My Security 2015 | Summary and Q&A

9.7K views
July 5, 2015
by
The PC Security Channel
YouTube video player
My Security 2015

TL;DR

The content provides insight into the security configuration used by the author on their PC, consisting of two programs: Emsisoft Anti-Malware and Comodo Firewall.

Install to Summarize YouTube Videos and Get Transcripts

Key Insights

  • 🤝 The author relies on their own knowledge and experience in dealing with cybersecurity threats, considering their "brain.exe" as their primary protection.
  • 🚒 Emsisoft Anti-Malware is chosen for file verification and malware detection due to its behavior blocker and dual scanning engines.
  • 🏃 Comodo Firewall is primarily utilized for running files and analyzing malware behavior, but its sandbox feature can be problematic if not configured properly.
  • 👤 The author emphasizes that their security configuration is specific to their needs and should not be blindly followed by other users.
  • 🎮 Windows 10's multiple desktop feature is mentioned as a potential solution to the inconvenience caused by a persistent window during the video.
  • 👤 The author acknowledges that their configuration may not be suitable for all users and urges individuals to choose security programs based on their own needs and requirements.
  • ⌛ The author mentions the ongoing formatting of their external hard drive, highlighting the time-consuming nature of the process.

Transcript

hello and welcome to the PC Security Channel this is going to be a really short video where I just show you guys my own security configuration that I use on my host machine for my own protection I'm going to do this once again because I've been receiving some requests and there have been changes so basically I just use two programs not much of fanc... Read More

Questions & Answers

Q: What are the two security programs used by the author?

The author uses Emsisoft Anti-Malware and Comodo Firewall for their PC security configuration.

Q: Why does the author primarily use Emsisoft Anti-Malware?

The author finds Emsisoft Anti-Malware effective for file verification, malware detection, and utilizing its behavior blocker for analyzing malware behavior.

Q: How does the author use Comodo Firewall in their security configuration?

The author uses Comodo Firewall primarily for running potentially unsafe files, analyzing malware behavior, and making use of its sandbox feature for testing purposes.

Q: What settings and configurations does the author provide for Emsisoft Anti-Malware and Comodo Firewall?

The author provides detailed settings and configurations for both programs, including preferences for notifications, privacy settings, and firewall rules.

Summary & Key Takeaways

  • The author uses Emsisoft Anti-Malware primarily for file verification and malware detection, with its behavior blocker and dual scanning engines being key features.

  • Comodo Firewall is used for running files that are potentially unsafe, analyzing malware behavior, and utilizing its sandbox feature for testing purposes.

  • The author provides detailed settings and configurations for both programs, including preferences for notifications, privacy settings, and firewall rules.

Share This Summary 📚

Summarize YouTube Videos and Get Video Transcripts with 1-Click

Download browser extensions on:

Explore More Summaries from The PC Security Channel 📚

Summarize YouTube Videos and Get Video Transcripts with 1-Click

Download browser extensions on: