As the network speed keeps getting faster and the trojan virus increases, we are overwhelmed and struggling. If we don't have anti-virus software, it's really hard to do. Many netizens are asking what anti-virus software and firewall can be configured to ensure Machine security and smooth network connection?
It is hard to say that everyone's machine configuration, application requirements, and usage habits are different. Therefore, we can only say that this is the best choice.
I will post a professional analysis document here for your reference (this document is from the gentlemen's Forum and I have only made some corrections ).
I. Combination Principle
1. machine configuration
The selection of the software killer + Firewall must comply with the machine configuration and cannot drag the machine speed.
2. Principles of complementarity
Protection should be comprehensive, and software protection and firewall protection should not be complementary, so as to avoid unknown conflicts (that is, what I once mentioned, do not use a powerful anti-bot to configure a powerful firewall. A strong combination is not necessarily stronger ).
3. Streamlining principles
A soft killer + a firewall + Good Internet surfing habits + security awareness. do not attach countless soft killer servers to your servers. It will undoubtedly torture your own machines.
4. Security Coefficient
No combination is absolutely safe. Do not pursue 100%. We can only try to approach 100%.
5. compatibility principles
If you have a set, try to use the set. The combination of anti-software and firewall of the same product is the strictest, And the compatibility is the highest. Do not blindly trust the tests of authoritative organizations. The most powerful things are not necessarily suitable for you.
6. Core Principles
The choice of anti-bot service and firewall must be the core.
2. Recommended combination
1. Combination with Kabbah (or AVS) as the core
First combination of KIS6.0 or 7.0
Anti-Virus + File Protection + active defense + anti-spyware + email protection + WEB Protection + KAH (7.0 added parental control, enhanced active defense, and increased heuristic ), it should be a comprehensive combination, which is sufficient for common users.
Recommended Configuration: Memory above MB (with reasonable settings, Mb is definitely enough), applicable to beginners.
The second combination of KAV + KAH (or pc tool or ashampoo)
Anti-Virus + active defense + WEB Protection + Firewall, which has fewer functions than KIS, but it is sufficient for general users. Do not install any more AVG or other anti-trojan software. The reason for this suggestion is that this will seriously affect the machine speed. The second is that Kabbah has a strong ability to kill horses. This is the most resource-saving combination. The pc tool or ashampoo functions are generally based on complementarity.
Recommended Configuration: Memory above MB (with reasonable settings, Mb is definitely enough), applicable to beginners.
Third combination KAV + jecito
This is a powerful combination, with good resource usage, powerful jecito functions, and few resources.
Recommended Configuration: Memory above M, suitable for Master, mainly because the settings of jecito are very complicated.
2. A combination of SPIDER (or Destroyer) as the core
First combination of spider + comodo V3
It saves a lot of resources. comodo V3 can make up for the weakness of the spider in active defense, and it is enough to prevent black.
Recommended Configuration: Memory above MB, suitable for Masters (complicated comodo settings ).
Second Combination of spider + SSM (or EQ) + XP Wall
This is not introduced. It has the same effect as the first group, but saves more resources.
Recommended Configuration: Memory above MB, suitable for Masters (complicated SSM settings ).
In fact, in many cases, an SSM is sufficient to cope with various situations.
3. a nod-centered combination
First combination of NOD32 V3 integrated firewall + SSM (or EQ)
NOD32's own suit still has poor active defense capability and moderate anti-Trojan capability. Therefore, we recommend that you configure it with a system firewall.
Recommended Configuration: Memory above MB, suitable for experts.
The second combination of NOD32 + micropoints
Strong combination, to make up for NOD's ability to kill horses and take the initiative to defend against attacks, and also comes with a firewall.
Recommended Configuration: Memory above MB, suitable for general users (micropoints are more complex ).
Combination of NOD32 + OP (or ZA)
Because NOD accounts for a small amount of resources, it provides conditions for him to work with powerful firewalls and is also a strong combination.
Recommended Configuration: Memory above MB, suitable for experts.
