Antivirus programs can detect viruses and prevent access to the infected document and is also able to eliminate the infection happened. Virus scanner program is the most popular type of anti-virus world, but such programs should be frequently updated to be able to recognize new viruses. In general there are two types of antivirus programs, the on-access and on-demand scanner. Many peerusahaan that offers a combination of two types of programs in one package.
* On-access scanner will always be active in the computer system as long as you use it. This type of scanner will automatically check the documents that you access and can prevent you from using the documents that have been infected by computer viruses.
* On-demand scanner that will let you start scanning the activity of all the documents on your computer. You could also arrange to be done periodically by using the scheduler.
There are also anti-virus types that implement the heuristic scanning. This allows the scanner to detect the virus, whether known or not, by using the rules of the common indicator of a virus. This is very useful to detect viruses or new types that have not been detected previously. This type of heuristic scanner does not need to frequently updated but its side effects can sometimes lead to error detection, where it was supposed to document, or a normal program, but was detected and considered as a virus.
Who writes viruses?
If your computer or your network exposed to viruses, you must have felt annoyed and sometimes you think "Why these people to make a virus?". The creator's motivation sometimes viruses differ in a virus. There is a virus because it wanted to spread a political message, to seek fame, wants to get public recognition, to criticize an institution or company (such as viruses that mocking Microsoft and other companies, etc.).
They are able to enter into someone's computer system, obtain various information, such as e-mail address, etc. and then could have sold the information to spammers. According to some studies, it is known that the average virus makers are male, aged under 25 (twenty five) years old and still single.
They sometimes want to get recognition from the community by creating and spreading computer viruses. Activities make the same virus as the action of writing graffiti, where the best will get a better status than the virus komunitasnya.Membuat sometimes a certain satisfaction to the author, and they will gain strength and popularity in cyberspace, while this can not they dapatenkan in the real world. They often use the names for the unique and strange existence, and also shows obsessed with fantasy figures idol.
Chronology of computer virus history
* 1950s - Bell Labs made an experimental game in which players use malicious programs to attack other players computers.
* 1975 - Author sci-fi story, John Brunner, imagine a computer worm spread through the network.
* 1984 - Fred Cohen introduced the term computer virus in the thesis.
* 1986 - The first computer virus called Brain written by two brothers in Pakistan.
* 1987 - Worm called Christmas tree IBM computer network attack.
* 1988 - Internet worm spreads on U.S. network DARPA.
* 1992 - There was panic in the world of Michelangelo virus.
* 1994 - Good Times hoax virus first appeared in the world.
* 1995 - The virus first document called Concept, present in the world.
* 1998 - CIH or Chernobyl became the first virus capable to interfere with computer hardware.
* 1999 - Melissa, a virus that spreads itself via e-mail spread throughout the world. Then the virus Bubbleboy, became the first virus that can infect your computer when you read your e-mail.
* 2000 - Love Bug, a virus e-mails are successful. At that time also found the virus on the Palm operating system.
* 2001 - The virus which claims to contain pictures tennis player Anna Kournikova infect thousands of computers around the world.
* 2002 - David L Smith, Mellisa virus maker, decided by U.S. courts to the prison for 20 months.
* 2003 - Blaster worm spreading on the Internet by exploiting weaknesses in the Windows operating system. At the same time spread the e-mail virus called Sobig, are made in August 2003 became the worst month for the virus incidents in that year.
* 2004 - Constructor Netsky and Bagle worms competing to achieve the greatest effect.
Would make a virus that is always wrong?
For all of us have agreed that the virus is a bad thing, but whether this is really true? Some viruses are not destructive or even some of the things that's funny. Anything else other viruses to warn us of a weakness in a particular software.
Some people have argued that this virus may be advantageous, for example, used to spread the bug fix. Unfortunately, viruses are not aimed at damaging this can not last long existence and still not be liked by everyone.
First, because the virus is able to change the settings on someone's computer without his knowledge. This is an unethical act as well as illegal in most countries in the world, whether good or bad purpose. You must not interfere with other people's computers, this same analogy you borrow someone else's car without permission, even if you fill the fuel.
Second, the virus often acted beyond the expectations of the virus creator. Virus generated at random could cause other problems bigger. Although it is not dangerous in certain systems, but this may cause problems on systems that lain.Ketiga, viruses can spread quickly, and in this case the manufacturer can not control the virus spread more and anyone can become infected by the virus.
In some cases, making the virus is considered as evidence that a new type of virus can do something about a system. This is usually called a proof-of-concept virus. These viruses usually do not have a specific effect and not distributed to the public network. There are other virus writers who claim as a research activity. Usually these viruses are not perfect workmanship so dangerous if released to the public.
Prevent virus
There are several things you can do to prevent viruses, will be presented following these things.
