Anti-virus computer protection | Share experiences on setting up, get rid of the virus, discussing ...



Rep: (2183)

Catalog of antivirus solutions
Additionally


Post has been editedstp101 - 21.04.18, 13:16
Reason for editing: New header. Rammsteiner cap tweaked



Rep: (2183)
Firewalls

Outpost Firewall
Attached Image
Outpost Firewall Pro - Personal firewall that provides comprehensive protection on the Internet. Rightfully ignoring one of the best tools to protect personal computers, Outpost Pro combines all the latest advances in security technology and is the best solution to ensure the security of your system.
The main advantages of Outpost Firewall Pro
Secure Internet Access
Firewall is a two-way traffic control stops inappropriate or malicious access to your computer from the local network or the Internet. As a frontline defense, it prevents malware from spreading, providing protection against burglary, unknown virus infection, interception and unauthorized network activity.
Proactive Threat Protection
Module "Local security" controls the interaction of programs to prevent unknown or suspicious transactions. Powerful tracking mechanisms, authenticated by numerous tests for leakage of data, you can protect your system from threats unrecognizable.
Complete victory over spyware!
Due to the automatic detection and removal of all types and classes of spyware, Outpost ensures the safety of your data and fast, not burdened by unnecessary advertising or software work. Access Monitor continuously protects your computer from intrusion attempts and activation spyware, and optimized architecture makes scanning quick and undemanding to resources.
Stay Safe on the Internet
Advanced module "Web Control" will protect you from the "dark side" of the Internet, including the risks of treatment to infected resources, stealing personal data, collect information about your preferences, intrusive advertising and other attacks on your privacy.
Bulletproof self-defense
Viruses and hackers can not disable the program Outpost, so it will always stay in your security guard.
Work with the highest productivity
What would you do on a computer, protected Outpost - it will always work as new, so few resources to meet your needs. Key mechanisms have been optimized to provide maximum performance, allowing you to concentrate on the job, while working to ensure the security incurs Outpost.
Powerful protection that's easy to use
Regardless of whether you are a novice or an expert in computer security, the program is very easy to use. Switchable intensity levels of protection and a simple, intuitive interface to make easy work quickly and efficiently.

Download:


Comodo firewall
Attached Image
Promising, highly intelligent firewall with the highest level of PC protection from intruders. Free, a kind of alternative to all paid counterparts.
Download:


ashampoo FireWall

Attached Image
Ashampoo company known primarily by a series of its various system utilities. Among these optimizers, tools for recording, and a variety of multimedia applications. It seems that the developers decided to expand its presence in the market of Internet applications, releasing a software firewall, or simply speaking Firewall.
Main features
  • Reliable protection: monitoring of all network activity and prevent potentially dangerous external attacks
  • Simple Mode: using automatic wizard, you can configure policies for individual applications
  • Expert mode: Users have full control and the ability to customize applications
  • simple and intuitive interface and a low consumption of system resources
  • Training mode: automatically detects applications that attempt to connect to the network, and suggests setting permission
  • Rules: the ability to set certain conditions to control access of individual applications
  • full blocking mode: designed for instant deny access to all applications in the event of danger of data leakage
  • monitoring local connections: mode to track suspicious connections in a LAN environment
  • Event Log: Displays information about connections each application to a specific remote address and port


Download:


Post has been editedGloomy - 14.10.11, 12:42



Rep: (2183)
McAfee products

McAfee Internet Security
Attached Image
Award-winning antivirus PC protection, protection from theft and spyware. Safe search and browse content on the Internet
McAfee Internet Security is safety ratings to sites and search results in search engines on the basis of comprehensive tests for the presence of the security mechanisms of spam mailings, promotional programs and fraudulent activities using the Internet. When dealing with search engines Google, Yahoo! or MSN remedy McAfee SiteAdvisor adds to the visual security indicators search results - red (dangerous content), yellow (use caution) or green (safe content). These indicators allow to make better decisions when you visit a particular website.

Features built into the software package:
Regular update
McAfee Internet Security makes regular automatic updates, which helps protect the receivable from evolving Internet threats
Virus protection
McAfee VirusScan Plus automatically protects your computer from viruses, mass-mailing worms, Trojans and many other viruses. The program also automatically removes viruses, or puts them in quarantine, with minimal interference in your computer.

McAfeeSystemGuards monitors processes that may indicate that your computer is exposed to viruses, spyware, or hacker.
SystemGuards continuously monitors key system files, host file and browser settings for suspicious changes (such as DNS substitution, in which the attackers redirect the user to fraudulent sites), or action that may disrupt the anti-virus protection
McAfee X-Ray for Windows allows you to remove from your computer rootkits, and other malicious software that may be deeply embedded in your operating system

Protection from hackers
Continuous monitoring of incoming and outgoing traffic can effectively deal with McAfee to hackers and fraudsters involved in identity theft and to prevent operation of malicious programs that can seize control of the system (for example, to send unsolicited messages), or introduce a virus program that violate privacy. Quick and easy installation, customizable security levels, the function of the visual trace the path, smart alerts, full screen mode and automatically customized functions - all this will fine-tune your protection, identify the source of the threat and act to block suspicious programs that may transfer your personal data " to the right place. "

Other features
hidden presence mode allows you to almost completely hide your presence from hackers on the network.
HotSpot (automatic detection of entering the insecure Internet zone) automatically increases the level of protection McAfee Firewall at work outside the trusted network.
protection function of the system during boot blocks unauthorized connections to the computer system to a complete security software download

Protection against spyware

McAfee Protection from spyware can detect, block and remove spyware, adware and other suspicious programs before they try to steal passwords to log into the system ( "keyboard loggers"), or start tracking your movements on the network or (a cookie file) or output on the screen a large and intrusive ads while browsing the Internet. Better protection based on the use of the new built-in protection against viruses and spyware. Now this protection detects and blocks tracking a cookie.