4. Combination with little red umbrella C as the core
First combination of red umbrella C version + micropoints (or comodo)
I strongly recommend this combination, which is personally considered the most secure. Red umbrella has excellent anti-virus capabilities, but its protection is too poor, and it is easy to end the process by virus. Microservices (or comodo) can also provide powerful active defense and Trojan protection for this combination.
Recommended Configuration: Memory above MB, suitable for general users.
Combination of red umbrella C + SSM (or EQ) + XP Wall
It is also a very powerful combination. Like the first combination, it is also to provide some protection for the system after the virus ends the red umbrella process. SSM (or EQ) is highly self-protected.
Recommended Configuration: Memory above M, suitable for Masters (M memory can also run ).
5. Coffee and Norton
Coffee first
We recommend that you use anti-virus Enterprise Edition + Anti-Spyware Enterprise Edition + Firewall Enterprise Edition. This combination of coffee itself is very powerful. In fact, as long as the rules of the anti-virus Enterprise Edition are set properly, coffee does not even need anti-spyware and firewall modules. As long as it works with the XP wall, it is enough to build a powerful line of defense (coffee monitoring, if the rules are properly set, is definitely the world's first ).
Recommended Configuration: Memory above MB, suitable for experts.
Norton
We recommend that you use Norton enterprise 10.1, a version with a firewall (SCS for short, and Its Anti-Virus for SAV for short). This combination is very good and is very closely integrated with the system, high compatibility and stability (do not be misled by mistaken kill events. Norton is still the eldest brother in the soft world. No one can compare his stability ).
In addition, NIS2007 is also a good choice, which is more powerful than SCS and consumes more resources. We do not recommend using Norton 360. In my opinion, 360 is a failed version.
Recommended Configuration: Memory above MB, suitable for beginners.
Coffee and Norton do not need to be used with other firewalls. Their own anti-virus systems are closely integrated with firewalls, so they are more secure and complementary.
Iii. Notes
1. This recommendation was written this time to consider the largest scope of free software. Therefore, powerful software such as BD, trend, FS, and AVK, but hard to crack, was not recommended, in fact, they all have their own firewall combinations. In addition, such as trends, FS, and AVK, the resource usage is very large and there are not many users in China. Therefore, I am not very recommended by myself.
2. It is not very recommended for horse-killing software such as AVG. First, they cannot replace software-killing, and second, they repeat some software-killing functions, resulting in a waste of resources. You can use a version that is green and unmonitored to form an auxiliary anti-trojan software.
3. Assist in soft Removal
Three Recommended secondary soft killer models:
The first is the red umbrella, which is highly enlightening and has a high detection and removal rate;
The second is Spider, which is very enlightening. shelling is the world's first;
The third is Kabbah, which has no doubt about its anti-virus capability. The monitoring is worse than the above two.
It is best to use a green version without monitoring to prevent conflicts with the master kill and firewall.
4. Firewall considerations
Internet users must install a strong firewall. Internet users are directly exposed to the Internet. XP firewalls are too weak to provide a secure Internet access environment. Free comodo is not suitable for Internet users, it should be the best choice.
Intranet users do not need to worry too much. A common wall that can achieve network stealth is enough.
5. Notes for soft Removal
I still stick to my opinion on the soft killer, and it is difficult for the Chinese giants to provide sufficient security. Here, I only recommend microservices. From a technical point of view, he is currently in the leading position in China. heuristic + active defense (his active defense and Kabbah are not a concept, it should be said that it is far stronger than Kabbah. The disadvantage is that the built-in firewall is weak and requires third-party firewalls for assistance (it is best not to bring HIPS to this third-party wall to avoid duplication with the micropoints, this can cause conflicts or lead to high CPU usage, just like a simple wall of pc tool ).
6. 360 security guard is quite good. We recommend that you use this tool. You can add 360 security guards to the above configurations!
Finally, it should be noted that no combination is omnipotent, and your security awareness is the most important.