![]() | |
![]() | |
![]() |
Personal Technology Information |
|
![]() |
Desktop Security Software Risks - Part 2
This is the third in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions. Reason #2: the Desktop Security Software Risks The risks of placing software on the desktop are such that I will be breaking this article into two parts. There are many advantages to putting security and anti-virus software on the desktop. They range from efficiency to money. Under previous ways of thinking if I can capture security and virus problems at the desktop I can prevent them from going any farther. That works well in a non-connected environment. In the connected environment it makes more sense to centralize the software and monitor connections in and out. Basically "firewall" all the appliances from each other. In a previous article we discussed the security risks inherent with desktop software designed to be the protection layer between you and all those bad people out there on the Internet. Here now we will discuss some more mundane issues regarding the risks of putting security software on the desktop: Drag Drag steals clock-cycles from your processes so that it can run in a higher priority mode. Anti-virus software especially places a drag on your computer. Depending on your settings (and the default settings are usually very aggressive), every time you run a program or open a file, real-time file scanning takes place and your files are scanned for viruses. This slows down your processing. Accessing larger files takes longer. You can see a discernible lag time between when you start a program/open a file and when you can actually access it. Compatibility After the obvious issue of "drag" is compatibility. Often security and anti-virus rules get in the way of your doing business on your computer. While you may get away with using older versions of such packages as Word, Sims, Photoshop, etc. on your computer with the new XP operating system, it's unlikely your security software will be completely compatible. Why? Many packages rely on very low-level functionality to be able to do the tasks they set out to do. Anti-virus packages have to be able to operate at a level closer to the hardware than most packages. They need to do this to prevent virus software from taking precedence from them. While many packages offer backward-compatibility the opposite is not true: forward-compatibility. There are several reasons for this: a package written for Windows 98 will not anticipate all the changes to the operating system that are implemented for Windows XP. While your Win98 anti-virus program may work under XP, it won't work at its peak performance. It can't. It's just another reason for centralizing your security. By siphoning all your traffic through a security screen at your ISP, for instance, you offload the need for updates and staying up-to-date on your security software. This then becomes the job of the service provider. Updates Having the software on your desktop means you are responsible for maintaining that software. In the case of office productivity software or image editing software, if new versions come out with features you're not interested in, you don't update. With new viruses appearing on the landscape every day, you can't afford not to continually update your software. If you don't update for a month or two, you run severe risks of infection. You also will incur potential long update cycles as your software has to be upgraded to handle all the new threats. This makes the desktop these days a somewhat ineffective solution. Nearly two-thirds of all the PCs that have anti-virus protection installed do not update their definitions regularly. These PCs might as well uninstall the software for all the good it's doing them. Lost Time As mentioned in the above discussion, you can lose considerable time if you don't update regularly. Long intervals between updates can translate into long update cycles. If you have a slow connection to a vendor, your down time is much longer as you have to wait for the files to be downloaded and then you have to wait for your software to update itself. Solution The better solution is to move to a centralized solution in which all the software, all the updates are the responsibility of the service provider. You pay for the service of having your email cleaned before you receive it. When email arrives at your service provider's mailbox, it is checked for malicious tendencies and stripped if bad. You notice no long waiting, no downtime, no drag, no incompatibilities. About The Author Tim Klemmer Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.
