{"video_id":"UKLTGoftJi8","title":"I Ran Every Antivirus At Once","channel":"Linus Tech Tips","show":"Linus Tech Tips","published_at":"2025-05-04T14:53:29Z","duration_s":1143,"segments":[{"start_s":0.16,"end_s":8.96,"text":"Everybody knows that more is better. More RAM means more programs can run at","speaker":null,"is_sponsor":0},{"start_s":5.52,"end_s":11.599,"text":"the same time. More GPU power means more","speaker":null,"is_sponsor":0},{"start_s":8.96,"end_s":16.16,"text":"FPS in your games. And more mother-in-laws means more time spent","speaker":null,"is_sponsor":0},{"start_s":13.92,"end_s":21.359,"text":"with family. There are downsides. Well, mine is great. But in a world where","speaker":null,"is_sponsor":0},{"start_s":18.8,"end_s":26.4,"text":"malware is seemingly more dangerous than ever, it would only be logical to assume","speaker":null,"is_sponsor":0},{"start_s":23.519,"end_s":31.519,"text":"that more antivirus software is going to keep her more safer, right? I mean, why","speaker":null,"is_sponsor":0},{"start_s":29.039,"end_s":36.0,"text":"not? It used to be that running even one antivirus package would significantly","speaker":null,"is_sponsor":0},{"start_s":33.68,"end_s":40.879,"text":"impact your PC's performance. But these days, computers are so much faster that","speaker":null,"is_sponsor":0},{"start_s":38.719,"end_s":46.239,"text":"Windows includes its own AV software that most people probably don't even","speaker":null,"is_sponsor":0},{"start_s":42.64,"end_s":49.6,"text":"notice is running. So, could we run two,","speaker":null,"is_sponsor":0},{"start_s":46.239,"end_s":52.879,"text":"three, or 10 antivirus tools to create","speaker":null,"is_sponsor":0},{"start_s":49.6,"end_s":54.719,"text":"the safest PC on the internet? That's","speaker":null,"is_sponsor":0},{"start_s":52.879,"end_s":59.199,"text":"what we're here to find out with some help from our sponsor, Threat Locker.","speaker":null,"is_sponsor":0},{"start_s":57.12,"end_s":63.039,"text":"Threat Locker is a totally different way to keep your entire business network","speaker":null,"is_sponsor":1},{"start_s":61.359,"end_s":70.88,"text":"safe, but we'll talk more about that later. For now, spoiler alert, more is","speaker":null,"is_sponsor":1},{"start_s":66.4,"end_s":70.88,"text":"not always better. Let's see how that","speaker":null,"is_sponsor":0},{"start_s":77.32,"end_s":84.0,"text":"goes. Let's kick this off with a good old-fashioned boot time test. In front","speaker":null,"is_sponsor":0},{"start_s":82.0,"end_s":90.64,"text":"of me are two virtually identical systems with Core i5 processors, 16 gigs","speaker":null,"is_sponsor":0},{"start_s":86.64,"end_s":93.92,"text":"of DDR5 memory, an RTX 3050GPU, and a","speaker":null,"is_sponsor":0},{"start_s":90.64,"end_s":95.759,"text":"terabyte of fast NVMe storage. Both have","speaker":null,"is_sponsor":0},{"start_s":93.92,"end_s":100.799,"text":"a fresh install of Windows 11, and all the latest drivers. But there's one key","speaker":null,"is_sponsor":0},{"start_s":97.92,"end_s":106.56,"text":"difference. This one relies solely on Microsoft's antivirus. Not that one,","speaker":null,"is_sponsor":0},{"start_s":104.079,"end_s":110.72,"text":"Microsoft Defender. As for the other, well, we just plum had a hard time","speaker":null,"is_sponsor":0},{"start_s":108.96,"end_s":115.04,"text":"choosing between all the options, especially with all of the inbreeding","speaker":null,"is_sponsor":0},{"start_s":112.56,"end_s":123.2,"text":"between AV companies these days. Did you know that Avast, Avera, AVG, and Norton","speaker":null,"is_sponsor":0},{"start_s":119.84,"end_s":125.6,"text":"are all the same company? Gen digital,","speaker":null,"is_sponsor":0},{"start_s":123.2,"end_s":131.599,"text":"look it up. And they don't just share ownership. Norton and AVG actually use","speaker":null,"is_sponsor":0},{"start_s":128.879,"end_s":136.8,"text":"Avast's AV engine these days. And a ver's engine gets used even by third","speaker":null,"is_sponsor":0},{"start_s":133.599,"end_s":138.56,"text":"parties like VMware and F-Secure. Uh,","speaker":null,"is_sponsor":0},{"start_s":136.8,"end_s":145.44,"text":"this one's booted by the way. Couldn't help noting that. This one not so","speaker":null,"is_sponsor":0},{"start_s":142.04,"end_s":148.319,"text":"much. Is it still going? Anyway, the","speaker":null,"is_sponsor":0},{"start_s":145.44,"end_s":152.319,"text":"TLDDR is we got confused. So, we crammed our second system full of as much","speaker":null,"is_sponsor":0},{"start_s":150.08,"end_s":156.2,"text":"antivirus software as she would take and still connect to the internet. What's","speaker":null,"is_sponsor":0},{"start_s":153.84,"end_s":163.2,"text":"the final count? I think 14. 14. My goodness.","speaker":null,"is_sponsor":0},{"start_s":160.239,"end_s":168.08,"text":"And it's booted. Hold on. I have another fun one for you, though. Let's see how","speaker":null,"is_sponsor":0},{"start_s":165.12,"end_s":168.08,"text":"long they take to shut","speaker":null,"is_sponsor":0},{"start_s":168.92,"end_s":175.519,"text":"down. Wow, that one's done","speaker":null,"is_sponsor":0},{"start_s":172.28,"end_s":178.16,"text":"already. Let's read some more lines. Ah,","speaker":null,"is_sponsor":0},{"start_s":175.519,"end_s":184.48,"text":"yes. React to boot time. Oh, I can tell you all the antiviruses we have. Total","speaker":null,"is_sponsor":0},{"start_s":180.8,"end_s":190.159,"text":"AV, Panda, Malware Bites, Quick Heal,","speaker":null,"is_sponsor":0},{"start_s":184.48,"end_s":193.599,"text":"Avast, AVG, Adaware, ESET, Avira, Forct,","speaker":null,"is_sponsor":0},{"start_s":190.159,"end_s":196.12,"text":"Heimdoll, Komodo, Clam, AV, and of","speaker":null,"is_sponsor":0},{"start_s":193.599,"end_s":200.4,"text":"course, good old-fashioned Windows Defender. It is worth noting that a","speaker":null,"is_sponsor":0},{"start_s":198.4,"end_s":204.56,"text":"couple of them do have reduced runtime protection when others are","speaker":null,"is_sponsor":0},{"start_s":202.44,"end_s":207.44,"text":"detected. And I guess I'll talk about our sponsor real quick here because","speaker":null,"is_sponsor":0},{"start_s":205.68,"end_s":211.12,"text":"we're still waiting. Uh, it's worth noting, by the way, our sponsor, Threat","speaker":null,"is_sponsor":1},{"start_s":209.12,"end_s":214.799,"text":"Locker, doesn't really compete with any of the antivirus software that we're","speaker":null,"is_sponsor":1},{"start_s":212.56,"end_s":218.959,"text":"showing off today. Threat Locker stops more than just malware. They even block","speaker":null,"is_sponsor":1},{"start_s":217.2,"end_s":223.04,"text":"unapproved applications on your network with application allow listing. That","speaker":null,"is_sponsor":1},{"start_s":221.2,"end_s":226.879,"text":"means that aside from being protected, your team can't be lured away from that","speaker":null,"is_sponsor":1},{"start_s":224.879,"end_s":231.12,"text":"important report for a quick round of Battro during business hours. Okay,","speaker":null,"is_sponsor":1},{"start_s":229.28,"end_s":234.799,"text":"finally, let's boot them back up and see how these systems feel. Let's start with","speaker":null,"is_sponsor":0},{"start_s":232.879,"end_s":238.319,"text":"our control computer. Yep, that's file explorer. Yep, that's the system tray.","speaker":null,"is_sponsor":0},{"start_s":236.72,"end_s":242.159,"text":"If I wanted to launch Steam, it seems like that'll happen in a perfectly","speaker":null,"is_sponsor":0},{"start_s":240.159,"end_s":246.72,"text":"reasonable amount of time. Now, let's move over here where Oh my goodness, I","speaker":null,"is_sponsor":0},{"start_s":243.84,"end_s":249.04,"text":"already have a popup to dismiss. Okay, file","speaker":null,"is_sponsor":0},{"start_s":251.64,"end_s":256.32,"text":"explorer. This is a modern Core i5. That","speaker":null,"is_sponsor":0},{"start_s":255.12,"end_s":265.639,"text":"was pretty quick for that one, actually. I mean, the system tray was still responsive. How long does it take to","speaker":null,"is_sponsor":0},{"start_s":259.919,"end_s":265.639,"text":"launch Steam, though? Ah. Oh.","speaker":null,"is_sponsor":0},{"start_s":267.96,"end_s":273.56,"text":"Oh. Oh my god. This poor system. Look at","speaker":null,"is_sponsor":0},{"start_s":272.479,"end_s":279.84,"text":"them all. Malware bite 6%. Komodo 4 Vera","speaker":null,"is_sponsor":0},{"start_s":279.96,"end_s":285.24,"text":"4%. Is Steam still launching?","speaker":null,"is_sponsor":0},{"start_s":286.0,"end_s":291.68,"text":"It'll take a while.","speaker":null,"is_sponsor":0},{"start_s":289.0,"end_s":296.16,"text":"Wow. Okay. I knew it was going to be bad. I didn't think it was going to be","speaker":null,"is_sponsor":0},{"start_s":293.6,"end_s":301.36,"text":"like using my Windows 98 machine. I thought it would be uh this is awful,","speaker":null,"is_sponsor":0},{"start_s":298.24,"end_s":303.36,"text":"but it's oh this is awful. And the funny","speaker":null,"is_sponsor":0},{"start_s":301.36,"end_s":307.759,"text":"part is when we're not doing anything, the usage of all these doesn't seem that","speaker":null,"is_sponsor":0},{"start_s":305.44,"end_s":311.28,"text":"bad. It's just that that's the whole thing, right? When they're idling in the","speaker":null,"is_sponsor":0},{"start_s":309.52,"end_s":315.84,"text":"background, they're fine. But it's as soon as you start to do anything that","speaker":null,"is_sponsor":0},{"start_s":313.36,"end_s":322.08,"text":"they're actively continuously monitoring what's going on and making sure that","speaker":null,"is_sponsor":0},{"start_s":317.44,"end_s":322.08,"text":"it's okay and the system resource usage","speaker":null,"is_sponsor":0},{"start_s":322.28,"end_s":327.56,"text":"goes oh my god did you see how long that","speaker":null,"is_sponsor":0},{"start_s":325.52,"end_s":332.56,"text":"took to maximize boy that's crazy. Can Can I see","speaker":null,"is_sponsor":0},{"start_s":330.639,"end_s":336.88,"text":"yours? Yours should be fine. Yeah. Mine works like a computer. This shouldn't","speaker":null,"is_sponsor":0},{"start_s":334.08,"end_s":340.72,"text":"slow the GPU, isn't the Do you see that? That's terrible.","speaker":null,"is_sponsor":0},{"start_s":338.32,"end_s":344.96,"text":"What the That is not the screen capture, guys. No, that's live happening","speaker":null,"is_sponsor":0},{"start_s":343.199,"end_s":350.0,"text":"in person. That's wild. It's It's not even using","speaker":null,"is_sponsor":0},{"start_s":347.199,"end_s":354.72,"text":"that much. No, it's at like 10%. Okay. What's yours? What's yours? One to 2%.","speaker":null,"is_sponsor":0},{"start_s":353.12,"end_s":359.759,"text":"And this is way worse than you think because you might say, \"Oh, what? It's","speaker":null,"is_sponsor":0},{"start_s":357.28,"end_s":364.199,"text":"using 10 times as much resources. That's to be expected.\" But I think it's more","speaker":null,"is_sponsor":0},{"start_s":361.84,"end_s":372.4,"text":"than that because yours is using 1% of like 1 and a half GHz. Mine is","speaker":null,"is_sponsor":0},{"start_s":368.16,"end_s":374.56,"text":"using anywhere from 5 to 10%. But my CPU","speaker":null,"is_sponsor":0},{"start_s":372.4,"end_s":378.479,"text":"is clocked way higher. Yeah. And I don't know if that's, you know, linear or","speaker":null,"is_sponsor":0},{"start_s":376.56,"end_s":384.36,"text":"anything, but it's clear that my resource usage is more than it appears.","speaker":null,"is_sponsor":0},{"start_s":381.919,"end_s":391.36,"text":"You're almost double the RAM, too. Oh, dude. How's my sto My storage seems","speaker":null,"is_sponsor":0},{"start_s":387.28,"end_s":393.6,"text":"okay. Yeah, but I bet my storage becomes","speaker":null,"is_sponsor":0},{"start_s":391.36,"end_s":398.08,"text":"a complete disaster as soon as I try to launch a program. So, let's both launch","speaker":null,"is_sponsor":0},{"start_s":395.759,"end_s":402.8,"text":"Edge and look at the average response time. 3 2 1 click. Oh, okay. That didn't","speaker":null,"is_sponsor":0},{"start_s":401.44,"end_s":406.28,"text":"work. Okay, let's launch File Explorer. Let's launch File Explorer. Okay, ready?","speaker":null,"is_sponsor":0},{"start_s":404.479,"end_s":412.44,"text":"3 2 1 click. So, you went up to","speaker":null,"is_sponsor":0},{"start_s":408.759,"end_s":415.919,"text":"7. Yeah. Okay. No, that was","speaker":null,"is_sponsor":0},{"start_s":412.44,"end_s":418.96,"text":"fine. Copilot. Let's launch Copilot. 