Personal Technology Information |
|
Desktop Security Software Risks - Part 2
This is the third in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions. Reason #2: the Desktop Security Software Risks The risks of placing software on the desktop are such that I will be breaking this article into two parts. There are many advantages to putting security and anti-virus software on the desktop. They range from efficiency to money. Under previous ways of thinking if I can capture security and virus problems at the desktop I can prevent them from going any farther. That works well in a non-connected environment. In the connected environment it makes more sense to centralize the software and monitor connections in and out. Basically "firewall" all the appliances from each other. In a previous article we discussed the security risks inherent with desktop software designed to be the protection layer between you and all those bad people out there on the Internet. Here now we will discuss some more mundane issues regarding the risks of putting security software on the desktop: Drag Drag steals clock-cycles from your processes so that it can run in a higher priority mode. Anti-virus software especially places a drag on your computer. Depending on your settings (and the default settings are usually very aggressive), every time you run a program or open a file, real-time file scanning takes place and your files are scanned for viruses. This slows down your processing. Accessing larger files takes longer. You can see a discernible lag time between when you start a program/open a file and when you can actually access it. Compatibility After the obvious issue of "drag" is compatibility. Often security and anti-virus rules get in the way of your doing business on your computer. While you may get away with using older versions of such packages as Word, Sims, Photoshop, etc. on your computer with the new XP operating system, it's unlikely your security software will be completely compatible. Why? Many packages rely on very low-level functionality to be able to do the tasks they set out to do. Anti-virus packages have to be able to operate at a level closer to the hardware than most packages. They need to do this to prevent virus software from taking precedence from them. While many packages offer backward-compatibility the opposite is not true: forward-compatibility. There are several reasons for this: a package written for Windows 98 will not anticipate all the changes to the operating system that are implemented for Windows XP. While your Win98 anti-virus program may work under XP, it won't work at its peak performance. It can't. It's just another reason for centralizing your security. By siphoning all your traffic through a security screen at your ISP, for instance, you offload the need for updates and staying up-to-date on your security software. This then becomes the job of the service provider. Updates Having the software on your desktop means you are responsible for maintaining that software. In the case of office productivity software or image editing software, if new versions come out with features you're not interested in, you don't update. With new viruses appearing on the landscape every day, you can't afford not to continually update your software. If you don't update for a month or two, you run severe risks of infection. You also will incur potential long update cycles as your software has to be upgraded to handle all the new threats. This makes the desktop these days a somewhat ineffective solution. Nearly two-thirds of all the PCs that have anti-virus protection installed do not update their definitions regularly. These PCs might as well uninstall the software for all the good it's doing them. Lost Time As mentioned in the above discussion, you can lose considerable time if you don't update regularly. Long intervals between updates can translate into long update cycles. If you have a slow connection to a vendor, your down time is much longer as you have to wait for the files to be downloaded and then you have to wait for your software to update itself. Solution The better solution is to move to a centralized solution in which all the software, all the updates are the responsibility of the service provider. You pay for the service of having your email cleaned before you receive it. When email arrives at your service provider's mailbox, it is checked for malicious tendencies and stripped if bad. You notice no long waiting, no downtime, no drag, no incompatibilities. About The Author Tim Klemmer Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.
