In some of my earliest conversations with Google, we talked about the company’s motivations for building Chrome. After developing a range of rich and complex Web apps, the company saw that it was time to build a browser from scratch that could better handle “today’s Web”. From the beginning, they focused on a browser that innovated in four key areas, namely speed, simplicity, security and stability. Early on, the Google Chrome team realized that the linchpin for innovating in these key aspects, as well as to handling the new Web apps, would be a much more efficient handling of JavaScript. Thus, the V8 JavaScript engine, explained further below, was conceived and became central to the Google Chrome Project.
Google hopes that innovations like V8 will change the feel of the desktop, making the Web apps we’re using more and more feel like native ones. Besides the internal code needed to achieve efficient JavaScript processing, Google Chrome hopes to maximize this native feel by keeping the UI minimal, including an "app mode" that lets one create a desktop icon that links to a URL with merely a tiny UI around the edges.
From a development standpoint, Google noted the difficulty in making this user experience acceptable on platforms with very different capabilities and conventions. Rather than just doing a brute-force port, the Google Chrome team has focused on often taking a step back from the code and looking at the larger picture of what a certain part of the code accomplishes for the user and then translated that into more abstract benefits for the respective Linux, Mac OS or Windows user. On some platforms, native capability exists in whole or in part for core functionality, such as sandboxed processes, but not on others. This fact has required a wide range of refactoring or writing new code depending on existing functionality found on the respective platform. One example of making Google Chrome good on the Mac platform is what the company did with WebKit. The team first had to come to terms with what it meant to use WebKit for Chrome and determine what it could provide. Interestingly, Google says that in the examples of Chrome or Safari, only about half the code is WebKit. In addition, WebKit was never really designed to be run in a separate process from the rest of the browser UI. In order to accomplish this, Google had to write much of its own drawing and event handling “plumbing” rather than simply dropping a WebView into a window in Interface Builder. However, the developers have been able to draw on much of the work that was done for the Windows version to solve this problem.
Of course, Google Chrome’s entire development process is much more efficient and potent given its opensource nature. More important than trying to “win the browser war” in the traditional sense—that is, get people to use Google Chrome as their primary browser—the company feels its opensource efforts with Chrome already have stimulated and seeded a great deal of innovation and made other browsers better than they would have been in Google Chrome’s absence. In fact, Google takes at least some credit for speed improvements and security enhancements that have taken place in other browsers during the past year, which is advantageous for everyone.
Given that Google Chrome is open source, we were curious to know how involved outside developers have been to its development. Although my contacts were unable to give me specific numbers, I was told that outside participation is very high, especially in terms of bug reports from users of the early developer builds of the browser. Google also works very closely with the WebKit team, so changes made by WebKit developers at Apple or others in the WebKit community are integrated into Google Chrome as well.
And now, on to the interview with Evan Martin and Mads Ager.
Source of Information : Linux Journal 185 September
Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts
Application As Service
Application As Service
$79.95
Eltima Software
www.eltima.com
There are plenty of ways to make programs start automatically when Windows loads, but most of them offer no control beyond that. Application As Service changes that by letting you treat any program as a Windows system service, providing all of the advanced configurability and other features that system services enjoy. As an example, say you use a backup program that you want to run on a regular basis, but other people use your computer and often shut it down accidentally. Using AaS, you can set up the program so it launches automatically when Windows loads, runs when you want it to run, and automatically restarts itself if some bonehead tries to kill it. And those are just some of the things this useful software allows.
Launching the software displays all of your Windows system services, as well as a separate list of Eltima Services you can add to manually. Clicking the Create button lets you establish a new service for any program installed on the PC, and you don’t have to navigate to the executable. Select the program’s shortcut, and the software automatically fills in the entire path to the .EXE. Once AaS creates a service, the GUI provides access to a staggering number of options, and even more are available via the command line interface. You can easily bind the service to a particular CPU or core, assign dependencies so it starts in the proper order if it relies on another service, establish environmental variables, and determine how the service reacts when the computer loses power or is rebooted. It’s even possible to close pop-up windows the service may generate when it loads, and full scheduling is easy to implement with the GUI. The software also has functionality to manage services on other PCs remotely, and you can password-protect the software itself so nobody can modify your settings or remove a program from the service list. The price is a bit steep for casual users, but if you manage a lot of PCs or certain programs that run on your machine are critical, AaS provides a convenient, powerful way to manage them that goes well beyond the Startup folder.
Source of Information : CPU Magazine 07 2009
$79.95
Eltima Software
www.eltima.com
There are plenty of ways to make programs start automatically when Windows loads, but most of them offer no control beyond that. Application As Service changes that by letting you treat any program as a Windows system service, providing all of the advanced configurability and other features that system services enjoy. As an example, say you use a backup program that you want to run on a regular basis, but other people use your computer and often shut it down accidentally. Using AaS, you can set up the program so it launches automatically when Windows loads, runs when you want it to run, and automatically restarts itself if some bonehead tries to kill it. And those are just some of the things this useful software allows.
Launching the software displays all of your Windows system services, as well as a separate list of Eltima Services you can add to manually. Clicking the Create button lets you establish a new service for any program installed on the PC, and you don’t have to navigate to the executable. Select the program’s shortcut, and the software automatically fills in the entire path to the .EXE. Once AaS creates a service, the GUI provides access to a staggering number of options, and even more are available via the command line interface. You can easily bind the service to a particular CPU or core, assign dependencies so it starts in the proper order if it relies on another service, establish environmental variables, and determine how the service reacts when the computer loses power or is rebooted. It’s even possible to close pop-up windows the service may generate when it loads, and full scheduling is easy to implement with the GUI. The software also has functionality to manage services on other PCs remotely, and you can password-protect the software itself so nobody can modify your settings or remove a program from the service list. The price is a bit steep for casual users, but if you manage a lot of PCs or certain programs that run on your machine are critical, AaS provides a convenient, powerful way to manage them that goes well beyond the Startup folder.
