Anti-virus computer protection | Share experiences on setting up, get rid of the virus, discussing ...



Rep: (2178)

Catalog of antivirus solutions
Additionally


Post has been editedstp101 - 21.04.18, 13:16
Reason for editing: New header. Rammsteiner cap tweaked



Rep: (5)
beta key is fraught with consequences !!! : Rolleyes: like to say a beta key only works on the beta versions

Post has been editedDiplomat16rus - 01.04.10, 09:07



Rep: (80)
And why not add in a cap survey who have a Antivir worth. I think those who chooses bidets helpful



Rep: (175)
Diplomat16rus @ 1.4.10, 8:36*
beta key is fraught with consequences !!!

Nope. : D is not the first use.



Rep: (5)
then you have a beta version of the product! : Rolleyes:



Rep: (938)
felicita @ 1.4.10, 13:58*
And why not add in a cap survey who have a Antivir worth.

What is the best antivirus in your opinion?



Rep: (5)
Each product has advantages and disadvantages. Each chooses a suitable product.
: rolleyes:



Rep: (175)
People, some antivirus advise for the old, weak nouta.
PIII 700Mg 128 RAM



Rep: (1955)
nealeksss
Antivirus (Post # 3149902)



Rep: (1955)
pursuit toAntivirus (Post # 3859827)

Unlock Windows, if the virus asks to send SMS (remove trojan winlock virus)fromESET :
ESET company will return the free computer performance if it was blocked by a malicious program that offers to send a paid SMS to a specified phone number, promising in return to provide the code to unlock the PC.

To get the code to unlock the PC, in the below form fill data, which are specified in the malicious message.

In the "Phone number" enter the number to which you are invited to send SMS.

In the "Message" enter the text to be sent to this number.

Next, click "Choose code".

The site will display the unlock code to be entered in the window of malware.

If you fill in the only "Phone" without specifying the text of the message, the website displays all possible codes to unlock the PC.



Rep: (319)
.. asked me to immediately set up an old computer clean .. WinXPsp1
tried to put a loved kapserskogo-does not arise. swears on an outdated system. etc. Web does not arise. pak2 require service. in general, only the unloved me nod32 established and has earned.
incidentally in the system requirements to drvebu indicated that required en2.

to install service packs did not for their own reasons.



Rep: (1955)
and-rassk
Maybe we need a new installer or dotnet ... Usually written for whatever reason did not install ...



Rep: (2178)
Embedding malicious code in archive files

Computer security researchers have discovered a way of hiding in popular formats file archives malware undetectable by most antivirus programs.
At the conference Black Hat, held in Barcelona (Spain), Tomislav Peritsin (Tomislav Pericin), founder of the project RLPack, dedicated to the protection of commercial applications, Mario Vucsan (Mario Vuksan), the independent expert and the president of ReversingLabs, as well as COO AccessData Brian Carney (Brian karney) demonstrated the possibility of undetectable for antivirus integration Conficker worm code in the archive files of the RAR and ZIP.
Total found eight vulnerabilities in ZIP and seven "holes" in 7ZIP, RAR, GZIP, and CAB. Point of "gaps" can help attackers to bypass corporate security system scan email attachments for the presence of hacking code. As a result, end users are again under serious threat.
Specialists also showed a way to integration into archive files of sensitive data. This technique is called steganography; in contrast to cryptography, hiding contents of secrecy, it enables to conceal its existence, for example, within a conventional (seemingly) a digital photograph. They say vengeance steganography is used in intelligence and terrorist circles.
As a result, it was announced the launch of an open utilityNyxEngineDesigned to detect malicious code and hidden content in the archive files. The program acts as a preprocessor formats ZIP, RAR, GZIP, and CAB.



Rep: (175)
nealeksss @ 15.4.10, 14:57*
People, some antivirus advise for the old, weak nouta. PIII 700Mg 128 RAM


Tried different versions of Avira, DrWeb and NOD32. The most appropriate result for ZHoru resources showed NOD. : D



Rep: (118)
People, some antivirus advise for the old, weak nouta. PIII 700Mg 128 RAM

nealeksss,
a laptop connected to the internet? If not, you can safely even USB Disk Security (Antivirus (Post # 3152979)) + EDT.

It can still be found where Eset carries out the action and get a completely legal key there. True, they were the last time to be greedy ... smile_good.gif
Or updated with a khaljavnogo mirror.
Or search where somebody puts base.
In this respect, Eset - the most affordable product.

: rofl:: rofl:: rofl:

Post has been editedfrag - 19.04.10, 22:04



Rep: (175)
frag @ 19.4.10, 22:02*
a laptop connected to the internet?

For Ineta just used.



Rep: (162)
nealeksss @ 15.4.10, 13:57*
some antivirus advise for the old, weak nouta.

After a couple of days ago, finally broke the 5 Avast for home computer IMHO - Avast! Internet Security is the best choice ..... or 10 Avira



Rep: (175)
VKozar @ 20.4.10, 11:07*
Avast! or 10 Avira

About his experiments wrote above. The results are obtained empirically. Of course all results are influenced by many external factors, but in my case NOD proved himself better than anyone else.



Rep: (162)
And by the way - a very interesting and very fresh independent test. That is to say, the Internet community - MRG On Demand Scan Test - Project 023. The results are more than at odds with the conventional wisdom of Russian guru antivirusovedenii ......

Attached fileMRG_On_Demand_Scan_Test_april_2010.pdf(1.09 MB)



Rep: (162)
nealeksss @ 20.4.10, 10:20*
The results are obtained empirically.

.... regarding Avast 5. I'm on the Hedgehog (EeePC 701, 900 Hz, 1Gig operatives, Win 7) Avastovsky harvester after the launch and "ustankanivanii" system in the process takes a total of about 4-5 megabytes, and does not slow the work as a whole. At the same hedgehog Avira 10 (the same processor) as a result sumarno eats about 18 - 20 meters and do not see its presence in this "powerful" computer.

Post has been editedVKozar - 20.04.10, 11:31



Rep: (175)
VKozar @ 20.4.10, 11:28*
900 Hz, 1Gig operativy

nealeksss @ 19.4.10, 14:59*
700Mg 128 RAM

So noticeable difference. : D
As a process which takes either at the moment is one thing. But resources are used already in different ways, depending on their number.


Full version    

Help     rules

Time is now: 11/07/20, 13:14