MORE RESOURCES: Tech support session saved files, but probably ended a marriage theregister.com Tech for Babies Is Booming. Here’s What One Parent Found Helped the Most. The New York Times TOP 10 personal tech and gadgets of 2024 Designboom The Latest Personal Tech at CES 2025- The Accounting Technology Lab Podcast - Jan. 2025 CPA Practice Advisor If TikTok Is Here to Stay, What Does That Mean for Us? The New York Times Not a Coder? With A.I., Just Having an Idea Can Be Enough. The New York Times Google says it's rolling out fix for stricken Chromecasts theregister.com How Tech Created a ‘Recipe for Loneliness’ The New York Times Ignorance really is bliss when you’re drowning in information theregister.com iRobot may be iDead in iYear theregister.com How to Create a Multimedia Digital Journal of Your Life The New York Times About National Personal Protective Technology Laboratory | NIOSH Centers for Disease Control and Prevention (.gov) A new operating model for people management: More personal, more tech, more human McKinsey & Company Top 10 Personal Gadgets For Tech-Savvy Individuals Designed To Revolutionize Their Routine Yanko Design Tariff uncertainty looms large over budget conscious CIOs theregister.com Shop the best Cyber Monday deals on phones, tablets, smartwatches and more Good Morning America Can You Turn Off Big Tech’s A.I. Tools? Sometimes, and Here’s How. The New York Times As Chromecast outage drags on, fix could be days to weeks away theregister.com Tech Made Easy AARP How to Make Typing Easier on the Phone and Leave the Laptop at Home The New York Times Framework guns for cheap laptops with upgradeable alternative theregister.com The Coolest Tech Gadgets We Recommend for 2025 Best Products Wozniak: I didn't reduce chip count for manufacturing. I wanted to prove I was clever theregister.com The sweet Raspberry taste of success masks a missed opportunity theregister.com Apple’s A.I. Is Landing Soon on iPhones. Here’s What It’s Like. The New York Times What the Arrival of A.I. Phones and Computers Means for Our Data The New York Times Hold my Pimms! Wimbledon turns to tech for line-ball calls theregister.com This Ring on Your Finger Tracks Your Sleep. Is It Worth the Splurge? The New York Times Apple and Meta trade barbs over interoperability requests theregister.com How to Download Your Videos and Other Data From TikTok The New York Times Apple 'broke law' by pushing out labor-organizing dev theregister.com AI PCs flood the market. Their makers hope someone wants them theregister.com If Trump gets elected, get your tech buying done asap theregister.com Android beefs up Bluetooth tag stalker protections theregister.com Laptop makers stalled on repairability improvements theregister.com PC shipments stuck in neutral despite AI buzz theregister.com Bank of America app glitch zeroes out people's balances theregister.com Christmas 1984: The last hurrah for 8-bit home computers theregister.com Taming Tech in Community by Andrew Zimmerman plough.com Apple dares users to fix 'budget' iPhone 16e themselves theregister.com HP ditches 15-minute wait time policy due to 'feedback' theregister.com Intel pitches modular PC designs to make repairs less painful theregister.com Framework Desktop wows iFixit – even with the soldered RAM theregister.com Lenovo teases solar-powered and folding screen concept laptops theregister.com Apple's backwards design mistake and the reversed capacitor theregister.com Bluesky capitalizes on X woes with funding and user growth theregister.com Hisense QLED TVs are just LED TVs, lawsuit claims theregister.com |
![]() |
![]() |
![]() |
RELATED ARTICLES
Computer Geeks and Garden Gnomes First and foremost before I begin my ranting it is worth mentioning that there are many very helpful and considerate people out there in the cyber wilderness who devote much of their time to providing open source and free scripts of all variations from PHP, CGI and Java to name but a few. They provide dedicated support, do not insist on payment, and spend much of their free time helping you avoid having to part with your hard earned cash to get free programs and scripts up and running on your websites. How Does My PC Get Hot There are many sources of heat that can raise the temperature in your PC. No, I'm not talking about the Tabasco sauce you dripped over your keyboard when you ate that bowl of chili at your desk, and no, I'm not talking about that Pamela Anderson (or Ricky Martin poster, depending on your taste) above your desk. Be Prepared in the Event Computer Disaster Strikes ComputersBusinesses and individuals alike have all grown to rely on computers. The reliance is never more apparent than when something happens to the horrid little box that makes our lives easier. Your Affiliate Business - Peripherals, Software, Computers I have always been interested in computers, but in the beginning, I would not venture any further than to the software end of learning. However, learning only the software side, and knowing nothing about the hardware side, can open you up to some costly times at the shop. Web Standards HTTP ProtocolThe web is run on port 80. You are probably wondering what "port 80" is, right (whether you actually are or not is