Tuesday 10 May 2011

Avast!

Anti-virus program for Windows. The home edition is freeware for noncommercial users.Avast! Antivirus is an antivirus program developed by AVAST Software a.s. (former ALWIL Software a.s.), a company based in Prague, Czech Republic. It was first released in 1988. Avast! is based on a central scanning engine that is certified by ICSA Labs and West Coast Lab's Checkmark process and incorporates anti-spyware technology, also certified by West Coast Lab's Checkmark process, as well as anti-rootkit and self-protection capabilities. It is a multiple recipient of the Virus Bulletin VB100 Award, for detection of 100% of "in-the-wild" viruses, and is a past winner of the Secure Computing Readers' Trust Award. The name Avast comes from "Anti-Virus-Advanced-Set".

Avast! Free Antivirus is the freeware version of Avast! antivirus software available to Microsoft Windows and  users, while Avast! Pro Antivirus is offered to businesses and users that want additional features. Priority updates are delivered automatically using PUSH update technology in Avast! Pro Antivirus. Avast! Pro Antivirus also has a command line scanner and a script blocker.

Avast! Antivirus is a widely used antivirus program, with 130 million users worldwide as of September 2010.

Features
  • Antivirus kernel based on certified antivirus engine.
  • Resident protection comprising individual modules or "shields", each of which can be individually configured or disabled:
    • File System Shield — Real-time protection against viruses and other malware threats. Scans files as they run on your computer to keep viruses from being able to execute.
    • Mail Shield  — Scans messages and attachments in E-mail/Microsoft Outlook/Exchange for viruses.
    • Web Shield — HTTP protection (local transparent proxy). Version 4.8 also allows the blocking of URLs. Scans URLs and incoming data for viruses, and aborts connections to the site if one is found.
    • P2P shield — Scans P2Pfiles from file share programs.
    • IM shield — Instant Messaging protection. (Scanning of files transferred through instant messaging applications)
    • Script blocker — Professional version only; scans webpages for malicious scripts, and disables them from infecting your computer, though they can still be used. (for example, a clickable button)
    • Network Shield — Basic protection against well-known network worms. Acts as an Intrusion Detection System.
    • Behavior Shield — Reports suspicious behavior by analyzing the behavior of programs
  • Anti-spyware capabilities Avast 5 update screen
  • Anti-rootkit capabilities
  • Self-Protection — Prevents malware from terminating avast! processes and damaging avast! files.
  • Automatic incremental updates — Updates of both the program and the virus database which is used to identify potential threats — Avast! updates its virus definitions on a regular basis (sometimes multiple updates daily) and this process is automated by default.
  • Audible alarms — Vocal warnings and notices such as "Caution, a virus has been detected!" and "Virus database has been updated."
  • Boot-time scan (32-bit only) — Users can schedule a boot-time scan to remove infections that load during Windows startup.
  • Virus Chest — Quarantine; folder where infected files can be stored. The virus chest also stores vital system files to protect them from damage by malware. Users can also add their own files to the virus chest. Once in the chest, a file cannot be executed; double-clicking the file will instead display information about the file.
Avast 5 web shield warning  
                 Registration (Free Antivirus) Avast! Antivirus can be downloaded and used for free for 30 days. After 30 days, the free Edition must be registered (for free) in order for the program to continue functioning. After the registration, Avast! can continue to be used free of charge for 12 months. After 12 months, it is necessary to re-register, in order to continue using it free of charge. However, if a user has version 4.8 and upgrades to the latest version, then they are given an automatic 14-month license.

AVG-Free Antivirus

AVG is an umbrella term for a range of anti-virus and Internet security software for the Microsoft Windows, Linux, Mac OS X, and FreeBSD computing platforms, developed by AVG Technologies, a privately held Czech company formerly known as Grisoft
 
   
AVG Technologies provides a number of products from the AVG range, suitable for Windows 2000 onwards. In addition to this, AVG Technologies also provides Linux, FreeBSD, and most recently Mac OS X versions of the software. AVG Anti-Virus 9.0 is available in free and commercial editions. AVG 9.0 has identity theft protection through a partnership with Intersections Inc,. AVG 9.0 also adds white listing, behavioral protection and cloud operations to their signature-based blocking. The software adds the Resident Shield, firewall, and identity protection modules. The LinkScanner component has been improved to cut phishing threats further.

