludgy piece of software.
If you really want to see decent secure systems - you don't have to install it but look at CENTOS and RED HAT and checkout the SELINUX info. This is built into the OS and very hard to break indeed.
Even if you HATE Linux just read the description here abut how it works. Whatever your OS it's a sensible (and not too technical) read.
Security-Enhanced Linux - Wikipedia, the free encyclopedia
The Ms kernel is going the same way in implementing security -- good thing too.
As I re-iterate -- understand what the REAL threats are, and what ways you can use to implement them.
BRAIN is still by far and away the safest and most secure method.
I can't remember the last time I actually got hit by any malware (maybe 2009 or 2010).
The weird thing was, despite using multiple different products, no malware/spyware was detected (not even false positives).
False warnings or blockages when visiting websites
500 samples used -0
False detections of legitimate software as malware during a system scan
1,468,321 samples used-0
False warnings concerning certain actions carried out whilst installing and using legitimate software
41 samples used-0
False blockages of certain actions carried out whilst installing and using legitimate software
41 samples used-0
What I would like to know (is Windows 10 Firewall and Defender) enough protection for the average user ?