[ lecture ]
While everyone's been giving good advice (although I personally prefer F-Prot and have had so many problems with the Symantec products that I'll now uninstall them on sight), I think the original poster is asking the wrong question...
In the end,
no product can fully protect you from the stuff that's going around - you have to combine it with safe work practice, which means:
* Installing all security updates from Windows update as a matter of religious duty.
* Using a good-quality local firewall and making sure that you're careful about exceptions
* Using a good-quality (preferably linux-based) stateful border firewall (many ADSL routers have tolerable stateful firewalls built into them - they're better than nothing). Open up the bare minimum of incoming ports - for most home users, this essentially means no ports at all.
* Not downloading programs from the web unless you are absolutely sure of their credentials (and I mean
absolutely sure)
* Not opening attachments from people you don't know - ever, under any circumstances.
* Not using Outlook Express unless you have no choice (it exposes you to any flaws in the Internet Explorer HTML rendering engine, which is a common vector for infection). If you have to use Outlook Express, either don't open HTML messages, or don't open messages from people you don't know.
* Not using Internet Explorer - but then, why would you when FireFox is out there?
* Not replying to spam (it confirms that your address is "live" and makes you more of a target)
* Not buying anything from an unsolicited mail message (even if it doesn't "look like spam" )
* Disabling Java in your web browser. For real security I'd also recommend disabling Javascript, but in reality this just makes too many sites unusable. Be careful, though.
* Disabling Flash in your web browser (or even better, installing the FireFox extension that allows you to choose whether or not to use Flash on a site-by-site basis).
* Not opening Microsoft Word or Excel documents received outside your firewall unless they have been scanned using a virus scanner that is
absolutely up-to-date (i.e, has been updated less than ten minutes before you do the scan) Both these formats are an increasingly common vector of attack because they can carry scripts and ActiveX controls, and because both products have some well-known buffer overflow vulnerabilities. Most people don't even realize that these formats have a risk associated with them.
... The firewall recommendations here are the most important parts - good firewall protection is essential if you want to have any real chance of safety, because a signficant number of commonly-exploited vulnerabilities under Windows only require the ability to connect to the machine.
Put simply,
trust nothing. Just because you're paranoid doesn't mean they're
not out to get you, and an ounce of suspicion, in this case, is worth five pounds of reformatting and recovery.
Establishing sound work practices is far more important than putting all your reliance on a software solution that is always a step behind the state of the hacking art. I'm not saying you shouldn't use AV software - far from it! But you shouldn't regard it as a replacement for sensible computing habits.
[ /lecture ]
* This post has been modified
: 18 years ago