Page 1 of 2 12 LastLast
Results 1 to 10 of 13

Thread: Review : GData Internet Security 2010

  1. #1
    Join Date
    Mar 2010
    Posts
    2,442

    Lightbulb Review : GData Internet Security 2010

    Part-1

    Hello All,

    Let me begin by start the first review thread.

    Once I have completed my review, i'll remove the Reviewing from the title.


    -----------------------------------------------------------------------------
    Part-2

    As there is no template for the review, I'm going to have the following points covered for my reviews. Anybody is free to use the same for uniformity. Avi if u like the template, set it as a standard for reviews.

    1. Description
    2. Image(s)
    3. Link to developer page/site/blog [within CODES]
    4. Availability of trial [post link]
    [within CODES]
    5. System Requirements
    6. Features
    7. Benefits
    8. Version Tested/Reviewed
    9. Self review - includes Pros, Cons, difference from other products, ....
    10. Self image(s)
    11. PC configuration where tested/used - OS, RAM, CPU, HDD
    12. Any other security related products currently installed
    13. Other similar products used recently
    14. TIPS

    --------------------------------------------------------------------------------
    Part-3

    Disclaimer: All review posted by me are my own work. They are not copied from anywhere. I'm free to post this elsewhere. Admin (Avi) is having privilege to use it on his blog, without any permission; but with credit. I will not post any kind of rating, etc. It is entirely based on experience - which I'm sharing.

    --------------------------------------------------------------------------------
    Last edited by Grr; 24-04-10 at 10:08 AM. Reason: Breaking post into 2, as it exceeded 10000 characters

  2. #2
    Join Date
    Feb 2010
    Location
    New Delhi
    Posts
    2,042
    We will wait for your review mate.

  3. #3
    Join Date
    Mar 2010
    Posts
    2,442

    Thumbs up

    Part-4

    Review

    1. Description

    G Data InternetSecurity is completely undetectable. Self-learning fingerprinting and whitelisting accelerate the test-winning protection so that PC performance remains completely unaffected.


    2. Image(s)

    http://www.gdata-software.com/upload...ail_RGB_01.jpg


    3. Link to developer page/site/blog

    Code:
    http://www.gdata-software.com/online-shop/anti-virus-produkte/shop/46-private-users/964-g-data-internetsecurity-2010.html



    4. Availability of trial

    Yes. 273Mb

    Code:
    http://www.gdata-software.com/typo3conf/ext/dam_frontend/pushfile.php?docID=5441




    5. System Requirements

    OS:
    Windows 7 (32/64Bit)
    Windows XP at least SP 2 (32/64Bit)
    Windows Vista (32/64Bit

    RAM:
    512 MB



    6. Features

    Includes:

    • AntiVirus
    • AntiSpyware
    • AntiPhising
    • AntiRookit
    • Child-Protection



    7. Benefits

    Simple user guidance - ideal for beginners:


    • With new “one click” user interfaces - everything at a glance
    • Automatically carries out all protection functions undetected in the background
    • Silent firewall without annoying querying



    8. Version Tested/Reviewed

    http://img442.imageshack.us/img442/5728/34938786.jpg



    9. Self review - includes Pros, Cons, difference from other products

    Brief

    I was using F-Secure while I got a license of Gdata from a promo. So today I thought to give it a try. So give me the opportunity to take you through a potential review of Gdata Internet Security 2010.



    Pros

    1. Has dual Engine. So better protection. Similar of having 2 different security software's
    2. Updates are very quick and small in size
    3. Updates can be done only by entering valid license and registering. So pirated keys cannot be used.
    4. 1 click maintenance to fix the problems like, updates, scan, virus monitor, Internet protection


    http://img94.imageshack.us/img94/1968/64591311.jpg


    5. Contains 5 products in one package: Antivirus, AntiSpyware, AntiPhishing, AntiRootkit, Parental Control

    6. 1 click and see the Statistics from the Tray Icon See below



    http://img693.imageshack.us/img693/7695/89378024.jpg



    7. Easy to disable monitor, firewall & autopilot from the tray icon



    http://img535.imageshack.us/img535/539/87569323.jpg



    8. Easy to update from the Tray Icon


    http://img688.imageshack.us/img688/8710/50047338.jpg


    9. Ability to automatically pause the virus check in case of High System load



    http://img541.imageshack.us/img541/6489/21782879.jpg



    10. Ability to select either of Engine A or Engine B; or Both.

    http://img101.imageshack.us/img101/579/20429404.jpg



    11. Ability to schedule Virus checks. Does not requires user intervention.



    http://img651.imageshack.us/img651/2108/75555463.jpg


    12. Ability to create a Bootable CD to automatically check the system for virus/infections, in case the system could not be started using the installed OS.



