<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 5 tips for identifying signs of malware</title>
	<atom:link href="http://www.gfi.com/blog/5-tips-identifying-signs-malware/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-tips-identifying-signs-malware</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: mike Rits</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-25435</link>
		<dc:creator>mike Rits</dc:creator>
		<pubDate>Mon, 14 Mar 2011 11:05:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-25435</guid>
		<description><![CDATA[If you&#039;re using Windows-based OS (such as XP, Vista, and Windows 7), you can identify malwares by just knowing what applications or programs load at startup. 

In Windows, you can do this by accessing the System Configuration &gt; Startup. 

The Startup tab displays all programs that load when your PC starts from a shutdown or a restart. You can disable applications you dont need by unchecking an item.

I hope this helps.]]></description>
		<content:encoded><![CDATA[<p>If you&#8217;re using Windows-based OS (such as XP, Vista, and Windows 7), you can identify malwares by just knowing what applications or programs load at startup. </p>
<p>In Windows, you can do this by accessing the System Configuration &gt; Startup. </p>
<p>The Startup tab displays all programs that load when your PC starts from a shutdown or a restart. You can disable applications you dont need by unchecking an item.</p>
<p>I hope this helps.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ben Vincenti</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-17919</link>
		<dc:creator>Ben Vincenti</dc:creator>
		<pubDate>Tue, 11 Jan 2011 11:42:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-17919</guid>
		<description><![CDATA[Hi everybody,

Thank you for all the comments.

Can you think of any other symptoms which might indicate a malware infection? 

Kind regards,

Ben Vincenti]]></description>
		<content:encoded><![CDATA[<p>Hi everybody,</p>
<p>Thank you for all the comments.</p>
<p>Can you think of any other symptoms which might indicate a malware infection? </p>
<p>Kind regards,</p>
<p>Ben Vincenti</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Rohit P.</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-17878</link>
		<dc:creator>Rohit P.</dc:creator>
		<pubDate>Mon, 10 Jan 2011 20:48:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-17878</guid>
		<description><![CDATA[One anti-virus is not sufficient. I have seen in the last few months that a file, which was given GREEN signal by an anti-virus an hour back, is detected as a malicious file as soon as you receive the update.

In a most recent scenario I noticed a network containing malicious files in all nodes with an anti-virus already running with updated definitions.

I use three tools for protection but as you know two anti-virus programs are not recommended, so I have planned it differently:

(1) I use GFI Vipre Anti-Virus Premium as main protection. Though it updates automatically still I check the updates from time-to-time.

(2) I use a tool called Malware Bytes Anti-Malware. Since it does not work as a resident tool, it never interferes with Vipre. I use it once a week. Before using it, I update it, disconnect my internet connection and disable Vipre&#039;s Active Protection.

It detects few threats that were skipped by Vipre.

(3) Once a week I also perform online virus scan from ESET website. I would say, ESET heuristic engine is one of the best. Since it is also not resident and running on my PC in the background, there is no question of it interfering with my resident anti-virus.

