Host based Anti-Virus and Cisco Security

Hello Everyone,
Happy Friday. I was wondering if there are any advantages to using 1 brand of anti-virus on PCs and servers as relates to Cisco Security. I know Symantec is soemthing of a competitor as opposed to Trend and Cisoc even uses Trend signature in some of their devices. I personally have a likeing for SYmantec as far as AV goes but if there is an advantage that is easily explited by a Cisco network of using something else I would like to know about it.
Thanks in advnace. All replies rated.

Hello angel-moon,
If you are talking about host based security then Cisco provides CSA,which is an extensive Host based IPS + Antivirus tool
http://www.cisco.com/univercd/cc/td/doc/product/vpn/ciscosec/csa/csa52/index.htm
hope it helps !

Similar Messages

  • Anti-Virus and Firewall Software for Windows (on my Intel Mac)?

    Hello,
    I have just ordered my first Intel Mac, as well as my first copy of Windows XP. How ironic that I would be asking this on the Apple Discussions site, but what Windows anti-virus and firewall software is recommended? I want to be well protected on the Windows side.
    “Technological change is like an axe in the hands of a pathological criminal.” (Albert Einstein, 1941),
    Dr. Z.

    Templeton,
    It is embarrassing enough that I am installing a copy of Windoze on my brand new Mac, not to mention voluntarily opening myself up to a host of viruses, spyware, and other PC garbage. If I can’t trust another Mac user for help here, then who can I trust?
    Thanks for your mere comment. Now, anyone else with actual knowledge to share?
    “The future is here; it's just not evenly distributed yet.” (Albert Einstein, 1939),
    Dr. Z.

  • Hi looking for a bit of free  anti - virus and firewall for osx 10.8.2

    hi looking for a bit of free  anti - virus and firewall for osx 10.8.2 any pointers also any one used Mac cleaner ?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. This feature is transparent to the user, but internally Apple calls it "XProtect." The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore reduces to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    5. Java on the network (not to be confused with JavaScript, to which it's not related) is a weak point in the security of any operating system. If a Java web plugin is not installed, don't install one unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so can corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. If you don't need to do that, avoid it. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    8. The greatest danger posed by anti-virus software, in my opinion, is its effect on human behavior. When people install such software, which does little or nothing to protect them from emerging threats, they get a false sense of security from it, and then they may do things that make them more vulnerable. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use.

  • Do I need virgin PCguard anti virus and firewall switched on with Firefox

    Do I need to have Virgin media PCguard anti virus and firewall switched on when browsing with Firefox?

    The person who told you that you do not need another security program was wrong, Firefox is just a web browser.
    There are free anti-virus programs available if you do not want to renew Norton. Some examples are:
    * Microsoft Security Essentials - http://www.microsoft.com/security_essentials
    * Avast - http://www.avast.com/free-antivirus-download
    * Avira - http://www.avira.com/en/avira-free-antivirus
    * Comodo - http://antivirus.comodo.com/

  • I keep getting error 205 when downloading CC on a 2nd computer. PC, Windows 7. We had turned off anti-virus and ran cleaner

    I keep getting error 205 when downloading CC on a 2nd computer. PC, Windows 7. We had turned off anti-virus and ran cleaner. Any suggestions of how else to do it? I have creative cloud installed on another computer, but do not see the .exe file on it so I can't copy and move it.