For desktop protection of PCs running Windows, the AVG solutions include:
  • AVG Internet Security is a full suite which brings together the AVG Anti-Virus, Anti-Spyware, Link Scanner, Anti-Root kit, Web Shield, Security Toolbar, Firewall, Anti-Spam, Identity Protection and System Tools protection components.
  • AVG Identity Protection provides protection against identity theft and unknown malware threats using behavioral monitoring.
  • AVG Anti-Virus plus Firewall provides the Anti-Virus, Anti-Spyware, LinkScanner, Anti-Rootkit, Web Shield, Security Toolbar and Firewall protection components.
  • AVG Anti-spyware was a rebranded version of ewido Anti-Spyware,that was integrated into AVG Anti-Virus as of version 8.0. A free version was also available, having now been merged into AVG Anti-Virus Free Edition
  • AVG Anti-Rootkit was a free anti-Rootkit program that was discontinued as of late 2006. Like AVG Anti-Spyware, it has now been merged into AVG Anti-Virus
  • AVGADMIN is a remote administration tool, which allows the software to be managed centrally on networks.
  • AVG Anti-Virus provides the Anti-Virus, Anti-Spyware, LinkScanner, Anti-Rootkit, Web Shield, and Security Toolbar protection components.
  • AVG Anti-Virus Free Edition provides basic Anti-Virus and Anti-Spyware protection, plus the full AVG LinkScanner safe search and surf technology. There are some limitations with AVG Anti-Virus Free Edition compared to the commercial versions of AVG products and other free antivirus. These limitations include:
    • Less protection – AVG Anti-Virus Free Edition provides the same anti-virus and anti-spyware scanning engine as the commercial product; however, it lacks anti-rootkit. The older 7.5 Free Edition is perfectly capable of finding and disabling rootkits based on signatures, but cannot scan for rootkit-like activity. The 8.5 version of AVG Anti-Virus Free Edition version lacks any anti-rootkit capability. While there is no official protection for files from messaging sources, the Resident Shield component automatically scans files before they are opened or copied.
    • Infrequent updates – AVG Anti-Virus Free Edition receives updates via a lower priority service. Priority updating via high-speed servers is only available for the commercial versions of AVG products.
    • No telephone or e-mail technical support – There is no telephone or e-mail technical support provided by AVG for users of AVG Free Edition products anywhere in the world. AVG Free Edition users have access to support via the self-help AVG Free Forum.
    • Less customization – Scheduling options in AVG Anti-Virus Free Edition are very limited (only one scheduled update per day). However, the AVG Resident Shield configuration allows exclusions. The on-demand/scheduled scanner allows advanced testing options such as heuristics and reporting of password-protected archives reporting. Process priority for on-demand/scheduled scans can be dynamically adjusted over three different configurations.
    • No server support – AVG Anti-Virus Free Edition cannot be installed on server operating systems (such as Windows Server 2003), nor can it be used for the scanning of network drives. Note, the newer AVG 2011 free edition can be installed on Server operating systems like Windows Server R2.
    • AVG Anti-Virus Free Edition is only licensed for home and non-commercial use on a single computer

AVG Free Edition has previously been responsible for popup ads advertising the non-free versions of AVG Anti-Virus and AVG Internet Security , which claim to provide more comprehensive levels of protection. AVG Anti-Virus 8.5 Free Edition users are now also subject to a daily pop-up advertising campaign for a "recommended upgrade" to AVG Internet Security. A "manager" on the AVG free version forum states that this advertisement appears once per day for one month each year.

All versions of the AVG products, excluding AVG Anti-Rootkit Free Edition (now discontinued), are compatible with the 64-bit edition of Windows.

Visit Website 

Download

Avira Antivirus

Avira Antivirus:


Avira GmbH is a German antivirus software company. When founded, the company was called "H+BEDV Datentechnik GmbH". Its antivirus applications are based on the AntiVir scan engine also known as "Luke Filewalker" (referring to Luke Skywalker), first launched in 1988. For aesthetic reasons, the name was changed to Avira. Avira's engine has been licensed to Ashampoo, Ad-Aware, and Webroot WebWasher.Avira is one of the most widely used antivirus programs in the world, with 100 million users worldwide As of September 2009.The company supports the Auerbach Stiftung, a foundation created by the company's founder and CEO, Tjark Auerbach. It supports charitable, social, cultural, and science projects.                These applications are based on the AntiVir antivirus engine also known as "Luke Filewalker", first launched in 1988.
                On October 17, 2008, a major update to the search engine was released, which increased scanning speed by 20%.
                 Avira GmbH periodically "cleans out" the virus definition files, by replacing specific signatures with generic ones, which results in a general increase in performance and scanning speed. The last database clean-out was made on October 27, 2008, which caused problems to AntiVir Personal users when updating because of its large size (15 MB) and because of AntiVir Personal's slow servers. For that reason Avira GmbH added an additional 6 GB of bandwidth to the AntiVir Personal Servers and changed the updating process: Nowadays there are 32 smaller definition files which are updated regularly to avoid peaks in the download of updates.
Products :
         Avira AntiVir Personal is for personal use only and free of charge. Like most antivirus software, it scans disks for malwarerootkits.Avira AntiVir Premium or Avira Premium Security Suite. Avira updated all its products to version 10.0 in March 2010. and also runs as a background process, checking each opened and closed file. It can detect and possibly remove It also performs Internet updates (daily by default) in which it opens a window, with an advertisement suggesting that the user purchase

              As a free service, Avira offers a bootable rescue CD to all users, regardless of whether they have any installed Avira products (free or non-free), and irrespective of the machine's operating system. This CD contains its own bootable Linux-based operating system and the AntiVir program with its latest virus database. If a computer cannot be booted, the CD may be used to boot the machine into the AntiVir program, then to scan for and remove detectable viruses and other malware, thereby possibly restoring normal boot and operation.

Avira AntiVir Premium has several improvements over the free version, including:

  • Email scanning (POP3 and SMTP)
  • WebGuard to block access to malicious sites
Avira AntiVir Premium Security Suite has some more improvements over both versions, including:

  • Anti Spam for E-mail
  • Firewall blocks hackers
  • Backup System to protect and secure important data
  • AntiBot prevents dangerous botnets from taking over your system
  • Parental Controls blocks unsuitable websites for Children and Teens
Product feature summary:
Click on the image to view larger Image


Reviews :
        AV-Comparatives awarded Avira AntiVir Premium with the highest score, the "Advanced+" distinction, in February, May, and August 2008, earning it the 2008 "AV Product of the Year" award. This large-scale comparative test saw Avira achieve an "excellent" score for its proactive detection performance. In the "Speed" category, Avira made it to the winner’s podium.
            In January 2008, Avira AntiVir was given a rating of 6.5 out of 8 in tests for detection and removal of rootkits and 71% for proactive virus detection by Anti-Malware Test Lab; both scores qualified for "gold" status, the highest award. Avira achieved the highest Malware Detection rate, along with G-DATA Antivirus, 98%, and was one of five products that achieved a 90% or higher spyware detection rate in the latest AV-Test performed in February 2010. AV-Comparatives also awarded Avira with an Advanced+ rating (the highest) in their latest test. Avira had the highest signature and proactive detection rates in all major independent antivirus tests. In April 2009, PC Pro awarded Avira Premium Security Suite 9 six out of six stars and a place on its A-list for internet security software. In August 2009, Avira AntiVir Personal Antivirus achieved a 98.9% percent overall malware detection rate, and was the fastest for both on-demand scans and on-access scans conducted by PC World, who ranked it first on its website. Neil J. Rubenking from PC Magazine gave the latest version of Avira (version 10) 3.5 out of 5 stars.

