I moved away from AVG some time back when it started to get too bloatware-ish.
I tend to use a mixture of methods to reduce attacks by loopbacking advertisement services canonical names to the localhost (127.0.0.1), turning off script engines, stopping third-party applications from running without confirmation, having my email program run in "text only mode" (I'm use to HTML so I can read through that). Any sites I want to visit but feel are a little iffy I use the view-source: method to read the page first to see what it is trying to load and which sites are attached to it. As for antivirus I did start using ClamAV, however that's been pulled into Immunet which itself is a bit bloated (Since it's a cloud anti-virus system which can use ClamAV to do local tests)
When concerned about security I run NETSTAT to find out which files are opening ports to listen on and which remote addresses are being connected to. I also turn off all processes and services that I don't need or use, this reduces the systems overhead while reducing the footprint of any exploitable processes. Lastly I also use the actual firewall rules in the Router to tighten connections in and out further.
Between all the small tweaks I see less than one infection a year over the past 10 years on my PC's (I can't say the same for other peoples)
I tend to use a mixture of methods to reduce attacks by loopbacking advertisement services canonical names to the localhost (127.0.0.1), turning off script engines, stopping third-party applications from running without confirmation, having my email program run in "text only mode" (I'm use to HTML so I can read through that). Any sites I want to visit but feel are a little iffy I use the view-source: method to read the page first to see what it is trying to load and which sites are attached to it. As for antivirus I did start using ClamAV, however that's been pulled into Immunet which itself is a bit bloated (Since it's a cloud anti-virus system which can use ClamAV to do local tests)
When concerned about security I run NETSTAT to find out which files are opening ports to listen on and which remote addresses are being connected to. I also turn off all processes and services that I don't need or use, this reduces the systems overhead while reducing the footprint of any exploitable processes. Lastly I also use the actual firewall rules in the Router to tighten connections in and out further.
Between all the small tweaks I see less than one infection a year over the past 10 years on my PC's (I can't say the same for other peoples)