Source of Information : CPU Magazine 07 2009
The State Of Security - “Suite” Isn’t A Dirty Word Anymore
Security software is something that most users liken to eating vegetables: We know they’re good for us, but they can leave a bad taste in our mouths. A few years ago, security software developers started adding extra layers of security to what they simply used to call their antivirus programs, generally adding so much bloat, complexity, and system slowness that users start swearing off particular vendors and their products. Believe it or not, we’re happy to report that the times have changed. The vegetables are tasting better. Two developments account for these improvements. The first was massive user revolt: Users directed their rage at security software vendors, and the vendors have listened, spending serious manpower on performance optimizations to keep computers spry. The second basically boils down to the availability of fast, cheap hardware. A $500 computer bought today is five or 10 times faster than a $1,400 computer bought three or four years ago, and a $1,500 computer bought today might as well be a 5-year-old supercomputer. In other words, the modern computers most CPU readers have are finally capable of good performance, even while running security software.
How We Tested
We had several conversations on online gaming forums to get a sense of what power users’ concerns are with security software, and the results were intriguing. General slowness due to background tasks is always a concern, but scheduled background scans and update downloads occurring during gaming, movie viewing, or other periods when performance is important is a big problem, too, so we focused on these areas first. There was a general assumption among the forum community that security effectiveness and ease of use were similar among competitors, so we checked them all out against viruses, spyware, legitimate servers, and illegitimate worms. Most users wanted simplicity, but some still wanted options and detailed controls, so we determined which software had what and how easy it was to use. We checked that bundled utilities performed as advertised.
Web-usage statistics, along with Valve’s Steam gaming engine statistics, show Windows XP still being used between two to four times as much as Vista. And because Windows 7 will soon be pushing Vista out of the marketplace, we tested with WinXP SP3. Valve shows more than 50% of users have CPUs ranging between 2.3GHz and 3.3GHz, and 70% have 2GB or more of RAM; instead of using a low-powered test system (which artificially highlights speed differences in the products), we chose a representative 3GHz Core 2 Duo-based computer with 4GB of RAM and two SATA hard drives to show the real-world effects of installing security software. If you’ve skipped ahead to the charts, you’ve seen that the test system was never overwhelmed by any security suite, though there were definitely measurable differences in speed with many tests. For the record, we also used slower systems and virtual machines for some threat testing and network compatibility. (Note: All prices listed are for a 3-PC license.)
About Malware Detection Rates
Although we’re including the results of our malware-detection and healing tests (performed against real malware collected with our own honeypot and mail servers), it’s time to mention something about statistics and sample size. Outfits such as AV Comparatives (www.av-comparatives.org) have teams of technicians spending months running most of our tested products against a malware “zoo” consisting of 1.3 million malware samples. Having decidedly less resources, we selected 25 malware items and one infected thumb drive to test against. There’s no telling if our sample is a representative subsample of AV Comparatives’, or indeed, of the types of malware spreading about in the real world at any given time, so directly comparing our detection rates with AV Comparatives’, or anyone else’s (and there are others you can and should Google for), isn’t terribly meaningful.
AVG Technologies AVG Internet Security 8.5
$64.99
AVG Technologies
www.avg.com
● ● ●
AVG’s free antivirus program is among the most popular security products on the Internet, so you’ve probably seen it around. As such, AVG Internet Security feels very familiar, essentially adding a two-way firewall, spam filter, drive-by download and phishing shield, and antirootkit abilities to the traditional antivirus/antispyware engine. This is a model most of the security vendors have taken with their suites, but AVG’s interface feels more cluttered than most. AVGIS also feels familiar because it essentially follows the security model of yesterday—deluge the user with security questions all the time, but don’t always be clear about the best course of action. For example, when it detects malware in a download, a pop-up proclaims “Threat Detected” and identifies the infected file and the threat it contains, usually followed by a Close button. Nowhere does the dialog box actually say “threat deleted” or “don’t worry, your computer is safe.” On top of this, the dialog stays up indefinitely, requiring you to pause your work to click it. For some threats, you’re given the option of Heal, Move To Vault, or Ignore with a Remove Threat As Power User checkbox; it seems sensible until you realize that many other products would automatically move the threat to the vault and not bother you with the details. The firewall pops up similar dialogs about network access to most wellknown programs and Internet games, even going as far as to jump to the Desktop so you can click Allow, although launched games resume where they are paused. Many other firewalls “automagically” know about thousands of “known-good” programs and just let them work. Other noteworthy aspects include better- than-average spam filtering, the best 3DMark06 score (though they’re all within .2% of each other), a default setting to scan within compressed files, and the identification of a well-known email password- recovery program as a “potentially dangerous hacking tool.”
Avira Premium Security Suite
$78
Avira GmbH
www.avira.com
● ● ● ●
Avira distributes what is generally the second-most-popular free antimalware program, and like AVG, Avira Premium Security Suite feels a lot like its free cousin, but with more features added. Also like AVG, APSS tends to annoy its user with a lot more pop-ups than necessary, and they contain options likely to confuse. Upon detecting our infected USB flash drive, for example, it popped up a warning identifying the offending file and the infection but made the user select one of the following options: Move to Quarantine, Delete, Overwrite And Delete, Rename, Deny Access (default), and Ignore. If you’re a virus researcher, such options are nice to have, but in almost every other situation it should automatically move the malware into quarantine. Pop-ups are the standard operating mode for the firewall, which even managed to freeze Counter-Strike: Source in its tracks until we ALT-TABbed to the Desktop to view the firewall permission dialog box, clicked the Allow button, and ALT-TABbed back. And then we had to do it again for another component in CS: Source that wanted to get online. It also popped up warnings about the occasional ICMP packet being detected from the Internet—something no other security suite did. On the positive side, APSS tied Eset for the fastest PCMark05 score, and its Web scanner proxy actually sped up large downloads from our test server on the LAN. Its AV Comparatives detection rates were the best. Its interface offered the right combination of ease and access to technical details. We’d be more willing to overlook Avira’s (and AVG’s) issues if these products were free or inexpensive, but the competition has it beat here too, with some being half the price.