3 2","speaker":null,"is_sponsor":0},{"start_s":415.919,"end_s":418.96,"text":"1 Click.","speaker":null,"is_sponsor":0},{"start_s":419.84,"end_s":428.16,"text":"Yeah, my storage is not hit that hard. I mean, it takes forever to do anything,","speaker":null,"is_sponsor":0},{"start_s":425.759,"end_s":431.36,"text":"but it seems to be more down to the CPU that's struggling. Is this ever going to","speaker":null,"is_sponsor":0},{"start_s":429.759,"end_s":438.88,"text":"launch? Did I click it? Yeah. Oh, dude. Yeah. Look, I got the spinny wheel. Oh, yeah. There you go. Wow. You want to see","speaker":null,"is_sponsor":0},{"start_s":435.52,"end_s":441.52,"text":"worse? Plug in the USB key. Really?","speaker":null,"is_sponsor":0},{"start_s":438.88,"end_s":447.68,"text":"Where did they go? Oh, that makes sense. They're going to lose their","speaker":null,"is_sponsor":0},{"start_s":444.039,"end_s":450.4,"text":"minds. Okay. And so the race is how long","speaker":null,"is_sponsor":0},{"start_s":447.68,"end_s":454.24,"text":"it takes for the folder to open. Well, just just see what happens when you plug","speaker":null,"is_sponsor":0},{"start_s":451.599,"end_s":460.8,"text":"it in. Top USB 3 port here. Sure. Okay. Three, two, one.","speaker":null,"is_sponsor":0},{"start_s":457.52,"end_s":464.84,"text":"Okay. Mine opens up. Oh, yeah. I got it.","speaker":null,"is_sponsor":0},{"start_s":460.8,"end_s":464.84,"text":"I got it. Okay.","speaker":null,"is_sponsor":0},{"start_s":466.52,"end_s":472.0,"text":"What? Look at my CPU usage. They all","speaker":null,"is_sponsor":0},{"start_s":470.4,"end_s":475.919,"text":"want to scan it for threats. You better let it do it. Oh, it's got Oh. Oh. Oh,","speaker":null,"is_sponsor":0},{"start_s":473.919,"end_s":480.96,"text":"good. gravy. Just say yes to a few of them. Oh, no. No. Oh, wait. Some of them","speaker":null,"is_sponsor":0},{"start_s":478.0,"end_s":490.56,"text":"don't even ask me. Yep. They just start. Oh, no. So, my poor USB drive is at 95%","speaker":null,"is_sponsor":0},{"start_s":486.879,"end_s":492.72,"text":"utilization right now. Even my NVMe SSD","speaker":null,"is_sponsor":0},{"start_s":490.56,"end_s":498.319,"text":"is registering. You were 30% CPU there a second ago at 3","speaker":null,"is_sponsor":0},{"start_s":496.0,"end_s":501.84,"text":"GHz. Okay. You want me to click yes? Click yes to a couple of them. That'll","speaker":null,"is_sponsor":0},{"start_s":500.0,"end_s":505.879,"text":"give you some time to talk. Back before Al Gore invented the internet, the","speaker":null,"is_sponsor":0},{"start_s":503.84,"end_s":510.879,"text":"primary way to exchange data was sneakeret. And the fight against malware","speaker":null,"is_sponsor":0},{"start_s":508.72,"end_s":516.399,"text":"depended on knowing what that malware looked like on your disc or in your","speaker":null,"is_sponsor":0},{"start_s":513.44,"end_s":521.839,"text":"system memory. Early PC antivirus suites then relied on databases of signatures","speaker":null,"is_sponsor":0},{"start_s":519.12,"end_s":526.8,"text":"for known malware. So if your AV tool didn't know about a virus, it probably","speaker":null,"is_sponsor":0},{"start_s":524.48,"end_s":531.2,"text":"wouldn't protect you from it. And it was a lot more work to get new signatures","speaker":null,"is_sponsor":0},{"start_s":529.44,"end_s":535.44,"text":"than just clicking update and downloading them from the internet. Of","speaker":null,"is_sponsor":0},{"start_s":533.36,"end_s":539.76,"text":"course, the damage a virus could do back then was also quite a lot more limited.","speaker":null,"is_sponsor":0},{"start_s":537.839,"end_s":544.64,"text":"We weren't exactly banking online back in 1987. It wasn't until the '90s then","speaker":null,"is_sponsor":0},{"start_s":542.56,"end_s":548.88,"text":"that antivirus turned into a serious industry. With the arrival of the","speaker":null,"is_sponsor":0},{"start_s":546.64,"end_s":553.839,"text":"internet, PCs were interacting with each other like never before. And the problem","speaker":null,"is_sponsor":0},{"start_s":551.2,"end_s":559.04,"text":"is that most desktop software really wasn't ready for the dangers of this new","speaker":null,"is_sponsor":0},{"start_s":556.64,"end_s":564.64,"text":"level of connectivity. Looking at you, Outlook Express. Antivirus creators then","speaker":null,"is_sponsor":0},{"start_s":562.24,"end_s":569.36,"text":"embraced having an easy way to get updates of these signatures or","speaker":null,"is_sponsor":0},{"start_s":566.959,"end_s":574.88,"text":"definitions to their users. But then at the same time, virus writers found new","speaker":null,"is_sponsor":0},{"start_s":572.08,"end_s":579.72,"text":"vectors of attack. email, Microsoft Office macros, Java, VBScript, and they","speaker":null,"is_sponsor":0},{"start_s":577.68,"end_s":585.04,"text":"exploited them with new types of malware, often more quickly than","speaker":null,"is_sponsor":0},{"start_s":582.0,"end_s":587.68,"text":"researchers could hope to respond to. Is","speaker":null,"is_sponsor":0},{"start_s":585.04,"end_s":592.8,"text":"this still running? All right, more history, then. We started the '90s with","speaker":null,"is_sponsor":0},{"start_s":590.32,"end_s":597.8,"text":"maybe a few hundred known viruses in the wild, and by 1999, the AV test database","speaker":null,"is_sponsor":0},{"start_s":596.32,"end_s":603.839,"text":"had nearly 100,000 entries. AV makers like FPROT","speaker":null,"is_sponsor":0},{"start_s":601.519,"end_s":608.24,"text":"tried to get out ahead of this rapid fire virus development with the first","speaker":null,"is_sponsor":0},{"start_s":605.92,"end_s":613.279,"text":"use of heristic detection as we might recognize it today. That is analyzing a","speaker":null,"is_sponsor":0},{"start_s":611.04,"end_s":617.76,"text":"program's behavior to recognize potential threats even if that malware","speaker":null,"is_sponsor":0},{"start_s":615.6,"end_s":623.72,"text":"has never been seen before. But signatures were still a big piece of the","speaker":null,"is_sponsor":0},{"start_s":620.24,"end_s":626.56,"text":"detection puzzle. And I mean big. By","speaker":null,"is_sponsor":0},{"start_s":623.72,"end_s":632.959,"text":"2005, AV Tests database had more than tripled to almost 340,000 entries. And","speaker":null,"is_sponsor":0},{"start_s":630.0,"end_s":638.6,"text":"the worst part is that was nothing. In 2007 alone, another 5 million unique","speaker":null,"is_sponsor":0},{"start_s":636.64,"end_s":645.2,"text":"malware samples were added to the database. It went parabolic and it's","speaker":null,"is_sponsor":0},{"start_s":642.16,"end_s":647.279,"text":"only gotten worse. So, yeah, it was easy","speaker":null,"is_sponsor":0},{"start_s":645.2,"end_s":651.92,"text":"to rag on Norton and friends, and they did make it real easy. But between","speaker":null,"is_sponsor":0},{"start_s":649.68,"end_s":656.72,"text":"massive databases of potential threats and the need to protect from more and","speaker":null,"is_sponsor":0},{"start_s":654.32,"end_s":662.279,"text":"more vectors of attack, it's no wonder that antivirus packages kept using more","speaker":null,"is_sponsor":0},{"start_s":659.04,"end_s":665.279,"text":"and more system resources causing