Avira was among the first companies to receive OESIS OK Gold Certification. This shows that both the antispyware and antivirus components of several of their products have achieved the maximum compatibility score with widespread network technologies (like SSL/TLS VPN and Network Access Control) from Juniper Networks, Cisco Systems, SonicWALL and others.
Avira has also received VB100 awards, the most recent in August 2009.

Rogue software:

(with similar name) In July 2010, a rogue security program called "Antivir Solution Pro" was reported as a threat; it is probably from the family known as AV Security Suite. This software had nothing to do with nor had any affiliation with Avira, but used a similar name to Avira's software.

BitDefender


BitDefender is an antivirus software suite developed by Romania-based software company SOFTWIN. It was launched in November 2001, and is currently in its thirteenth version. The 2011 version was launched in August 2010, and it includes several protection and performance enhancements as Search Advisor and Performance Optimizer.

The BitDefender products feature antivirus and antispyware, personal firewall, privacy control, user control and backup for corporate and home users. PC Tuneup and Performance Optimizer are available in the Total Security Suite.


BitDefender replaced SOFTWIN's earlier AVX  (AntiVirus eXpert) product range. Between 1996 and 2001 AVX became a product available worldwide that offered intelligent updating without user intervention and integrated an internal browser which scanned and monitored all downloaded files. AVX hold the first behavior- based application blocking technology and it was the first antivirus product to include personal firewall features. With the sixth generation of AVX, the product became the first antivirus to include an application firewall as well as behavior- based blocking. The BitDefender group spun off from SOFTWIN in 2007.
          The BitDefender range includes antivirus products for home users, businesses, enterprise users and Internet service providers. Home editions support Microsoft Windows, Symbian OS, Windows Mobile and Mac OS X (Beta); business and enterprise editions support Microsoft Windows, Linux and FreeBSD. The current version of the Home/Home Office security suite includes antivirus, anti-spyware, firewall, e-mail spam filtering, backup, tune-up and parental control components. A free basic online scan is offered via the BitDefender website. The Free version however does require free registration and is valid for 1 year after registration. Bitdefender is designed to protect computers from viruses and spyware. Older versions of BitDefender are made available for free download when newer versions are released. The first version which was made freely available was version 6. As of May 2009, version 12 of BitDefender is freely available for download. Unlike the commercial version, the free version only offers an on-demand virus scanning and doesn't provide real time scanning, and may therefore be less suitable for machines with a continuous connection to the internet.

Click on the Image to view larger one

       BitDefender Antispam NeuNet BitDefender Antispam NeuNet, short for Neural Network is an antispam filter pre-trained by the BitDefender Antispam Lab on a series of spam messages, so that it learns to recognize new spam by perceiving its similarities with the messages it has already examined.

B-HAVE
         In May 2005 BitDefender introduced a new technology, B-HAVE (patent pending), to reduce dependency on virus signatures through proactive detection of unknown threats. This technology is based on behavioral analysis in a virtualized environment.

           To determine whether a program is malicious or not, this technology makes use of a virtual PC in which files are executed and analyzed. The virtual PC includes a set of virtual hardware devices, mimicking the configuration of a typical PC. B-HAVE checks for characteristics known to be associated with malware. A program may be deemed to be malicious if it attempts to modify certain files, read from or write to a sensitive area of the memory or create a file that is a product of a known virus. When attempting to use an un-trusted program, B-HAVE delays the launching until the program’s behavior and characteristics are analyzed and catalogued in the virtual environment. If no malicious actions are detected, B-HAVE starts the program normally; if a suspect conduct is present, B-HAVE automatically quarantines or deletes the application.

Active Virus Control Incorporated in the 2010 product suites, BitDefender introduced another technology, Active Virus Control, in August 2009.