BitDefender Internet Security 2009
$39.95
BitDefender
www.bitdefender.com
● ● ● ●
BitDefender Internet Security 2009 feels like the most flexible suite from the moment you fire up its installer, because it peppers you with question after question about your home network, parental and identity control, and so forth. Most other utilities make you dive into the interface to configure these options, or they just turn them all on by default and assume you’ll figure out how to disable them if you need to. Most of the utilities aced at least one of our performance or security tests, but not BitDefender, although this is forgivable given its low price. Its pop-ups are very straightforward and make it clear that it’s on the job and taking care of problems as it finds them. The firewall doesn’t seem to know much about good and bad applications, as it asked us about almost every Internet-accessing program we had, except for obvious programs such as Web browsers, emailers, and WinZip. One unique option is a removable disc scanner, which asks to run a scan whenever a new disc or flash drive is inserted—very handy in this era of infected thumbdrives. Most of the utilities have a game mode, which tells the software not to display any pop-ups that would interfere with fullscreen games, movies, etc. Some of the better utilities enter game mode automatically, but BitDefender requires you to enter game mode manually. Background updates sometimes require a reboot, which interrupted us more than once. BitDefender’s main interface has two modes, Simple and Advanced, and it’s a good way to minimize confusion for most users. Simple mode basically lets you enable or disable various areas of protection in a broad stroke, while the Advanced mode opens up all the options and fine details. We love all the tools available in Advanced mode, but Basic is a little too busy, considering the options you can’t select there.
Eset Smart Security 4
$89.99
Eset
www.eset.com
● ● ● ● ●
Eset’s security programs are known for being light on resources, and Eset Smart
Security doesn’t disappoint. It added the least amount of time to a reboot (just three extra seconds!) and tied for the best PCMark05 score. We were pleasantly surprised by its high level of “smarts.” (But then again, “smart” is in its name, so we shouldn’t have been.) Better than almost any other suite, ESS knew what to say and when to say it. When it detects a downloaded virus, for example, it pops up a small red alert dialog box, which identifies the infection, the infected file, and simply says “Connection Terminated—Quarantined.” Its game mode fires up automatically when it detects programs running fullscreen. The firewall immediately recognized almost every Internet program, remote-control applet, and online game in our arsenal and let them communicate with the Internet without prompting us, yet it was smart enough to just block our firewall-leaktest program. Although our leaktest program wasn’t really malicious (which is important when considering Norton’s actions), we think ESS made the smart call on this. The ESS interface has two modes, Standard and Advanced. Standard has the bare minimum of commands, but they are the right ones a beginner really needs. Advanced adds a few more options front and center but makes the Setup menu available with direct access to configuration options. Some options that are typical in other products are either slightly hard to locate or simply absent, forcing the user to rely on ESS to make the smart choice automatically. The only glitch we encountered was with our download speed test. Between two LAN machines, speeds slowed to a crawl (slower than DSL rates), yet we saw no slowdown on downloads from the Internet. Eset Smart Security’s smarts and speed make it the most expensive choice here, but if you don’t want to be bothered by your security suite, the cost is worth it.
Kaspersky Internet Security 2009
$79.99
Kaspersky Lab
www.kaspersky.com
● ● ● ●
Kaspersky’s security products are generally thought of as the preferred tool for experts, and we can see why. It combines excellent detection rates with very clear on-screen messages, but makes no attempt to simplify the process of keeping your system secure. All the settings and configuration options are sort of hanging off the interface every which way (there’s no basic mode), and current protection statistics and live graphs and charts line every screen in its tabbed interface. If you like being asked about almost every program your security suite encounters, you’ll love KIS. For example, it identified our gaming keypad’s driver as “a potentially hazardous program,” asking if we wanted KIS to run it, delete it, or assign it to a restricted group. Run and Delete are obvious, but the Restricted group is something different. KIS can selectively prohibit apps from having access to the network, the file system, or the Registry, sort of like “sandboxing” them. None of the tested products identified clean-but-not-legal keygen applets as malware (years ago they used to), but KIS was the only one to offer to run them in a restricted mode, preventing them from doing anything untoward. Even the excellent spam filter is expert-oriented: It divides messages into “definitely spam” and “probably spam,” minimizing the messages you need to double-check once the system is trained. KIS is not without drawbacks. It generated the slowest CS: Source and 3DMark06 benchmarks, and, in fact, we had to disable it before 3DMark-06 and PCMark05 would even start. (We manually re-enabled it after starting the benchmark programs.) Its firewall was slow to react to a port scan, stealthing many ports only after a scan commenced.