* Making people understand the risk of viruses,
Tell everyone that they are always at risk when opening e-mail, open e-mail attachments, downloading files from a site or exchanging a floppy disk. They must understand that the dangers of the virus is everywhere, and be careful.
* Install anti-virus program and update on a regular basis is,
Anti-virus programs can detect and sometimes are able to eradicate the virus. If the program offers on-access scanner, immediately use the facility.
* Always use the software patches to close security holes,
Always monitor the development of patches for the operating system you use. If there is a new immediate download and run to close the security hole on your computer. This will make the virus a little hard to spread.
* Use a firewall,
A firewall is able to prevent illegal access to computer systems or your network. This also can prevent the rapid spread of the virus into the network.
* Always backup your data regularly,
Always make a backup for all existing data on your computer. Choose the data and programs that you consider important and do regular backups. Sewakti-time if your computer is infected with a virus then you can do with the data and restore a clean program.
FREE ANTIVIRUS
SCANNER
SCAN LINKS
FREE DOWNLOAD
ESET NOD32
In this month, has been found in some computer viruses have emerged. Here are the new viruses are detected and attacked several computers in the world that have been launched by Symantec, McAfee and trandmicro. For those of you who use the MSWindows system, it is good to always update your anti-virus each day.
W32.Stayt.A! Inf/W32.Stayt.A
These viruses include the most dangerous viruses. Found this on June 8, with W32.Stayt.A file.
This virus will download the files your computer from other places.
W32.Evolym
Found on June 6. Spread via email and instant messages. This virus will copy the contents of / data to your hard disk.
Trojan.Gpcoder.F
The virus is somewhat unique, he's going to script files in your computer, so that your files will be locked.
TROJ_DLOADER.XCU
This virus was found on June 5, will install the software on your computer, and the image that appears in your browser will be changed to -, alias does not appear.
JS_IFRAME.YE
This virus will redirect your url to access. This virus was discovered on June 5.
JS_PSYME.CXZ
The virus found in this June 5 will take advantage of security holes in your computer, and use that hole to illegal action.
JS / Exploit-iframe
This virus was discovered by McAfee on June 4. Trojan software has to be installed on infected computers.
Reviewers give ESET NOD32 a slight edge over Norton AntiVirus 2009 (*est. $20). Earlier releases were widely criticized for their confusing interface, but reviews say the most recent versions -- including version 4 -- are vastly improved. Computer experts say NOD32 offers great protection against viruses, spyware and adware, yet there's no system drain and no software conflicts. User satisfaction with this program is much higher than with its antivirus competitors. Despite NOD32's improved user friendliness, some reviewers say Norton AntiVirus 2009 (*est. $20) is a better choice for beginners or people who want the simplest possible user experience.
Scientific testing sites like Virus Bulletin and CheckVir.com are the best places to learn about the effectiveness of ESET NOD32 antivirus software. Initial impressions about the user experience offered by the just released version NOD32 Antivirus 4 can be found at download sites, like Download.com. Blogger Michael Aulia provides a more in-depth report based on the beta version of the program. CNet.com has an in-depth report of the still widely available and very similar version 3 of the software.
let for solution new virus use new ESET NOD32 antivirus let go to know about ESET NOD32.
ESET NOD32 Antivirus is also one of the fastest antivirus solutions, so fast you won't even notice it running. And it's both incredibly easy to use yet simple to tailor for your specific needs.
ESET NOD32 Antivirus 4 is the most effective protection you can find to combat today's huge volumes of Internet and email threats. It provides comprehensive antivirus and antispyware protection without affecting your computer's performance.
Using advanced ThreatSense® technology, ESET NOD32 Antivirus proactively protects you from new attacks, even during the critical first hours when other vendors' products aren't aware the attack even exists. ESET NOD32 Antivirus detects and disables both known and unknown viruses, trojans, worms, adware, spyware, rootkits and other Internet threats.
thank .........
W32.Stayt.A! Inf/W32.Stayt.A
These viruses include the most dangerous viruses. Found this on June 8, with W32.Stayt.A file.
This virus will download the files your computer from other places.
W32.Evolym
Found on June 6. Spread via email and instant messages. This virus will copy the contents of / data to your hard disk.
Trojan.Gpcoder.F
The virus is somewhat unique, he's going to script files in your computer, so that your files will be locked.
TROJ_DLOADER.XCU
This virus was found on June 5, will install the software on your computer, and the image that appears in your browser will be changed to -, alias does not appear.
JS_IFRAME.YE
This virus will redirect your url to access. This virus was discovered on June 5.
JS_PSYME.CXZ
The virus found in this June 5 will take advantage of security holes in your computer, and use that hole to illegal action.
JS / Exploit-iframe
This virus was discovered by McAfee on June 4. Trojan software has to be installed on infected computers.
Reviewers give ESET NOD32 a slight edge over Norton AntiVirus 2009 (*est. $20). Earlier releases were widely criticized for their confusing interface, but reviews say the most recent versions -- including version 4 -- are vastly improved. Computer experts say NOD32 offers great protection against viruses, spyware and adware, yet there's no system drain and no software conflicts. User satisfaction with this program is much higher than with its antivirus competitors. Despite NOD32's improved user friendliness, some reviewers say Norton AntiVirus 2009 (*est. $20) is a better choice for beginners or people who want the simplest possible user experience.
Scientific testing sites like Virus Bulletin and CheckVir.com are the best places to learn about the effectiveness of ESET NOD32 antivirus software. Initial impressions about the user experience offered by the just released version NOD32 Antivirus 4 can be found at download sites, like Download.com. Blogger Michael Aulia provides a more in-depth report based on the beta version of the program. CNet.com has an in-depth report of the still widely available and very similar version 3 of the software.
let for solution new virus use new ESET NOD32 antivirus let go to know about ESET NOD32.
ESET NOD32 Antivirus is also one of the fastest antivirus solutions, so fast you won't even notice it running. And it's both incredibly easy to use yet simple to tailor for your specific needs.
ESET NOD32 Antivirus 4 is the most effective protection you can find to combat today's huge volumes of Internet and email threats. It provides comprehensive antivirus and antispyware protection without affecting your computer's performance.
Using advanced ThreatSense® technology, ESET NOD32 Antivirus proactively protects you from new attacks, even during the critical first hours when other vendors' products aren't aware the attack even exists. ESET NOD32 Antivirus detects and disables both known and unknown viruses, trojans, worms, adware, spyware, rootkits and other Internet threats.
thank .........
About ESET NOD32
In this June, has been found in some computer viruses have emerged. Here are the new viruses are detected and attacked several computers in the world that have been launched by Symantec, McAfee and trandmicro. For those of you who use the MSWindows system, it is good to always update your anti-virus each day.
W32.Stayt.A! Inf/W32.Stayt.A
These viruses include the most dangerous viruses. Found this on June 8, with W32.Stayt.A file.
This virus will download the files your computer from other places.
W32.Evolym
Found on June 6. Spread via email and instant messages. This virus will copy the contents of / data to your hard disk.
Trojan.Gpcoder.F
The virus is somewhat unique, he's going to script files in your computer, so that your files will be locked.
TROJ_DLOADER.XCU
This virus was found on June 5, will install the software on your computer, and the image that appears in your browser will be changed to -, alias does not appear.
JS_IFRAME.YE
This virus will redirect your url to access. This virus was discovered on June 5.
JS_PSYME.CXZ
The virus found in this June 5 will take advantage of security holes in your computer, and use that hole to illegal action.
JS / Exploit-iframe
This virus was discovered by McAfee on June 4. Trojan software has to be installed on infected computers.
Reviewers give ESET NOD32 a slight edge over Norton AntiVirus 2009 (*est. $20). Earlier releases were widely criticized for their confusing interface, but reviews say the most recent versions -- including version 4 -- are vastly improved. Computer experts say NOD32 offers great protection against viruses, spyware and adware, yet there's no system drain and no software conflicts. User satisfaction with this program is much higher than with its antivirus competitors. Despite NOD32's improved user friendliness, some reviewers say Norton AntiVirus 2009 (*est. $20) is a better choice for beginners or people who want the simplest possible user experience.
W32.Stayt.A! Inf/W32.Stayt.A
These viruses include the most dangerous viruses. Found this on June 8, with W32.Stayt.A file.
This virus will download the files your computer from other places.
W32.Evolym
Found on June 6. Spread via email and instant messages. This virus will copy the contents of / data to your hard disk.
Trojan.Gpcoder.F
The virus is somewhat unique, he's going to script files in your computer, so that your files will be locked.
TROJ_DLOADER.XCU
This virus was found on June 5, will install the software on your computer, and the image that appears in your browser will be changed to -, alias does not appear.
JS_IFRAME.YE
This virus will redirect your url to access. This virus was discovered on June 5.
JS_PSYME.CXZ
The virus found in this June 5 will take advantage of security holes in your computer, and use that hole to illegal action.
JS / Exploit-iframe
This virus was discovered by McAfee on June 4. Trojan software has to be installed on infected computers.
Reviewers give ESET NOD32 a slight edge over Norton AntiVirus 2009 (*est. $20). Earlier releases were widely criticized for their confusing interface, but reviews say the most recent versions -- including version 4 -- are vastly improved. Computer experts say NOD32 offers great protection against viruses, spyware and adware, yet there's no system drain and no software conflicts. User satisfaction with this program is much higher than with its antivirus competitors. Despite NOD32's improved user friendliness, some reviewers say Norton AntiVirus 2009 (*est. $20) is a better choice for beginners or people who want the simplest possible user experience.
