Anti-virus is the name given to software that detects and (where possible) removes viruses from Documents, Files & as well as from folders. Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, Trojan horses, and spyware & ad ware.
Computer Viruses are written by people who wish to gain control of your system resources & are continually updated to try and break through any barriers you may have installed. GMS Anti-Virus overcomes this issue by providing a “signature file” update service which ensures that all new variants are caught as soon as possible A variety of strategies are typically employed.
Signature based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox & analyzing what it does to see if it performs any malicious actions.
No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer’s performance. In experienced users may also have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach.
If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack. Criminals can be programmed by virus writers specific pests and bring them to the Internet. The goal: to your computer. The bad guys are after your data here, or they want to take the same control over the entire PC. You can protect themselves with an antivirus program. While there are many manufacturers also complete security suites, but we wanted to know what the pure anti-virus programs can do. Because many users to provide their own security packages together. Finally some free firewalls are among the most popular system tool. Therefore, we have investigated 13 pure virus hunters, and accurately pre buttoned. To find the tool that best fits your security concept.
This is what anti-virus tools a good antivirus program should block all the pests before they can become active. Therefore, the virus monitors the most important module in these programs. It should generally always beat an alarm if a malicious file reaches the computer and the latest when the file is stored on the hard disk. An example A worm arrives as an attachment to a mail in your mail program. The simple guards responded not yet. But should a careless user start the Annex, it will be stored first on the hard disk. Now the monitor is active, because it scans every file that is created or accessed. It blocks the execution of the worm and report the find Mission accomplished. Several anti-virus programs come with additional features, such as a mail guard that scans attachments before they arrive in the mail program. The system maintains an even cleaner, but ultimately no better protection against infection. The second major module is the scanner. You should therefore regularly check all hard drives.
Flood of viruses (update event)
In recent months the number of new malware has grown exponentially. The security lab AV Test.org has already collected nearly seven million pests. In this mass of new pests respond to AV-tool manufacturers is that they increase the number of updates with new virus signatures – some manufacturers exaggerate the extreme. G Data , the winner, forcing its customers to an average of 24 updates per day. So come together after a week of about 7.5 MB of data, the user must download the. The benefits for users: It is very fast protection against new threats. But this system has limitations that are now potentially reach it is clear that the example of AVG. Even more updates per day create some problems in quality assurance. That is why some manufacturers to develop new techniques to block malware even if there are still no updates.
Behavior based analysis
The new strategy called behavior-based analysis. The anti-virus tool to investigate the behavior of a program. If certain conditions are met, the tool alarm. Has a code about not visible, it builds on an Internet connection, and he also recorded the keystrokes should smell a rat, the behavioral analysis can be engaged by the program, the pest before he sends some data. The manufacturers are here to varying degrees and varying degrees of success. We recorded the behavior based analysis in our test course. Some tools discovered while the pests with their heuristics, which we also basically right. You can find these results together with all others in our table at the end of the article. The improvement or development of modules for the behavior-based analysis is for the manufacturers probably the biggest challenge in the coming months. Because the number of new viruses every day will continue to rise, and recognition of signatures alone cannot keep up anymore.
How we test Antivirus Software
The PC World tested antivirus programs in five categories and weighted for the final
grade as follows:
- Scan performance 50%
- Features 20%
- Service / Support 15%
- Operation 10%
- System Requirements 5%
Our specialist Andreas Marx and Maik Morgenstern Guido hawk from safety test laboratory AV undergo any anti-virus program a thorough test. Virus scanning and virus guards must run Windows XP 1412 spread pests (ITW malware In the Wild) track.
The scanner must be in addition to 768 457 copies from the collection of zoo malware (not as prevalent as ITW malware) try. Good programs are at the ITW and zoo malware more than 90 percent. In addition, the tools must find the installation files of ad ware and spy ware. Then let the experts find the tools for active and inactive root kits. In the inactive root kits are the installation files, this should definitely be found. Active root kits have been made invisible and are difficult to detect. Next, we test the behavior-based detection also called behavioral analysis. Here need to recognize the tools without virus signatures, the pests. Last among the specialists, the software on a speed test: To copy a set of files, once with and once without an activated virus guard. The scanner must then check to 760 MB files.
Facilities include anti-virus software, a scanner, which scours the hard drive after manual call for pests, a resident anti-virus monitor that monitors your PC, and a function to download new virus signatures. A scheduler should also be there as a quarantine. Well, we still find the options with which to create a rescue CD can.
Antivirus software should be easy to operate without a long orientation period. If the tool finds a pest, clear instructions on how to proceed and detailed information is important for the reported discovery. Ideally, also achieves a precise configuration of the tools easily.
Here we consider about how much the system performance tools require and on what version of Windows they are running.
2016 Antivirus Test
Against viruses and Trojans and other threats from AVG Antivirus. The free tool detects and removes viruses and malicious programs of all types and protects your computer permanently. The AVG offers numerous protections against viruses, worms and Trojans. AVG scans your computer using virus signatures. Detections may be deleted at the request immediately. By the so called smart updates the signatures are kept up to date. With the On Guard Protection offers AVG Antivirus protection for files (File Guard) and a guard mail (e-mail Guard).
Service and Support
Here we assess the information on the manufacturers’ websites and check how expensive is a call to the hotline. Our AVG technical support have also measured how often do you update the tools and how large the.