I feel a multi-layer protection is needed as you can&#039;t rely even on heuristics these days.]]></description>
		<content:encoded><![CDATA[<p>One anti-virus is not sufficient. I have seen in the last few months that a file, which was given GREEN signal by an anti-virus an hour back, is detected as a malicious file as soon as you receive the update.</p>
<p>In a most recent scenario I noticed a network containing malicious files in all nodes with an anti-virus already running with updated definitions.</p>
<p>I use three tools for protection but as you know two anti-virus programs are not recommended, so I have planned it differently:</p>
<p>(1) I use GFI Vipre Anti-Virus Premium as main protection. Though it updates automatically still I check the updates from time-to-time.</p>
<p>(2) I use a tool called Malware Bytes Anti-Malware. Since it does not work as a resident tool, it never interferes with Vipre. I use it once a week. Before using it, I update it, disconnect my internet connection and disable Vipre&#8217;s Active Protection.</p>
<p>It detects few threats that were skipped by Vipre.</p>
<p>(3) Once a week I also perform online virus scan from ESET website. I would say, ESET heuristic engine is one of the best. Since it is also not resident and running on my PC in the background, there is no question of it interfering with my resident anti-virus.</p>
<p>I feel a multi-layer protection is needed as you can&#8217;t rely even on heuristics these days.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: eric b.</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-17541</link>
		<dc:creator>eric b.</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:21:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-17541</guid>
		<description><![CDATA[A wide variety of malware have been designed to shut off browsing capabilities. For this reason alone, I think it is imperative that users install multiple internet browsers to be able to identify if their computers have been infected with malware. Although individuals may be inclined to use one browser over the other, having Mozilla’s Firefox, Google’s Chrome and even Microsoft’s Internet Explorer on hand is important to check if browsing capabilities have been affected by malware.]]></description>
		<content:encoded><![CDATA[<p>A wide variety of malware have been designed to shut off browsing capabilities. For this reason alone, I think it is imperative that users install multiple internet browsers to be able to identify if their computers have been infected with malware. Although individuals may be inclined to use one browser over the other, having Mozilla’s Firefox, Google’s Chrome and even Microsoft’s Internet Explorer on hand is important to check if browsing capabilities have been affected by malware.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Carol G.</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-17537</link>
		<dc:creator>Carol G.</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:04:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-17537</guid>
		<description><![CDATA[I think a lot of people commenting here are missing a major point of the article. Though we’re all arguing on the best way of spotting malware on a workstation, the article makes no claim that these are the only ways. The author only lists that these are five possible methods in a whole host of others. I don’t think that the methods indicated here are necessarily wrong, but neither are they exclusively right.]]></description>
		<content:encoded><![CDATA[<p>I think a lot of people commenting here are missing a major point of the article. Though we’re all arguing on the best way of spotting malware on a workstation, the article makes no claim that these are the only ways. The author only lists that these are five possible methods in a whole host of others. I don’t think that the methods indicated here are necessarily wrong, but neither are they exclusively right.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Robert Hao</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-17515</link>
		<dc:creator>Robert Hao</dc:creator>
		<pubDate>Tue, 04 Jan 2011 13:26:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-17515</guid>
		<description><![CDATA[Like it or not, spotting malware on your workstation (remote or mobile) has turned into a necessary skill for professionals who rely on their computers on a daily basis (which is practically everyone). Because of the widespread proliferation of malware, identifying signs of harmful software can no longer fall under the shoulders of IT specialists alone. Private users should also educate themselves on proper malware identification.]]></description>
		<content:encoded><![CDATA[<p>Like it or not, spotting malware on your workstation (remote or mobile) has turned into a necessary skill for professionals who rely on their computers on a daily basis (which is practically everyone). Because of the widespread proliferation of malware, identifying signs of harmful software can no longer fall under the shoulders of IT specialists alone. Private users should also educate themselves on proper malware identification.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Miguel</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-17214</link>
		<dc:creator>Miguel</dc:creator>
		<pubDate>Thu, 30 Dec 2010 15:59:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-17214</guid>
		<description><![CDATA[I have to agree with Adrian when it comes to speed tests and benchmarks as a supposed indicator for identifying malware on a system. There are just too many scenarios to consider before checking off malware with a hundred percent certainty. Of course, it’s one way to do it, but I’ve been working on systems where malware wasn’t discovered until months after it’s initial installation.]]></description>
		<content:encoded><![CDATA[<p>I have to agree with Adrian when it comes to speed tests and benchmarks as a supposed indicator for identifying malware on a system. There are just too many scenarios to consider before checking off malware with a hundred percent certainty. Of course, it’s one way to do it, but I’ve been working on systems where malware wasn’t discovered until months after it’s initial installation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: adrian wood</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-16162</link>
		<dc:creator>adrian wood</dc:creator>
		<pubDate>Wed, 15 Dec 2010 16:44:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-16162</guid>
		<description><![CDATA[There are still too many factors to account for even if you cross check against previous benchmarking and internet speed test results. Malware will affect you in a number of difference ways, and internet and hardware performance slowdowns aren’t always a given. If you’re on a high speed internet connection, or a multicore processor, the slowdowns might actually be too negligible to notice. Multiple and thorough system scans are still the way to go, I believe.]]></description>
		<content:encoded><![CDATA[<p>There are still too many factors to account for even if you cross check against previous benchmarking and internet speed test results. Malware will affect you in a number of difference ways, and internet and hardware performance slowdowns aren’t always a given. If you’re on a high speed internet connection, or a multicore processor, the slowdowns might actually be too negligible to notice. Multiple and thorough system scans are still the way to go, I believe.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Charlie Cowper</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-15707</link>
		<dc:creator>Charlie Cowper</dc:creator>
		<pubDate>Sun, 12 Dec 2010 16:47:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-15707</guid>
		<description><![CDATA[I think the supposed recent &quot;boom of porn-related pop-up malware issues&quot; isn&#039;t recent at all. I&#039;ve been running into those blasted pop-ups for over ten years now, and when I say &quot;me&quot;, I really mean all those people from the marketing department who keep on snooping around websites they shouldn&#039;t and carrying to the office the malware they managed to &quot;catch&quot; at home. 

Sorry about that. Just had to vent.]]></description>
		<content:encoded><![CDATA[<p>I think the supposed recent &#8220;boom of porn-related pop-up malware issues&#8221; isn&#8217;t recent at all. I&#8217;ve been running into those blasted pop-ups for over ten years now, and when I say &#8220;me&#8221;, I really mean all those people from the marketing department who keep on snooping around websites they shouldn&#8217;t and carrying to the office the malware they managed to &#8220;catch&#8221; at home. </p>
<p>Sorry about that. Just had to vent.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: raymond r.</title>
		<link>http://www.gfi.com/blog/5-tips-identifying-signs-malware/comment-page-1/#comment-15584</link>
		<dc:creator>raymond r.</dc:creator>
		<pubDate>Sat, 11 Dec 2010 18:36:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3010#comment-15584</guid>
		<description><![CDATA[@antonio gevido

Actually, aside from benchmarking your PC performance, one could opt to benchmark their internet speed. Malware has been known to eat up large amounts of bandwidth when left unchecked (usually sending out user data to the originator). After experiencing frequent (and consistent) slowdown, and ruling out your internet provider or your router as a culprit, it might be safe to say that malware has gotten the best of you.]]></description>
		<content:encoded><![CDATA[<p>@antonio gevido</p>
<p>Actually, aside from benchmarking your PC performance, one could opt to benchmark their internet speed. Malware has been known to eat up large amounts of bandwidth when left unchecked (usually sending out user data to the originator). After experiencing frequent (and consistent) slowdown, and ruling out your internet provider or your router as a culprit, it might be safe to say that malware has gotten the best of you.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 03:07:18 by W3 Total Cache --