Network monitoring
McAfee Internet Security checks McAfee properly installed on your computer.

Improving the efficiency of your computer
McAfee SecurityCenter Displaying a toolbar, you can quickly assess the security status of your computer and make the necessary changes with one click. You can also easily check for updates, fix potential security problems and view the settings in the normal and advanced modes.
With built-in McAfee QuickClean McAfee technology, Internet Security helps optimize the performance of your computer by removing contaminating the hard disk Internet files (such as temporary files, cached files, file fragments, and Active code X), as well as unused programs and other unnecessary system junk to free valuable disk space. QuickClean also represents a network map that shows the security status of your home network.

Personal data protection

McAfee Internet Security helps protect your personal data and financial information (such as name, phone number, credit card number and bank account) from the unauthorized transmission over the Internet. McAfeeShredder feature allows you to permanently delete confidential files and thereby protect your privacy.

McAfee tools to protect against viruses, spyware, spam, and firewall work together, forming a layered defense against threats to identity thieves who can use a combination of malware to steal files, credentials to enter the financial system, and other personal information, user identification.

Protection from spam and fraudulent actions by e-mail
McAfee Internet Security automatically detects and blocks unwanted messages, including messages in foreign languages, as well as letters by which the fraudsters can get users to run a virus. Thus, junk mail is blocked and only messages from trusted sources come to you. Regular updates of the Junk E-mail Filter guarantee reliable protection against spam. More accurate analysis of mechanisms, filtering and blocking unwanted messages can reduce the number of locks allowed letters.

Protecting children from harmful influences at work on the Internet
McAfee Internet Security helps protect family members from viewing inappropriate Web content and online predators by age settings and easy-to-use filtering options. In addition, the package includes McAfee ImageAnalyzer, protecting children from viewing obscene images.

Backing up and restoring files

McAfee Internet Security provides automatic backup, preserving irreplaceable photos, music files, videos and documents on CD-, DVD-, USB-media, or external or network drives. Extract files from archives possible with one click.


Download:


Post has been editedGloomy - 14.10.11, 12:53



Rep: (1)
Valerius Grim @ 08/31/09, 0:17*
Scanner from a flash drive?

Yeah, keep antivirus megahit with 128 RAM and 100 megabytes of free space on the tin is not very desirable.



Rep: (2183)
Virusirus
Attached Image
a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, Trojans and all types of malicious programs detected by Kaspersky.
Description:
  • Free independent service
  • The use of multiple anti-virus systems
  • Automatic updating of virus databases in real-time
  • Detailed results for each antivirus
  • Global real-time statistics


Attention:
VirusTotal is not substitute any antivirus software installed in your PC. Performed only check individual files on demand.
Although the detection rate is ensured by using multiple anti-virus programs, these results do not guarantee the harmlessness of a file.
Currently, there is not any solution that would provide 100% efficacy for detecting viruses and malware. You can become a victim of misleading advertising, if you purchase a product with a 100% guarantee of detection.



Rep: (2183)
Avira

Avira AntiVir
Attached Image
Reliable protection against viruses, worms, Trojans and dialers pay sites
  • Very modest resource requirements
  • Automatic update
  • Ease of maintenance

Premium Features:
  • Built-detection system espionage and advertising programs
  • Additional protection for email traffic (POP3)
  • Special dedicated file server for fast uploads data
  • User-settable intervals updates
  • Ability to check the selected directories

Key features:
  • Protection against viruses, worms and Trojans
  • Protection against spyware / adware
  • Additional virus email protection (POP3)
  • Phishing Protection
  • Monitoring in real time
  • Preventing download malicious files from the infected sites
  • Scanning for viruses with a boot disk
  • Checking the data downloaded from the Internet



Download:


Avira Premium Security Suite
Attached Image
High-quality anti-virus, developed by German programmer. This program has always distinguished the quality of work and quick response to new viruses. Avira AntiVir includes a resident monitor, scanner, and software updates. Anti-Virus can continuously monitor the files and archives, which may be potential carriers of viruses. Are found also and macros that are embedded in Office documents. The program is not demanding to resources and has shown good results in terms of speed and quality of research.
Full protection for your computer. Personal firewall and anti-spam modul.Mnogokratno noted and recognized by 15 million users of the software to protect against viruses and malware are now equipped with personal firewall and antispam module.
Program features:
· Full package with virus scanner, email protection (POP3), personal firewall, anti-spyware, phishing and rootkits ...
· The product is easy to install
· Easy configuration with individual selection between standard and expert mode
· Extremely high performance and detection rates, ensuring the application of the latest safety standard (technology AHeAD)
· Small size of update files
· Protection against rootkits
· AntiSpam and proactive anti-phishing
The advantages of the firewall:
· Adjustable rules to control the traffic of all inbound and outbound connections, including wireless.
· Protection against DoS-attacks (blocking the computer from a huge number of requests from the outside)
· Easy installation-level security by using the slider.

Download:


Post has been editedGloomy - 14.10.11, 12:55



Rep: (118)
Valerius Gloomy,
maybe it's all in a hat and under different spoilers? : Rolleyes:


I hope there is not only a reference to anti-virus / firewalls, but also to discuss-they can be a little?