McAfee Internet Security 2009
$44.99
McAfee
www.mcafee.com
● ● ● ●
McAfee Internet Security is the surprise low-price leader among the major vendors, with a per-computer price of only $15. And although it did relatively poorly with our relatively small malware zoo, it has the second-highest detection rate in AV Comparatives’ more statistically significant test. It receives definition updates almost constantly and will even update itself to next year’s version automatically if your subscription is active when McAfee performs the switchover, making it an even better deal. MIS automatically enters game mode when fullscreen applications are running, suppressing the pop-ups that would kick you to the Desktop, but it doesn’t stop it from performing scheduled tasks or getting updates, which can slow things down occasionally. Many of the suites now duplicate McAfee’s Site Advisor, a pioneering service that shows you how malware-free a Web site is from the results of a search engine search, though we found it a tad more sensitive than the competition. It is easily disabled if you’re not with the “better safe than sorry” crowd and doesn’t take up a lot of browser space. MIS does a good job of clearly explaining what it’s doing. It quickly dispatches viruses with a clear “McAfee has automatically blocked and removed a Virus,” and the firewall messages are similarly clear, although we encountered them more than we would have expected with popular network applications. With virtually no training, the spam filter was right 99% of the time, obviously benefitting from McAfee’s server-side training based on all its users’ input. Our biggest problem with MIS was a general level of sluggishness. It took a good 4 seconds from Tray icon doubleclick to being able to work with the GUI, whereas a lot of other suites are instantaneous. Navigating to certain sub-screens takes a moment, too, discouraging experimentation.
Norton Internet Security 2009
$59.99
Symantec
www.symantec.com
● ● ● ● ●
In the recent past, Symantec was justly targeted by angry users for bloated versions of NIS that slowed computers down, sometimes dramatically. NIS 2009 is a whole new ballgame. The main NIS interface has two CPU bars—one showing overall CPU usage and another showing how much CPU time NIS is consuming, obviously attempting to prove that your slow computer isn’t Symantec’s fault. Other speedboosting tricks include never performing a background scan or downloading an update unless the CPU is idle, actively freeing RAM when the program is idle (its idle RAM footprint is an almost unbelievable 4.5MB), and taking inventory of known-good executables on your hard drive (and recording their checksums) and then skipping them during system scans to make scans faster. The main GUI appears instantly upon double- clicking its Tray icon, and subscreens open instantly, too. NIS has just one mode (no basic and advanced modes here). Instead, the relatively simple GUI has multiple Settings links that delve deeper into more options. It takes up too much on-screen space but works well. You may not need to get to detailed configuration settings often because NIS is just about as smart as Eset, almost always making the right choices about what to block (and telling you so unambiguously), what to quarantine, and what to leave alone. It let our leaktest program open ports unopposed, but this, debatably, isn’t a dangerous program per se, and NIS’ heuristics accurately detected this. Although NIS 2009 is a spry application, it’s worth noting that benchmarks were generally average, and the antispam filter needed a lot of training before it approached the effectiveness of the competition’s untrained filters. Still, NIS is an excellent combination of price, speed, and features and worth a second look if you’ve been burned by Symantec before.
Panda Internet Security 2009
$79.95
Panda Security
www.pandasecurity.com
● ● ● ●
Panda Internet Security is a very attractive, easy-to-use security program that just needs slightly better pricing, a little more smarts when dealing with nasties (or, in our case, a false positive), and a bit of a diet. We have only slight qualms with PIS’ detection model. When we tried downloading test malware, Panda’s concise message of “This file was infected with this virus and was deleted” appears directly in the content area of the Web browser window and clearly says what it does, which is great. Infected compressed files, on the other hand, generated no message and actually downloaded and saved, but the ZIP files themselves were empty. PIS silently took care of the problem. Viruses in ZIP files detected with heuristics were renamed with a .VIR extension, which is important to note since our legitimate passworddetecting program was renamed in its ZIP file. When we extracted it and renamed it back to an EXE file, it worked fine. A manual scan of it resulted in its being quarantined, meaning the background scanner plays by different rules than the on-demand scanner. PIS isn’t especially well suited to gamers. There’s no game mode (it started downloading an update during a CS: Source benchmark; we threw out that test result), and it consumes a whopping 158MB of RAM when idle. The firewall didn’t recognize some popular Internet applications and games that other security suites simply allowed without a pop-up. That said, it makes a good security suite for the general populace. The clear interface invites exploration, and it comes with the most well-written Help file. The spam filter’s only mistake was marking a few newsletters that had imbedded ads as spam before training, and PIS’ rescue CD (like Norton’s) makes recovering a thoroughly infested Windows installation possible.
Trend Micro Internet Security Pro
$69.95
Trend Micro
us.trendmicro.com
● ● ● ●
We haven’t looked at a Trend Micro security product for a while and are pleasantly surprised at the innovative features tucked into the current version of TMISP. However, a general slowness in opening the interface, along with a fairly dramatic increase in most filerelated benchmarks, has us hoping the engineers at Trend can give TMISP a NIS2009-like speed boost in the future. Additionally, its lack of inclusion in the AV Comparatives’ (and other large-sample) tests has us wondering about its overall efficacy against malware, though it aced our limited tests. TMISP clearly announces when it blocks malware and confirms your system is safe, so there are no decisions you need to make to stay malware-free. It also wisely decides which applications to automatically grant network access to and which to block, though manually overriding the built-in smarts is simple. All the products in this roundup come with some sort of Web filter or phishing filter, but TMISP’s Web site safety filter actively blocked our malware test server on our test machine after only about eight virus detections. Our other test machines were blocked from their first visit to our malware test server only a few days later. You can’t get infected from a site you can’t connect to, right? An additional button on the browser toolbar evaluates the security of your wireless connection, handy in coffee shops and other hotspots. Although it lacks either an automatic or manual game mode, some interesting features include a keystroke encrypter to foil keyloggers, a remote file vault to back up important files, and an Internet filter that monitors and optionally prevents the transmission of information such as credit card numbers, telephone numbers, and so forth.
Recommendations
Each of the suites has its strengths and weaknesses, but we’re pleased to report that none of the suites we tested will slow down a reasonably modern computer. For those seeking a lightweight suite that doesn’t deluge you with questions and pop-ups, we recommend Eset Smart Security and Norton Internet Security, depending on whether you want the utmost speed in benchmarks or merely very good speed with more security features, respectively. Control freaks and techies who like lots of options should consider Kaspersky Internet Security.
