Quote (zell1luk @ 29 Apr 2019 18:12)
Or that a full Malwarebytes scan has detected.
Avoiding AVs is a joke. They are about as smart as iRobot without the 'emotional chip' installed. Please disregard mumbo-jumbo about system level driver root kit. I'm sure it wouldn't even scoff at GRUB2.
Quote (zell1luk @ 29 Apr 2019 18:12)
Or that windows has detected (on my gaming desktop).
Windows is a general purpose operating system (proprietary, however). 'It' doesn't detect anything. If you're referring to the hilarious joke of 'Windows Defender' written in Visual Basic? Yeah... No.
Quote (zell1luk @ 29 Apr 2019 18:12)
Or that has slowed down performance.
4GHz single core, 4GHz duo-core, 4GHz quad-core, 4GHz octo-core, 4GHz 16-core+ CPU chips with 4GB, 8GB, 16GB, 32GB, 128GB+ systems (server level at the latter). What were you expecting from a 'bad program?' To be exposed on accident?
Quote (zell1luk @ 29 Apr 2019 18:12)
Or that has created any unusual processes in my system.
This isn't the '90s. MS-DOS and Windows 3.1.1 (Windows with networking) has come to a halt. Remote injecting executable code into already spawned processes (even multi-threaded) and creating code-caves was an old task. It leaves behind nearly no evidence, unless you're actively searching for it. Want a generic process? svchost (service host) fits the bill. Connecting to the internet? svchost processes will spawn. SSDP is enabled? Count another bean. Link-layer enabled? Another svchost. Installing a program? Another svchost. Windows Update (automatic)? Tag another. Oh, boy! The options. The memory footprint is also practically zero (especially if you're basing it on code-caves, in which case: 0% increase and CPU increase is 0.001%).
Quote (zell1luk @ 29 Apr 2019 18:12)
This isn't the 90's, random viruses don't just randomly download themselves to your computer.
Ironically: Yes. They do. Probably more frequently than you are aware of. Java's major security exploits have been handled. Google Chrome and other more commonly used browsers adapted to using 'Sandboxie' type ideas to help handle the security issues with providing direct access to the local machine's hardware (EG: "drive-by-download"). AJAX, Javascript, Java, VBS, Python and dozens of others (ActiveX anyone? Although I believe that's an IE only issue now) provide plenty of attack vectors (in the year of our lord: 2019).
Quote (zell1luk @ 29 Apr 2019 18:12)
and I know where everything I download comes from sooo... Pretty safe to say just don't be an idiot and you're fine.
I wonder if that's what the persons using the PlayStation Network said! Oh, wait. The US Government as well? I'm pretty sure that "top secret classified" doesn't mean "open to Wikileaks hacker." I wonder how he gained access repeatedly (without a 'mole' inside). Hm.
Overall, however: I agree.
Anti-virus scanners always have been and always will be
useless for the average user.
In regards to your '90s comment: I couldn't help but laugh at you. You should've said: 'This isn't the '80s.' You should really do some homework on technology (in the obvious case that you were alive during the birth of them).