That's about the firewall - should I have all known Outpost Firewall Pro. In principle, he lingered on my computer because of the built-in ability to cut advertising, with which he deals, in principle, on the level. As for other features, the first time he IMHO reminded infuriated mongrel, which should be almost on every prog / game to explain that this is not an evil spy, and necessary and useful thing. In particular, trying to control the torrent Outpost to the end of the day gradually zazhiratsya all computer resources and bring sisemu stupor could just reset. After setting up, of course, all it plowed normal, but the sediment remained ...

1. Do I need to W7 firewall at all?
2. What alternative competently cuts from sites advertising?
3. If you do not Outpost, then what? English-language Comodo?

Sobsno interesting. : Sveta:



Rep: (2183)
frag,
frag @ 31.8.09, 19:42*
maybe it's all in a hat and under different spoilers?

links to posts in the hat is. : Blush:
frag @ 31.8.09, 19:42*
What alternative competently cuts from sites advertising?

I have KIS 2010 installed. Advertising, like, normal cuts. Only there should be black and white lists for Anti-Banner to import into a program.
By the way, right now, I will add these lists.

Post has been editedValerius the Dark - 26.04.10, 09:48



Rep: (319)
frag @ 31.8.09, 20:42*
What alternative competently cuts from sites advertising?

I recommend admuncher try. really I do not know how she copes without a firewall, but combined, well ...

it is a pity that it does not have a poppy

Post has been editedand-rassk - 31.08.09, 20:37



Rep: (118)
ad muncher

thank you, but on Windows 7 that does not want to be put. Hanging process and all ...

Posted 01-09-2009, 05:01:

And, it is necessary to lastbeta. Then I put.
And still not assigned.

Post has been editedValerius the Dark - 26.04.10, 09:49
Reason for editing: two posts stuck together



Rep: (2183)
frag @ 1.9.09, 5:01*
And still not assigned.

So put Casper. There's Anti-Banner is.



Rep: (2183)
BitDefender

BitDefender AntiVirus
Attached Image
The aim of the module is guaranteed Antivirus detection and identification and removal of all viruses category «in the wild». BitDefender Antivirus uses a powerful scan engine, certified by ICSA Labs, Virus Bulletin, Checkmark, Checkvir and TUV.
Opportunities
Permanent antivirus protection
New optimized BitDefender scanning engines check and treat the infected files on access mode, minimizing data loss. Infected documents can be recovered instead of being simply removed.
Protecting applications Peer-2-Peer
Protects against viruses that spread via instant messaging programs and files.
Innovative behavior blocker
Blocks the execution of suspicious applications based on behavior analysis of their work. This method provides proactive protection against the latest viruses, Trojans, Internet worms and other potentially malicious code. The file system, registry and Internet activity are constantly monitored.
Full protection against email threats
Antivirus works at the level of protocol POP3, blocking any infected e-mail message, regardless of the mail client (MS Exchange, MS Outlook, MS Outlook Express, Netscape, Eudora, Lotus Notes, Pegasus, The Bat, etc.), without the need additional configuration.

Download:


BitDefender Internet Security
Attached Image
protects your PC, without compromising its performance. This solution blocks viruses, hackers and spam, providing parental control and firewall protection.
Opportunities
  • The improved antivirus websites Scan feature, email messages and Internet-pagers to detect viruses, spyware, which operates in real time.
  • Obespechivat proktivnuyu protection against new virus outbreaks using deep heuristic analysis.
  • Blocks attempts to steal personal information.
  • It prevents the theft of personal information by e-mail, web or Internet pagers.
  • Use encryption for Internet pagers
  • Automatically configures firewall protection under the required parameters
  • Wi-Fi observer helps to prevent entry of unauthorized users to your Wi-Fi network
  • Blocks access to inappropriate websites and incoming email messages
  • It sets a limit for children to access the Internet and various applications
  • It reduces the load on the system and makes it easier to communicate to players in the playing time
  • Minimum PC resource consumption
  • Laptop Mode saves energy computer
  • Improved scanning websites, email messages and Internet-pagers to detect viruses, spyware, which operates in real time
  • It provides proactive protection against new virus outbreaks using heuristic analysis.



Download:


Post has been editedGloomy - 14.10.11, 13:05



Rep: (584)
Valerius Grim @ 09/01/09, 12:50*
So put Casper. There's Anti-Banner is.

As far as I know, there are only seven for Kaspersky Anti-Virus (technical preview), and there is no bannerorezki.



Rep: (118)
So put Casper. There's Anti-Banner is.

I'm not a car to put Casper. In addition, a program needs either free or grunted and works to complete victory. And messing with keys trialresetami so not worth it.



Rep: (2183)
USB port protection
The program did not check!

USB Manager 1.2
Attached Image
The program serves as a helper in managing plug USB devices. It has functions of complete shutdown and including USB ports for printers, scanners and flash drives. The program will be useful for people who are not the only users of your PC and do not want that in their absence used any USB device, also useful in offices, where you can block USB ports, and set a password for their inclusion, thus preventing the use of devices for non-work purposes.
Features of the program:
  • off and on the types of USB ports for connecting devices;
  • possibility to close ports on password;
  • intuitive interface with support for Russian, Ukrainian and English.

Download:


USB Disk Security 2009

Attached Image

It provides antivirus protection for USB flash drives and USD flash memory cards, external hard drives, digital cameras and media players.
When the USB equipment is inserted into your computer, USD Drive Antivirus will automatically start its scan, remove and block running viruses, trojans and any malicious code. It also detects and removes autorun.inf virus in your computer. USB Drive Antivirus can also remove the virus at startup. USB Drive AntiVirus is the best anti-virus software to protect your computer from a variety of USB virus without the need for constant renewal, although any other antivirsunoe software requires constant updating of the database. This software is easy to use and compatible with all software and completely inhibits the performance of your computer.
Download:


Autorun Virus Remover v2.3 Build 0209
Attached Image

The program allows to remove viruses with common flash-carriers based on the automatic startup when connected. If you have such trouble or you want to scan your PC and protect it - this program for vas.Ne requires both conventional antivirus update their signature databases, which is especially important when the computer is not connected to the Internet, and is in the off-line ...
Download:


Panda USB Vaccine
Attached Image

Panda USB Vaccine - free solution to block malware spreading from USB-devices.
Currently, the number of malware rapidly increases, which, like worm Conficker, distributed via removable media such as flash memory, MP3 players, digital cameras, etc. To do this, these malicious codes modify the AutoRun file on these devices.
Panda USB Vaccine is a free solution designed to protect against this threat. It offers a double layer of preventive protection, allowing users to disable the AutoRun feature on computers, USB-drives and other devices:
Vaccine for computers: This is a 'vaccine' for computers to prevent any AutoRun file run regardless of whether the device is infected or not (memory card, CD, etc.).
Vaccine for USB devices: This is a 'vaccine' for removable USB-devices, prevents situations where the AutoRun file becomes a source of infection. The tool disables this file so that it can not be read, modified or replaced by malicious code.
This product - a very useful tool because there is no simple way of disabling the AutoRun feature in Windows. The utility provides users with an easy way to disable this feature, offering a high level of protection against infections from removable drives and devices.
Download:


Useful links:
ThemeViruses carried on flash drives. How to fight?fromslimest

Post has been editedValerius the Dark - 30.05.10, 09:28



Rep: (2183)
Performance test conducted by an independent organization Cascadia Labs.
In testing, Cascadia Labs, which was carried out on identical machines with typical home PC parameters usual, involved six security products from different vendors.
They were evaluated on five criteria:
  • consumption mode in RAM absence workload;
  • the influence at the time of the computer boot
  • upload large files;
  • Speed ​​full scan of computer systems on request;
  • Speed ​​test in real time by reference to a specified set of files.

According to Cascadia Labs experts, the criteria reflect the basic requirements for the performance of your computer: Quick Start, available processor and memory resources to applications and high speed open documents.
Kaspersky Internet Security 2010 I received three of the five best scores, demonstrating the minimum time opening large files and anti-virus scanning in different modes, as well as high scores in the other two categories. As a result, the product "Kaspersky Lab" has received the highest final evaluation of the performance of all test participants, taking first place in the ranking of the most productive solutions.
Taken from here:
See the results Cascadia Labs test in English (file pdf - 1.2mb):
the results table:



Post has been editedValerius the Dark - 02.09.09, 15:27



Rep: (2183)
Different varieties. : D
I have not tested the program!

Iobit Security 360 Beta 3.1 Rus
Attached Image
Iobit Security 360 - utility designed to remove spyware and malicious software that detects, removes and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the unique "Dual-Core" engine and the heuristic malware detection, program the most complex and deepest spyware and malware is very fast and efficient way.

Download:


Ad-Aware 2009 Free
Attached Image
Ad-aware 2009 provides reliable protection against these types of malware such as Trojans, dialers, malware, scumware, aggressive advertising, malicious add-ons to the browser, as well as components that track the preferences of the user without his consent, stealing personal data, sites-parasites fraud programs.
When you run Ad-Aware scans for the presence of suspicious modules almost everything - RAM, registry, hard drive, CD and DVD discs.
With the help of the identification codes of the sequence technology, you will be protected not only from known Trojans, but will also have advanced protection against many of their unknown variants. For greater security Ad-Aware can also scan alternate data streams in Windows NT (NTFS) file system volumes.
From the paid version differs by the absence of protection functions in real-time, automatic scanning and automatic updates of virus databases.

Download:


SpyBot - Search & Destroy 1.6.2.46
Attached Image
Spybot - Search & Destroy (Spaybot - search and destroy) can detect and remove from your PC to different kinds of spyware. Spyware (Spyware) - a relatively new kind of threat not yet covered by common anti-virus applications.
Spyware silently tracks your surfing behavior to create your "marketing profile", which is transmitted without knowledge to the compilers and sold your information to advertising companies. If you see in your browser, new toolbars that you have not intentionally installed, if your browser "falls" or start page has changed, then it is likely that the wound "spy" on your computer. But even if there is nothing unusual, the "spies" can all be equal - the farther, the more emerging. Spybot - Search & Destroy is free, so nothing bad will happen if you check your computer.
Spybot - Search & Destroy can also clean "traces of" (usage tracks), which can be useful when you share your computer with someone else ( "personal computer for collective use") and do not want other users to know what you were doing. For professional users have the opportunity to fix some registry inconsistencies and extended reports.