system","speaker":null,"is_sponsor":0},{"start_s":662.279,"end_s":667.92,"text":"slowdowns. And that was with just one of","speaker":null,"is_sponsor":0},{"start_s":665.279,"end_s":672.16,"text":"them running. Let's try gaming on our system with 14 AVs. We haven't even","speaker":null,"is_sponsor":0},{"start_s":669.839,"end_s":676.64,"text":"finished scanning this USB drive yet. Yeah, sure. Let's game. We did so many","speaker":null,"is_sponsor":0},{"start_s":674.959,"end_s":681.279,"text":"takes while this was sitting here scanning.","speaker":null,"is_sponsor":0},{"start_s":679.279,"end_s":688.079,"text":"I have 270 FPS. You're sure these systems are safe? I have 294. Oh, wait.","speaker":null,"is_sponsor":0},{"start_s":685.36,"end_s":694.2,"text":"Gaming might be totally okay cuz it's not burdening our","speaker":null,"is_sponsor":0},{"start_s":689.48,"end_s":697.6,"text":"GPU and our storage was actually doing","speaker":null,"is_sponsor":0},{"start_s":694.2,"end_s":700.959,"text":"fine. Yeah, my RAM usage is way higher.","speaker":null,"is_sponsor":0},{"start_s":697.6,"end_s":703.04,"text":"4 gigs higher and my CPU usage is","speaker":null,"is_sponsor":0},{"start_s":700.959,"end_s":707.6,"text":"substantially higher. But this is interesting. I'm at a higher speed","speaker":null,"is_sponsor":0},{"start_s":705.279,"end_s":712.399,"text":"though. Yours is turboing higher, probably because it's less burdened. But","speaker":null,"is_sponsor":0},{"start_s":710.0,"end_s":717.76,"text":"the FPS is nearly identical. We just seem to be GPU bound. Yeah, that's","speaker":null,"is_sponsor":0},{"start_s":715.519,"end_s":722.72,"text":"interesting. I think it might be because we're running RTX 3050s. These are","speaker":null,"is_sponsor":0},{"start_s":720.079,"end_s":726.24,"text":"pretty low GPUs. Look at the process count","speaker":null,"is_sponsor":0},{"start_s":724.72,"end_s":729.24,"text":"and the threads. You have double the threads.","speaker":null,"is_sponsor":0},{"start_s":729.519,"end_s":736.399,"text":"That is wild. So, I think the only reason this isn't","speaker":null,"is_sponsor":0},{"start_s":734.0,"end_s":742.399,"text":"impeding my gaming performance is that our GPU is just not powerful enough. I","speaker":null,"is_sponsor":0},{"start_s":740.0,"end_s":746.88,"text":"mean, we're getting 230 frames a second. Yeah, but we're just we're not revealing","speaker":null,"is_sponsor":0},{"start_s":744.48,"end_s":750.48,"text":"we're we're GPU bottlenecked. Yeah, clearly I have plenty of CPU left","speaker":null,"is_sponsor":0},{"start_s":749.12,"end_s":754.48,"text":"over to run all this crap in the background. I think we might need a","speaker":null,"is_sponsor":0},{"start_s":752.399,"end_s":760.839,"text":"couple higherend GPUs. I'll be right back. He brought us 5080s. We can't plug","speaker":null,"is_sponsor":0},{"start_s":757.279,"end_s":760.839,"text":"these into our PSUs.","speaker":null,"is_sponsor":0},{"start_s":761.519,"end_s":767.36,"text":"You didn't bring the 12 pin. Really? They don't include it anymore? Well, I","speaker":null,"is_sponsor":0},{"start_s":766.079,"end_s":772.56,"text":"guess this is an opportunity to talk about our sponsor, Threat Locker. They take a different approach to keeping","speaker":null,"is_sponsor":1},{"start_s":770.32,"end_s":776.48,"text":"your company's network safe. Following zero trust principles, Threat Locker","speaker":null,"is_sponsor":1},{"start_s":774.56,"end_s":780.8,"text":"proactively blocks everything by default, only allowing what you decide","speaker":null,"is_sponsor":1},{"start_s":778.88,"end_s":784.32,"text":"is absolutely necessary for your team to be productive. This approach means","speaker":null,"is_sponsor":1},{"start_s":782.48,"end_s":787.839,"text":"Threat Locker doesn't require a lot of system resources. And it does more than","speaker":null,"is_sponsor":1},{"start_s":786.48,"end_s":792.8,"text":"just limit which applications can be run. Elevation control allows standard","speaker":null,"is_sponsor":1},{"start_s":790.24,"end_s":796.88,"text":"users to run specific applications with local admin privileges without ever","speaker":null,"is_sponsor":1},{"start_s":794.959,"end_s":800.639,"text":"having that unnecessary privilege as a user. And threat locker detect","speaker":null,"is_sponsor":1},{"start_s":798.88,"end_s":804.959,"text":"continuously monitors the behavior of trusted and untrusted applications and","speaker":null,"is_sponsor":1},{"start_s":803.12,"end_s":808.8,"text":"will automatically respond based on the rules created by your IT specialists.","speaker":null,"is_sponsor":1},{"start_s":807.2,"end_s":812.399,"text":"These policies are enforced in milliseconds whether or not your","speaker":null,"is_sponsor":1},{"start_s":810.399,"end_s":817.44,"text":"endpoint is connected to the internet. Do you see this? What the","speaker":null,"is_sponsor":1},{"start_s":815.6,"end_s":822.56,"text":"mine? No. No. This has got to be a driver issue. It's got to be a driver issue. Maybe my drivers didn't auto","speaker":null,"is_sponsor":0},{"start_s":820.32,"end_s":828.0,"text":"install or my drivers probably took so long to autoupdate to the new card that","speaker":null,"is_sponsor":0},{"start_s":825.44,"end_s":830.72,"text":"they that they haven't updated yet. Startup scan and pro. Oh my god. Oh,","speaker":null,"is_sponsor":0},{"start_s":829.6,"end_s":835.6,"text":"your internet was off when you you booted up, too, cuz the cable fell out. Okay. Yeah, that's probably the issue.","speaker":null,"is_sponsor":0},{"start_s":833.6,"end_s":841.88,"text":"Okay. Okay. Okay. Okay. It was a driver issue getting new ones installed. It's","speaker":null,"is_sponsor":0},{"start_s":838.32,"end_s":843.839,"text":"freaking warm. Great hoodie. Terminally","speaker":null,"is_sponsor":1},{"start_s":841.88,"end_s":849.36,"text":"online. But I'm too warm to wear it right now. Here we go. Holy,","speaker":null,"is_sponsor":1},{"start_s":846.92,"end_s":853.519,"text":"dude. We're still in the loading screen and I'm pretty sure my CPU usage is","speaker":null,"is_sponsor":0},{"start_s":851.199,"end_s":857.36,"text":"higher than last time. It's not good. I'll tell you that much. Cuz I'm at","speaker":null,"is_sponsor":0},{"start_s":854.8,"end_s":862.0,"text":"1,000 FPS in this loading screen now. Y I think this is going to impact it more.","speaker":null,"is_sponsor":0},{"start_s":859.199,"end_s":864.959,"text":"My clock speed is lower than it was compared to yours. I think","speaker":null,"is_sponsor":0},{"start_s":864.0,"end_s":870.079,"text":"it's still going to be pretty respectable. I think so to