Better protection against the perfect combination of anti-virus software and Firewall

Source: Internet
Author: User
Tags high cpu usage norton 360

As the network speed keeps getting faster and the trojan virus increases, we are overwhelmed and struggling. If we don't have anti-virus software, it's really hard to do. Many netizens are asking what anti-virus software and firewall can be configured to ensure Machine security and smooth network connection?

It is hard to say that everyone's machine configuration, application requirements, and usage habits are different. Therefore, we can only say that this is the best choice.

I will post a professional analysis document here for your reference (this document is from the gentlemen's Forum and I have only made some corrections ).

I. Combination Principle

1. machine configuration

The selection of the software killer + Firewall must comply with the machine configuration and cannot drag the machine speed.

2. Principles of complementarity

Protection should be comprehensive, and software protection and firewall protection should not be complementary, so as to avoid unknown conflicts (that is, what I once mentioned, do not use a powerful anti-bot to configure a powerful firewall. A strong combination is not necessarily stronger ).

3. Streamlining principles

A soft killer + a firewall + Good Internet surfing habits + security awareness. do not attach countless soft killer servers to your servers. It will undoubtedly torture your own machines.

4. Security Coefficient

No combination is absolutely safe. Do not pursue 100%. We can only try to approach 100%.

5. compatibility principles

If you have a set, try to use the set. The combination of anti-software and firewall of the same product is the strictest, And the compatibility is the highest. Do not blindly trust the tests of authoritative organizations. The most powerful things are not necessarily suitable for you.

6. Core Principles

The choice of anti-bot service and firewall must be the core.

2. Recommended combination

1. Combination with Kabbah (or AVS) as the core

 


First combination of KIS6.0 or 7.0

Anti-Virus + File Protection + active defense + anti-spyware + email protection + WEB Protection + KAH (7.0 added parental control, enhanced active defense, and increased heuristic ), it should be a comprehensive combination, which is sufficient for common users.

Recommended Configuration: Memory above MB (with reasonable settings, Mb is definitely enough), applicable to beginners.

The second combination of KAV + KAH (or pc tool or ashampoo)

Anti-Virus + active defense + WEB Protection + Firewall, which has fewer functions than KIS, but it is sufficient for general users. Do not install any more AVG or other anti-trojan software. The reason for this suggestion is that this will seriously affect the machine speed. The second is that Kabbah has a strong ability to kill horses. This is the most resource-saving combination. The pc tool or ashampoo functions are generally based on complementarity.

Recommended Configuration: Memory above MB (with reasonable settings, Mb is definitely enough), applicable to beginners.

Third combination KAV + jecito

This is a powerful combination, with good resource usage, powerful jecito functions, and few resources.

Recommended Configuration: Memory above M, suitable for Master, mainly because the settings of jecito are very complicated.

2. A combination of SPIDER (or Destroyer) as the core

 

First combination of spider + comodo V3

It saves a lot of resources. comodo V3 can make up for the weakness of the spider in active defense, and it is enough to prevent black.

Recommended Configuration: Memory above MB, suitable for Masters (complicated comodo settings ).

Second Combination of spider + SSM (or EQ) + XP Wall

This is not introduced. It has the same effect as the first group, but saves more resources.

Recommended Configuration: Memory above MB, suitable for Masters (complicated SSM settings ).

In fact, in many cases, an SSM is sufficient to cope with various situations.

3. a nod-centered combination

 

First combination of NOD32 V3 integrated firewall + SSM (or EQ)

NOD32's own suit still has poor active defense capability and moderate anti-Trojan capability. Therefore, we recommend that you configure it with a system firewall.

Recommended Configuration: Memory above MB, suitable for experts.

The second combination of NOD32 + micropoints

Strong combination, to make up for NOD's ability to kill horses and take the initiative to defend against attacks, and also comes with a firewall.

Recommended Configuration: Memory above MB, suitable for general users (micropoints are more complex ).

Combination of NOD32 + OP (or ZA)

Because NOD accounts for a small amount of resources, it provides conditions for him to work with powerful firewalls and is also a strong combination.