Source of Information : CPU Magazine 07 2009
How We Tested
We had several conversations on online gaming forums to get a sense of what power users’ concerns are with security software, and the results were intriguing. General slowness due to background tasks is always a concern, but scheduled background scans and update downloads occurring during gaming, movie viewing, or other periods when performance is important is a big problem, too, so we focused on these areas first. There was a general assumption among the forum community that security effectiveness and ease of use were similar among competitors, so we checked them all out against viruses, spyware, legitimate servers, and illegitimate worms. Most users wanted simplicity, but some still wanted options and detailed controls, so we determined which software had what and how easy it was to use. We checked that bundled utilities performed as advertised.
Web-usage statistics, along with Valve’s Steam gaming engine statistics, show Windows XP still being used between two to four times as much as Vista. And because Windows 7 will soon be pushing Vista out of the marketplace, we tested with WinXP SP3. Valve shows more than 50% of users have CPUs ranging between 2.3GHz and 3.3GHz, and 70% have 2GB or more of RAM; instead of using a low-powered test system (which artificially highlights speed differences in the products), we chose a representative 3GHz Core 2 Duo-based computer with 4GB of RAM and two SATA hard drives to show the real-world effects of installing security software. If you’ve skipped ahead to the charts, you’ve seen that the test system was never overwhelmed by any security suite, though there were definitely measurable differences in speed with many tests. For the record, we also used slower systems and virtual machines for some threat testing and network compatibility. (Note: All prices listed are for a 3-PC license.)
About Malware Detection Rates
Although we’re including the results of our malware-detection and healing tests (performed against real malware collected with our own honeypot and mail servers), it’s time to mention something about statistics and sample size. Outfits such as AV Comparatives (www.av-comparatives.org) have teams of technicians spending months running most of our tested products against a malware “zoo” consisting of 1.3 million malware samples. Having decidedly less resources, we selected 25 malware items and one infected thumb drive to test against. There’s no telling if our sample is a representative subsample of AV Comparatives’, or indeed, of the types of malware spreading about in the real world at any given time, so directly comparing our detection rates with AV Comparatives’, or anyone else’s (and there are others you can and should Google for), isn’t terribly meaningful.
AVG Technologies AVG Internet Security 8.5
$64.99
AVG Technologies
www.avg.com
● ● ●
AVG’s free antivirus program is among the most popular security products on the Internet, so you’ve probably seen it around. As such, AVG Internet Security feels very familiar, essentially adding a two-way firewall, spam filter, drive-by download and phishing shield, and antirootkit abilities to the traditional antivirus/antispyware engine. This is a model most of the security vendors have taken with their suites, but AVG’s interface feels more cluttered than most. AVGIS also feels familiar because it essentially follows the security model of yesterday—deluge the user with security questions all the time, but don’t always be clear about the best course of action. For example, when it detects malware in a download, a pop-up proclaims “Threat Detected” and identifies the infected file and the threat it contains, usually followed by a Close button. Nowhere does the dialog box actually say “threat deleted” or “don’t worry, your computer is safe.” On top of this, the dialog stays up indefinitely, requiring you to pause your work to click it. For some threats, you’re given the option of Heal, Move To Vault, or Ignore with a Remove Threat As Power User checkbox; it seems sensible until you realize that many other products would automatically move the threat to the vault and not bother you with the details. The firewall pops up similar dialogs about network access to most wellknown programs and Internet games, even going as far as to jump to the Desktop so you can click Allow, although launched games resume where they are paused. Many other firewalls “automagically” know about thousands of “known-good” programs and just let them work. Other noteworthy aspects include better- than-average spam filtering, the best 3DMark06 score (though they’re all within .2% of each other), a default setting to scan within compressed files, and the identification of a well-known email password- recovery program as a “potentially dangerous hacking tool.”
Avira Premium Security Suite
$78
Avira GmbH
www.avira.com
● ● ● ●
Avira distributes what is generally the second-most-popular free antimalware program, and like AVG, Avira Premium Security Suite feels a lot like its free cousin, but with more features added. Also like AVG, APSS tends to annoy its user with a lot more pop-ups than necessary, and they contain options likely to confuse. Upon detecting our infected USB flash drive, for example, it popped up a warning identifying the offending file and the infection but made the user select one of the following options: Move to Quarantine, Delete, Overwrite And Delete, Rename, Deny Access (default), and Ignore. If you’re a virus researcher, such options are nice to have, but in almost every other situation it should automatically move the malware into quarantine. Pop-ups are the standard operating mode for the firewall, which even managed to freeze Counter-Strike: Source in its tracks until we ALT-TABbed to the Desktop to view the firewall permission dialog box, clicked the Allow button, and ALT-TABbed back. And then we had to do it again for another component in CS: Source that wanted to get online. It also popped up warnings about the occasional ICMP packet being detected from the Internet—something no other security suite did. On the positive side, APSS tied Eset for the fastest PCMark05 score, and its Web scanner proxy actually sped up large downloads from our test server on the LAN. Its AV Comparatives detection rates were the best. Its interface offered the right combination of ease and access to technical details. We’d be more willing to overlook Avira’s (and AVG’s) issues if these products were free or inexpensive, but the competition has it beat here too, with some being half the price.