Download:


Anti-Trojan Elite 4.6.3 Rus
Attached Image
Anti Trojan Elite - program to clean your computer from malicious files such as thrones, keyloggers and more. Scans are not only hard drive (including the archives ZIP CAB), but also looks at what processes are running. Also the manager of network processes by which we can define, pouring, is running an undesirable process.
Additionally, you can view the registry keys and values, and remove suspicious, repair Internet Explorer, to optimize Windows and much more. In addition, the program includes tools for blocking suspicious TCP-connections and processes, as well as for corrections of errors caused by malware activity.
Features:
• Scanning the memory and hard drive
• Monitoring the insertion of malware in real time
• Compressed files (RAR, ZIP, CAB)
• Backup before deletion
• Network Manager. Tracking TCP / UDP states and processes. The user can key from any connections or processes.
• Restore Windows Registry and Internet Explorer
• Automatic online updating
• Monitoring the registry in real time

Download:


Malwarebytes Anti-Malware v1.38
Attached Image
Malwarebytes Anti-Malware - software to quickly scan your system to detect and remove different kinds of malware. Malwarebytes Anti-Malware is focused primarily on the fight against spyware and allows after removing them completely restore normal computer. Realtime-unit included in the Malwarebytes Anti-Malware, uses advanced heuristic scanning technology and allows you to save
system clean and safe.
Key features MalwareBytes Anti-malware.
  • It can run on Windows 2000 / XP / Vista.
  • Light speed quick scanning.
  • Ability to perform full scans for all drives.
  • Availability of computer security module (for the paid version only).
  • Database updates released daily.
  • Can place files to quarantine and restore them if necessary.
  • Ability to create an ignore list for the scanner and Protection Module.
  • Flexible settings to speed up the program.
  • Of extra utilities to help remove malware manually.
  • The presence of the Russian version (a rarity).
  • It works great and does not conflict with already installed on other anti computer programs.
  • Support run from command line for quick scanning.
  • Integration with Windows context menu that allows you to perform a case skanioovanie any file.


As used MalwareBytes Anti-malware (fast scanning and removing spyware).
  • Download MalwareBytes Anti-malware.
  • Close all open programs and Windows window.
  • Double click on the setup.exe file-mbam to start the installation program, it does not change anything at the time, just follow the instructions.
  • In the last step, check the boxes allow the program to start the update process and automatically start after the end of the installation process.
  • If an update is found, it will be downloaded and installed.
  • After you start the program, open the Scanner tab and click the Verify button.
  • Be patient, the scanning process can be quite long.
  • After the scan, click Show results and you will be shown the scan result.
  • Click on the button Remove Selected.
  • In the end of the program will open the log file (action program description).



Download:


Post has been editedValerius the Dark - 02.09.09, 15:10



Rep: (2183)
Avg

AVG Anti-Virus Free
Attached Image
AVG Anti-Virus Free 9.0.716a1803 - a new version of the free anti-virus, in the arsenal which has a file scanner and the scanner e-mail, but this suschestvlyaet automatic control system, a scan of RAM and disk boot sectors during computer startup. In general AVG Anti-Virus Free has a complete set of features peculiar to qualitative complex means of protection, including the possibility of a permanent monitoring system, including auto-update via the Internet ..
The program can both find and treat infected files viruses. For safe storage and treatment of infected files in the antivirus program has a function of viral repository, in which all operations take place with the infected files. This antivirus is able to work together with third-party firewalls (supported by work with Kerio Personal, Zone Alarm Pro and the firewall built into Windows XP), allowing you to securely protect your computer from various Internet threats and virus attacks.
In Version 8 AVG Anti-Virus Free add comprehensive protection against spyware spyware and new LinkScanner module, which shows the levels of security sites in Google search queries, Yahoo and MSN.
Key features:
• Automatic updates on all the "life time" antivirus.
• AVG Resident Shield to scan (scan) files when they are opened and programs are run.
• AVG E-mail Scanner checks all your email.
• AVG On-Demand Scanner allows the user to scan the computer for viruses as scheduled or manually.
• Careful handling of infected files (can treat infected files).
• Ability to set off computer after the scan is completed.
• non-standard file scanning improvements to RT-patronage.
Download:


AVG Internet Security
Attached Image
AVG Internet Security - a software package for comprehensive protection of your computer. Includes Anti-Virus, Anti-Spyware, Anti-Spam, Firewall. This software package includes all the tools to protect your PC from dangerous objects. AVG Internet Security blocks the penetration of viruses, trojans, worms, spyware, etc. The package also protects against theft of personal information, and a module to deal with rootkits helps get rid of the malicious processes, masking the virus.
Protect your PC is functioning perfectly, and while working in the network are constantly monitored both the boot and the messages that come through the Internet pagers. Also scanned the websites you visit, and if they pose a threat (a phishing or viruses), then access is blocked. There are anti-spam module, which will prevent receiving unwanted advertising mail, and firewall successfully protect against network attacks.
Quality protection that ensures this package is made up of several components: a constant and scanning in real time, and automatically update antivirus databases, and the guaranteed removal or treatment of detected infected files. Any computer interaction with a network of carefully checked for penetration of potentially dangerous objects. All the files on the disk, and this includes documents, applications and even photos and music.
All the products included in AVG Internet Security, you can customize to your liking, and, this is done in one window and virtually no problems.
Key features:

• Anti-Virus (Anti)
Antivirus performs detection of viruses, worms and Trojans, as well as ispolyanemyh files and DLL libraries that could be potentially unwanted in the system. Anti-Virus also contains an internal virus database.
• Anti-Spyware (Spyware)
Anti-Spyware protects your computer from all types of malware such as spyware that collects data from the computer, and advertising programs.
• Anti-Rootkit (Antirukit)
Anti-Rootkit scans for dangerous rootkits hidden in applications, disks, or the DLL. A rootkit is a package of malware that allows an attacker to gain access to the level of administration or to the entire network.
• Firewall (Firewall)
Firewall defines rules to protect your computer from external attacks, mainly from the Internet, and managed (allow / restrict) connections on each network port. If the Firewall detects intrusion attempts, immediately blocks its components and does not allow an attacker to gain access to the computer.
• Anti-Spam (Spam)
Anti-Spam checks all incoming email messages. mail and notes unwanted messages as spam. The component uses several methods of analysis, ensuring the highest possible level of protection.
• LinkScanner (scanner links)
LinkScanner includes Active Surf-Shield and Search-Shield. Active Surf-Shield prevents accidental contamination from unwanted automatic downloads and other exploits, but also checks the safety of visited web pages. Search-Shield works with search services of Google, Yahoo, Bing and others to provide for the safety of all search results in real time.
• E-mail Scanner (Scanner email)
E-mail Scanner scans incoming and outgoing email messages. mail using plug-ins designed for the most ubiquitous e-mail clients. When a virus is detected moving in the repository of viruses.
• Identity Protection
Identity Protection provides continuous protection of digital data from new and unknown threats. Identity Protection adds signatures based on the protection of AVG Internet Security by tracking the behavior of programs komptyutere and automatic locking deyaielnosti that can lead to identity theft, and does not require renewal.
• Web Shield
Web Shield protects your computer from accidentally see the uploaded infected files, or infected files, obtained by instant messaging.
• Resident Shield
Resident Shield scans files when they are copied, opened or saved. When a threat is detected prevents its activation. Also component provides important protection for the system areas of your computer.
• System Tools
System Tools advanced settings for advanced users - contain information about processes, network connections, automatically starting applications, Internet Explorer extensions and Layered service provider on the computer.
AVG 9.0 is faster, easier to use, and protects like never before:
• Significant progress in speeding up scan - faster by 50%
• There are several new options to define exceptions for scanning files.
• Added "cloud" scanning technology, verification of running applications (whitelisting), and anti-phishing protection.
• ID protection has been fully integrated into the product.
• Completely redesigned firewall, lists of "trust" technology protection of personal data.
• Advanced game mode.
• Improved monitoring and reporting errors during the upgrade.
• Update the user interface, improved navigation.
• Ability to assign sounds to certain events (the scanning began, the threat found, etc.).
• Fast installation on your PC.
• Other internal improvements.
AVG antivirus engine has many awards for the quality of malicious code detection. AVG certified by independent certification companies such as: VB100%, ICSA, West Coast Labs, Checkmark and other AVG products protect more than 80 million PC users around the world..
AVG scans in real time:
• All files including documents, photos, music and applications
• E-mail (it supports all popular email programs)
• Instant messaging and P2P communications
• Files and online transactions such as shopping and banking
• Search results and any other web-links


Download:


Post has been editedGloomy - 14.10.11, 13:11



Rep: (2183)
Virus activity in August 2009

Attached ImageThe main topic of the month was the ActivityWin32.Induc - a virus that infects the Delphi development environment. Not having a pronounced malicious functionality, this virus, however, is fraught with very enticing for potential intruders.
Along with last month's programming environments virus writers continue to use the power of social networks and tested social engineering techniques. Used and new schemes for the spread of malware and spam - in particular with the selection captcha via infected users to authenticate to various Web resources. Also, the "left side" the growing popularity of VoIP-telephony - malefactors have wrapped this tendency against users.
Delphi and other programming environments under attack
For several months appliesWin32.Induc - a virus that infects system installed version with Delphi 4th through 7th inclusive. It modifies one of the libraries are used in the assembly of projects. Thus, each program is developed in a modified version of the virus Delphi, already infected Win32.Induc.
This virus does not cause visible harm to the infected system - the only one of its malicious functions is self-propagation. But in the future, nothing prevents criminals use this method to spread malicious programs. Despite the "harmlessness"Win32.Induc The company "Doctor Web" sees it as a potential threat, and today offers its treatment.
Win32.Induc I could disperse widely, as received by the user with a reliable legal programs developed in the infected Delphi environment. Because of this, after adding Win32.Induc in the majority of the virus database antivirus vendors work of these programs it blocked that cause inconvenience for both users and developers. However, after adding a record to enable treat infected Win32.Induc the files in the virus database vendors of IT security, it was observed a sharp decline in the activity of this malicious program.
In August, it was also found similar malware,ACAD.Siggen . Unlike Win32.Induc It is distributed as a module implemented in Visual Lisp development environment that is used in computer-aided design of Autodesk AutoCAD. ACAD.Siggen infects AutoCAD-files opened in an infected system, because it is run simultaneously with AutoCAD.