                 Active Virus Control continuously monitors each program  (specific processes) running on the PC, as it executes, and it notes any malware-like actions. Each of these actions is scored and when a given threshold is reached, the process is reported as harmful. Unlike heuristic technologies that check executable files when they are accessed or first started, Active Virus Control monitors everything applications do as long as they are active. Because of this approach, Active Virus Control is considered a third layer of defense.

                 BitDefender Total Security 2011 - Comprehensive protection against viruses, spyware, hacker attacks and other electronic threats, which can lead to identity theft, data loss and reduce system performance. BitDefender Total Security ranks first among its competitors thanks to effective protection from spam and viruses, secure firewall and the availability of tools to optimize and backup systems in one package.

Taking into *** the intuitive interface for novice users and a minimum load on system resources, BitDefender can be considered one of the best products in security at the moment. There are three modes: basic, standard and enhanced. As the complexity of the functions in them increases. In each mode (at any time it can change) is tuned in "home" window, in which some features are deleted as unnecessary in the background, while others are activated.

Antivirus and fairvol as standard security tools provide protection against most threats, but multifunctional systems capable of more. The main purpose of Bitdefender Total Security 2011 - to guarantee the security of personal data to detect system vulnerabilities and maintain control over children.

In Advanced mode interface clearly lists a number of tools available. Certain categories of reserved antivirus, antispam and fairvol. Setting up their parameters is carried out through the slide buttons and tabs. The effectiveness of antivirus system for detection and neutralization of threats can not be compared, and the configuration fairvol requires no special effort with intuitive interface.

In addition, the utility is a function of parental control over Internet access and applications, as well as control over personal safety in the global network. Besides the basic functions, the monitor application monitors the system's vulnerability, namely, the presence of updates Microsoft Windows, performance of vital programs and Passwords Windows. If necessary add-missing or outdated, the utility notifies the user and wish to download and install them.

Under the backup set schedule backup data to local disk or server space 2 GB. File Safe encrypts sensitive information and instant messaging. Above all, there are optimization tools like disk defragmenter, a master of clean and restore the registry, and disk cleanup.

The main components of BitDefender Total Security 2011:
? Antivirus and antispyware
? Firewall
? Protection against phishing
? Encrypting chats
? Quick Scan
? Family Network Protection
? Verification of Smart Scan
? Planner Smart Schedule
? Help System Smart Help
? Smart Sense
? Parental Control
? Anti-Spam
? Encrypt files
? System Configuration
? Online Backup
? Performance Optimization
? Personal Toolbar

New features BitDefender Total Security 2011:
? Redesigned and regulated system installation.
? Search Advisor warns about unsafe web pages displayed in search results, by checking each link with an online database BitDefender website addresses.
? Firewall Troubleshoot Wizard - master of solutions to common problems associated with the Internet, a printer and a remote office (VPN) connection.
? Performance Optimizer shows what programs slow down your computer and suggests remedial measures.
? The level of protection adapted to the computing power of the computer. BitDefender Total Security 2011 is configured in conformance with the volume doustupnoy memory and processor type.
? Customize Toolbar favorite sections and action program for the interface Basic and Intermediate.

Operating system: XP, Vista, 7
Language: En
Activation: Yes

Antivirus

Antivirus or anti-virus software is used to prevent, detect, and remove computer viruses, worms, and trojan horses. It may also prevent and remove adware, spyware, and other forms of malware. This page talks about the software used for the prevention and removal of such threats, rather than computer security implemented by software methods.

              A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions.

             No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance. Inexperienced users may also have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.
Here u can find a complete list of antivirus software with comaprisons
http://en.wikipedia.org/wiki/List_of_antivirus_software


There are several methods which antivirus software can use to identify malware.
           Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces.

           Heuristic-based detection, like malicious activity detection, can be used to identify unknown viruses.
           File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions.
               Signature based detection Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be very effective, but cannot defend against malware unless samples have already been obtained and signatures created. Because of this, signature-based approaches are not effective against new, unknown viruses.
               As new viruses are being created each day, the signature-based detection approach requires frequent updates of the virus signature dictionary. To assist the antivirus software companies, the software may allow the user to upload new viruses or variants to the company, allowing the virus to be analyzed and the signature added to the dictionary.
              Although the signature-based approach can effectively contain virus outbreaks, virus authors have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and, more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.