MORE RESOURCES: From personal aircraft to e-bikes to robots: 5 tech innovations seen at CES Las Vegas Review-Journal Minnesota tech on display at country’s biggest consumer electronics show, with 3M leading the way Star Tribune Time to Finally Organize Your Digital Photos. First You Have to Find Them. - The Wall Street Journal Time to Finally Organize Your Digital Photos. First You Have to Find Them. The Wall Street Journal TOP 10 personal tech and gadgets of 2024 Designboom How AI Will Change Personal Tech in 2025 - Tech News Briefing - WSJ Podcasts The Wall Street Journal Shop the best Cyber Monday deals on phones, tablets, smartwatches and more Good Morning America Tech That Will Change Your Life in 2025 The Wall Street Journal Things to Try: Our 9 Top Tech Tips for You The Wall Street Journal The 28 Best Tech Gifts of 2024, According to Our Gadget Gurus The Wall Street Journal I’ve Been Driving an EV for a Year. I Have Only One Regret. The Wall Street Journal How Tech Created a ‘Recipe for Loneliness’ The New York Times Can You Turn Off Big Tech’s A.I. Tools? Sometimes, and Here’s How. The New York Times The Great AI Challenge: We Test Five Top Bots on Useful, Everyday Skills The Wall Street Journal Android beefs up Bluetooth tag stalker protections The Register Apple’s A.I. Is Landing Soon on iPhones. Here’s What It’s Like. The New York Times The Coolest Tech Gadgets We’ve Tested So Far This Year BestProducts.com Touch Screens Are Over. Even Apple Is Bringing Back Buttons. The Wall Street Journal Opinion | Why Is Technology Mean to Me? The New York Times The Data Big Tech Companies Have On You Security.org The Summer Is So Hot, Workers Are Wearing High-Tech Ice Packs The Wall Street Journal Apple Watch Is Becoming Doctors’ Favorite Medical Device The Wall Street Journal In the City, Personal Safety Starts With Your Smartphone The Wall Street Journal No way? Big Tech's 'lucrative surveillance' of everyone is terrible for privacy, freedom The Register When Cell Service Is Down, You Can Send iPhone Texts via Satellite The Wall Street Journal Why Turning It Off and Turning It Back On Is Gadget-Fixing Magic The Wall Street Journal Apple Intelligence Isn’t Very Smart Yet—and Apple’s OK With That The Wall Street Journal China's homebrew Bluetooth alternative is on the march as Beijing pushes universal remotes The Register What the Arrival of A.I. Phones and Computers Means for Our Data The New York Times My Husband Wants a Japanese Toilet. Is He On to Something? The Wall Street Journal How I Got My Attention Span Back The Wall Street Journal How to Add Extra Security Layers to Your Phone or Tablet The New York Times Jonathan Haidt Blamed Tech for Teen Anxiety. Managing the Blowback Has Become a Full-Time Job. The Wall Street Journal The Only App That Always Wins the Battle for Your Attention The Wall Street Journal Exclusive | Wanted: Weekend Warriors in Tech The Wall Street Journal Amazon Wants Your Palm and TSA Wants Your Face. What Saying Yes Will Mean. - The Wall Street Journal Amazon Wants Your Palm and TSA Wants Your Face. What Saying Yes Will Mean. The Wall Street Journal Foldables Are Becoming Good Enough to Be Your Next Smartphone The New York Times When Did Apple’s Notes App Become an Extension of Our Brains? The Wall Street Journal How to Reduce Your Risk When Using Personal-Finance Apps The Wall Street Journal This Ring on Your Finger Tracks Your Sleep. Is It Worth the Splurge? The New York Times How to Turn Your Old iPhone Into an A.I. Phone (and Skip the Upgrade) The New York Times Tech Made Easy AARP A Case for Backing Up Your Precious Photos and Files at Home The Wall Street Journal I Tried a $1,000 Trash Can for Two Months—and I Get It The Wall Street Journal The Screen Time You Shouldn’t Feel Bad About The Wall Street Journal The Hearing Aid Revolution That Wasn’t The Wall Street Journal The Battle to Ban Screens From School Now Includes Chromebooks and Tablets - The Wall Street Journal The Battle to Ban Screens From School Now Includes Chromebooks and Tablets The Wall Street Journal China wants mobile devices to limit usage time for minors, ensure they only see nice content The Register How to Make Typing Easier on the Phone and Leave the Laptop at Home The New York Times Young Women With Eating Disorders Feel the Pull of Energy Drinks The Wall Street Journal How TikTok Is Wiring Gen Z’s Money Brain The Wall Street Journal PC shipments stuck in neutral despite AI buzz The Register Slack, Microsoft Teams, Google Chat: Is There Any Safe Place to Complain About Work Online? The Wall Street Journal |
RELATED ARTICLES
Computer Geeks and Garden Gnomes First and foremost before I begin my ranting it is worth mentioning that there are many very helpful and considerate people out there in the cyber wilderness who devote much of their time to providing open source and free scripts of all variations from PHP, CGI and Java to name but a few. They provide dedicated support, do not insist on payment, and spend much of their free time helping you avoid having to part with your hard earned cash to get free programs and scripts up and running on your websites. How Does My PC Get Hot There are many sources of heat that can raise the temperature in your PC. No, I'm not talking about the Tabasco sauce you dripped over your keyboard when you ate that bowl of chili at your desk, and no, I'm not talking about that Pamela Anderson (or Ricky Martin poster, depending on your taste) above your desk. Be Prepared in the Event Computer Disaster Strikes ComputersBusinesses and individuals alike have all grown to rely on computers. The reliance is never more apparent than when something happens to the horrid little box that makes our lives