Scanning regimes you use

Out of interest what scanning regimes do you employ?

Does one need to scan once the first scan has shown a clear system?

What do you recommend?

Ian

Hi,

just scan your system on a regular basis, ie at least once a week as long as you surf the Internet ;), so a quick scan for this, weekly, and a full scan once a month.

+1

I like to have system Layered Protection with several security applications.

An up to date anti virus application with avast!
An up to date anti malware application like Malwarebytes’ Anti-Malware (MBAM)

Up to date HOSTS file that prevents access to known malware sites with hpHosts and MVPS HOSTS file managed with HostsMan.

A system Security monitor that watches over them that WinPatrol provides.

@ the OP: also don’t forget, this new Avast version uses something called the persistence cache, a set of data referring to what has been scanned already, so that when you scan again, the process will refer to it and won’t scan clean files again…(gotta start a new thread about that, wondering about something related…); so basically, the more you scan, the faster it goes.

Interesting question.

I’m a bit of a Luddite when it comes to computers. I do have IE6 SP1, for convenience, but many of the security features are set quite high; Eudora 3.0.6 Lite and Email Remover on a POP3 account; Opera 9.51 with very few security enhancements; Lotus SmartSuite 9.8; Avast!4.8 (I tried installing v5.0.396 but it has problems on W2K SP4 rollup1); and the hardware firewall in my NAT router – DLink DSL-G604T.

So, the scanning requirements are fairly relaxed. I have IM, P2P and Standard shields, and the Standard shield is set to scan all files on creation/modification and all executed programs – passive protection you might say. Occasionally I run a boot-time scan when I have nothing else to amuse myself, and from time to time I’ll scan a file or folder just for the heck of it, from the Explorer Extension.

At the same time, I have followed the grc.com advice and unbound my filesystem from the TCP/IP protocol as a backup for the NAT firewall, and my system is fully “stealthed”.

I’m not seriously worried about infection, but then you never can tell…

Gordon.