Foreign social networks: a paradise for virus writers
In view of the continuing growth of the popularity of microblogging service Twitter and known foreign social networking site Facebook continues to attract criminals. Unfortunately, unsuspecting users with respect to messages containing tempting offers to visit external resources is still high.
It has long been well-known family of virusesWin32.HLLW.Facebook in August 2009 to offer users "work" for cybercriminals very sophisticated way. The virus, as previously, the user attracts by a variety of posts in social networks on the dummy resource that looks very similar to a legitimate, which is loaded with supposedly codec to view the video. If the user runs the downloaded executable file, there is an infection. In this interesting new trend in deceit technologies. As you know, many web-services protect their own resources from automatic registration of users, as well as the distribution on behalf of spam messages. To this end, various techniques are used which allow to confirm that the message it sends people, not robot software.
To check the most often used captcha - the mechanism by which the user must enter a randomly generated sequence of characters, which is represented as an image.
The latest versions of the wormWin32.HLLW.Facebook there was a curious unit Win32.HLLW.Facebook.194 Which selects captcha efforts of the affected user. The purpose of this module - to force the user to enter the "right" combination of characters entered and send the result to a malicious server. After the introduction captcha job received from a remote server on the infected computer pops up a window with input field, and the operation of the system at this moment blokiruetsya.Blagodarya user actions deceived attackers are able to create accounts on various web services with the purpose of sending spam and phishing new messages.
Another tool misuse of social networks have become the control commands to the botnet in the messages of one of the microblogging service Twitter accounts. Teams were coded references bit.ly (service links the reduction), which led to malicious components resources. After clicking on these links infected computer received commands via RSS-Feed a corresponding account on the Twitter messages. A similar scheme usedTrojan.PWS.Finanz.410 .
Masking of control commands to the botnet was seen on another microblogging service - Jaiku. The technology used is the same - a coded message in the form of shortened links leading to malware, and receive control commands occurs via RSS-Feed.
For such schemes intruders attractive, primarily under the masking ability legitimate network traffic and detection complexity. The same Twitter allows you to create private accounts, the content of which is available to a limited number of users that can complicate detection of such accounts and timely blocking.

Update update discord. The threat for Mozilla Firefox users

Topic dummy sites continues to malwareAdware.FF.1 - advertising module delivering trouble fans of the Mozilla Firefox browser.
In modern conditions, when the attackers are constantly discovering vulnerabilities in popular software, these programs are forced manufacturers regularly release updates and persistently offer them to their users. Many have become accustomed to a large number of the proposed operating system updates, antivirus, browsers, even text editors. Attackers have decided to take advantage of frequent updates from Adobe -Adware.FF.1 distributed under the guise of false upgrade to the program Adobe Flash Player. And the resource from which there was the spread of the malware that looks very similar to the original site of Adobe. In addition, the domain name is a dummy site is also designed to lull users. Links to some of its sections are the original resource. The very same ad unit Adware.FF.1 after starting lzheobnovleniya installs a plugin for the Mozilla Firefox browser. Its task is the substitution of the content in the Google search engine.
"Relatives" of the virus,Adware.FF.3 In order not to cause suspicion of users, in its installer contains more original installer Adobe Flash Player.

Virus complete
Virus writers are not the first time use the increased interest in the release of new versions of those or other popular programs. So, with the release of the office suite from Apple -iWorks'09 - actively disseminate distribution containing the Trojan from the family Mac.Iservice . At this time virus writers have decided to take advantage of the increased attention to the Mac OS X Snow Leopard. Facts known to spread through the popular torrent trackers infected distribution of the OS, containing virus family Mac.DnsChange , When activated on a computer implemented DNS-requests a substitution in the course of the user with a browser.

Telephony service on Cybercrime
Another important event that took place at the end of August 2009 - the appearance of Trojan-Trojan.SkypeSpy concept, which aims to - capture audio stream from the popular Skype program. In this case, the intercepted calls are recorded directly to your mp3-file. source codesTrojan.SkypeSpy It became public, which may entail the emergence of many new modifications of this troyatsa. However, the specialists of "Doctor Web" suggest that their distribution will be of rather local in nature, rather than a mass - due to the fact that commercially viable is the interception of communications in a business environment with the purpose of espionage, rather than pervasive "surveillance" for Skype users.
This program proves once again that any technology or service that received the mass distribution, attract the attention of cyber criminals.

"Receipt" Botnet
Since August 2009, there was a Trojan activityTrojan.Botnetlog.11 Which spreads under the guise of e-mail "receipts".
For the user to open this "receipt", the letter reported that he allegedly sent e-mail message, but because of incorrectly specified address, it can not be delivered. The letter attached ZIP-file, which is defined as a Dr.WebTrojan.Botnetlog.11 .
Notable is the fact that practically every new users to the mailing list comes a modified version of the Trojan uses a specific packer. But Dr.Web technologies allow automatic adding new options sent by the virus laboratoryTrojan.Botnetlog.11 That significantly increases the quality of the user protection against this type of threat.
Later versions of the malware detected by Dr.Web as theTrojan.DownLoad.45107 .

Phishing site complete
In August 2009, received widespread form of phishing, in which form, designed to fill the user private data, is applied in the HTML-format directly to the phishing email. This file, which was conceived fraud, the user must open the browser. Next, he must complete the form and press the confirmation button. When this data is sent to a prepared server.
This scheme greatly simplifies the organization of fraud, because It does not require creating bogus sites that may be soon closed. Also, there is the complexity of the closure of the servers that get collected private data users, as show server involvement in this scheme is more complicated than using a classic phishing. A similar scheme was used in August against the users of the payment system PayPal and USAA Bank.
A slightly different scheme was used in the phishing mailing supposedly from the administration Yandex.Dengi system. The letter was created in HTML-format, his body was placed button, clicking on which the user is taken to a phishing site. The code script that is executed when you press the button, link shortening service used again.
Cases of classical phishing attacks were observed with respect to the customers of banks Ally Bank, Bank of America, Chase Bank, Key Bank, SunTrust Bank, as well as in relation to the participants of the online auction eBay and PayPal users of the payment system.