BitDefender Internet Security 2009
$39.95
BitDefender
www.bitdefender.com
● ● ● ●
BitDefender Internet Security 2009 feels like the most flexible suite from the moment you fire up its installer, because it peppers you with question after question about your home network, parental and identity control, and so forth. Most other utilities make you dive into the interface to configure these options, or they just turn them all on by default and assume you’ll figure out how to disable them if you need to. Most of the utilities aced at least one of our performance or security tests, but not BitDefender, although this is forgivable given its low price. Its pop-ups are very straightforward and make it clear that it’s on the job and taking care of problems as it finds them. The firewall doesn’t seem to know much about good and bad applications, as it asked us about almost every Internet-accessing program we had, except for obvious programs such as Web browsers, emailers, and WinZip. One unique option is a removable disc scanner, which asks to run a scan whenever a new disc or flash drive is inserted—very handy in this era of infected thumbdrives. Most of the utilities have a game mode, which tells the software not to display any pop-ups that would interfere with fullscreen games, movies, etc. Some of the better utilities enter game mode automatically, but BitDefender requires you to enter game mode manually. Background updates sometimes require a reboot, which interrupted us more than once. BitDefender’s main interface has two modes, Simple and Advanced, and it’s a good way to minimize confusion for most users. Simple mode basically lets you enable or disable various areas of protection in a broad stroke, while the Advanced mode opens up all the options and fine details. We love all the tools available in Advanced mode, but Basic is a little too busy, considering the options you can’t select there.
Eset Smart Security 4
$89.99
Eset
www.eset.com
● ● ● ● ●
Eset’s security programs are known for being light on resources, and Eset Smart
Security doesn’t disappoint. It added the least amount of time to a reboot (just three extra seconds!) and tied for the best PCMark05 score. We were pleasantly surprised by its high level of “smarts.” (But then again, “smart” is in its name, so we shouldn’t have been.) Better than almost any other suite, ESS knew what to say and when to say it. When it detects a downloaded virus, for example, it pops up a small red alert dialog box, which identifies the infection, the infected file, and simply says “Connection Terminated—Quarantined.” Its game mode fires up automatically when it detects programs running fullscreen. The firewall immediately recognized almost every Internet program, remote-control applet, and online game in our arsenal and let them communicate with the Internet without prompting us, yet it was smart enough to just block our firewall-leaktest program. Although our leaktest program wasn’t really malicious (which is important when considering Norton’s actions), we think ESS made the smart call on this. The ESS interface has two modes, Standard and Advanced. Standard has the bare minimum of commands, but they are the right ones a beginner really needs. Advanced adds a few more options front and center but makes the Setup menu available with direct access to configuration options. Some options that are typical in other products are either slightly hard to locate or simply absent, forcing the user to rely on ESS to make the smart choice automatically. The only glitch we encountered was with our download speed test. Between two LAN machines, speeds slowed to a crawl (slower than DSL rates), yet we saw no slowdown on downloads from the Internet. Eset Smart Security’s smarts and speed make it the most expensive choice here, but if you don’t want to be bothered by your security suite, the cost is worth it.
Kaspersky Internet Security 2009
$79.99
Kaspersky Lab
www.kaspersky.com
● ● ● ●
Kaspersky’s security products are generally thought of as the preferred tool for experts, and we can see why. It combines excellent detection rates with very clear on-screen messages, but makes no attempt to simplify the process of keeping your system secure. All the settings and configuration options are sort of hanging off the interface every which way (there’s no basic mode), and current protection statistics and live graphs and charts line every screen in its tabbed interface. If you like being asked about almost every program your security suite encounters, you’ll love KIS. For example, it identified our gaming keypad’s driver as “a potentially hazardous program,” asking if we wanted KIS to run it, delete it, or assign it to a restricted group. Run and Delete are obvious, but the Restricted group is something different. KIS can selectively prohibit apps from having access to the network, the file system, or the Registry, sort of like “sandboxing” them. None of the tested products identified clean-but-not-legal keygen applets as malware (years ago they used to), but KIS was the only one to offer to run them in a restricted mode, preventing them from doing anything untoward. Even the excellent spam filter is expert-oriented: It divides messages into “definitely spam” and “probably spam,” minimizing the messages you need to double-check once the system is trained. KIS is not without drawbacks. It generated the slowest CS: Source and 3DMark06 benchmarks, and, in fact, we had to disable it before 3DMark-06 and PCMark05 would even start. (We manually re-enabled it after starting the benchmark programs.) Its firewall was slow to react to a port scan, stealthing many ports only after a scan commenced.
McAfee Internet Security 2009
$44.99
McAfee
www.mcafee.com
● ● ● ●
McAfee Internet Security is the surprise low-price leader among the major vendors, with a per-computer price of only $15. And although it did relatively poorly with our relatively small malware zoo, it has the second-highest detection rate in AV Comparatives’ more statistically significant test. It receives definition updates almost constantly and will even update itself to next year’s version automatically if your subscription is active when McAfee performs the switchover, making it an even better deal. MIS automatically enters game mode when fullscreen applications are running, suppressing the pop-ups that would kick you to the Desktop, but it doesn’t stop it from performing scheduled tasks or getting updates, which can slow things down occasionally. Many of the suites now duplicate McAfee’s Site Advisor, a pioneering service that shows you how malware-free a Web site is from the results of a search engine search, though we found it a tad more sensitive than the competition. It is easily disabled if you’re not with the “better safe than sorry” crowd and doesn’t take up a lot of browser space. MIS does a good job of clearly explaining what it’s doing. It quickly dispatches viruses with a clear “McAfee has automatically blocked and removed a Virus,” and the firewall messages are similarly clear, although we encountered them more than we would have expected with popular network applications. With virtually no training, the spam filter was right 99% of the time, obviously benefitting from McAfee’s server-side training based on all its users’ input. Our biggest problem with MIS was a general level of sluggishness. It took a good 4 seconds from Tray icon doubleclick to being able to work with the GUI, whereas a lot of other suites are instantaneous. Navigating to certain sub-screens takes a moment, too, discouraging experimentation.