    I found this log.  Is there a way to ftp the file or get it through email?
    04/03/15 08:13:32:710 | [INFO] |  | ACC | LBS | ApplicationFacade |  |  | 3396 | ****************Starting LBS workflow*******************
    04/03/15 08:13:32:912 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 3396 | LBS launched in LEGACY mode
    04/03/15 08:13:33:005 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 5428 | ACCC System requirements check passed
    04/03/15 08:13:33:785 | [INFO] |  | ACC | LBS | ProductInfo |  |  | 5428 | Product locale not specified in the product information file
    04/03/15 08:13:33:785 | [INFO] |  | ACC | LBS | ProductInfo |  |  | 5428 | Product name not specified in the product information file
    04/03/15 08:13:33:785 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 5428 | Bootstrap LBS is successful
    04/03/15 08:13:33:803 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 5428 | Bootstrapper Lock acquired
    04/03/15 08:13:33:821 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 5428 | LBS Lock acquired
    04/03/15 08:13:33:844 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 5428 | Deployment lock check passed
    04/03/15 08:13:33:861 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 5428 | The resolved URL for package service is https://prod-rel-ffc.oobesaas.adobe.com/adobe-ffc-external/core/v1/applications?name=Creat iveCloud&name=CCLBS&osVersion=6.1.1&platform=win32
    04/03/15 08:13:35:173 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 5428 | Successfully downloaded application xml at path C:\Users\Blatte1\AppData\Local\Temp\{C0981016-EE83-444B-9F00-2D580FC13CC6}\applications.x ml
    04/03/15 08:13:35:235 | [ERROR] |  | ACC | LBS | WorkflowManager |  | FileUtils | 5428 | Failed to get version of file at path :C:\Program Files (x86)\Adobe\Adobe Creative Cloud\utils\AdobePIM.dll Error
    04/03/15 08:13:35:235 | [ERROR] |  | ACC | LBS | WorkflowManager |  |  | 5428 | Failed to get the PIM version from location: C:\Program Files (x86)\Adobe\Adobe Creative Cloud\utils\AdobePIM.dll
    04/03/15 08:13:38:378 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:39:374 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:40:364 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:41:356 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:42:346 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:43:339 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:44:331 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:45:324 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:46:314 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:47:394 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:48:397 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 6680 | Segment 0 of size 777130 is Invalid
    04/03/15 08:13:48:854 | [WARN] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 8144 | A user retryable error has occured while downloading the file. errotType = -60 extendedErrorCode = 417
    04/03/15 08:13:48:935 | [WARN] |  | ACC | LBS | PDM | PackageDownloadManager |  | 4156 | Manifest file could not be downloaded
    04/03/15 08:13:49:146 | [ERROR] |  | ACC | LBS | WorkflowManager |  |  | 5428 | Failed in DOWNLOAD PIM
    04/03/15 08:13:56:667 | [INFO] |  | ACC | LBS | ETS |  |  | 3396 | Waiting for the async thread to get the task completed
    04/03/15 08:13:56:667 | [INFO] |  | ACC | LBS | ETS |  |  | 5308 | Async thread is completed. Now exiting from function.
    04/03/15 08:13:56:668 | [INFO] |  | ACC | LBS | ApplicationFacade |  |  | 3396 | ****************Closing LBS workflow*******************
    04/03/15 08:14:51:529 | [INFO] |  | ACC | LBS | ApplicationFacade |  |  | 6764 | ****************Starting LBS workflow*******************
    04/03/15 08:14:51:557 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 6764 | LBS launched in LEGACY mode
    04/03/15 08:14:51:633 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 2108 | ACCC System requirements check passed
    04/03/15 08:14:52:137 | [INFO] |  | ACC | LBS | ProductInfo |  |  | 2108 | Product locale not specified in the product information file
    04/03/15 08:14:52:137 | [INFO] |  | ACC | LBS | ProductInfo |  |  | 2108 | Product name not specified in the product information file
    04/03/15 08:14:52:138 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 2108 | Bootstrap LBS is successful
    04/03/15 08:14:52:155 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 2108 | Bootstrapper Lock acquired
    04/03/15 08:14:52:173 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 2108 | LBS Lock acquired