            Heuristics Some more sophisticated antivirus software uses heuristic analysis to identify new malware or variants of known malware.

             Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Generic detection refers to the detection and removal of multiple threats using a single virus definition.

                For example, the Vundo trojan has several family members, depending on the antivirus vendor's classification. Symantec classifies members of the Vundo family into two distinct categories, Trojan.Vundo and Trojan.Vundo.B.
          While it may be advantageous to identify a specific virus, it can be quicker to detect a virus family through a generic signature or through an inexact match to an existing signature. Virus researchers find common areas that all viruses in a family share uniquely and can thus create a single generic signature. These signatures often contain non-contiguous code, using wildcard characters where differences lie. These wildcards allow the scanner to detect viruses even if they are padded with extra, meaningless code. A detection that uses this method is said to be "heuristic detection."
             Rootkit detection Main article: Rootkit Anti-virus software can also scan for rootkits; a rootkit is a type of malware that is designed to gain administrative-level control over a computer system without being detected. Rootkits can change how the operating system functions and in some cases can tamper with the anti-virus program and render it ineffective. Rootkits are also difficult to remove, in some cases requiring a complete re-installation of the operating system.

Issues concerning Antivirus softwares

Unexpected renewal costs        
         Some commercial antivirus software end-user license agreements include a clause that the subscription will be automatically renewed, and the purchaser's credit card automatically billed, at the renewal time without explicit approval. For example, McAfee requires users to unsubscribe at least 60 days before the expiration of the present subscription while BitDefender sends notifications to unsubscribe 30 days before the renewal. Norton Antivirus also renews subscriptions automatically by default.

Rogue security applications 
          
           Some apparent antivirus programs are actually malware masquerading as legitimate software, such as WinFixer and MS Antivirus. Problems caused by false positives                      
              A "false positive" is when antivirus software identifies a non-malicious file as a virus. When this happens, it can cause serious problems. For example, if an antivirus program is configured to immediately delete or quarantine infected files, a false positive in a essential file can render the operating system or some applications unusable. In May 2007, a faulty virus signature issued by Symantec mistakenly removed essential operating system files, leaving thousands of PCs unable to boot. Also in May 2007 the executable file required by Pegasus Mail was falsely detected by Norton AntiVirus as being a Trojan and it was automatically removed, preventing Pegasus Mail from running. Norton anti-virus has falsely identified three releases of Pegasus Mail as malware, and would delete the Pegasus Mail installer file when this happens. In response to this Pegasus Mail stated:

“ On the basis that Norton/Symantec has done this for every one of the last three releases of Pegasus Mail, we can only condemn this product as too flawed to use, and recommend in the strongest terms that our users cease using it in favour of alternative, less buggy anti-virus packages. ” In April 2010 McAfee VirusScan detected svchost.exe, a normal Windows binary, as a virus on machines running Windows XP with Service Pack 3, causing a reboot loop and loss of all network access.

In December 2010, a faulty update on the AVG anti-virus suite damaged 64-bit versions of Windows 7, rendering it unable to boot, due to an endless boot loop created.
               When Microsoft Windows becomes damaged by faulty anti-virus products, fixing the damage to Microsoft Windows incurs technical support costs and businesses can be forced to close whilst remedial action is undertaken.

System and interoperability related issues     
               Running multiple antivirus programs concurrently can degrade performance and create conflicts. However, using a concept called multiscanning, several companies (including OPSWAT, G Data and Microsoft) have created applications which can run multiple engines concurrently.
             It is sometimes necessary to temporarily disable virus protection when installing major updates such as Windows Service Packs or updating graphics card drivers. Active antivirus protection may partially or completely prevent the installation of a major update.

