× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



> From: Jones, John (US)
> 
> And when the virus/malware gets on your network?

Different issue.


> Or you install new
> software? (make a new image) Or change a setting in an existing app?
> (registry/config file writes - make a new image)  Very limiting for a
> normal user.

Installation involves thawing and refreezing, no big deal.  The only
problems are those programs that use the registry during normal use.
Frankly, I don't know how many of those programs exist.  It would be
interesting to know.


> This is fine for restoring a trashed system or one that is used by the
> public but is not properly locked down.  But it is not a replacement
for
> tools like AV, Anti-Spyware, and personal firewall software.

But it might be a nice complement, especially on a home network.  The
"family" workstation that is used by my wife and daughter might be a
good candidate for this sort of approach.

The other very interesting software from these people is
anti-executable, which basically whitelists what programs can run on
your machine.  This seems like a very nice addition to any anti-spyware
scenarios.

I'm just looking at options right now.  Since I'm convinced that the
spyware writers are funded by the anti-spyware companies, I find it
galling to have to buy this stuff anyway.  Hell, if Microsoft wrote code
that passed CS101 and didn't have buffer overrun exploits, 99.8% of the
viruses would be nullified and this industry wouldn't exist.

Joe


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.