Merci Beaucoup...
Best answer by RetiredTripleHelix
View originalBest answer by RetiredTripleHelix
View originalThat is a matter of personal preference. Some of us use Webroot exclusively, while others use a layered approach with other anti-malware software. Webroot is designed to be compatible with any of the other available software, so if you have any compatibility problems you can submit a Trouble Ticket (Link Below) to help resolve the problem.@ wrote:
Prior to being a Webroot User, I had a standard antivirus software on my PC and as a "On Demand Scanner" I used a Trojan Scanner for years. With that said: Webroot has excellent malware removal tools............Does that mean Trojan Scanners are not needed?? Or in the true sense outdated?? Since Webroot of course uses the cloud everything is protected instantly when there is a issue. Appreciate your input on this.;)
The only reason I say don't use other tools as Webroot Guarantees there malware cleaning but if you use other tools in which I have also but only On-Demand then Webroot can't Guarantee as the other AM could remove things that were unnecessary or some of them could even Brick your system by accident. Also the Webroot scan log will show the exact Trojan that needs to be removed in this case and all it could take is a detection of the infection in the Cloud then WSA would remove itself and rollback to preinfection state.@ wrote:
Prior to being a Webroot User, I had a standard antivirus software on my PC and as a "On Demand Scanner" I used a Trojan Scanner for years. With that said: Webroot has excellent malware removal tools.............Does that mean Trojan Scanners are not needed?? Or in the true sense outdated?? Since Webroot of course uses the cloud everything is protected instantly when there is a issue. Appreciate your input on this.;)
I think the OP got a little over the top with saying destroyed IMO. Have a look at this Video. ;)@ wrote:
Hi
I'm a bit scared to hear that my PCs can be destroyed by a trojan despite using WSA-C ! :@
Is-it really necessary to use another AV ?
As I always do! 😉 First thing is never panic and seek help Here or the Support System the Threat Research Staff is Excellent and if need be they can connect to your system and clean it themselves. You are on the most Innovative Security Solution on the market and you are very well protected that I can say without a doubt.@ wrote:
Yes a nice video:D
Now I can sleep on my two ears;)
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.