Witch Norton or McAfee for 6600 M

  • 1
  • Question
  • Updated 9 months ago
Have new computer(Win 10) that came with McAfee, but using Norton on my other computer. The new one will be for Ham Radio and the 6600M (if it ever gets here)only.
Photo of Brad

Brad

  • 28 Posts
  • 2 Reply Likes

Posted 10 months ago

  • 1
Photo of Tim - W4TME

Tim - W4TME, Customer Experience Manager

  • 9152 Posts
  • 3478 Reply Likes
Neither.  Both cause a lot of problems we get in support.  I am just using Windows Defender and do not do careless things over the Internet.
Photo of Paul

Paul

  • 481 Posts
  • 145 Reply Likes
Just to put another perspective on that Howard;

I have been using Kaspersky on all of my windows machines for many years. I have also used products from pretty much every other main stream company. IMHO Kaspersky is better in many respects. I have never had cause to suspect foul play and have yet to see any evidence to support the scaremongering. All I see is a couple of (rather paranoid) large scale ex-users covering their backs. Popular opinion seems to suggest the average user (me) has no reason to change.

Ps. I can assure you I would drop it like a stone if any real evidence was produced.

Cheers, Paul
Photo of Varistor

Varistor

  • 334 Posts
  • 73 Reply Likes
Technically Howard’s statement is accurate, but utterly incomplete. It was in fact proven by Israeli, US, and UK law enforcement and intelligence agencies that Kaspersky’s backend infrastructure was breached and the product was used to search for endpoints that contained specific information. Then the identified endpoints were targeted with real data exfiltration tools and methods. Kaspersky itself did not collect the data on behalf of the bad guys.

The product itself works very well. SmartSDR has no problem with both Kaspersky and BitDefender.

I also use the BitDefender network appliance/firewall to protect my entire network, which includes computers, SDRs, security cameras, ecobee smart thermostats, smart TVs, etc. Most of the malware gets blocked before it enters the network.

Last but not least I use OpenDNS as an additional screening tool. Neither I (or the rest of the family) run Windows with admin rights and no ham software has ever ran or will run as admin.
(Edited)
Photo of Paul

Paul

  • 481 Posts
  • 145 Reply Likes
Fair comment Varistor. I have nothing of interest to the "bad guys" on my system so I sleep easy ;-)
Photo of Varistor

Varistor

  • 334 Posts
  • 73 Reply Likes
A side bar:

Most of the systems that have been breached are not the actual target, but only the means of completing the mission or just being a stepping stone. Stuxnet was never about hacking Siemens, it was about Iran’s nuclear centrifuges. Hacking the PlayStation network was a failed attempt to build a distributed supercomputer for cracking encryption. The list goes on. Your personal data has been obtained long time ago, at scale, and enhanced by correlating multiple data points.

My clients are paying me well to be paranoid. Let me give you a very crude example to illustrate the CONCEPT of conducting a complete threat analysis:

A remotely accessible SDR with high gain directional antennas is a great asset to have in La Jolla, where we have strategic bases used by the Navy, the Marines, and the Secret Service, to name just a few. The SDR can be used for the following:

1) Remote listening post. It’s hard to build a stealthy surveillance site. Using a ham station that has been there for a long time is much more trivial. Hide it in plain sight

2) Use the radio is a command and control node for other on prem devices

3) High power jamming device should such a need araises

Again, these are nothing but crude examples to illustrate that your computer or Flex may be used to accomplish missions objectIves that go beyond your personal secrets. You could merely be collateral damage.
Photo of Paul

Paul

  • 481 Posts
  • 145 Reply Likes
Indeed but I still sleep easy.