be clear.","speaker":null,"is_sponsor":0},{"start_s":867.44,"end_s":875.839,"text":"Wow. Let's let it settle in a little bit because you never know. Here, let's walk","speaker":null,"is_sponsor":0},{"start_s":872.16,"end_s":878.56,"text":"up the stairs. All right. So there is no","speaker":null,"is_sponsor":0},{"start_s":875.839,"end_s":882.399,"text":"doubt that if you have enough overhead, you can","speaker":null,"is_sponsor":0},{"start_s":879.8,"end_s":885.839,"text":"absolutely impact the ability to run games at maximum performance. You're","speaker":null,"is_sponsor":0},{"start_s":884.0,"end_s":892.48,"text":"about 20 frames lower than me, but realistically, we're looking at an RTX","speaker":null,"is_sponsor":0},{"start_s":888.88,"end_s":894.72,"text":"5080, right? Yeah. And I'm only running","speaker":null,"is_sponsor":0},{"start_s":892.48,"end_s":899.04,"text":"about 20 FPS lower than you. It's really not bad in a pretty CPUbound game. With","speaker":null,"is_sponsor":0},{"start_s":897.44,"end_s":903.079,"text":"all of that said, it's very clear that these AV programs are heavy enough to","speaker":null,"is_sponsor":0},{"start_s":901.279,"end_s":907.6,"text":"run that they can impact system performance, which isn't to say that","speaker":null,"is_sponsor":0},{"start_s":905.36,"end_s":912.399,"text":"they're unnecessarily bloated. They're just doing a lot. Let's go back to our","speaker":null,"is_sponsor":0},{"start_s":910.16,"end_s":917.92,"text":"history lesson. First introduced by McAfee in 2008, cloud-based antivirus","speaker":null,"is_sponsor":0},{"start_s":915.76,"end_s":923.36,"text":"uses kind of the best of both worlds. Heristic detection to identify the","speaker":null,"is_sponsor":0},{"start_s":920.24,"end_s":926.32,"text":"behavior of suspicious files and","speaker":null,"is_sponsor":0},{"start_s":923.36,"end_s":931.279,"text":"constant checking against a continually updated online database of threats,","speaker":null,"is_sponsor":0},{"start_s":928.88,"end_s":936.88,"text":"taking advantage of the spread of always on internet connections. It was a really","speaker":null,"is_sponsor":0},{"start_s":933.92,"end_s":942.0,"text":"good idea, but Microsoft was about to upset the game board. After years of","speaker":null,"is_sponsor":0},{"start_s":939.92,"end_s":947.839,"text":"ruthless attacks from Apple targeting Windows's security, Microsoft acquired","speaker":null,"is_sponsor":0},{"start_s":944.88,"end_s":952.399,"text":"giant anti-spyware in late 2004 and quietly started work on what would","speaker":null,"is_sponsor":0},{"start_s":949.36,"end_s":954.399,"text":"become Microsoft Defender Antivirus.","speaker":null,"is_sponsor":0},{"start_s":952.399,"end_s":959.519,"text":"Starting with Windows 8, Defender was enabled on Windows PCs by default,","speaker":null,"is_sponsor":0},{"start_s":957.04,"end_s":964.32,"text":"switching itself off if a third party AV tool was installed. And over the years,","speaker":null,"is_sponsor":0},{"start_s":961.92,"end_s":970.32,"text":"Defender has evolved to the point where those third party AV tools are less","speaker":null,"is_sponsor":0},{"start_s":966.959,"end_s":972.88,"text":"likely to feel needed. As of 2024, more","speaker":null,"is_sponsor":0},{"start_s":970.32,"end_s":977.519,"text":"than half of American users use built-in antivirus protection like Microsoft","speaker":null,"is_sponsor":0},{"start_s":974.88,"end_s":982.639,"text":"Defender or Apple's XProtect. And of those that use a third party solution,","speaker":null,"is_sponsor":0},{"start_s":979.36,"end_s":984.399,"text":"only about half use a paid product. As a","speaker":null,"is_sponsor":0},{"start_s":982.639,"end_s":988.639,"text":"result, recent years have seen significant consolidation in the","speaker":null,"is_sponsor":0},{"start_s":985.839,"end_s":992.639,"text":"antivirus market. Intel bought McAfee back in 2010 only for it to end up in","speaker":null,"is_sponsor":0},{"start_s":990.72,"end_s":996.56,"text":"the hands of Advent International, a private equity firm that is rumored to","speaker":null,"is_sponsor":0},{"start_s":994.16,"end_s":1001.56,"text":"be eyeing Trend Micro as well. And we mentioned Gen Digital earlier, formerly","speaker":null,"is_sponsor":0},{"start_s":998.639,"end_s":1005.68,"text":"Norton, who now owns four major AV brands. Other major brands have shifted","speaker":null,"is_sponsor":0},{"start_s":1003.92,"end_s":1009.92,"text":"their sites to corporate clients with NextG Endpoint Protection and Management","speaker":null,"is_sponsor":0},{"start_s":1007.68,"end_s":1014.0,"text":"Solutions, leaving the home market to lesserk known antivirus solutions, some","speaker":null,"is_sponsor":0},{"start_s":1011.92,"end_s":1017.6,"text":"of which we installed here today. Before we go, then let's see how they handle","speaker":null,"is_sponsor":0},{"start_s":1015.6,"end_s":1020.32,"text":"this little selection of malware that we've prepared for them. Oh, we're going","speaker":null,"is_sponsor":0},{"start_s":1019.199,"end_s":1026.16,"text":"to intentionally infect them. We're going to remove the Ethernet. Oh, you did. Oh, no. You didn't. Are we?","speaker":null,"is_sponsor":0},{"start_s":1024.48,"end_s":1028.959,"text":"I mean, they should be safe, right? They should be fine. Oh, this makes me deeply","speaker":null,"is_sponsor":0},{"start_s":1027.76,"end_s":1032.799,"text":"uncomfortable. Jordan, they're mostly just test files. Okay. Mostly. Okay.","speaker":null,"is_sponsor":0},{"start_s":1031.12,"end_s":1039.839,"text":"What do you want me to Oh, threat blocked. Hey, the system","speaker":null,"is_sponsor":0},{"start_s":1037.24,"end_s":1043.679,"text":"works. Maybe. Oh, potential threat block. Oh, infected file move to","speaker":null,"is_sponsor":0},{"start_s":1042.079,"end_s":1047.839,"text":"quarantine full. I mean, maybe you are safer. Maybe I am","speaker":null,"is_sponsor":0},{"start_s":1046.16,"end_s":1052.24,"text":"safer. Nothing happened here yet. I feel safer. Okay. What am I supposed to try","speaker":null,"is_sponsor":0},{"start_s":1049.679,"end_s":1056.799,"text":"to do? Ah, whatever you want here. Open up the danger zone. Open the danger","speaker":null,"is_sponsor":0},{"start_s":1053.52,"end_s":1058.12,"text":"zone. Okay. Jokes. Yeah. Run something","speaker":null,"is_sponsor":0},{"start_s":1056.799,"end_s":1062.799,"text":"in there. It'll be fine. Oh my god. Avoid.exe. Threat blocked. Good. Oh,","speaker":null,"is_sponsor":0},{"start_s":1060.64,"end_s":1066.72,"text":"it's gone. Good. It's gone. Boom. Just like that. How about