Author |
Topic: Has Anybody Heard of Panda Cloud Antivirus |
John Floyd
From: R.I.P.
|
|
|
![](templates/respond/images/spacer.gif) |
Brad Bechtel
From: San Francisco, CA
|
|
|
![](templates/respond/images/spacer.gif) |
Wiz Feinberg
From: Mid-Michigan, USA
|
Posted 22 Mar 2010 7:47 am
|
|
So, now there are bears in the clouds! Ethereal Pandas!
All joking aside, everybody is embracing Cloud Computing. It began as Software As A Service (SSAS) and has become Cloud Security. It is something that is only effective if you have high speed Internet access. Slow speed satellites or 3G networks may cause a time lag that is noticeable as a cloud based anti virus scans files as they are saved, executed or even as folder contents are displayed.
Cloud based definitions are supposed to reduce the load on the local machine by placing a small database of the most well known virus definitions onboard, with the newest definitions left in the Cloud. Malware authors are constantly repacking their software to avoid detection by anti virus scanners. There is simply no way to keep a fully up to date database on a computer and still be able to use the PC. _________________ "Wiz" Feinberg, Moderator SGF Computers Forum
Security Consultant
Twitter: @Wizcrafts
Main web pages: Wiztunes Steel Guitar website | Wiz's Security Blog | My Webmaster Services | Wiz's Security Blog |
|
|
![](templates/respond/images/spacer.gif) |
Leroy Riggs
From: Looney Tunes, R.I.P.
|
Posted 22 Mar 2010 10:25 am
|
|
'Cloud' is a synonym of 'hacking target'.
If a hacker can break into private computers, they will break into the cloud, one day, regularly. Think of all that data embedded there just for the asking! |
|
|
![](templates/respond/images/spacer.gif) |
John Cipriano
From: San Francisco
|
Posted 23 Mar 2010 9:40 am
|
|
In general you can see where keeping a list of every bad program ever written is going to be fruitless.
This is a pretty interesting article:
http://www.ranum.com/security/computer_security/editorials/dumb/
I'm thinking of part 2, "Enumerating Badness"
Even though they only use signatures (basically they look at what the program does rather than what it is) to build antivirus databases, the signatures differ enough that it boils down to the same problem.
This is why "least privilege" is good security, for instance the instructions Wiz posted about running Windows a standard user than as an administrator 24/7. |
|
|
![](templates/respond/images/spacer.gif) |
Wiz Feinberg
From: Mid-Michigan, USA
|
|
|
![](templates/respond/images/spacer.gif) |