    04/03/15 08:14:52:194 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 2108 | Deployment lock check passed
    04/03/15 08:14:52:211 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 2108 | The resolved URL for package service is https://prod-rel-ffc.oobesaas.adobe.com/adobe-ffc-external/core/v1/applications?name=Creat iveCloud&name=CCLBS&osVersion=6.1.1&platform=win32
    04/03/15 08:14:53:528 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 2108 | Successfully downloaded application xml at path C:\Users\Blatte1\AppData\Local\Temp\{F7CC0F61-C090-43B1-A0E4-A85ECBEAC0A6}\applications.x ml
    04/03/15 08:14:53:577 | [ERROR] |  | ACC | LBS | WorkflowManager |  | FileUtils | 2108 | Failed to get version of file at path :C:\Program Files (x86)\Adobe\Adobe Creative Cloud\utils\AdobePIM.dll Error
    04/03/15 08:14:53:578 | [ERROR] |  | ACC | LBS | WorkflowManager |  |  | 2108 | Failed to get the PIM version from location: C:\Program Files (x86)\Adobe\Adobe Creative Cloud\utils\AdobePIM.dll
    04/03/15 08:14:59:411 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:00:404 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:01:396 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:02:957 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:03:949 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:05:025 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:06:316 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:07:306 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:08:297 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:09:289 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:10:281 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7700 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:10:425 | [WARN] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 8168 | A user retryable error has occured while downloading the file. errotType = -60 extendedErrorCode = 417
    04/03/15 08:15:10:499 | [WARN] |  | ACC | LBS | PDM | PackageDownloadManager |  | 7984 | Manifest file could not be downloaded
    04/03/15 08:15:10:709 | [ERROR] |  | ACC | LBS | WorkflowManager |  |  | 2108 | Failed in DOWNLOAD PIM
    04/03/15 08:15:17:071 | [ERROR] |  | ACC | LBS | WorkflowManager |  | FileUtils | 2108 | Failed to get version of file at path :C:\Program Files (x86)\Adobe\Adobe Creative Cloud\utils\AdobePIM.dll Error
    04/03/15 08:15:17:071 | [ERROR] |  | ACC | LBS | WorkflowManager |  |  | 2108 | Failed to get the PIM version from location: C:\Program Files (x86)\Adobe\Adobe Creative Cloud\utils\AdobePIM.dll
    04/03/15 08:15:19:766 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:20:781 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:21:775 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:22:767 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:23:768 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:24:814 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:25:808 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:26:821 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:27:817 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:28:811 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:29:808 | [ERROR] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 2572 | Segment 0 of size 777130 is Invalid
    04/03/15 08:15:30:285 | [WARN] |  | ACC | LBS | PDM | PDMWorkflowManager |  | 7160 | A user retryable error has occured while downloading the file. errotType = -60 extendedErrorCode = 417
    04/03/15 08:15:30:367 | [WARN] |  | ACC | LBS | PDM | PackageDownloadManager |  | 4148 | Manifest file could not be downloaded
    04/03/15 08:15:30:572 | [ERROR] |  | ACC | LBS | WorkflowManager |  |  | 2108 | Failed in DOWNLOAD PIM
    04/03/15 08:16:41:099 | [INFO] |  | ACC | LBS | ApplicationFacade |  |  | 7008 | ****************Starting LBS workflow*******************
    04/03/15 08:16:41:130 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 7008 | LBS launched in LEGACY mode
    04/03/15 08:16:41:191 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 6628 | ACCC System requirements check passed
    04/03/15 08:16:41:733 | [INFO] |  | ACC | LBS | ProductInfo |  |  | 6628 | Product locale not specified in the product information file
    04/03/15 08:16:41:734 | [INFO] |  | ACC | LBS | ProductInfo |  |  | 6628 | Product name not specified in the product information file
    04/03/15 08:16:41:734 | [INFO] |  | ACC | LBS | WorkflowManager |  |  | 6628 | Bootstrap LBS is successful
    04/03/15 08:16:41:751 | [ERROR] |  | ACC | LBS | WorkflowManager |  |  | 6628 | Failed to acquire Bootstrapper Lock