Norton Internet Security 2009
$59.99
Symantec
www.symantec.com
● ● ● ● ●
In the recent past, Symantec was justly targeted by angry users for bloated versions of NIS that slowed computers down, sometimes dramatically. NIS 2009 is a whole new ballgame. The main NIS interface has two CPU bars—one showing overall CPU usage and another showing how much CPU time NIS is consuming, obviously attempting to prove that your slow computer isn’t Symantec’s fault. Other speedboosting tricks include never performing a background scan or downloading an update unless the CPU is idle, actively freeing RAM when the program is idle (its idle RAM footprint is an almost unbelievable 4.5MB), and taking inventory of known-good executables on your hard drive (and recording their checksums) and then skipping them during system scans to make scans faster. The main GUI appears instantly upon double- clicking its Tray icon, and subscreens open instantly, too. NIS has just one mode (no basic and advanced modes here). Instead, the relatively simple GUI has multiple Settings links that delve deeper into more options. It takes up too much on-screen space but works well. You may not need to get to detailed configuration settings often because NIS is just about as smart as Eset, almost always making the right choices about what to block (and telling you so unambiguously), what to quarantine, and what to leave alone. It let our leaktest program open ports unopposed, but this, debatably, isn’t a dangerous program per se, and NIS’ heuristics accurately detected this. Although NIS 2009 is a spry application, it’s worth noting that benchmarks were generally average, and the antispam filter needed a lot of training before it approached the effectiveness of the competition’s untrained filters. Still, NIS is an excellent combination of price, speed, and features and worth a second look if you’ve been burned by Symantec before.
Panda Internet Security 2009
$79.95
Panda Security
www.pandasecurity.com
● ● ● ●
Panda Internet Security is a very attractive, easy-to-use security program that just needs slightly better pricing, a little more smarts when dealing with nasties (or, in our case, a false positive), and a bit of a diet. We have only slight qualms with PIS’ detection model. When we tried downloading test malware, Panda’s concise message of “This file was infected with this virus and was deleted” appears directly in the content area of the Web browser window and clearly says what it does, which is great. Infected compressed files, on the other hand, generated no message and actually downloaded and saved, but the ZIP files themselves were empty. PIS silently took care of the problem. Viruses in ZIP files detected with heuristics were renamed with a .VIR extension, which is important to note since our legitimate passworddetecting program was renamed in its ZIP file. When we extracted it and renamed it back to an EXE file, it worked fine. A manual scan of it resulted in its being quarantined, meaning the background scanner plays by different rules than the on-demand scanner. PIS isn’t especially well suited to gamers. There’s no game mode (it started downloading an update during a CS: Source benchmark; we threw out that test result), and it consumes a whopping 158MB of RAM when idle. The firewall didn’t recognize some popular Internet applications and games that other security suites simply allowed without a pop-up. That said, it makes a good security suite for the general populace. The clear interface invites exploration, and it comes with the most well-written Help file. The spam filter’s only mistake was marking a few newsletters that had imbedded ads as spam before training, and PIS’ rescue CD (like Norton’s) makes recovering a thoroughly infested Windows installation possible.
Trend Micro Internet Security Pro
$69.95
Trend Micro
us.trendmicro.com
● ● ● ●
We haven’t looked at a Trend Micro security product for a while and are pleasantly surprised at the innovative features tucked into the current version of TMISP. However, a general slowness in opening the interface, along with a fairly dramatic increase in most filerelated benchmarks, has us hoping the engineers at Trend can give TMISP a NIS2009-like speed boost in the future. Additionally, its lack of inclusion in the AV Comparatives’ (and other large-sample) tests has us wondering about its overall efficacy against malware, though it aced our limited tests. TMISP clearly announces when it blocks malware and confirms your system is safe, so there are no decisions you need to make to stay malware-free. It also wisely decides which applications to automatically grant network access to and which to block, though manually overriding the built-in smarts is simple. All the products in this roundup come with some sort of Web filter or phishing filter, but TMISP’s Web site safety filter actively blocked our malware test server on our test machine after only about eight virus detections. Our other test machines were blocked from their first visit to our malware test server only a few days later. You can’t get infected from a site you can’t connect to, right? An additional button on the browser toolbar evaluates the security of your wireless connection, handy in coffee shops and other hotspots. Although it lacks either an automatic or manual game mode, some interesting features include a keystroke encrypter to foil keyloggers, a remote file vault to back up important files, and an Internet filter that monitors and optionally prevents the transmission of information such as credit card numbers, telephone numbers, and so forth.
Recommendations
Each of the suites has its strengths and weaknesses, but we’re pleased to report that none of the suites we tested will slow down a reasonably modern computer. For those seeking a lightweight suite that doesn’t deluge you with questions and pop-ups, we recommend Eset Smart Security and Norton Internet Security, depending on whether you want the utmost speed in benchmarks or merely very good speed with more security features, respectively. Control freaks and techies who like lots of options should consider Kaspersky Internet Security.
Source of Information : CPU Magazine 07 2009
PDFCreator 0.9.8
It’s been a long time since Adobe Acrobat was the only way to generate PDF files, but the alternatives have normally had trade-offs. Some are merely cheaper than Adobe’s (admittedly high-priced) offerings but still aren’t free. Some free options are fairly complicated multistep processes, involving making a PostScript file and then converting it with GhostScript to a PDF. PDFCreator strikes a nice balance between cost (it’s free), ease of use, ease of installation, and configurability. Once you get past its only installation gotcha (be sure to uncheck the browser toolbar add-on if you normally avoid such things), installation is a snap. The installer adds GhostScript (an open-source Post-Script interpreter), a Windows printer driver, and a print job manager quickly and painlessly, and it even includes a wellwritten and complete Help file. Like other tools, making the PDF involves “printing” to the PDFCreator printer driver and specifying a filename for the resulting PDF file, and then within a few seconds, the PDF file appears in your default PDF viewer. PDFCreator has a few nice tricks. There are individual settings for controlling the compression rates of different types of graphics, controls for embedding True Type fonts within your PDF files, and different pathways for directly emailing PDF files once they’re created. If you’re trying to add PDF creation to some sort of workflow, you can automatically execute scripts before or after the actual PDF file is created. There’s even an option to create a network print driver, letting all the computers in a LAN create PDFs files without installing the program on multiple PCs. PDFCreator is one of those projects that’s been improving for years yet still refuses to breach the magic “1.0 Barrier,” so we encountered what is basically a finished and polished product, free from the bugs normally associated with beta software.
Publisher and URL: Philip Chinery and Frank Heindörfer, sourceforge.net/projects/pdfcreator
ETA: Q4 2009
Why You Should Care: There’s no better free PDF creator for Windows with this many options.
Source of Information : CPU Magazine 07 2009
Publisher and URL: Philip Chinery and Frank Heindörfer, sourceforge.net/projects/pdfcreator
ETA: Q4 2009
Why You Should Care: There’s no better free PDF creator for Windows with this many options.
Source of Information : CPU Magazine 07 2009
Network Assistant 4.5 Beta 1
If you work in a small network spread across a small or medium-sized office, perhaps you’ve wished for some way to easily communicate with the group that’s faster than email but isn’t public like IM programs. The old WinPopup method of broadcasting short messages to everyone in the LAN is still an option, but a better one is Network Assistant, which has more features than a Swiss-army knife and is easy to use and configure. Network Assistant doesn’t require a centralized server to coordinate things: It just multicasts over IP or with UDP packets over your LAN, finding other instances of NA automatically. By default, NA users are identified by their Windows username, but custom names are available, too. Users on the LAN appear in a list, and by rightclicking a user, you can send a pop-up message, initiate a private chat, send a file, or even send a “beep” over his speaker. Other communications options include an IRC-style group chat (complete with several channels), a shared whiteboard, and a more permanent message board. There are some handy administration tools, too. Users can be divided into groups, making it easy to handle offices with dozens (or hundreds) of users. Operators can share screenshots of their desktops and make their Windows task-list visible, allowing for a basic kind of remote support option for an IS department. Certain features can be locked out with an administrator password, thereby forcing users to utilize certain options. The pricing for Network Assistant boils down to $30 a seat, and you can only buy licenses in groups of two or more. (There are discounts for bulk licenses.) If you’re just looking for a cute way to chat with your wife in another part of the house, this is probably a tad expensive, but this is actually a good price for small-office, groupware-type software. The 30-day trial should be enough time to figure out if the expense is worth it.
Network Assistant 4.5
Publisher and URL: Gracebyte Software, www.gracebyte.com
ETA: Q3 2009
Why You Should Care: Add big-network communications to any small LAN with ease.
Source of Information : CPU Magazine 07 2009
Network Assistant 4.5
Publisher and URL: Gracebyte Software, www.gracebyte.com
ETA: Q3 2009
Why You Should Care: Add big-network communications to any small LAN with ease.
Source of Information : CPU Magazine 07 2009
Adobe Online Tools for Documents and Presentations
ADOBE'S ACROBAT.COM has free content-creation tools that can help in a pinch or even be a regular part of your workday. Most of the Webbased applications are collaborative, and Adobe will even host your files, so both the app and the documents can be accessed on any Pc. It's great if you bounce between machines and don't carry a USB drive. Adobe Buzzword is a word processor, and Adobe ConnectNow handles online meetings. Just released is a presentation tool, called simply Presentations. Most of the tools require Flash 9; Presentations needs Flash 10. Set up a free account, log in, and work away. With Buzzword, you can adjust fonts, formatting, and other text basics, as well as insert images. It's also great for collaboration. As with Google Docs, you invite contacts to view or edit a file, and you can make changes at the same time. A commenting tool lets you 3dd notations.
Buzzword imports and exports Word, Open Doc, t ext, and RTF files; it also exports as PDF, HTML, or .epub (Adobe'S e-reader format). In Connct:tNow online meetings, up to three people can share desktops and documents using the live screen casting tool. Its VolP option handles spoken conversations-a chat window works for typing-and 3 collaborative whiteboard allows everyone to focus on the same thing. A presentation is hosted at labs.acrobat.com because it has additional critical features coming. For example, it can't yet export PowerPoint files-a deal-breaker for many small businesses. But Adobe is working on adding that option, which may come by the end of this year.
Overall, Presentations follows the familiar slide-creation paradigm of PowerPoint. Unlike in that Office app, you can invite an unlimited number of people to view or edit the files, making Presentations 3 hub for both collaboration and showing slides.
Buzzword imports and exports Word, Open Doc, t ext, and RTF files; it also exports as PDF, HTML, or .epub (Adobe'S e-reader format). In Connct:tNow online meetings, up to three people can share desktops and documents using the live screen casting tool. Its VolP option handles spoken conversations-a chat window works for typing-and 3 collaborative whiteboard allows everyone to focus on the same thing. A presentation is hosted at labs.acrobat.com because it has additional critical features coming. For example, it can't yet export PowerPoint files-a deal-breaker for many small businesses. But Adobe is working on adding that option, which may come by the end of this year.
Overall, Presentations follows the familiar slide-creation paradigm of PowerPoint. Unlike in that Office app, you can invite an unlimited number of people to view or edit the files, making Presentations 3 hub for both collaboration and showing slides.
Subscribe to:
Posts (Atom)
Cloud storage is for blocks too, not just files
One of the misconceptions about cloud storage is that it is only useful for storing files. This assumption comes from the popularity of file...
-
Many of the virus, adware, security, and crash problems with Windows occu when someone installs a driver of dubious origin. The driver suppo...
-
The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. T...
-
Boot chart (www.bootchart.org), by Ziga Mahkovec, is an impressive and useful utility that monitors the boot process, creating data files th...