First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Symantec Norton Internet Security 2010 beta
The beta of Symantec's Norton Internet Security 2010 is more notable for what's under the hood than what you actually see
The just-beta of Symantec's Norton Internet Security 2010 is more notable for what's under the hood than what you actually see.
- Less bloated than earlier versions
- Installation bugginess, uninstalls whatever security program is already running
So should you download this beta version of Norton Internet Security 2010? Given its installation bugginess — and the fact that it appears that the subscription may last only 14 days — the answer is most likely no. And since it uninstalls whatever security program is already running, you certainly won't want to put it on your primary computer. The software is set to be final sometime in the autumn; you'd do well to wait until then.
However, if you're planning to try out Symantec Norton Internet Security 2010, you'd better not do it on your main PC - this is not only a beta release, but a temporary one as well. Currently, the installed beta says that it is good for only 14 days.
The NIS 2010 beta is available for free from www.norton.com/nis2010beta, Norton AntiVirus 2010 beta: www.norton.com/nav2010beta. (Only those people who consider themselves sufficiently technically savvy to deal with software glitches and flaws should test beta software, particularly security software.)
Norton Internet Security 2010: From signatures to reputation
Symantec's comprehensive Norton Internet Security 2010 suite offers protection against viruses, Trojans, rootkits, spyware and malware of all kinds, as did the previous versions. Like those versions, it includes a firewall, intrusion protection, email protection and web protection; for example, it integrates with your browser and search engine to warn you away from visiting sites that might be malicious.
Symantec says that Symantec Norton Internet Security 2010 marks a major shift away from signature-based detection to what it calls "reputation-based security technologies", which it claims offer more complete and up-to-date protection.
According to Symantec, traditional signature-based solutions simply can't keep up with the massive amounts of new malware released every year. The company says that Symantec researchers see more than 200 million attacks on PCs every month, many of them threats not seen before that may slip by signature-based security software. Because of that, the company claims, signature-based solutions by themselves can no longer adequately protect PCs.
Its new reputation-based security strategy relies heavily on Symantec's global product reach, in which millions of people who use Norton products and opt in to the Norton Community send information anonymously about the applications running on their system. Using this data, Symantec calculates a "reputation score" for applications, and uses that reputation score, in addition to traditional malware signatures, as the engine to keep PCs safe in Norton Internet Security Suite 2010.
Norton Internet Security 2010 isn't the first time a reputation-based technology has been used by anti-malware vendors. Cloudmark Desktop, for example, has been using it for years to protect against spam. But Cloudmark is a far smaller company than Symantec, with a smaller user base, and not as comprehensive a security suite. In addition, protecting against spam is far simpler than protecting against the myriad constantly evolving threats on the web.
These days it takes a large-scale lab to judge whether reputation-based security is superior to signature-based security, so the final answer will have to wait until the fall of 2009 when Symantec Norton Internet Security 2010 is expected to be released in final form. At that point, various labs will weigh in with their results.
Latest News Articles
- Dick Smith awards SIM-enabled tablet purchases with $30 Globalgig credit
- Twitter, Deutsche Telekom team on Android
- China bans banks from trading in Bitcoin
- Studio Proper PA1 Bluetooth speaker
- Two arrested in Germany for hacking computers they used to generate bitcoins
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Mobile PhonesView all »
- NotebooksView all »
- TabletsView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »