Well I use Webroot SecureAnywhere 2013 Complete and I Beta tested from the beginning early 2011 as I was a Prevx user and Webroot acquired Prevx in Nov 2010 and WSA is based on Prevx Full Cloud Technology I have not seen a FP in over a year as they keep tweaking the Heuristics and Behavioural Analysis in the Cloud there's nothing lighter 3 to 6MB of RAM 725kb client download with 5 to 6MB on the Disk if you have WSA-Complete as it has a Webroot re-branded lastpast password management toolbar and Back Up & Sync and scans in minutes mine scans in 30 seconds as it only scans where possible threats can hide no need to scan the whole system but you can if wanted it's strength is on execution I would like to invite anyone to give WSA a 2 week trial and it will speak for itself IMHO.
AntiVirus Free Trial - Free Malware Scan | Webroot Here is a video if WSA misses a virus:
What Happens if Webroot "Misses" a Virus? - Webroot Community
Best Regards,
Daniel
View attachment 4339
It's a cool concept, but how well it works remains unseen just by that one video; that C++ code is
very bad, and this is why I don't have full trust in that AV yet without having done further research about WebRoot. That is a high level function call, not a low level keyboard hook for starters. And there may even be a way to bypass that firewall feature as well from disallowing certain information to be sent out. Depending on the methods being used there, one may try to encrypt the data to have it sent, and maybe inject it into an already running process to carry out the action to make it less suspicious; IE or Firefox for instance. The only hope there would be that webroot detects this activity and stops it before it's executed.
Okay, in sum though, viruses are hardly
that simple anymore, they are much more complex. That kind of C++ code may have been used for a REAL keylogger in which was undetected some years ago, but I could write a program to prevent that compiled C++ binary from doing any harm to a person's PC and perhaps many beginner programmers as well to put things into perspective. :grin1:
If this WebRoot allows things to be sent that it deems are okay, over HTTP(S) then their programmers are making the assumption that the keys that were possibly recorded by the protected programs (by configuration), don't reveal the original text. The very first rule in programming for security is that you never make assumptions.
For instance, I wouldn't let a known criminal into my house even if I thought he couldn't do any harm because his gun was taken away or he doesn't have a gun, I would make sure I never let him into my house in the first place. In relation to WebRoot here, allowing this "criminal" into the house, he could still steal stuff, even if our initial worry was solved (not to be harmed), among many other things. And because he doesn't have a gun still doesn't make him dangerous. Thus it's better to stop at the source (the front door to the house in this case), than to assume, and possibly find out the hard way later. By not allowing this criminal into your house, you're automatically protecting yourself against many other bad situations as possibilities. This is the way all good AV's work. :thumbsup2:
To me, the false positives rating given to WebRoot from that report however, tells me that WebRoot has ineffective, or inefficient ways of checking a file for a malicious signature. So although it uses other methods (that may work, I don't know), it's lacking in other areas.
BEFORE, I eliminate the possibility of WebRoot being a good AV though, I may, or would like to test for myself for my own curiosity though to see how effective it is on detection and prevention. So I'm not saying it's a bad AV, but it still has yet to be proven that it is good. This is 100% speculation, but remains to be proven or disproven.