findings
Win32.Induc Which has become the main event of the month viral, has generated a lot of discussion on whether or not to detect and treat the virus without causing any apparent harm need.
Win32.Induc It should be treated as distribution methods attackers can use in the future when creating malware.
The focus of virus writers remain and foreign social networks. Cybercriminals are developing new, more sophisticated schemes of their use. An example of this is the management of botnet via RSS-Feed from Twitter-account. Alas, largely into the hands of cybercriminals continues to play a naive users of social networks.
Interesting scheme used by hackers to forcing users to enter captcha. It seems that such a scheme will meet again and again, because protection against automatic registration captcha is used everywhere, and automatic selection methods perfected by virus writers.
Availability sourceTrojan.SkypeSpy It lets talk about the probability of occurrence of new malicious programs that use this scheme to intercept Skype conversations of users and transfer them to a malicious server. Ordinary users Skype is threatened to a lesser extent than those who use this means of communication for conducting important negotiations.



Monthly Malware Statistics: August 2009 version of Kaspersky

Post has been editedValerius the Dark - 07.09.09, 00:13



Rep: (2183)
Scammers distribute free app SMS Reader

Attached ImageThe company "Doctor Web" reported on the distribution in RuNet program SMS Reader v.11.4.3 Russian edition, which is used by hackers to implement a fraudulent scheme. A malicious program detected by Dr.Web as a Trojan.Fraudster.6, offers users to receive SMS-message to any phone number. To do this, the attackers need to send them paid SMS.
Under the guise of seemingly free software, the creators of which promise a lot of useful, as well as illegal functions in RuNet often be found malicious applications and programs using fraudulent schemes.
Once again, this can be encountered by downloading SMS Reader v.11.4.3 Russian edition (defined by Dr.Web as Trojan.Fraudster.6) Online www.ubs ***. Ru. Program creators promise anyone text of all SMS from any phone number, which he directs. According to the developers, this program is run from any PC and requires only an Internet connection.
Download SMS Reader v.11.4.3 Russian edition user is prompted to fill in the table, indicating the phone number, SMS printout which he wants to watch, as well as the name of man, which is registered to the number. At the same time, on the assurances of the developers of the scheme, SMS Reader v.11.4.3 Russian edition is capable of receiving data from 6 major Russian operators, which is not really true.
Attached Image
In the future, the program carries out the alleged verification of data and informs the user that found a specific number of SMS during this period it. It does not matter whether the number of current subscribers, or completely random name and a meaningless set of numbers specified - this function is only a cover, because no exchange of information on external channel program is not carried out.
Attached ImageAttached Image
To read the "received" SMS creators SMS Reader v.11.4.3 Russian edition need to send SMS to a special number value "3-4 USD." If the user goes for it, a message that "the operator SMS is sent in encrypted form." In order to become readable text, the user is offered SMS-decoder, which requires sending another SMS. If the user has performed these actions, the program terminates.

In fact, for this program hides another fraudulent model, whose purpose - weaning funds from naive users. No decoded text SMS you do not receive, and can not get because of the lack of functionality in SMS Reader v.11.4.3 Russian edition.

The specialists of "Doctor Web" recommends not to fall for tricks and malicious use licensed antivirus software with the latest updates.



Rep: (2183)
Anti Banners

Ad Muncher
Attached Image
AdMuncher - a program to block all types of advertisements when traveling on internetu.Ad Muncher removes pop-ups, banners and other advertisements on web-pages. Works with virtually any modern browsers Internet Explorer, Opera, Firefox, Mozilla and Netscape, it and c ons over Internet Explorer, such as Maxthon and Avant Browser. It allows thereby increase the speed of loading pages and save bandwidth.
Ad Muncher 4.73 - a utility to remove the pop-ups and banners.
Works from the system tray, integrates with virtually all browsers and removes ads from ICQ, Morpheus, Kazaa, iMesh and some other programs. Despite the modest size, the program is perfectly removes ads from the visited pages, identifying them by: address, size, signature (tag alt). In addition to banners Ad Muncher successfully fights: music on the pages; background images; Pop-up windows (popups); automatically refresh the page; scripts, change the state status bar'a scripts that block right mouse button. All optional and can be configured. Ad Muncher requires no additional configuration software, it works "transparently" for your browser or other software.
Opportunities:
  • blocking any kind of advertising in all browsers (Opera, Firefox, Internet Explorer), including -vsplyvayuschie window
  • Ad blocking in products such as ICQ, Morpheus, Kazaa, Grokster, PalTalk, iMesh, Bearshare, LimeWire,
  • accelerated page loading due to the lack of superfluous elements, including of advertising
  • Lock 'stalking behavior »web-sites (hidden elements, scripts, malware, etc.)
  • powerful filtering system, which is growing due to the constant assistance of the users of the program.


Compatibility: Windows 98 / Me / NT4 / 2000 / XP / 2003 Server / VISTA
Homepage: http://www.admuncher.com/
Download:


Anti banner for Opera
Anti banner for Opera v.2.01 - Supplement, which is the script, cutting advertising and banners. Supplement does not require registration, automatically configured, and most importantly - increases the speed of loading pages while saving your traffic.
List of changes:
  • Updated to support Opera v.10.x (partial support, depending on the type of browser installer)
  • Updated almost all the main JS lock files
  • Updated scripts for easy jumps from file sharing files
  • Updated help file
  • Minor improvements are not the critical nature

Compatibility: XP / Vista, 7-?
Download:


Post has been editedGloomy - 15.05.11, 11:52


Full version    

Help     rules

Time is now: 03/10/20, 9:15