Witch Norton or McAfee for 6600 M

  • 1
  • Question
  • Updated 2 years ago
Have new computer(Win 10) that came with McAfee, but using Norton on my other computer. The new one will be for Ham Radio and the 6600M (if it ever gets here)only.
Photo of Brad


  • 42 Posts
  • 2 Reply Likes

Posted 2 years ago

  • 1
Photo of Tim - W4TME

Tim - W4TME, Customer Experience Manager

  • 9197 Posts
  • 3557 Reply Likes
Neither.  Both cause a lot of problems we get in support.  I am just using Windows Defender and do not do careless things over the Internet.
Photo of Rick  WN2C

Rick WN2C

  • 305 Posts
  • 46 Reply Likes
Tim, any problems running Kaspersky Total Security?
Photo of KY6LA - Howard

KY6LA - Howard, Elmer

  • 3778 Posts
  • 1636 Reply Likes
Kaspersky is alleged to be spyware
Photo of Varistor


  • 334 Posts
  • 74 Reply Likes
Technically Howard’s statement is accurate, but utterly incomplete. It was in fact proven by Israeli, US, and UK law enforcement and intelligence agencies that Kaspersky’s backend infrastructure was breached and the product was used to search for endpoints that contained specific information. Then the identified endpoints were targeted with real data exfiltration tools and methods. Kaspersky itself did not collect the data on behalf of the bad guys.

The product itself works very well. SmartSDR has no problem with both Kaspersky and BitDefender.

I also use the BitDefender network appliance/firewall to protect my entire network, which includes computers, SDRs, security cameras, ecobee smart thermostats, smart TVs, etc. Most of the malware gets blocked before it enters the network.

Last but not least I use OpenDNS as an additional screening tool. Neither I (or the rest of the family) run Windows with admin rights and no ham software has ever ran or will run as admin.
Photo of Varistor


  • 334 Posts
  • 74 Reply Likes
A side bar:

Most of the systems that have been breached are not the actual target, but only the means of completing the mission or just being a stepping stone. Stuxnet was never about hacking Siemens, it was about Iran’s nuclear centrifuges. Hacking the PlayStation network was a failed attempt to build a distributed supercomputer for cracking encryption. The list goes on. Your personal data has been obtained long time ago, at scale, and enhanced by correlating multiple data points.

My clients are paying me well to be paranoid. Let me give you a very crude example to illustrate the CONCEPT of conducting a complete threat analysis:

A remotely accessible SDR with high gain directional antennas is a great asset to have in La Jolla, where we have strategic bases used by the Navy, the Marines, and the Secret Service, to name just a few. The SDR can be used for the following:

1) Remote listening post. It’s hard to build a stealthy surveillance site. Using a ham station that has been there for a long time is much more trivial. Hide it in plain sight

2) Use the radio is a command and control node for other on prem devices

3) High power jamming device should such a need araises

Again, these are nothing but crude examples to illustrate that your computer or Flex may be used to accomplish missions objectIves that go beyond your personal secrets. You could merely be collateral damage.