What Virus protection program do you recommend???

I have a macbook c2d currently using ClamXav......i have heard some people using norton av 10, some using intego virusbarrier etc.....which is the best? or should i stick with clam?
thanks
brent

You're welcome.
Just so I don't receive and forward any attachments that contain a Windows virus to my always concerned about viruses, adware and spyware Windows using friends, I have the Sentry watch my entire Mail folder since I use the Mail application.
I do notice a very slight and short bogging down of the Mail application at times when receiving a message or messages but if you didn't use the Sentry and only performed a complete hard drive scan weekly or so, you would be plenty covered especially since all it may find is a Windows virus.

Similar Messages

  • What virus protection should i download for my macbook pro

    i just got my macbook pro and want to know what virus protection program should i download for free

    This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an attacker who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    Starting with OS X 10.7.5, there is another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications that are downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Applications certified in this way haven't actually been tested by Apple (unless they come from the Mac App Store), but you can be sure that they haven't been modified by anyone other than the developer, and his identity is known, so he could be held responsible if he knowingly released malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe. Note, however, that there are some caveats concerning Gatekeeper:
    It doesn't apply to software that comes packaged as an installer. Treat all third-party installers with caution.
    It can be disabled or overridden by the user.
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to applications downloaded from the network. Software installed from a CD or other media is not checked.
    For more information about Gatekeeper, see this Apple Support article.
    Notwithstanding the above, the most effective defense against malware attacks is your own intelligence. All known malware on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. [Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.]
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Java on the network (not to be confused with JavaScript, to which it's not related) is always a potential weak spot in the security of any operating system. If Java is not installed, don't install it unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.

  • My mac is infected with viruses, Safari can not normally search for constantly appear commercials and some unknown site. What to do? antivirus free program that you recommend?

    my mac is infected with viruses, Safari can not normally search for constantly appear commercials and some unknown site. What to do? antivirus free program that you recommend?

    You may have installed the "VSearch" trojan, perhaps under a different name. Remove it as follows.
    Malware is constantly changing to get around the defenses against it. The instructions in this comment are valid as of now, as far as I know. They won't necessarily be valid in the future. Anyone finding this comment a few days or more after it was posted should look for more recent discussions or start a new one.
    Back up all data before proceeding.
    Step 1
    From the Safari menu bar, select
              Safari ▹ Preferences... ▹ Extensions
    Uninstall any extensions you don't know you need, including any that have the word "Spigot," "Trovi," or "Conduit" in the description. If in doubt, uninstall all extensions. Do the equivalent for the Firefox and Chrome browsers, if you use either of those.
    Reset the home page and default search engine in all the browsers, if it was changed.
    Step 2
    Triple-click anywhere in the line below on this page to select it:
    /Library/LaunchAgents/com.vsearch.agent.plist
    Right-click or control-click the line and select
              Services ▹ Reveal in Finder (or just Reveal)
    from the contextual menu.* A folder should open with an item named "com.vsearch.agent.plist" selected. Drag the selected item to the Trash. You may be prompted for your administrator login password.
    Repeat with each of these lines:
    /Library/LaunchDaemons/com.vsearch.daemon.plist
    /Library/LaunchDaemons/com.vsearch.helper.plist
    /Library/LaunchDaemons/Jack.plist
    Restart the computer and empty the Trash. Then delete the following items in the same way:
    /Library/Application Support/VSearch
    /Library/PrivilegedHelperTools/Jack
    /System/Library/Frameworks/VSearch.framework
    ~/Library/Internet Plug-Ins/ConduitNPAPIPlugin.plugin
    Some of these items may be absent, in which case you'll get a message that the file can't be found. Skip that item and go on to the next one.
    This trojan is distributed on illegal websites that traffic in pirated content. If you, or anyone else who uses the computer, visit such sites and follow prompts to install software, you can expect much worse to happen in the future.
    You may be wondering why you didn't get a warning from Gatekeeper about installing software from an unknown developer, as you should have. The reason is that this Internet criminal has a codesigning certificate issued by Apple, which causes Gatekeeper to give the installer a pass. Apple could revoke the certificate, but as of this writing, has not done so, even though it's aware of the problem. This failure of oversight has compromised both Gatekeeper and the Developer ID program. You can't rely on Gatekeeper alone to protect you from harmful software.
    *If you don't see the contextual menu item, copy the selected text to the Clipboard by pressing the key combination  command-C. In the Finder, select
              Go ▹ Go to Folder...
    from the menu bar and paste into the box that opens by pressing command-V. You won't see what you pasted because a line break is included. Press return.

  • What virus protection do you recommend?

    What virus protection do you recommend for MacBook Pro?

    I simply recommend practicing safe browsing habits, such as not opening files or attachments from unverified sources and never provide your user name and password unless you're certain of what you're doing.
    Point in case: There is a malicious application currently floating around which goes by various different names, such as Mac Defender and Mac Security. When this piece of malware is downloaded and run on your computer, it will ask you to install it and you will be asked to provide your user name and password for it to gain access to your computer. By not providing this information, the malware is unable to cause any harm your computer.

  • What program do you recommend to download movies onto my macbook pro

    what program do you recommend to download movies onto my macbook pro

    iTunes.
    Not sure what you're asking. You don't require any software other than what your MacBook Pro already has. If you ever encounter a popup window indicating you need something else, it's a scam and you should ignore it.

  • I have just purchased a used MacBook Pro. Should I use a virus protection program on this computer? I can get Norton for free through my cable provider. Thanks, funkro

    I have just purchased a used MacBook Pro. Should I use a virus protection program on this computer? I can get Norton for free through my cable provider. Thanks, funkro

    See my Mac Malware Guide.
    This issue is more complex than some of the responses you have gotten are indicating. You definitely should avoid Norton, but there actually IS malware out there, and all anti-virus software is NOT "snake oil." Don't listen to anyone who tells you otherwise, as they don't know what they're talking about.
    Although you should be able to do without anti-virus software just fine, there are some perfectly good reasons to install it and some good anti-virus apps to use if you decide to do so. Further, even if you do avoid anti-virus software, you need to understand what the threats are so you don't end up thinking you're totally safe and do something you shouldn't.

  • I have a macbook pro what virus protection should i install?

    I have a macbook pro, what virus protection should I install?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.         
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Virus protection program?

    Just got my new iMac, finally returned to the Apple world after being away for 10 yrs. It is good to be back.
    Do I need a virus protection program? If so which one?

    There are Mac viruses, just very very few, and most of them are of the proof of concept variety.
    Think of the virus threat like a thundercloud you can see off in the distance. You know sooner or later it's going to rain, but at least for the time being you can still enjoy your day at the beach.
    Keep an eye on that cloud, because some day it will descend on Mac World... Until that day however, you can go without and be pretty safe. Do note that this DOESN'T mean that you're immune from any and all threats. You still need to follow some of the safe computing habits from Windows. Basic things, like don't open strange attachments, don't go to dodgy websites, don't run your mouth off in hacker forums/chat rooms, don't respond to spam, avoid programs with known security issues, and keep up with security updates. Basic things like that.

  • What external hard drive to you recommend to free up space on an old Macbook Pro?

    My Macbook Pro is approx. 5 years old. I have since gotten an imac, however would like to use my old Creative Suite 2 on the macbook. When I updated it to "Lion" - it denied access to my creative suite apps. I have since contacted Adobe, and they have given me a solution to get it up and running again, however, my startup disk is just about FULL. Therefore I can't upgrade or really even open more than one app without getting the warning pop up about getting rid of some files asap or risk malfunction of the laptop.
    What external hard drive do you recommend to get the most bang for my buck in terms of offloading a massive amount of photos to in order to be able to use the laptop again?

    Your picture folder would have to be 10 times larger and then it would be close to 1 TB in size.  I have an aphorism, 'one cannot have too much storage'.  If the bank account can afford it, follow Ralph's advice and do go for the larger storage drive.  Given enough time, you might just grow into it..
    Now there is an issue that you should consider.  Since these pictures will no longer be on your MBP, do you want to have them backed up?  If so, you then are going to need an additional HDD to store the backups.  All HDDs will eventually fail, you just do not know when.
    Ciao.

  • What brand of printer do you recommend for my imac 27?

    What brand of printer do you recommend for my imac 27 from 2009?

    I bought a Hewlett-Packard M451dn color laser jet. I'm happy with it.
    I selected it after having a horrible experience with a low-cost Xerox color laser jet.
    The things I like the best:
    Fast warm-up time. No waiting around like solid-ink printers from Xerox have.
    No odor. Solid-ink printers have a smell like baked crayons.
    Very good print quality - real Postscript.
    Duplex printing (both sides of the paper)
    I connect to it wirelessly through my Airport; I connect an ethernet cable from the printer to the Airport then my Mac communicates wirelessly.

  • What shell for Iphone do you recommend me?

    What shell for Iphone do you recommend me ?

    I'll try to help. Here's 177 million answers:  iPhone Shell

  • Your last update did not support AVG virus protection program. Does this newest one allow AVG

    Attempted to upgrade your last update, but was advised newer version did not support AVG virus protection program.

    See:
    * https://support.mozilla.org/en-US/questions/912133#answer-298043
    let me know how it goes

  • What is the best spyware/virus protection program for the mac?

    I'm new to the whole virus protection thing, and I know there are very few viruses out there for the mac, but better safe then sorry right? Plus i'm mainly getting it for the spyware protection anyway. Does Leopard already have some protection for it? Or would it be better to buy a new program? Thanks.

    Normally the best defense against Virus and other scrap on the net is the User. Never agree to open something you are not sure about. Don't visit dangerous sites, and think twice before make a gesture.
    After almost 25 years on Mac, and with X system, the only use for a AntiVirus is you can pass Virus to PC user but that ot effect your Mac. If you use Parallels or Bootcmp (or booth) you need a AntiVirus and Anti what the need on the PC, because that take 20 minutes on PC to be infected.

  • What kind of camcorder would you recommend for FCE HD 3.5?

