Showing posts with label Anti-virus. Show all posts
Showing posts with label Anti-virus. Show all posts

Saturday, February 6, 2010

What To Look For In Antivirus Software


With up to 100 new malware threats being discovered per day, antivirus software is, for many home computer users, the primary method for protecting their computer from threats.

Many computers come with some sort of antivirus software, often a trial version, installed. Unfortunately, many users fail to properly configure the antivirus software or keep it up to date, and many may let the antivirus software expire without even realizing their computer is no longer protected against current malware threats.

This article provides a listing of some of the key features or functions that are commonly found in antivirus software.

* Realtime Scanner: The antivirus software realtime scanner monitors network data as it is coming into the computer to intercept any malware as it enters your system.

* On-access Scanner: The on-access scanner does what its name implies- it scans files as they are opened or accessed to detect any malware.

* On-Demand Scanner:The on-demand scanner provides the ability to perform a custom scan of a file, folder or drive initiated by the user.

* Heuristic Scanner: Antivirus software typically has a heuristic scanner as well. Heuristic scanning uses what is known about existing malware and what it has learned from past experience to identify new threats even before the antivirus vendor creates an update to detect it.

* Compressed File Scanner: Some malware may come inside a compressed file such as a ZIP file, or may even be embedded in a compressed file within a compressed file and so on. Most antivirus programs can scan within a compressed file. The better programs may be able to scan many levels deep to detect malware even if it is buried within multiple compressed files.

* Scheduled Scans: Most antivirus software provides some method of creating a schedule to set when the software will automatically perform a scan. Some antivirus programs may restrict what sort of scans can be scheduled, while the more flexible programs allow you to run any type of pre-configured or custom scan at the scheduled time.

* Script Blocking: Script languages are frequently used to execute malicious code from web sites. Many antivirus programs have the ability to monitor Java, ActiveX, Visual Basic and other script files and detect and block malicious activity.

* POP3 Email Scanning: The ability of the antivirus software to monitor incoming and/or outgoing POP3 email traffic and the associated file attachments to detect and alert about virus or other malware threats.

* Webmail Protection: The better antivirus programs can monitor web-based email traffic such as Hotmail or Yahoo! Mail to detect and block malware in file attachments.

* Instant Messaging Protection: Many worms and other malware can now be spread through instant messaging programs such as AOL Instant Messenger (AIM) or Yahoo! Messenger. Some antivirus software will monitor instant messaging traffic to detect and block malicious threats.

* Automatic Virus Updates: One of the biggest problems users have with antivirus software is simply keeping it up to date. Most antivirus software can be configured to automatically connect with the vendor site and download new updates on a regular basis.

* Automatic Program Updates: The scan engine(s) and program itself may periodically be updated to add functionality to detect newer threats. Many antivirus software programs can be configured to automatically check for new updates and download and install them if they are available.

Source: www.about.com

Sunday, January 31, 2010

Free Online Anti-Virus Tools


This is the first in IT Security's periodic list of free security tools.In the interest of listing tools that can help in a moment of crisis, this list only includes tools that can detect, clean, remove or neutralize viruses.Of course, if a file is small, an easy way to check it for a virus is to send it to yourself via a free email service like Yahoo! Mail, Gmail or Hotmail, which scan all file attachments.

In the future, IT Security will compile a list of free downloadable antivirus tools.

A-squared: The A-squared malware scanner looks for for Trojan horses, backdoors, worms, dialers, spyware/adware, keyloggers, rootkits, hacking tools, riskware and tracking cookies. However, it only works inside IE (Internet Explorer) with ActiveX controls enabled.

BitDefender Scan8 Online: BitDefender is a complete online anti-virus scanner that appears in a new window. It requires IE to function.

Command On Demand Scanner: Another straightforward online virus scanner that requires IE and ActiveX controls.

The ESET Online Scanner: This online antivirus scanner from ESET also requires ActiveX and IE.

Computer Associates CA Anti-Virus: The free online version of CA's anti-virus program requires ActiveX and IE.

Ewido Networks Anti-Spyware: Ewido Networks has an online anti-spyware scanner that is a predecessor to AVG Anti-Virus; it also requires IE and ActiveX.

Freedom Online Virus Check: One of the very few online scanners that works with both Firefox and IE. Firefox users will need to install a Java-based scanner, while IE users will need to activate ActiveX controls The service's engine is based on the F-Prot scanner.

F-Secure Online Scanner: Another scanner that requires IE and ActiveX. It also checks for rootkits.

Panda ActiveScan: Based on the popular Panda virus scanner, the online version also requires IE and ActiveX.

Windows Live OneCare: Microsoft's online virus scanner is based around its new Windows Live technology — and yes, this service too is only compatible with Internet Explorer with ActiveX controls enabled.

Trend Micro HouseCall
: A smarter online scanner than most, Trend Micro's solution detects browsers and installs the appropriate piece of code needed, whether it's Java or ActiveX. The service is based on TrendMicro's popular anti-virus engine.

Note that leading anti-virus vendors McAfee Inc. and Symantec Corp. have rich online scanning tools, but these services do not actually remove detected threats.


Source: www.itsecurity.com