Recommended Configuration: Memory above MB, suitable for experts.

4. Combination with little red umbrella C as the core

First combination of red umbrella C version + micropoints (or comodo)

I strongly recommend this combination, which is personally considered the most secure. Red umbrella has excellent anti-virus capabilities, but its protection is too poor, and it is easy to end the process by virus. Microservices (or comodo) can also provide powerful active defense and Trojan protection for this combination.

Recommended Configuration: Memory above MB, suitable for general users.

Combination of red umbrella C + SSM (or EQ) + XP Wall

It is also a very powerful combination. Like the first combination, it is also to provide some protection for the system after the virus ends the red umbrella process. SSM (or EQ) is highly self-protected.

Recommended Configuration: Memory above M, suitable for Masters (M memory can also run ).

5. Coffee and Norton

 

Coffee first

We recommend that you use anti-virus Enterprise Edition + Anti-Spyware Enterprise Edition + Firewall Enterprise Edition. This combination of coffee itself is very powerful. In fact, as long as the rules of the anti-virus Enterprise Edition are set properly, coffee does not even need anti-spyware and firewall modules. As long as it works with the XP wall, it is enough to build a powerful line of defense (coffee monitoring, if the rules are properly set, is definitely the world's first ).

Recommended Configuration: Memory above MB, suitable for experts.

Norton

We recommend that you use Norton enterprise 10.1, a version with a firewall (SCS for short, and Its Anti-Virus for SAV for short). This combination is very good and is very closely integrated with the system, high compatibility and stability (do not be misled by mistaken kill events. Norton is still the eldest brother in the soft world. No one can compare his stability ).

In addition, NIS2007 is also a good choice, which is more powerful than SCS and consumes more resources. We do not recommend using Norton 360. In my opinion, 360 is a failed version.

Recommended Configuration: Memory above MB, suitable for beginners.

Coffee and Norton do not need to be used with other firewalls. Their own anti-virus systems are closely integrated with firewalls, so they are more secure and complementary.

Iii. Notes

1. This recommendation was written this time to consider the largest scope of free software. Therefore, powerful software such as BD, trend, FS, and AVK, but hard to crack, was not recommended, in fact, they all have their own firewall combinations. In addition, such as trends, FS, and AVK, the resource usage is very large and there are not many users in China. Therefore, I am not very recommended by myself.

2. It is not very recommended for horse-killing software such as AVG. First, they cannot replace software-killing, and second, they repeat some software-killing functions, resulting in a waste of resources. You can use a version that is green and unmonitored to form an auxiliary anti-trojan software.

3. Assist in soft Removal

Three Recommended secondary soft killer models:

The first is the red umbrella, which is highly enlightening and has a high detection and removal rate;

The second is Spider, which is very enlightening. shelling is the world's first;

The third is Kabbah, which has no doubt about its anti-virus capability. The monitoring is worse than the above two.

It is best to use a green version without monitoring to prevent conflicts with the master kill and firewall.

4. Firewall considerations

Internet users must install a strong firewall. Internet users are directly exposed to the Internet. XP firewalls are too weak to provide a secure Internet access environment. Free comodo is not suitable for Internet users, it should be the best choice.

Intranet users do not need to worry too much. A common wall that can achieve network stealth is enough.

5. Notes for soft Removal

I still stick to my opinion on the soft killer, and it is difficult for the Chinese giants to provide sufficient security. Here, I only recommend microservices. From a technical point of view, he is currently in the leading position in China. heuristic + active defense (his active defense and Kabbah are not a concept, it should be said that it is far stronger than Kabbah. The disadvantage is that the built-in firewall is weak and requires third-party firewalls for assistance (it is best not to bring HIPS to this third-party wall to avoid duplication with the micropoints, this can cause conflicts or lead to high CPU usage, just like a simple wall of pc tool ).

6. 360 security guard is quite good. We recommend that you use this tool. You can add 360 security guards to the above configurations!


Finally, it should be noted that no combination is omnipotent, and your security awareness is the most important.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.