                   Support issues also exist around antivirus application interoperability with common solutions like SSL VPN remote access and network access control products. These technology solutions often have policy assessment applications which require that an up to date antivirus is installed and running. If the antivirus application is not recognized by the policy assessment, whether because the antivirus application has been updated or because it is not part of the policy assessment library, the user will be unable to connect. Interoperability testing and certification for antivirus applications is offered by the OESIS OK Program.

Effectiveness Studies in December 2007 showed that the effectiveness of antivirus software had decreased in the previous year, particularly against unknown or zero day attacks. The computer magazine c't found that detection rates for these threats had dropped from 40-50% in 2006 to 20-30% in 2007. At that time, the only exception was the NOD32 antivirus, which managed a detection rate of 68 percent.

The problem is magnified by the changing intent of virus authors. Some years ago it was obvious when a virus infection was present. The viruses of the day, written by amateurs, exhibited destructive behavior or pop-ups. Modern viruses are often written by professionals, financed by criminal organizations.

Independent testing on all the major virus scanners consistently shows that none provide 100% virus detection. The best ones provided as high as 99.6% detection, while the lowest provided only 81.8% in tests conducted in February 2010. All virus scanners produce false positive results as well, identifying benign files as malware.

Although methodologies may differ, some notable independent quality testing agencies include AV-Comparatives, ICSA Labs, West Coast Labs, VB100 and other members of the Anti-Malware Testing Standards Organization.

New viruses Most popular anti-virus programs are not very effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild.

Some new viruses, particularly ransomware, use polymorphic code to avoid detection by virus scanners. Jerome Segura, a security analyst with ParetoLogic, explained:

“ It's something that they miss a lot of the time because this type of [ransomware virus] comes from sites that use a polymorphism, which means they basically randomize the file they send you and it gets by well-known antivirus products very easily. I've seen people firsthand getting infected, having all the pop-ups and yet they have antivirus software running and it's not detecting anything. It actually can be pretty hard to get rid of, as well, and you're never really sure if it's really gone. When we see something like that usually we advise to reinstall the operating system or reinstall backups. ” A proof of concept malware has shown how new viruses could use the Graphics Processing Unit (GPU) to avoid detection from anti-virus software. The potential success of this involves bypassing the CPU in order to make it much harder for security researchers to analyse the inner workings of such malware.

Rootkits

                      The detection of rootkits are a major challenge for anti-virus programs. Rootkits are extremely difficult to detect and if undetected, rootkits have full administrative access to the computer and are invisible to users, so that they will not be shown in the list of running processes in the task manager. Rootkits can modify the inner workings of the operating system and tamper with antivirus programs.

So the best way is to use only the known and best used antivirus in the market and update it regularly

Sunday 8 May 2011

Spyware Nuker:(Spyware and Adaware Removal Tool)


               Did you know that SPYWARE is the number one threat to personal computing? Also, 9 out of 10 PCs that are hooked up to the INTERNET are infected with SPYWARE or ADWARE, and in most cases both! Not only can SPYWARE and ADWARE ruin your expensive computer forever, but they can possibly lead to you being fired from your job or even divorced. People can also be sent to prison for what SPYWARE has added to their computer!

                 Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
              While the term spyware suggests software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet connection or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is provided by the term privacy-invasive software.
                In response to the emergence of spyware, a small industry  antispyware has sprung up dealing in  software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.
                 These programs allow hackers and advertising companies to track your every move, both online and even when you work offline. They can track the websites you visit, the items that you buy online, the emails you send and receive, your Instant Message dialog, and worst of all they can even record your credit card number, personal identification numbers, and all of your passwords. If you use dial-up to connect to the Internet then spyware can be used to bill 900 numbers to your phone bill. This is just a short list of the harm that spyware can cause.
                    Adware applications are installed onto your PCs hard drive by Internet advertising companies that allow them to inundate you with pop-up ad after pop-up ad all day long. Have you ever noticed a strange icon on your desktop or start menu and wondered where it came from? Have you ever logged on to the Internet to find that your home page had been switched? Are there strange search bars on every page you visit? These are all adware programs. These program can place icons almost anywhere on your PC, they can change your home page whenever they wish, and they control your google search results so you see the results that they want you to see.


