I don't use antivirus

>i don't use antivirus

Attached: A0AD72EE-E80C-4934-97D1-FA1FF726E890.jpg (764x1046, 122K)

Other urls found in this thread:

exploit-db.com/exploits/43414/
fortinet.com/blog/threat-research/satori-adds-known-exploit-chain-to-slave-wireless-ip-cameras.html
threatpost.com/satori-author-linked-to-new-mirai-variant-masuta/129640/
twitter.com/SFWRedditGifs

based mall ninja

you can't get a virus with free software

>disables smartscreen, windows defender and avast to install pirated game
>gets virus

>"Why is windows so shit?"

Enjoy your Typhoid Mary system.

well no shit, the free software is the virus

>leave my computer few moment
>come back at a warning window of my antivirus
>he found something suspect
>some shady js in my browser's cache
Thanks, antivirus-sama

Attached: 1526733562803.jpg (466x700, 48K)

>port scans your IP and exploits your router

>uses Bitdefender or Kaspersky
>based Slavs don’t give a fuck if your pirate and throw no false positives

common sense is all it takes, boomer

What is that gonna do against an exploit on an obscure port?

>common sense
not enough to protect you against the current state of the internet if you're on wangblows

I'm a nobody these things don't happen

I'm on gnu/linux. When viruses are more common on for it I'll be the first one to be affected by them!

Attached: vlad.jpg (1024x768, 62K)

Infected devices scan random IPs user.

>using winblows

literally means absolutely nothing unless you go to whatever website had it again, in which case it'll redownload anyway

Malware authors have taken a huge interest in Linux devices(routers/CCTV/DVR/desktops etc). You can blame IOT.

omg I literally cannot with you

that's not really true
having open software is supposed to encourage people to audit it themselves to prove that there's no spyware, malware, etc.

Free as in libre

it also puts the security holes on display for the whole world to see

>Bitdefender
forced subscriptions advertised as pre-paid sale, no thanks.

And it publicly shames and destroys trust in the developer so it won't happen on any serious project

>uses AVG or Norton
OHNONONO

I have McAfee for protection

I run my own custom antivirus

It's pretty much invincible

Attached: 1523036769916.jpg (564x564, 26K)

>and a never had any virus

I actually work in security and I don't use an AV. They are basically a meme. Statistically, people who work in security are more likely to not use an AV.

Attached: 1539707872794.jpg (260x194, 5K)

Canyon get an STD without a condom

I paid 86c for a bitdefender key off G2A so

The best way to protect yourself from viruses and malware is to install Gentoo GNU/Linux-libre

>this thread
the current state of Jow Forums is depressing.

>having your router exposed over WAN
I really think you have no idea what you're talking about.

another retarded larper. What the fuck is even "an obscure port" supposed to mean, retard?
If someone is dumb enough to waste an 0day exploit to hack your computer and steal your furry porn they're not gonna be dumb enough to use malware that is already detected by endpoint solutions.

Attached: 1771C442-A8A2-497E-8A0F-4A08778748BC.jpg (600x450, 49K)

Slash up those Ethernet cables before some hacker hacks your computer

>an obscure port
He's gonna hack my minecraft server.

probs some 12 year old newfag

>using malware on malware

I don't need it. using exclusively open source software for ten years now, and never had a virus/worm/rootkit. an antivirus is for retards, who use winshit, especially when they use an older version or turn down updates, or install cracked software.

OP gets virus for "cracking" Gentoo GNU/Linux-libre

who uses AV, I havent used that shit like 8 years without any problems.
Also there is defender.

Truth be told many antivirus these days are turning into spyware

Only because the definition of spyware has expanded to "anything that connects to the internet that isn't a web browser or MMORPG"

mall security and computer security aren't the same things, man

antivirus software doesn't need "registry cleaners", "game boosters" and other shit. Besides it is proprietary software meaning that no one knows what the software actually does.

>install cheatengine
>cheatengine installer installs avast antirvirus
>avast deletes cheatengine installer

Attached: bw7il5agctj11.jpg (294x385, 28K)

>it is proprietary software meaning that no one knows what the software actually does

Obviously it steals your social security number and sells it to the DNC so they can register illegals to vote in our elections.

Vlad probably is already in the process to switch to BSD in particular OpenBSD with their RuBSD conventions

>same

You call that a knife?

Attached: 114274717336.jpg (384x404, 20K)

>What the fuck is even "an obscure port" supposed to mean, retard?
Nobody expects an RCE attack on port 52789
>having your router exposed over WAN
It's almost like malware like Mirai don't exists...
exploit-db.com/exploits/43414/
fortinet.com/blog/threat-research/satori-adds-known-exploit-chain-to-slave-wireless-ip-cameras.html
threatpost.com/satori-author-linked-to-new-mirai-variant-masuta/129640/
>If someone is dumb enough to waste an 0day exploit
0 day exploits don't just target desktops
>to hack your computer and steal your furry porn they're not gonna be dumb enough to use malware that is already detected by endpoint solutions.
Except malware is predominantly used for ddos in 2018. And is usually built not to cause suspicion besides the needed tcp fingerprint to the c2 server, and propogation scans.
>"We sure showed him, brofist!"
Please do research on malware that isn't from 2007

this Guy knows

>using an (((antivirus))) instead of common sense and just being careful
lmfao, none's after you kiddo

Security by obscurity has never worked.

HURRR COMMEN SENS ALL U NEED HURRRRRR

obscurity is the only security

why use antivirus if you are not running windows ?

Linux malware exists but it's usually IOT

Havent used an antivirus program since 2007.
Antivirus if for foofles who know nothing about computing

>create fresh install
>image your drive
>back up image to external HDD
>run risky crapware in a virtual machine
>install uBlock in all browsers
>NEVER use cracked software on PC, if you do, your sissy ass deserves all the backdoors and trojans this shit world has to offer
>encrypt all external storage drives
>if a nasty AIDS does slip through, back up all data, reformat, install backed up HDD image
>be up and running again within a half hour

That's not a bad coat desu. Too big on him but if he got it adjusted it would look nice.

I'm immune to viruses even without an anti-virus

Attached: screenshot.jpg (1600x900, 83K)

Are you okay user?

>68127714
>this much damage control
lmao
You're wrong and here's why:

>Nobody expects an RCE attack on port 52789
Completely irrelevant and you don't even know what ports are. If you're running a public facing service in ANY port you expect it to be attacked, even if it's available only in LAN.

>It's almost like malware like Mirai don't exists...
Mirai targeted internet of shit devices, and this thread is mostly about desktop workstations and home routers. Desktop workstations, unlike iot devices, receive OS updates. Home routers have no good reason to be exposed to the WAN, although it does happen occasionally due to poor configuration by ISPs (easy to fix).
>0 day exploits don't just target desktops
This thread IS about desktops, retard. If you're a business running internet facing services, you're looking at a whole other threat level.
>Except malware is predominantly used for ddos in 2018. And is usually built not to cause suspicion besides the needed tcp fingerprint to the c2 server, and propogation scans.
Again,if you're dumb enough to run .exe's from piratebay or something, no endpoint security solution will save you. You're just reinforcing my point.

meant to quote

I don't use an active one, but all executables go thru the virus total before being ran the first time in my machine.
Also i avoid flash, adobe PDF, java and run an obscure browser and all the outgoing ports are blocked by the hardware firewall.
It's not perfect and if a zero cool want to pwn me, the zero cool will pwn me, but i avoid teasing zero cools.

You should put a bigger effort in making your OS look like win95.

No :’

I've created many router exploits months before they were patched, because the source was available to audit and flaws were easy to spot.

>you can't get AIDS from free pussy

>being THIS edgy

Attached: 1488558959363.jpg (184x184, 5K)

Reminder that antivirus companies work like the mafia, they sell you """protection""" from their competitors or their own secret services

It's not edgy and takes almost no effort.

>If you're running a public facing service in ANY port you expect it to be attacked, even if it's available only in LAN.
Fair enough.
>Desktop workstations, unlike iot devices, receive OS updates.
IOT devices usually receive firmware updates that include security patches
>Home routers have no good reason to be exposed to the WAN, although it does happen occasionally due to poor configuration by ISPs (easy to fix).
Did you not read ANY of the links I posted, The routers are the devices being exploited. And the average normie doesn't know how to configure a router. That's why there are 100,000+ node botnets that only target routers.
>This thread IS about desktops, retard.
Why do you keep repeating that if OP didn't state it? Are you implying that antivirus only exists for desktops?
>Again,if you're dumb enough to run .exe's from piratebay or something
Again, did you not read any of the links I posted? Modern malware doesn't require a browser or a manual download to propogate, that's what the exploits are used for.

>It's not edgy and takes almost no effort.

Attached: 1395632730259.gif (512x288, 2.94M)

I non ironically do this when I have to use windblows.
Every download goes through virustotal, signatures are checked (if available), hash is checked (if available).
I haven't done anything with hardware firewall though.
Also I personally believe running an obscure browser is more of a risk than running a mainstream, up to date browser inside a sandbox. Specially if you didn't edit your user agent to look like you're using a mainstream browser.