  • Do i need to buy anti-virus or internet security for my new mac?

    Do I need to buy anti-virus or internet security for my new mac?

    No.
    See this Discussion
    https://discussions.apple.com/message/16532409#16532409
    From the  More Like This  on the right.

  • Stopping anti-virus and anti-malware scans from scanning diasabled user files?

    Using Windows Server 2008
    If I only disable old user profiles, does anti-virus and anti-malware still scan their profiles and all files contained there within? Is this something that will happen regardless of the old users status and during a "whole computer" scan?
    And if so, are computer resources still being used for these old profiles?
    Thanks!

    Hi LaEmperor,
    From my experience with different AV softwares, I can say that they continue scanning them as part of the filesystem, despite of being disabled.
    I am not sure about your question for the resources, but I´ll give two shots:
    1. From the system perspective: basically affects the space that the files from that profile are using. The leave also some information on the Registry hive, on .USERS\ but unless it is a large numbre, I will not be concerned.
    2. From the Antivirus perpective: Well, as usual, Disk I/O, RAM, CPU, etc...; so as much as disabled profiles, as much they will add to the usual amount of resource comsumption.
    Hope you find this informative.

  • Youtube video is not playing on my macbook pro laptop. I have norton anti virus and firewall installed on it.

    youtube video is not playing on my mac pro laptop. Just a blank screen shows up where the video should be playing. I have norton anti virus and firewall installed on the laptop. Could it have something to do with it?

    unless you have a partition for another operating system, such as Windows or Linux, most mac users would agree that any a/v software is completly unnecesary and will do more harm than good.  There is a free a/v in the appstore called "ClamXav.   Have you installed all software updates and also have you tried youtube using different browsers (chrome, safari, opera, etc)?

  • Anti-Virus Software/Internet Security Suite

    What Anti-Virus Software/Internet Security Suite should I use with my iMAC G5. I know that I shouldn't have any problems with my MAC, but just in case I would like to install security software.
    Thanks,
    Lisa

    To The *Non Paranoid* Apple Community.

  • Scheduling Anti-Virus and Anti-Spyware scans with Internet Security Suite

    When I installed Verizon Internet Security Suite, the scan schedule for Anti-Virus was set to a default time of: Weekly at 12:00 am on Saturday. The Anti-Spyware scan was default scheduled weekly at 12:00 am on Sunday.
    I don't want the scans done at this time. So I rescheduled them to run at 5:00 am instead of 12:00 on each day. 
    This didn't work. Even though when I look at the schedules for those programs, it shows the times I put in. But it still ignores the times I scheduled and always starts up both programs at 12:00. This is very inconvenient for me. How do you debug this?
    Message Edited by Joanna_M on 03-30-2009 04:02 PM

    I know what you mean. I have the same problem, here it is 6:31 am and I am awake and on my pc when all of a sudden verizon's virus scan pops up and starts it's scan. I scheduled that for 12:01 am. Plus not to mention the other day it said I have a virus but it couldn't repair it so it quaranteed it, then when I clicked on find out more information about this virus the page said it will be available soon. I did a search of the virus on radialpoints website and it couldn't tell me the virus either and then I found out through google that is actually a trojan and wrote a bunch of keys to the registry but the website never said what to do about it, whether to delete those keys or not.
    I don't like to delete registry keys unless I am sure.
    I used to have Norton installed and its virus scan used to do some odd things to. Like forget! Symantec said it was windows fault because it uses task scheduler.
    I am seriously thinking about dumping this verizon suite if they don't fix it real soon and get their website's up and running!!!

  • Norton ends in 5 days. What is a good FREE, safe anti-virus and security download?

    Since downloading Firefox, I cant see ID safe of the toolbar. It does not seem compatible with 9.0.1. but as Norton expires in 5 days anyway, I would like to try a free anti-virus/security download.
    Any ideas what would be a good one to try with Firefox?
    Thanks

    No, Avira doesn't include a Firewall. My advice is to use the Windows Firewall which comes with WinXP, which should automatically be reactivated when you un-install Norton.
    http://en.wikipedia.org/wiki/Windows_Firewall

  • Any suggestions for free real time anti virus or malware security sw?