Vista?","speaker":null,"is_sponsor":0},{"start_s":1065.2,"end_s":1071.76,"text":"Cannot access. It's still freaking out in the bottom corner here. It's malware","speaker":null,"is_sponsor":0},{"start_s":1068.4,"end_s":1074.96,"text":"stopped. Windows chilled Windows. I'm","speaker":null,"is_sponsor":0},{"start_s":1071.76,"end_s":1077.039,"text":"It's working.","speaker":null,"is_sponsor":0},{"start_s":1074.96,"end_s":1080.799,"text":"Chilled Windows cannot access. Oh, dude. I think I think it's just removing. Oh,","speaker":null,"is_sponsor":0},{"start_s":1078.559,"end_s":1084.88,"text":"there we go. I finally got a popup. Threats found. Yep.","speaker":null,"is_sponsor":0},{"start_s":1083.44,"end_s":1089.039,"text":"Okay, so it's stopping me from doing it, too. Also working.","speaker":null,"is_sponsor":0},{"start_s":1087.12,"end_s":1093.44,"text":"Mine's a lot more calm about it. They're working. Yeah.","speaker":null,"is_sponsor":0},{"start_s":1091.84,"end_s":1097.36,"text":"And that was even after I told them, hey, look, don't bother scanning this","speaker":null,"is_sponsor":0},{"start_s":1094.88,"end_s":1102.0,"text":"thing. Yeah, that's pretty cool. The point today was not to answer, you know,","speaker":null,"is_sponsor":0},{"start_s":1099.76,"end_s":1106.0,"text":"which of these antivirus suites is the best? That was not what we set out to","speaker":null,"is_sponsor":0},{"start_s":1103.44,"end_s":1111.039,"text":"do. What we set out to answer was, is more better? The answer is no. Pick one","speaker":null,"is_sponsor":0},{"start_s":1108.88,"end_s":1116.72,"text":"good tool for real-time monitoring. And then if you must run additional tools,","speaker":null,"is_sponsor":0},{"start_s":1113.36,"end_s":1118.559,"text":"just run them as single time scans. And","speaker":null,"is_sponsor":0},{"start_s":1116.72,"end_s":1121.52,"text":"don't discount Microsoft Defender. I mean, it did work against all these","speaker":null,"is_sponsor":0},{"start_s":1120.08,"end_s":1125.2,"text":"threats. Found the problems here, even if it might not find every threat. And","speaker":null,"is_sponsor":0},{"start_s":1123.76,"end_s":1130.24,"text":"if you want enterprise or business protection, you're going to want to check out something entirely different,","speaker":null,"is_sponsor":1},{"start_s":1128.559,"end_s":1134.32,"text":"like from Threat Locker, who sponsored this little experiment. We're going to have a link to them in the video","speaker":null,"is_sponsor":1},{"start_s":1132.88,"end_s":1139.12,"text":"description. If you guys enjoyed this video, uh maybe you like the vibe of how","speaker":null,"is_sponsor":1},{"start_s":1136.799,"end_s":1144.48,"text":"many USB devices can you plug into one computer. That was a lot of well, it was","speaker":null,"is_sponsor":0},{"start_s":1141.2,"end_s":1144.48,"text":"pain, but also fun.","speaker":null,"is_sponsor":0}],"full_text":"Everybody knows that more is better. More RAM means more programs can run at the same time. More GPU power means more FPS in your games. And more mother-in-laws means more time spent with family. There are downsides. Well, mine is great. But in a world where malware is seemingly more dangerous than ever, it would only be logical to assume that more antivirus software is going to keep her more safer, right? I mean, why not? It used to be that running even one antivirus package would significantly impact your PC's performance. But these days, computers are so much faster that Windows includes its own AV software that most people probably don't even notice is running. So, could we run two, three, or 10 antivirus tools to create the safest PC on the internet? That's what we're here to find out with some help from our sponsor, Threat Locker. Threat Locker is a totally different way to keep your entire business network safe, but we'll talk more about that later. For now, spoiler alert, more is not always better. Let's see how that goes. Let's kick this off with a good old-fashioned boot time test. In front of me are two virtually identical systems with Core i5 processors, 16 gigs of DDR5 memory, an RTX 3050GPU, and a terabyte of fast NVMe storage. Both have a fresh install of Windows 11, and all the latest drivers. But there's one key difference. This one relies solely on Microsoft's antivirus. Not that one, Microsoft Defender. As for the other, well, we just plum had a hard time choosing between all the options, especially with all of the inbreeding between AV companies these days. Did you know that Avast, Avera, AVG, and Norton are all the same company? Gen digital, look it up. And they don't just share ownership. Norton and AVG actually use Avast's AV engine these days. And a ver's engine gets used even by third parties like VMware and F-Secure. Uh, this one's booted by the way. Couldn't help noting that. This one not so much. Is it still going? Anyway, the TLDDR is we got confused. So, we crammed our second system full of as much antivirus software as she would take and still connect to the internet. What's the final count? I think 14. 14. My goodness. And it's booted. Hold on. I have another fun one for you, though. Let's see how long they take to shut down. Wow, that one's done already. Let's read some more lines. Ah, yes. React to boot time. Oh, I can tell you all the antiviruses we have. Total AV, Panda, Malware Bites, Quick Heal, Avast, AVG, Adaware, ESET, Avira, Forct, Heimdoll, Komodo, Clam, AV, and of course, good old-fashioned Windows Defender. It is worth noting that a couple of them do have reduced runtime protection when others are detected. And I guess I'll talk about our sponsor real quick here because we're still waiting. Uh, it's worth noting, by the way, our sponsor, Threat Locker, doesn't really compete with any of the antivirus software that we're showing off today. Threat Locker stops more than just malware. They even block unapproved applications on your network with application allow listing. That means that aside from being protected, your team can't be lured away from that important report for a quick round of Battro during business hours. Okay, finally, let's boot them back up and see how these systems feel. Let's start with our control computer. Yep, that's file explorer. Yep, that's the system tray. If I wanted to launch Steam, it seems like that'll happen in a perfectly reasonable amount of time. Now, let's move over here where Oh my goodness, I already have a popup to dismiss. Okay, file explorer. This is a modern Core i5. That was pretty quick for that one, actually. I mean, the system tray was still responsive. How long does it take to launch Steam, though? Ah. Oh. Oh. Oh my god. This poor system. Look at them all. Malware bite 6%. Komodo 4 Vera 4%. Is Steam still launching? It'll take a while. Wow. Okay. I knew it was going to be bad. I didn't think it was going to be like using my Windows 98 machine. I thought it would be uh this is awful, but it's oh this is awful. And the funny part is when we're not doing anything, the usage of all these doesn't seem that bad. It's just that that's the whole thing, right? When they're idling in the background, they're fine. But it's as soon as you start to do anything that they're actively continuously monitoring what's going on and making sure that it's okay and the system resource usage goes oh my god did you see how long that took to maximize boy that's crazy. Can Can I see yours? Yours should be fine. Yeah. Mine works like a computer. This shouldn't slow the GPU, isn't the Do you see that? That's terrible. What the That is not the screen capture, guys. No, that's live happening in person. That's wild. It's It's not even using that much. No, it's at like 10%. Okay. What's yours? What's yours? One to 2%. And this is way worse than you think because you might say, \"Oh, what? It's using 10 times as much resources. That's to be expected.\" But I think it's more than that because yours is using 1% of like 1 and a half GHz. Mine is using anywhere from 5 to 10%. But my CPU is clocked way higher. Yeah. And I don't know if that's, you know, linear or anything, but it's clear that my resource usage is more than it appears. You're almost double the RAM, too. Oh, dude. How's my sto My storage seems okay. Yeah, but I bet my storage becomes a complete disaster as soon as I try to launch a program. So, let's both launch Edge and look at the average response time. 3 2 1 click. Oh, okay. That didn't work. Okay, let's launch File Explorer. Let's launch File Explorer. Okay, ready? 3 2 1 click. So, you went up to 7. Yeah. Okay. No, that was fine. Copilot. Let's launch Copilot. 3 2 1 Click. Yeah, my storage is not hit that hard. I mean, it takes forever to do anything, but it seems to be more down to the CPU that's struggling. Is this ever going to launch? Did I click it? Yeah. Oh, dude. Yeah. Look, I got the spinny wheel. Oh, yeah. There you go. Wow. You want to see worse? Plug in the USB key. Really? Where did they go? Oh, that makes sense. They're going to lose their minds. Okay. And so the race is how long it takes for the folder to open. Well, just just see what happens when you plug it in. Top USB 3 port here. Sure. Okay. Three, two, one. Okay. Mine opens up. Oh, yeah. I got it. I got it. Okay. What? Look at my CPU usage. They all want to scan it for threats. You better let it do it. Oh, it's got Oh. Oh. Oh, good. gravy. Just say yes to a few of them. Oh, no. No. Oh, wait. Some of them don't even ask me. Yep. They just start. Oh, no. So, my poor USB drive is at 95% utilization right now. Even my NVMe SSD is registering. You were 30% CPU there a second ago at 3 GHz. Okay. You want me to click yes? Click yes to a couple of them. That'll give you some time to talk. Back before Al Gore invented the internet, the primary way to exchange data was sneakeret. And the fight against malware depended on knowing what that malware looked like on your disc or in your system memory. Early PC antivirus suites then relied on databases of signatures for known malware. So if your AV tool didn't know about a virus, it probably wouldn't protect you from it. And it was a lot more work to get new signatures than just clicking update and downloading them from the internet. Of course, the damage a virus could do back then was also quite a lot more limited. We weren't exactly banking online back in 1987. It wasn't until the '90s then that antivirus turned into a serious industry. With the arrival of the internet, PCs were interacting with each other like never before. And the problem is that most desktop software really wasn't ready for the dangers of this new level of connectivity. Looking at you, Outlook Express. Antivirus creators then embraced having an easy way to get updates of these signatures or definitions to their users. But then at the same time, virus writers found new vectors of attack. email, Microsoft Office macros, Java, VBScript, and they exploited them with new types of malware, often more quickly than researchers could hope to respond to. Is this still running? All right, more history, then. We started the '90s with maybe a few hundred known viruses in the wild, and by 1999, the AV test database had nearly 100,000 entries. AV makers like FPROT tried to get out ahead of this rapid fire virus development with the first use of heristic detection as we might recognize it today. That is analyzing a program's behavior to recognize potential threats even if that malware has never been seen before. But signatures were still a big piece of the detection puzzle. And I mean big. By 2005, AV Tests database had more than tripled to almost 340,000 entries. And the worst part is that was nothing. In 2007 alone, another 5 million unique malware samples were added to the database. It went parabolic and it's only gotten worse. So, yeah, it was easy to rag on Norton and friends, and they did make it real easy. But between massive databases of potential threats and the need to protect from more and more vectors of attack, it's no wonder that antivirus packages kept using more and more system resources causing system slowdowns. And that was with just one of them running. Let's try gaming on our system with 14 AVs. We haven't even finished scanning this USB drive yet. Yeah, sure. Let's game. We did so many takes while this was sitting here scanning. I have 270 FPS. You're sure these systems are safe? I have 294. Oh, wait. Gaming might be totally okay cuz it's not burdening our GPU and our storage was actually doing fine. Yeah, my RAM usage is way higher. 