easier. Your Affiliate Business - Peripherals, Software, Computers I have always been interested in computers, but in the beginning, I would not venture any further than to the software end of learning. However, learning only the software side, and knowing nothing about the hardware side, can open you up to some costly times at the shop. Web Standards HTTP ProtocolThe web is run on port 80. You are probably wondering what "port 80" is, right (whether you actually are or not is irrelevant)? Well, the answer is easy (not really). Is Digital Camera Technology Making Film Obsolete? Perhaps not yet, but the handwriting might be on the wall?How is a digital camera different from a film camera? What are pixels and why are they important? What's the difference between optical and digital zoom? What advantages do digital cameras have compared to film cameras? Let's address these and other questions as we discuss digital camera technology.First a short history and overview of digital imaging?The technology began with television in the early 1950's when researchers discovered how to convert video images to electrical signals for storage on magnetic tape. Back Up, Back Up, Back Up! This is not your typical lost data story. I was a good girl and I kept my files on the network drive just like the company recommended. This Page Cannot Be Displayed - What to Do When Your Internet Breaks The DNS (Domain Name System) servers are what your computer uses to figure out where to go on the internet. www. More Cool Web Tricks If you ask most people what frustrates them most about the Internet, many of them will tell you "It's the little things!"It seems like all the great tricks and tips that make people exclaim "STOP! How did you do that?" never make it into any manual (at least where I can find them).My father (and co-author of "Turn Words Into Traffic") calls it the "reverse oral tradition" of computing, where children teach parents the survival skills of PC life. Cisco Certification: Taking Your First Certification Exam You??ve studied hard; you??ve practiced your configurations; you??ve used your flash cards over and over again; and finally, the big day is here. Your first certification exam!For many Cisco certification candidates, their first exam is the CCNA Composite exam or one of the two exams that make up the CCNA, the Introduction To Networking exam or the ICND (Interconnecting Cisco Networking Devices) exam. A Lesson in HTML As the owner of a Country Mall and Top Site List, I have been asked several times about what to put in the sign up form when it asks for the URL or the HTML of a banner or other image. I have people that email me feeling totally lost and have no idea what they mean! Actually, it is very easy once you know WHAT they are talking about and HOW to do what they want you to do. How to Protect your PC from Spyware in the Cyber Age Wouldn't you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes? Even worse.. How To Become A True CCNA I've worked my way from the CCNA to the CCIE, and along the way I've conducted job interviews and casual conversations with dozens of CCNAs and CCNA candidates. Believe me, people who "sneak by" the CCNA exam by braindumps, memorization, and never touching a router or switch are QUICKLY found out in job interviews and on the job. Learn the Lost Art of Touch Typing Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never replace the touch typing of a trained professional.A recent report by Robert Johnson in the Boston Globe highlights the decline of typing skills. System File Checker - A Maintenance Utility System File Checker is a great utility that is typically not utilized by the average Windows XP User. What it does is scan system files that are protected by Windows File Protection (by default Windows File Protection is enabled), and it checks to make sure that the protected files have not been altered. Learning To Navigate Ciscos Online Documentation When studying for your Cisco CCNA, CCNP, or CCIE exam, you've got a powerful online weapon at your disposal. It's Cisco Connection Documentation, found at www. Help, I Need a New HDTV! (Part 4 of 5) Feeling overwhelmed in selecting a new TV? With all the choices these days, you may feel like, "Where do I start?!"In part 4 of our 5 part article, we the discuss "do I really need an HDTV?"---Right now, stations are moving towards HDTV programming. Although available for free over the air in major metropolitan areas, this process will take a few years to fully unfold. Flash Your nVidia Video Cards BIOS You will need the following:1. 1. Virtual Memory - What is It? I recently got an e-mail asking about virtual memory. The person who sent me the question was getting an error on random occasions from their Windows operating system stating "Your computer is low on virtual memory". The Importance Of Email Backup Viruses, software failures, power failures, human errors, hard drive failures are only a few examples of what could destroy the data on a hard drive, including all documents, pictures, emails and other files!Most home computer users don't need an expensive backup solution; as they only need to burn the folders with important documents and pictures to a CD-RW from time to time; this ensuring that in case of a disaster they can easily get them back.Togeder with documents and pictures, it's a critical operation to save the emails, attachments, address book and other important data from within the email client; otherwise in case of a computer problem the user will find himself in the impossibility to get them back, and this can be a really unwanted situation especially for webmasters or people who rely on their emails. |
home | site map |
© 2006 |