SPYWARE and ADWARE are very horrible programs that you really should remove from your home and office computers right away!

How can Spyware lead to people being fired or divorced?
There are hundreds, possibly thousands, of SPYWARE programs that allow people to monitor what you do online. Many spouses and employers secretly download these SPYWARE programs onto their PCs so they can monitor everything their employees and spouses do online. These programs can do all of the following if not more:
  • Every WEBSITE you visit
  • EMAILS you send and receive
  • INSTANT MESSAGES sent and received
  • CHAT ROOM conversion made
  • Every PROGRAM that your run
  • Every KEYSTROKE you type

You don't want people spying on you to make sure you are a good person do you?
        There are also SPYWARE programs out there that allow people to secretly download image onto your PC. What if someone wanted to get you in trouble and downloaded a program that allowed them to place illegal content onto your hard drive such as child pornography or terrorist activity files? This type of SPYWARE could get you in serious trouble!
How can SPYWARE and ADWARE infect my computer?
                             Your PC has a 90% chance of being infected with spyware and adware if you have ever downloaded any of the following:
SCREENSAVERS
MUSIC
GAMES
MOVIES
PICTURES

Malicious programmers have released a large number of rogue (fake) anti-spyware programs, and widely distributed Web banner ads now spuriously warn users that their computers have been infected with spyware, directing them to purchase programs which do not actually remove spyware—or else, may add more spyware of their own.
                   The recent proliferation of fake or spoofed antivirus products has occasioned some concern. Such products often bill themselves as antispyware, antivirus, or registry cleaners, and sometimes feature popups prompting users to install them. This software is called rogue software.
                    It is recommended that users do not install any freeware claiming to be anti-spyware unless it is verified to be legitimate. Some known offenders include:
Fake antivirus products constitute 15 percent of all malware.
On January 26, 2006, Microsoft and the Washington state attorney general filed suit against Secure Computer for its Spyware Cleaner product. On December 4, 2006, the Washington attorney general announced that Secure Computer had paid $1 million to settle with the state. As of that date, Microsoft's case against Secure Computer remained pending.
 Don't be in a haste and Buy some Rogue  product.Think over and find a better solution like this Spyware Nuker.

How effective is Nuker?

Honestly, we have to constantly battle the spyware and adware developers on a daily basis. Their intelligent technical team searches every cyber nook and cranny 24/7 to hunt out and locate any new spyware and adware files that have been created so that Spyware Nuker can remove them from any PC. As  mentioned, there are currently 78,000 adware and spyware programs lurking on the Net today. New infections are being created constantly, and the Spyware Nuker Team will find them and send you an update so you can remove them.


Spyware Nuker XT, the fourth generation of anti-spyware software produced by Trek Blue, represents hundreds of person hours of hard work by our development and quality assurance team to bring you the latest features and anti-spyware protection available.
                  If you have Spyware Nuker 2004 or Spyware Nuker 2005 already installed you are eligible for a FREE upgrade. To upgrade your version of Spyware Nuker to Spyware Nuker XT you should download and execute the update file through your current Spyware Nuker version (Start Spyware Nuker 2005, go to Advanced Option, click on 'Check Now' button and click 'Yes' when prompted for update). As an alternative, you can click here to manually download and install Spyware Nuker XT.
Here is an overview of the exciting new features we have included:
Requirements
Most Windows-based computers used today are able to run all Trek Blue software. However, about 1 percent of Windows based personal computers in active use are below minimal required configuration. Please read carefully to see if your system matches the requirements.

Software requirements:
Windows 98 or later (Windows 2000 or later for Active Protection module).
Internet Explorer 5.0 or later.
Hardware requirements:
233 Mhz Pentium processor or better, 16MB RAM, 10MB free hard drive space, Mouse, Internet Connection (dial-up modem, cable modem or DSL) for program updates.

SpyWare Nuker is not compatible with MAC, Linux, or any other non-Microsoft operating system.