    http://img686.imageshack.us/img686/4544/49849978.jpg


    13. The logs from the Firewall provide complete details as to what was going on. It includes information like: Network used, Protocol Used, Direction of use, Host Name, port and many others. See an example below:


    http://img709.imageshack.us/img709/1859/62285604.jpg



    14. On uninstalling it leaves less clutter than other similar products. However it does not deletes the extracted set-up file of 273Mb size.

    15. On uninstalling it completely removed your registration information. This is something other products won't do.


    16. Parental control can be set-up for each existing user. Also new users could be added. this not just limited to content usage, but also Internet & Computer usage. See below:


    http://img532.imageshack.us/img532/3799/80029279.jpg


    17. It also adds an add-on to the browsers for checking the Web-content. Similar to Mcafee Site advisor and WOT. See below:


    Code:
     http://img402.imageshack.us/img402/170/70749277.jpg
    Code:
    http://img717.imageshack.us/img717/2640/70562151.jpg



    18.
    It also has another useful tool by the name "G Data Shredder". This tool helps deleting the files completely, so that they cannot be recovered back.

    19. To reduce the scan time you could select the file types you would like to scan. See below:

    Code:
    http://img406.imageshack.us/img406/3161/77948205.jpg



    Last edited by Grr; 24-04-10 at 10:02 AM. Reason: added new points

  4. #4
    Join Date
    Feb 2010
    Location
    New Delhi
    Posts
    2,042
    Quote Originally Posted by Grr View Post
    Part-3

    Disclaimer: All review posted by me are my own work. They are not copied from anywhere. I'm free to post this elsewhere. Admin (Avi) is having privilege to use it on his blog, without any permission; but with credit. I will not post any kind of rating, etc. It is entirely based on experience - which I'm sharing.

    --------------------------------------------------------------------------------
    First of all, Thanks for putting that template and your review.

    It seems we have issues with Part 3. The reason, Google hates duplicate content. You can quote it anywhere else but using full post somewhere else may have issues from Google point of view.

    As I have not made any rules before you posted this, so I will make a exception to this post.

    In any case the review remains yours and not mine. But anything that is posted here should not be copied anywhere but only can be referenced or quoted with you as author .

    I claim no credit for your review but due to rules made by various web giants like google and other search engines, it will be difficult for me to allow part 3 in full.

    This rule is common all over the web whether its a forum or a blog. So even if you want to use it somewhere else, most probably they wont allow you but thats only my view.
    Last edited by Avinash; 22-04-10 at 11:29 AM.

  5. #5
    Join Date
    Mar 2010
    Posts
    2,442

    Thumbs up

    Cons

    1. Rootkit Scanning takes a lot of time. I just canceled it.


    As the scan was still going on for more than 2.5 hours without showing any progress, I canceled it.


    2. Once the scan is canceled, it still keeps on going. See proofs below


    http://img130.imageshack.us/img130/1669/16522291.jpg

    http://img697.imageshack.us/img697/3305/89494028.jpg



    3. Is a resource hog. Adds many processes
    4. Installation takes a lot of time and hangs the system completely. See proof below:


    http://img696.imageshack.us/img696/5299/80571454.jpg



    5. Scanning a single file of 273mb (setup) eats 60-63% CPU. See proofs below


    http://img338.imageshack.us/img338/8540/38701769.jpg

    http://img714.imageshack.us/img714/8513/40393751.jpg



    6. In the scan GUI against the Start time: it shows the date. The field should have been named as Start Date. See Below:


    http://img693.imageshack.us/img693/5017/53718959.jpg



    7. By default the Firewall setting is set to Normal--which allows everything.


    8. During or After installation there is no wizard which allows/assists the user to set different settings. All the settings are set by default. Lack of wizard makes it difficult to go into each product and change the setting.