    I have been using Onyx and that seems to work fine, I wonder how you can tell without anything else to compare it to anyway.
    But lately I've been reading a lot about virusses (virae?) attacking Mac computers and I'm wondering if there is any free real time security software that is really working.
    If anyone has any recommendations I'd really appreciate it.
    Thank you in advance.
    Regards,
    Milli.

    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download from:
    http://www.clamxav.com/
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More information on Mac security can be found here:
    http://macscan.securemac.com/
    The MacScan application can be downloaded from here:
    http://macscan.securemac.com/buy/
    You can download a 30 day trail copy which enables you to do a full scan of your hard disk. After that it costs $29.95.
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    As to the current 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially *********** sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications.
    6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg

  • NAC-L2-802.1x (EAP-FAST) and Cisco Secure Services Client 5.0 in wired net

    Hi!
    (Sorry, if this is a wrong forum.)
    Does anybody have any success with Cisco SSC and EAP-FAST in the wired network?
    I'm going to use NAC, so I'm trying to set up EAP-FAST. I see the pop-up window on the client to enter user credentials and I see a lot of "debug radius" messages on my 3750 12.2(44)SE switch:
    Access-Requests with User-Name="anonymous"
    Access-Challenges (I see certificate is sent from ACS)
    Access-Reject
    CS ACS Failed Attempts Report shows "ACS user unknown" failure for "anonymous".
    So far as I understood, EAP-FAST is a tunneled method and it uses "anonymous" to protect user's identity during phase 0 / phase 1 transactions. The actual username is sent in phase 2 transaction.
    The following is excerpt from the CS ACS documentation:
    "EAP-FAST can protect the username in all EAP-FAST transactions. ACS does not perform user authentication based on a username that is presented in phase one; however, whether the username is protected during phase one depends on the end-user client. If the end-user client does not send the real username in phase one, the username is protected. The Cisco Aironet EAP-FAST client protects the username in phase one by sending FAST_MAC address in place of the username. After phase one of EAP-FAST, all data is encrypted, including username information that is usually sent in clear text."
    SSC 5.0 is indeed set up with "Unprotected Identity Pattern"=anonymous and "Protected Identity Pattern"=[username] using sscManagementUtility.exe
    So, the question is: Why is ACS 4.1 trying to authenticate username "anonymous" if it knows that the user is fake? Does anybody have working configuaration for EAP-FAST in a wired network?
    Any help is greatly appreciated.

    Correct, ACS database wasn't selected on the NAP Authentication page. It works now, but I constantly get the following message in the Windows event log: "The Cisco Secure Services Client service hung on starting". This is Windows 2000 Advanced Server system with SP4. SSC was set up with no domain authentication, no machine authentication, single sign-on. After some time the SSC service starts, but at that time my PC is already put into the guest VLAN by the switch (the tx-period is 10 seconds):
    POD1-SW#sh run int fa1/0/1
    Building configuration...
    Current configuration : 378 bytes
    interface FastEthernet1/0/1
    switchport access vlan 999
    switchport mode access
    dot1x mac-auth-bypass
    dot1x pae authenticator
    dot1x port-control auto
    dot1x timeout reauth-period server
    dot1x timeout tx-period 10
    dot1x reauthentication
    dot1x critical
    dot1x critical recovery action reinitialize
    dot1x guest-vlan 91
    dot1x critical vlan 11
    spanning-tree portfast
    end
    After all the VLAN is reassigned by the switch, but the delay is too high. How can I troubleshoot this?
    Thx.

  • Do i need anti-virus and trojan etc. protection?

    i am new to mac's and just wondering if i need some software or something for protection from the internet. i know on my old PC i needed all the protection i could get, but I don't know if leopard already has something to protect my computer? and if i need another program, what should i use?
    Thanks

    Mac OS X by design is probably more secure than Windows. There are no known viruses (and I mean this in the strict sense of the definition of virus) that affect OS X today.
    That's not to say there will never be, and that's not to say that things like Trojan Horses (things that, if you run them, will cause damage to your system) don't exist. Because I could write a 1-line shell script that would delete your entire home folder, and I could write a little app and a few lines that, if you entered your password, could send an email to every user in your address book with a spam. If you the user okay that, I can do anything I want.
    So what does this mean? It means you can use anti-virus or other "protective" stuff, or you can exercise a modicum of caution and do without. Personally, I'm in the latter category, as I think that type of software causes way more problems on the Mac than it solves... but I can't always recommend it for everyone. I know I get emails from my mom (who uses a Mac) about once every 4 months asking about some bizarre behavior she's seeing and whether it means she has a virus (she doesn't). For her, the peace of mind of having AV may be worth it (to me, if not to her )
    Clear as mud?

  • Good anti-virus and question...

    Is Sophos a good Anti-Virus? and also if i did have a virus, i erased my HD. Would that get rid of any virus/malware i had? Also i will be re-installing Lion.
    There is still 3 folders and 2 files on my HD, will that be the malware/virus?
    Thanks.

    While Sophos certainly receives numerous high marks from thiose who do use it, the value of such a product is mush less clear cut than it is for a Windows user.
    While I have an antivirus on my Macs, I do not have it running as a background application when I am using my Mac. Currently there are no "Viruses" in the wild right now that are any significant threat to OS X. The Security inherrent to the system is also robust enough to prevent infection from other malware types that have ever been encountered. That is not to say that my system is 100% protected from ALL forms of malware.
    First, by using a good antivirus, the application may (I said, "may") help protect Windows users from shared media that could be infected with code. That is to say, that the Mac AV Software would be the first line of defense to Windows-Only for which you might be the proverbial "typhoid Mary", infected but not sick.
    This presumes that your Mac software is more capable than your Windows users at catching Windows malware.
    I use rather robust malware and anti-virus protection on my Windows machines that I manage, so I don't see a need to augment it with a Mac solution that is likely to be wasted. Moreover, since I feel fairly confident that my Mac security is adequate, I don't run a Mav AV product continually. Nor would I want to keep one running, giving me a false sense of security at the cost of arunning process.
    Then again,
    I practice a thrice weekly Time Machine backup regimen. I am very careful about letting any process run, unless I am sure about the process. And I am fastidious about knowing the operating system's components (what should be running or stored, and what should not.
    If you are a user who wants peace of mind, and does not want to think about security, then an AV program will indeed help in some regard. However, I am not one to think that it replaces diligence at all. Any AV program can be fooled by a brand new threat, before your AV has the stored virus signature from a rencet update. Heuristics can only go so far. The best Antivirus is the user who knows his system, and keeps backups.
    The bottom line: Get Sophos, and concurrently learn OS X, so that you might transition to better malware protection, which is yourself.

Maybe you are looking for

  • Font in a Textbox changed by FormStream Filler

    I am having troubles with the fonts in textboxes which are in subforms being changed to what appears to a default font and size by FormStream Filler. In LiveCycle, I set the font to Times New Roman and the size to 5.8.  But when the form is displayed

  • Some apps do not have sound in ipad2

    in my ipad, I do not get sound on some of the apps. sound is working for some apps ( like pbs kids) , also for you tube. How can I fix it ?

  • Pricing Conditon based on Inco Terms

    Hi all, We have requirement to add price based on Sales area and  Shipping type ( Route )  VBKD-VSART, i created new condition table and assign to access sequence and access sequence assign to condition type and Maintain condition reocrds based on Sh

  • What is the OEM telling me?

    I am trying to figure out how to properly read OEM's Performance graph. During a point of high activity on my database, users complained of having very slow query times and some unresponsiveness from our application. OEM shows high levels of Network,

  • Plant related materials needs to be appeared in SC

    Hi Experts, i need your suggestions for the below mentioned issue. i  have 10 materials which is maintained for P1,P2,P3 plants and i have 6 materials maintained for P4 plant out of 10 materials. when my user  is trying to shop a material related to