Microsoft Security Essentials

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Threaded View


Since Ubuntu Linux has apparently went the way of releasing buggy-as-hell
software, I reluctantly installed Windows 7 on my PC. Much to my surprise, I
find that Microsoft has released a free AV for Windows users.

The Microsoft Security Essentials seems to work rather well from what I have
read, and from a personal opinion the interface is simple and functional.

Anyone else using this product?


--
Bill

Re: Microsoft Security Essentials



Bill wrote:

Quoted text here. Click to load it

Do you feel that Windows 7 is less buggy than Ubuntu Linux?

Quoted text here. Click to load it

I read this somewhere...:
"Would you trust a security application written by the people who wrote
the operating system that needs it?"

--
   -bts
   -Four wheels carry the body; two wheels move the soul


Re: Microsoft Security Essentials



Shagnasty says...

Quoted text here. Click to load it


It's free, it works and let's face it. You have to be pretty much a nimrod to
get your PC infected anyway.


--
Bill

Re: Microsoft Security Essentials



Bill wrote:
Quoted text here. Click to load it

It seems to be very good, and I doubt MS even wrote it, a 3rd party
vendor maybe.

<http://download.cnet.com/Microsoft-Security-Essentials/3000-2239_4-10969260.html

It's just like MS had to turn to someone to better protect the Vista and
Windows 7 O/S(s).

<http://www.npr.org/blogs/thetwo-way/2009/11/nsa_microsoft_windows_7.html
<http://www.washingtonpost.com/wp-dyn/content/article/2007/01/08/AR2007010801352.html

I don't come to this NG much, but I do spend a lot of time in the MS
community NG(s).

What I don't see in the Vista or 7 NG(s) is users talking about I have
been hit by malware that much anymore. It's not to say that it doesn't
happen.

But before you say that Linux doesn't need the NSA help in securing the
O/S, it doesn't seem to be the case.

<http://www.nsa.gov/research/selinux/index.shtml

Re: Microsoft Security Essentials



Quoted text here. Click to load it

It's cute, but doesn't really make sense.



Re: Microsoft Security Essentials



wrote:

Quoted text here. Click to load it

Do you remember MSAV?  Microsoft purchases an anti-virus program, but
fails to maintain it.  Why would anyone expect anything different this
time?

Regards, Dave Hodgins

--
Change nomail.afraid.org to ody.ca to reply by email.
(nomail.afraid.org has been set up specifically for
use in usenet. Feel free to use it yourself.)

Re: Microsoft Security Essentials



David W. Hodgins wrote:
Quoted text here. Click to load it

So you're suggesting that people don't learn from past activities,
and seek to correct and improve their efforts?
Isn't that sort of what RaiD claims to have done?

Re: Microsoft Security Essentials




Quoted text here. Click to load it

I'm saying that some people don't, not all.  In the case of m$, they
have a long history of not showing any change in their ability to
develop and maintain secure software.

In Dustin's case, he's demonstrated the change by his behavior.

Regards, Dave Hodgins

--
Change nomail.afraid.org to ody.ca to reply by email.
(nomail.afraid.org has been set up specifically for
use in usenet. Feel free to use it yourself.)

Re: Microsoft Security Essentials




Quoted text here. Click to load it

Given Adobe's failure to patch its software and Apple's refusal to use it in
their machines, I'd say that MS is miles ahead of Adobe.  Also, nobody's
mentioning that Apple has security issues, but they keep it covered up.  Apple
issues patches all the time.  


Re: Microsoft Security Essentials



David W. Hodgins wrote:
Quoted text here. Click to load it

Care to tell us what the significant insecurities are in Windows 7 or
Windows Server 2008?



Re: Microsoft Security Essentials




Quoted text here. Click to load it

For w7, they currently only have one publicly known "less critical"
unpatched vulnerability http://secunia.com/advisories/product/27467 /

With server 2008, it's currently two "less critical" vulnerabilities
http://secunia.com/advisories/product/18255 /

Those are for the os itself.  If you include the various programs such
as internet explorer 8, additional, although at this time, also
"less critical" problems also show up
http://secunia.com/advisories/product/18255 /

As with any software from m$, it's only a matter of time till the new
problems are found.

If you skim through
http://www.microsoft.com/technet/security/advisory/archive.mspx
you'll notice that many advisories are fixes for things that allow
remote code execution, and/or privilege escalation.

If you follow the secunia advisories, and the release of fixes from
m$, over time, you'll understand that m$ is not, and never has been,
capable of developing secure software, in my opinion.

Many of the problems seem to stem from bad design choices, where they
are trying to make things easy to use, and then adding security features
after the fact, instead of designing the system to be secure from the
start.  Most of the rest appear to be problems where one group of
software developers are using tools/features of other software components
(such as the help fiasco), without properly considering the possible
security implications, of using those features.

Regards, Dave Hodgins

--
Change nomail.afraid.org to ody.ca to reply by email.
(nomail.afraid.org has been set up specifically for
use in usenet. Feel free to use it yourself.)

Re: Microsoft Security Essentials



Somebody wrote:

Quoted text here. Click to load it

Eh?  Flash is not a Microsoft product.  Neither are QuickTime or Firefox.  All
have had their malware vulnerabilities.  It's hardly Microsoft's fault if they
don't fix the exploits in 3rd party software.


Re: Microsoft Security Essentials



Quoted text here. Click to load it

That makes more sense.

My objection to the previous was that an OS is designed to facillitate
the execution of programs of the operator's choice to do what the
operator wants. The security programs almost always work to limit that -
protecting the operator from executing "bad code" or limiting what said
code has access to. Not all malware is written to exploit software
flaws, they're just programs that the operator shouldn't have executed.
The statement seems to imply that the malware *depends* on the
insecurity of the OS and it is foolish to trust someone who can't design
a secure OS to begin with to decide what programs you should and should
not execute.

It reminds me of the phrase "Is it warmer in the summer than it is in
the city?".



Re: Microsoft Security Essentials




wrote:

Quoted text here. Click to load it

| Do you remember MSAV?  Microsoft purchases an anti-virus program, but
| fails to maintain it.  Why would anyone expect anything different this
| time?

| Regards, Dave Hodgins

MSAV was an OEM of Central Point Anti Virus (CPAV).  Central Point Software was
bought by
Peter Norton and was eventually integrated into Norton AV before being acquired
by
Symantec.

MSE (and it predecessor Live OneCare) Microsoft Malicious Software Removal Tool
(MRT) and
Windows Defender are based upon the orginal kernel (mpengine.dll) of GeCAD's RAV
(but use
different signature bases).

The Microsoft anti malware product manager told me "Of course it's not exactly
the GeCAD
RAV engine any longer - the code has evolved a bit since 2003!"

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



Re: Microsoft Security Essentials




Quoted text here. Click to load it

I said this somewhere...

"You have to believe that Microsoft will get this right because since they're
releasing their own security software, their entire reputation as a company is
on the line now.  Not so when they relied on 3rd parties to provide
protection.  Now there's nobody to blame."


Re: Microsoft Security Essentials



David Kaye wrote:

Quoted text here. Click to load it

No I don't!   <lol>

--
   -bts
   -Four wheels carry the body; two wheels move the soul

Re: Microsoft Security Essentials




Quoted text here. Click to load it

I was wondering where you went. <G>


--
The bear went over the mountain to see what he could see. Hey! The other
side of the mountain was all that he could see! So he went back over the
mountain to see what he could see. Hey! The other side of the mountain was
all that he could see! - Green Jelly The Bear Song

Re: Microsoft Security Essentials



Dustin Cook wrote:
Quoted text here. Click to load it

He went off and cried over someone dumping Linux for a couple of days.
Let's hope he's alright. :-P

Re: Microsoft Security Essentials



Big 666 wrote:

Quoted text here. Click to load it

No he didn't, and yes he's alright.  ;-)  

--
   -bts
   -Four wheels carry the body; two wheels move the soul


Re: Microsoft Security Essentials



Quoted text here. Click to load it

One man's meat is another man's poison...yada..yada..yada.

If Ubuntu is too buggy for you, then you either have hardware
conflicts or you're doing it wrong.

GrtArtiste

Site Timeline