    9. While scanning a single file of 273mb (setup), it keeps on going--without showing any progress .

    As the scan was still going on for more than 2.5 hours without showing any progress, I canceled it.

    EDIT: I uninstalled and then reinstalled it back. Now the scan for the same file ended in less than a minute. I was perplexed to see this ambiguity.


    10. The help file gets closed, if the main interface is closed. It should have 2 independent thread for both of them. It is a bug.


    11. While checking the Firewall logs, GData process GDFwSvc.exe eats almost more than 70% of the CPU. Proof below:


    http://img697.imageshack.us/img697/8246/46047374.jpg




    10. Self image(s)

    http://img191.imageshack.us/img191/8047/13187593.jpg



    11. PC configuration where tested/used - OS, RAM, CPU, HDD

    OS:
    Win-XP with SP-2; 32 bit

    RAM:
    1 Gb

    CPU:
    Centrino Duo, 2 Ghz

    HDD:
    60 Gb



    12. Any other security related products currently installed

    Yes.

    Malwarebytes' Anti-Malware Pro V1.45.



    13. Other similar products used recently


    F-Secure Internet Security 2010
    Kaspersky
    Internet Security 2010
    Avast Antivirus Professional
    Bitdefender
    Internet Security 2010


    14. TIPS

    1. DO NOT use the firewall. Just disable it. Reason firewall eats up to 50% CPU and slows down your system to an extent that you would uninstall GData.
    2. Do not use this product for scanning .exe file. It goes into infinite, never ending scan mode.
    3. Even though it has 2 Engines (A & B), still it is comparatively low on system resources. Assuming that you DO NOT use Firewall.
    4. Set the configurations after the set-up is done. DO NOT trust and go by the default settings.
    5. Have good amount of disk space (at least 3gb free) before installing.
    6. Peak Memory usage is 27,936 K.

    7. DO NOT trust the Remaining time, as it changes frequently
    8. The time elapsed also is ambiguous. WHY? Because --I did a full scan of my computer. While when I selected "pause scan on load", it didn't counted that time. Though the FULL Scan lasted for approximately 6 hours, it showed the scan time as only some 3 hrs and 15 minutes.




    I hope you liked the review. Please feel free to post your comments and/or suggestions. It would be nice to hear from you.
    Last edited by Grr; 24-04-10 at 04:16 AM. Reason: added new cons, updated other points

  6. #6
    Join Date
    Feb 2010
    Location
    New Delhi
    Posts
    2,042
    Thanks a lot Grr for this extensive review. It looks great and you have almost covered everything. Everyone else can be benifiteed from this if they want to use it for their system.

  7. #7
    Join Date
    Mar 2010
    Posts
    2,442
    Quote Originally Posted by Avinash View Post
    Thanks a lot Grr for this extensive review. It looks great and you have almost covered everything. Everyone else can be benifiteed from this if they want to use it for their system.

    Thanks Avi...Please remove the Reviewing from the title. My review is completed.

  8. #8
    Join Date
    Feb 2010
    Location
    New Delhi
    Posts
    2,042
    Quote Originally Posted by Grr View Post
    Thanks Avi...Please remove the Reviewing from the title. My review is completed.
    Thanks mate. Its done

  9. #9
    Join Date
    Jan 2010
    Location
    United States
    Posts
    1,790
    That was quite a review grr and you did an excellant job on presenting it. I was curious abot using GDATA after recieving a few license keys from the promotion myself but don't think I am interested in it now. Do you know if you can add keys together to get more license time?

  10. #10
    Join Date
    Mar 2010
    Posts
    2,442
    Quote Originally Posted by mrm52858 View Post
    That was quite a review grr and you did an excellant job on presenting it. I was curious abot using GDATA after recieving a few license keys from the promotion myself but don't think I am interested in it now. Do you know if you can add keys together to get more license time?

    Thanks a lot Mike for commenting and Appreciating my effort.

    Abt the keys..no there is no way to add/stack the keys. Once the current key is expired, it will pop-up during update to enter another one.

Page 1 of 2 12 LastLast

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •