|
>I'm going to assume you mean running the DOS Fprot program >from within Windows and that you know DOS doesn't support the >NTFS filesystem. (not without special drivers, anyway)
Correct.
>Filesystem issues aside, I would expect a DOS antivirus >program running in a Windows NT based operating system to not >work correctly, because it is running in a virtual machine. It >only runs, because it's being lied to about its environment. >Low level access to repair system files will fail.
That is assuming it is making a low level access. Or is it just making an OS call to delete file? I don't really know but with F-Prot (DOS & Windows) that is the impression I get. (The realtime AV would be different in that respect. And I assume Norton AV gets in far "deeper" then F-Prot?
>I had a look at your test results. I used to do stuff like >that too, I had a "virus zoo" in an archive. I collected them. >I soon realized, that sort of testing is not really all that >useful. No matter how many you have, it's never a large enough >sample and nor is it necessarily representative of threats >that others are going to encounter.
True.
>Also, in testing like >that, it's not real world situations. Finding a signature in >filename.exe.antivirust.test (or whatever) just sitting in a >directory with a file extension that might not even be scanned >by all scanners is not the same as finding and dealing with >active nasties.
Well, these are all real world situations. All pulled from my Brothers' computer. All ended up on his computer one way or another.
He is running Win98. Oddly enough, even though for a long period of time, he was continually getting malware, & even though he was networked with other computers, none of this really affected him or any of the other systems. I have him running Mozilla rather then IE, & Eudora rather then OE. There never was any real "cleanup" actions taken on his computer (that I can recall?). I'd run the usual's, Ad-Aware & Spybot, & eventually put in SpywareBlaster. So it was more like the malware was getting into his computer, but not really doing anything. I'd periodically look through his system, find (usually by "feel") what wasn't right, rename the file with a .VIR extension, & leave it there.
Unfortunately, I never receive the kinds of stuff he does, so when I went started thinking about doing this kind of test, I had ready availability of material.
I culled his files, pulling a single sample of each type of malware I could find.
>So the KAV based scanner finds lots of stuff and you used it >to generate samples, kind of like a baseline for your tests. >Your sample is far too small for that kind of comparison. Even >the crappiest antivirus program can know about something that >even the best doesn't.
Agreed. But, when I took the "samples" & put them on my system, & started scanning them, I then I find that F-Prot did not find much of what KAV came up with, & then I give some other programs shots at the same samples, & they miss much also.
So what does that tell me. First, I have never had a virus. I do not run Ad-Aware or Spybot or SpywareBlaster on my system. I have run hijackthis & CWShredder only cause they are stand-alone programs that I can run in a scan only mode.
I do (now) run F-Prot for Windows AV, & free ZoneAlarm, & I have a router with NAT. Oh, & I run Mozilla & Eudora. I do not run IE, or OE, & do not have Java installed.
Knowing what I do, & how I do it, I have no problems running the way I do. Knowing that F-Prot is not an end all solution - cause I see there is a lot that it is not finding, I've endeavored to find other methods of keeping my system clean. So what will I do. 95% of the time, I will run as I do & as I have been. That other 5% of the time, if I download something from a suspect site, or something that I am not comfortable with, or something that I have read my contain malware, I'm going to scan it with other scanners.
>You have to know, that in cleaning up a system, you need to >run multiple utilities to get all the malware. There is no one >program that is going to take care of all of it.
Agreed 100%. Note, on my Brothers' computer as I mentioned above, there was not really anything to be cleaned. An odd thing here, or an odd thing there, but not a wholesale corruption to his system where it really affected anything on it. My impression is that current malware takes advantage of WinXP, IE, & OE, & their vulnerabilites. It see's Win98, & laughs, hah!, I'm not even going to screw around with you. (If he was running IE & OE, that would likely have been different.)
A friends computer (XP, IE, OE), had all types of malware, & I had to use all of the tools mentioned here (plus A2) to get rid of it. One found what the other didn't. They all complemented one another. Some needed the reboot (Spybot) before it was able to fully remove some of the malware. I thought that was great that it was able to do that.
I updated his AV (Norton) & firewall (ZA), & installed SpywareBlaster.
We'll see what happens with that.
|