irrelevant)? Well, the answer is easy (not really). Is Digital Camera Technology Making Film Obsolete? Perhaps not yet, but the handwriting might be on the wall?How is a digital camera different from a film camera? What are pixels and why are they important? What's the difference between optical and digital zoom? What advantages do digital cameras have compared to film cameras? Let's address these and other questions as we discuss digital camera technology.First a short history and overview of digital imaging?The technology began with television in the early 1950's when researchers discovered how to convert video images to electrical signals for storage on magnetic tape. Back Up, Back Up, Back Up! This is not your typical lost data story. I was a good girl and I kept my files on the network drive just like the company recommended. This Page Cannot Be Displayed - What to Do When Your Internet Breaks The DNS (Domain Name System) servers are what your computer uses to figure out where to go on the internet. www. More Cool Web Tricks If you ask most people what frustrates them most about the Internet, many of them will tell you "It's the little things!"It seems like all the great tricks and tips that make people exclaim "STOP! How did you do that?" never make it into any manual (at least where I can find them).My father (and co-author of "Turn Words Into Traffic") calls it the "reverse oral tradition" of computing, where children teach parents the survival skills of PC life. Cisco Certification: Taking Your First Certification Exam You�??ve studied hard; you�??ve practiced your configurations; you�??ve used your flash cards over and over again; and finally, the big day is here. Your first certification exam!For many Cisco certification candidates, their first exam is the CCNA Composite exam or one of the two exams that make up the CCNA, the Introduction To Networking exam or the ICND (Interconnecting Cisco Networking Devices) exam. A Lesson in HTML As the owner of a Country Mall and Top Site List, I have been asked several times about what to put in the sign up form when it asks for the URL or the HTML of a banner or other image. I have people that email me feeling totally lost and have no idea what they mean! Actually, it is very easy once you know WHAT they are talking about and HOW to do what they want you to do. How to Protect your PC from Spyware in the Cyber Age Wouldn't you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes? Even worse.. How To Become A True CCNA I've worked my way from the CCNA to the CCIE, and along the way I've conducted job interviews and casual conversations with dozens of CCNAs and CCNA candidates. Believe me, people who "sneak by" the CCNA exam by braindumps, memorization, and never touching a router or switch are QUICKLY found out in job interviews and on the job. Learn the Lost Art of Touch Typing Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never replace the touch typing of a trained professional.A recent report by Robert Johnson in the Boston Globe highlights the decline of typing skills. System File Checker - A Maintenance Utility System File Checker is a great utility that is typically not utilized by the average Windows XP User. What it does is scan system files that are protected by Windows File Protection (by default Windows File Protection is enabled), and it checks to make sure that the protected files have not been altered. Learning To Navigate Ciscos Online Documentation When studying for your Cisco CCNA, CCNP, or CCIE exam, you've got a powerful online weapon at your disposal. It's Cisco Connection Documentation, found at www. Help, I Need a New HDTV! (Part 4 of 5) Feeling overwhelmed in selecting a new TV? With all the choices these days, you may feel like, "Where do I start?!"In part 4 of our 5 part article, we the discuss "do I really need an HDTV?"---Right now, stations are moving towards HDTV programming. Although available for free over the air in major metropolitan areas, this process will take a few years to fully unfold. Flash Your nVidia Video Cards BIOS You will need the following:1. 1. Virtual Memory - What is It? I recently got an e-mail asking about virtual memory. The person who sent me the question was getting an error on random occasions from their Windows operating system stating "Your computer is low on virtual memory". The Importance Of Email Backup Viruses, software failures, power failures, human errors, hard drive failures are only a few examples of what could destroy the data on a hard drive, including all documents, pictures, emails and other files!Most home computer users don't need an expensive backup solution; as they only need to burn the folders with important documents and pictures to a CD-RW from time to time; this ensuring that in case of a disaster they can easily get them back.Togeder with documents and pictures, it's a critical operation to save the emails, attachments, address book and other important data from within the email client; otherwise in case of a computer problem the user will find himself in the impossibility to get them back, and this can be a really unwanted situation especially for webmasters or people who rely on their emails. ![]() |
home | site map |
© 2006 |