4 gigs higher and my CPU usage is substantially higher. But this is interesting. I'm at a higher speed though. Yours is turboing higher, probably because it's less burdened. But the FPS is nearly identical. We just seem to be GPU bound. Yeah, that's interesting. I think it might be because we're running RTX 3050s. These are pretty low GPUs. Look at the process count and the threads. You have double the threads. That is wild. So, I think the only reason this isn't impeding my gaming performance is that our GPU is just not powerful enough. I mean, we're getting 230 frames a second. Yeah, but we're just we're not revealing we're we're GPU bottlenecked. Yeah, clearly I have plenty of CPU left over to run all this crap in the background. I think we might need a couple higherend GPUs. I'll be right back. He brought us 5080s. We can't plug these into our PSUs. You didn't bring the 12 pin. Really? They don't include it anymore? Well, I guess this is an opportunity to talk about our sponsor, Threat Locker. They take a different approach to keeping your company's network safe. Following zero trust principles, Threat Locker proactively blocks everything by default, only allowing what you decide is absolutely necessary for your team to be productive. This approach means Threat Locker doesn't require a lot of system resources. And it does more than just limit which applications can be run. Elevation control allows standard users to run specific applications with local admin privileges without ever having that unnecessary privilege as a user. And threat locker detect continuously monitors the behavior of trusted and untrusted applications and will automatically respond based on the rules created by your IT specialists. These policies are enforced in milliseconds whether or not your endpoint is connected to the internet. Do you see this? What the mine? No. No. This has got to be a driver issue. It's got to be a driver issue. Maybe my drivers didn't auto install or my drivers probably took so long to autoupdate to the new card that they that they haven't updated yet. Startup scan and pro. Oh my god. Oh, your internet was off when you you booted up, too, cuz the cable fell out. Okay. Yeah, that's probably the issue. Okay. Okay. Okay. Okay. It was a driver issue getting new ones installed. It's freaking warm. Great hoodie. Terminally online. But I'm too warm to wear it right now. Here we go. Holy, dude. We're still in the loading screen and I'm pretty sure my CPU usage is higher than last time. It's not good. I'll tell you that much. Cuz I'm at 1,000 FPS in this loading screen now. Y I think this is going to impact it more. My clock speed is lower than it was compared to yours. I think it's still going to be pretty respectable. I think so to be clear. Wow. Let's let it settle in a little bit because you never know. Here, let's walk up the stairs. All right. So there is no doubt that if you have enough overhead, you can absolutely impact the ability to run games at maximum performance. You're about 20 frames lower than me, but realistically, we're looking at an RTX 5080, right? Yeah. And I'm only running about 20 FPS lower than you. It's really not bad in a pretty CPUbound game. With all of that said, it's very clear that these AV programs are heavy enough to run that they can impact system performance, which isn't to say that they're unnecessarily bloated. They're just doing a lot. Let's go back to our history lesson. First introduced by McAfee in 2008, cloud-based antivirus uses kind of the best of both worlds. Heristic detection to identify the behavior of suspicious files and constant checking against a continually updated online database of threats, taking advantage of the spread of always on internet connections. It was a really good idea, but Microsoft was about to upset the game board. After years of ruthless attacks from Apple targeting Windows's security, Microsoft acquired giant anti-spyware in late 2004 and quietly started work on what would become Microsoft Defender Antivirus. Starting with Windows 8, Defender was enabled on Windows PCs by default, switching itself off if a third party AV tool was installed. And over the years, Defender has evolved to the point where those third party AV tools are less likely to feel needed. As of 2024, more than half of American users use built-in antivirus protection like Microsoft Defender or Apple's XProtect. And of those that use a third party solution, only about half use a paid product. As a result, recent years have seen significant consolidation in the antivirus market. Intel bought McAfee back in 2010 only for it to end up in the hands of Advent International, a private equity firm that is rumored to be eyeing Trend Micro as well. And we mentioned Gen Digital earlier, formerly Norton, who now owns four major AV brands. Other major brands have shifted their sites to corporate clients with NextG Endpoint Protection and Management Solutions, leaving the home market to lesserk known antivirus solutions, some of which we installed here today. Before we go, then let's see how they handle this little selection of malware that we've prepared for them. Oh, we're going to intentionally infect them. We're going to remove the Ethernet. Oh, you did. Oh, no. You didn't. Are we? I mean, they should be safe, right? They should be fine. Oh, this makes me deeply uncomfortable. Jordan, they're mostly just test files. Okay. Mostly. Okay. What do you want me to Oh, threat blocked. Hey, the system works. Maybe. Oh, potential threat block. Oh, infected file move to quarantine full. I mean, maybe you are safer. Maybe I am safer. Nothing happened here yet. I feel safer. Okay. What am I supposed to try to do? Ah, whatever you want here. Open up the danger zone. Open the danger zone. Okay. Jokes. Yeah. Run something in there. It'll be fine. Oh my god. Avoid.exe. Threat blocked. Good. Oh, it's gone. Good. It's gone. Boom. Just like that. How about Vista? Cannot access. It's still freaking out in the bottom corner here. It's malware stopped. Windows chilled Windows. I'm It's working. Chilled Windows cannot access. Oh, dude. I think I think it's just removing. Oh, there we go. I finally got a popup. Threats found. Yep. Okay, so it's stopping me from doing it, too. Also working. Mine's a lot more calm about it. They're working. Yeah. And that was even after I told them, hey, look, don't bother scanning this thing. Yeah, that's pretty cool. The point today was not to answer, you know, which of these antivirus suites is the best? That was not what we set out to do. What we set out to answer was, is more better? The answer is no. Pick one good tool for real-time monitoring. And then if you must run additional tools, just run them as single time scans. And don't discount Microsoft Defender. I mean, it did work against all these threats. Found the problems here, even if it might not find every threat. And if you want enterprise or business protection, you're going to want to check out something entirely different, like from Threat Locker, who sponsored this little experiment. We're going to have a link to them in the video description. If you guys enjoyed this video, uh maybe you like the vibe of how many USB devices can you plug into one computer. That was a lot of well, it was pain, but also fun."}