CCTVCam
Known around here
- Sep 25, 2017
- 2,815
- 3,683
On the virus front, some larger companies such as Kaspersky allow you to upload a folder for manual analysis by their techs. This is better still than a web check. One sure way to confirm. That said, apart from Eset-NOD32, I haven't heard of any of the other AV vendors which is a good pointer it's their software to blame and not BI.
It's highly unlikely a respected company such as Ken's would include anything malicious in their software as they have far more to lose reputationally than they have to gain. Pretty much the only way it could happen would be if the download server was hacked and files altered and you would like to think that server security measures would detect an intrusion if not stop it so at least the vendor would be aware of potential compromise and upon finding that, any vendor worth their salt would probably do a check sum comparison before putting the server back online.
As for the IP's, ensure your server is secured and not port forwarding. Personally, I use a lower level commercial level modem and a separate higher level consumer router to secure mine. Each device has it's own firewall, so I have an enterprise firewall on the outside and a high end consumer one on the inside. Add to it secure passwords, PNP turned off, and an active VPN, and it's highly unlikely I'll suffer an intrusion. I tried to run some ASUS Router software earlier and even though I was on my internal network, the router said no and the software warned that it might not function due a vpn being operational. Quite reassuring.
It's highly unlikely a respected company such as Ken's would include anything malicious in their software as they have far more to lose reputationally than they have to gain. Pretty much the only way it could happen would be if the download server was hacked and files altered and you would like to think that server security measures would detect an intrusion if not stop it so at least the vendor would be aware of potential compromise and upon finding that, any vendor worth their salt would probably do a check sum comparison before putting the server back online.
As for the IP's, ensure your server is secured and not port forwarding. Personally, I use a lower level commercial level modem and a separate higher level consumer router to secure mine. Each device has it's own firewall, so I have an enterprise firewall on the outside and a high end consumer one on the inside. Add to it secure passwords, PNP turned off, and an active VPN, and it's highly unlikely I'll suffer an intrusion. I tried to run some ASUS Router software earlier and even though I was on my internal network, the router said no and the software warned that it might not function due a vpn being operational. Quite reassuring.