    Hello everyone,
    I'm very new here and have been trying to search for the answer to my question without having to bug anyone, but now I am under the gun, as it were.
    I need to purchase something within a week and a half and would truly appreciate suggestions from anyone here. Here are a list of my questions and I hope you all will be kind of enough to help me. Thank you in advance.
    1- I would prefer a camcorder that records to a DVD, but if tape is way better, please let me know.
    2- I see that FCE does not support AVCHD. What other pitfalls are there to avoid in purchasing a camcorder that is compatible with FCE HD?
    3- My dream is to have a camcorder that can record in 24p, but can't seem to determine whether FCE HD can support it. Please help!
    4- Am willing to pay more for CCD sensor range - is this helping?
    5-Would like to shoot in 16:9 ratio and with lines of resolution of 720 and higher, this possible with FCE?
    5- With the questions above...what camcorder would you recommend?
    I know some of the camcorders that have these features are ranging from $900 to over $1,000 but would consider it a good investment for things I would like to do in the future.
    I hope the information I've given is enough for you all to give your suggestions. Thank you again.

    They are not bad - just unsuitable for FCE and all good editing programs.
    There are several totally different kinds of Digital Video - many people mistakenly think all "digital" is the same.
    DVD, Flash Memory or Hard Disk camcorders produce video in a version of the MPEG format.
    FCE etc. only handles video in the DV or QT format which is totally different from MPEG.
    One analogy would be to buy a diesel powered car and then find that all the filling stations in your area only had petrol (gasolene) pumps. Your car would be pretty useless !
    The only way MPEG can be used in FCE is by converting it to DV or QT which wastes time or money and results in slightly reduced quality.
    All these cameras are produced for the mass market (where the money is), to be used by people with no knowledge or interest in film-making or editing.
    Ian.

  • I want to get a virus protection program but want to include adware, spyware, ect how do i find one for free?

    Would like a anti virus protection on my mac but if i do i want one that includes adware, spyware, and any thing else
    that might help get rid of these things that pop up from time to time.

    A good, free anti-virus utility is ClamXAV.  You will find it at MacUpdate or CNET Downloads.
    If you find a trojan on your computer see the following about getting rid of it.
    Trojan War
    If you discover a trojan program is running on your computer then look to the following information for assistance:
    1. A recent discussion on the Apple Support Communities: MacDefender Trojan.
    2. An excellent site devoted to Mac Malware: Macintosh Virus Guide
    Removing strange software can be a task.  The following outlines various ways of uninstalling software:
    Uninstalling Software: The Basics
    Most OS X applications are completely self-contained "packages" that can be uninstalled by simply dragging the application to the Trash.  Applications may create preference files that are stored in the /Home/Library/Preferences/ folder.  Although they do nothing once you delete the associated application, they do take up some disk space.  If you want you can look for them in the above location and delete them, too.
    Some applications may install an uninstaller program that can be used to remove the application.  In some cases the uninstaller may be part of the application's installer, and is invoked by clicking on a Customize button that will appear during the install process.
    Some applications may install components in the /Home/Library/Applications Support/ folder.  You can also check there to see if the application has created a folder.  You can also delete the folder that's in the Applications Support folder.  Again, they don't do anything but take up disk space once the application is trashed.
    Some applications may install a Startup item or a Log In item.  Startup items are usually installed in the /Library/StartupItems/ folder and less often in the /Home/Library/StartupItems/ folder.  Log In Items are set in the Accounts preferences.  Open System Preferences, click on the Accounts icon, then click on the LogIn Items tab.  Locate the item in the list for the application you want to remove and click on the Delete [-] button to delete it from the list.
    Some software use startup daemons or agents that are a new feature of the OS.  Look for them in /Library/LaunchAgents/ and /Library/LaunchDaemons/ or in /Home/Library/LaunchAgents/.
    If an application installs any other files the best way to track them down is to do a Finder search using the application name or the developer name as the search term.  Unfortunately Spotlight will not look in certain folders by default.  You can modify Spotlight's behavior or use a third-party search utility, Easy Find, instead.  Download Easy Find at VersionTracker or MacUpdate.
    Some applications install a receipt in the /Library/Receipts/ folder.  Usually with the same name as the program or the developer.  The item generally has a ".pkg" extension.  Be sure you also delete this item as some programs use it to determine if it's already installed.
    There are many utilities that can uninstall applications.  Note that you must have this software installed before you install software you may need to uninstall.  Uninstallers won't work if you install them after the fact.  Here is a selection:
    AppZapper
    Automaton
    Hazel
    CleanApp
    Yank
    SuperPop
    Uninstaller
    Spring Cleaning
    Look for them and others at VersionTracker or MacUpdate.
    For more information visit The XLab FAQs and read the FAQs on removing software and dealing with spyware and malware.
    After removing all the components of the software you may have to restart the computer to fully disable the software.  This will be the case when removing software that has installed a daemon.  After the daemon has been removed you need to restart the computer to stop the daemon.  Alternatively, you can kill the daemon process using the Terminal application or Activity Monitor.

Maybe you are looking for