Results 1 to 10 of 19

Thread: Malwarebytes Anti Malware Feedback

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Join Date
    Dec 2009
    Location
    Hyderabad, India
    Posts
    411

    Talking

    Quote Originally Posted by Avinash View Post
    I have sent the licenses to winners of MBAM.

    PS: - As i have stated at blog too, those who do not provide feedback will be disqualified from all upcoming giveaways.
    I see it as a very daring step Avinash. Not many people dare to do that. But your decision to make feedback must has a deep sense. Through feedback only the softwares vendors can improve their softwares.

    Most of the giveaways on internet look like it is for promoting purpose and as usual, you've made giveaways at AvinashTech totally different than others. I hope both AvinashTech and software vendors benefit from giveaways.

  2. #2

    About MBAM Pro

    MBAM pro is the best I have heard,the download+install+registeration+update all went easily for me.I scanned my system I found some trojans which I cleaned immediately.I agree MBAM Pro is something you should definitely have on every system if you want allevated and improved security.The Real-time protection in pro version is what that makes MBAM special.It would be great if future versions provide zero-day protection and protection to vulnerable applications like IE,Adobe and other Microsoft products.

  3. #3
    Join Date
    Mar 2010
    Posts
    164

    My MBAM PRO FEEDBACK

    Sorry Aviansh for not posting my feedback here on forum sooner.
    Overall this what I can say about MBAM PRO it's a great tool for finding malwares not detected by regular Anti-viruses like ESET and others.MBAM is very light and doesn't slow processes at all.But I what don't get is why MBAM doesn't detect Autorun.inf in my pen-drive,as it really hard to clean or delete this malcious folder out of my pen drive.Also I feel MBAM should be able to find all hidden files too,I also would like to know if MBAM Pro can detect keyloggers which are very commonly used by hackers.

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •