Author Topic: Is Avast Free sufficient protection for Windows XP SP 2 with Updates turned off?  (Read 12178 times)

0 Members and 1 Guest are viewing this topic.

ITNoob65

  • Guest
Hi Guys,

I tried googling and searching several forums but wasn't able to get anything concrete.

If I'm running a Windows XP machine with SP 2 or 3 and automatic updates turned off, is it safe to browse the web? I was reading a post on tom's hardware that said every site you visit can tell which OS you are using. But let's say I'm going to my bank's website. The data is encrypted right (https)?, so how would the operating system matter? Is there some connection between the OS and the browser?

Thanks.

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user
Why have you turned off updates?

Some info may be found here  http://forum.avast.com/index.php?topic=145320.0



Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31079
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Right click "my computer" > properties and it will tell you the service pack installed.

ITNoob65

  • Guest
Thanks, I read that thread. I rather not say why my updates are turned off. Because I haven't been using Windows updates, I don't know if there has been any patches or fixes that make the web browsing experience any safer..and thanks eddy it's SP 2

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31079
  • Watching (over?) you
    • Malware removal, Biljart and other things.
First thing to do is installing SP3 and all (security) updates released after that.
They will patch security holes and make your system more safe.
You also need to turn on the automatic updates.

ITNoob65

  • Guest
ok thanks

Online DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89024
  • No support PMs thanks
Thanks, I read that thread. I rather not say why my updates are turned off. Because I haven't been using Windows updates, I don't know if there has been any patches or fixes that make the web browsing experience any safer..and thanks eddy it's SP 2

Well with SP2 you won't be getting any updates switched on or not, updates for XP were stopped some time ago unless you had SP3 installed. With that support ending in April this year you only have a short time frame to get SP3 and any other security updates after SP3 installed.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD/ avast! free 24.3.6108 (build 24.3.8975.762) UI 1.0.801/ Firefox, uBlock Origin, uMatrix/ MailWasher Pro/ Avast! Mobile Security

ITNoob65

  • Guest
Ok thanks David, I think I will take my chances with SP 2 with automatic updates turned off. I haven't had any issues and I'm hopeful that Avast Free is sufficient protection.

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user

ITNoob65

  • Guest
beautiful, thanks Pondus

ITNoob65

  • Guest
Many of those hotfixes don't apply in my case but there are some security updates that sound scary such as:

"MS08-001: Vulnerability in TCP/IP could allow remote code execution
MS06-057: Vulnerability in Windows Explorer could allow remote code execution
MS06-036: A vulnerability in the DHCP Client Service could allow remote code execution
MS06-020: Vulnerabilities in Macromedia Flash Player from Adobe could allow remote code execution"

I don't know what they mean but wouldn't those things be picked up by Avast if someone was trying to intrude on my network?

Offline schmidthouse

  • VIRUS FREE A Long Time
  • Avast Evangelist
  • Starting Graphoman
  • ***
  • Posts: 7170
  • When you think you know, Think Again
Many of those hotfixes don't apply in my case but there are some security updates that sound scary such as:

"MS08-001: Vulnerability in TCP/IP could allow remote code execution
MS06-057: Vulnerability in Windows Explorer could allow remote code execution
MS06-036: A vulnerability in the DHCP Client Service could allow remote code execution
MS06-020: Vulnerabilities in Macromedia Flash Player from Adobe could allow remote code execution"

I don't know what they mean but wouldn't those things be picked up by Avast if someone was trying to intrude on my network?

The way I understand Security Patches to an OS.
A Security Software Program whether Anti Malware/ Anti Virus/or Firewall does not protect from the vulnerabilities discovered in an Operating System that the Security Patches address.
You are talking Apples and Oranges. While a strong layered Secuity profile including Anti Virus will help this still does not address the OS vulnerabilities. :)

ITNoob65

  • Guest
ok Thanks Schmidt

waking

  • Guest

With that support ending in April this year you only have a short time frame to get SP3 and any other security updates after SP3 installed.

I think that may be inaccurate. MS will not be issuing any *new* patches for XP after April but the *existing* service packs and patches will likely be available for quite some time after that. I haven't seen MS suddenly yank all existing patches and SPs for older software versions as soon as active support ends.


waking

  • Guest

A Security Software Program whether Anti Malware/ Anti Virus/or Firewall does not protect from the vulnerabilities discovered in an Operating System that the Security Patches address.

Well, I think that depends on a number of factors. First off, a newly discovered and newly exploited vulnerability may not get detected when first released to "the wild". So if such a vulnerability can be eliminated proactively by patching the OS *before* an exploit starts circulating then that's ideal.

Once an exploit is identified, most top-tier AV/IS products will detect and block that exploit. So an AV can and will offer some protection against exploits of OS vulnerabilities. See:

2012 Consumer AV/EPP Comparative Analysis - Exploit Protection
https://www.nsslabs.com/reports/2012-consumer-avepp-comparative-analysis-exploit-protection

Additionally, products such as EMET may afford some protection against new exploits of unpatched vulnerabilities by disrupting the typical methods used by exploits to attack most Windows vulnerabilties. It appears that Kaspersky for one also attempts similar interceptions and disruptions of common exploit behavior via Automatic Exploit Prevention.

See:

Automatic Exploit Prevention Technology
www.kaspersky.com/downloads/pdf/kaspersky_lab_whitepaper_automatic_exploit_prevention_eng_final.pdf

www.mrg-effitas.com/wp-content/uploads/2012/06/MRG-Effitas-Exploit-Prevention-Test1.pdf

« Last Edit: February 02, 2014, 09:17:40 AM by waking »