Scientific testing sites like Virus Bulletin and CheckVir.com are the best places to learn about the effectiveness of ESET NOD32 antivirus software. Initial impressions about the user experience offered by the just released version NOD32 Antivirus 4 can be found at download sites, like Download.com. Blogger Michael Aulia provides a more in-depth report based on the beta version of the program. CNet.com has an in-depth report of the still widely available and very similar version 3 of the software.
Kaspersky Anti Virus 2010
Kaspersky Anti Virus 2010, our top rated security products from a year ago, is back for 2010 with more protection and features. Kaspersky will continue to outperform its Competitors. Read on to find out.
Kaspersky Anti-Virus 2010 promising a full PC protection and ease of use for end users. Kaspersky protects against threats including viruses, spyware, Trojans, worms, and bots. Updates done every hour. Two new scanning technology incorporated for 2010 - iSwift and iChecker. ISwift designed to adjust the scanning depending on user activity, maintain the performance. IChecker remember which files are safe after scanning and will only scan them again if they are modified, which means faster scan times.
Include new technologies for the year 2010 is a white list and Application Control Kaspersky, which determines the application security, and Kaspersky Advisory URL, which makes users safe by warning them of the dangerous link.
Like other anti-virus Kaspersky suite not have a personal firewall, which is included in the more-expensive Kaspersky Internet Security 2010 suite.
Installation and Activation
Kaspersky takes three clicks to install and two clicks to complete. Not including download time process only takes a few minutes and no restart is required. After accepting the license agreement installer give users the option to allow anonymous Kaspersky to send information to the company's network security, which is used to detect new threats. Once installed, users must enter their activation code to continue, once it contacts the server installer and license activation is enabled.
We have a problem with the activation license last year, the problems that absent this time.
On the whole installation process simple and painless.
Interface Program
Kaspersky Anti-Virus in 2010 the risk of system
Kaspersky's sleek and polished interface that is easy on the eye and well laid-out. Navigation is handled on the left through the four main categories, the support link at the bottom left, and advanced settings in the upper right. The layout is similar to last years' but smooth with a more convenient access to the navigation items.
Protection status is displayed at the top of the window. Like many of Kaspersky anti-virus applications using color codes to status. Green bar means the computer is protected and yellow means the risk as shown on the left. If at risk, it seems the "Fix now" - we click a button and the program did so without further instructions.
Kaspersky Anti-Virus protection component 2010
Kaspersky provides a comfortable flow chart detailing how the various modules to protect by clicking on one of the items on the protection of the main screen. This serves as a bit of an ad for more expensive Internet Security suite by showing what is not included in the Anti-Virus suite, but still we like the features of protection because it makes it easier to understand; we have not seen other antivirus applications, including something like this .
Kaspersky includes several other items not explicitly advertised. Click on the Security tab allows use to make a rescue disk, use the virtual keyboard, deleting activity history, analyzing browser security, and troubleshoot Windows.
Browser security adviser identified several weaknesses in Internet Explorer and keep them. Small objects like this is a nice touch and added value.
In the Use and Effectiveness
Kaspersky Anti-Virus 2010 history
Kaspersky does not interfere and does not interfere with Internet surfing or office productivity. Advisor clean URL is integrated with Firefox and Internet Explorer. The "K" system tray icon serves as an indication only application running. Renewal is completely automated.
To test the effectiveness of Kaspersky I use several virus files from Eicar.org, an IT security site. The four files available for download, which has a different extension, including. Com,. Zip, and. Txt, contains a virus. Please see the description of tests for complete information about the test. Antivirus software should detect the file as a threat.
Kaspersky identified as a threat prior to file download initialized and deny download - This is the most pro-active antivirus application we have tested to date, same as last year. All other antivirus applications we tested this file is identified as a threat but often only after the download is completed or the hard drives are scanned.
Kaspersky provides a rather comprehensive history of action, as shown on the left.
Performance Impact
We evaluate the performance impact of antivirus software in three ways:
1. Overall system performance is measured before and after the installation of antivirus using PCMark
2. Memory footprint
3. Full system scan time
Our test system is an HP Pavilion dv5t:
* Intel Core 2 Duo P8400 (2.26GHz/3MB L2/1066MHz FSB)
* 4GB RAM
* 500GB 5400RPM hard drive
* Windows Vista Home Premium x86
Impact overall system performance is measured with PCMark Vantage
Below are the before-(left) and after installation (right) PCMark benchmark for Kaspersky Anti-Virus 2010 on our test PC:
Kaspersky Anti-Virus 2010 preinstall benchmark
Kaspersky Anti-Virus 2010 post-install benchmark
Very small differences can be caused by errors benchmark.
System Memory Footprint and Scan Time
Task Manager shows Kaspersky uses less than 10MB memory, which describes the efficiency program.
Initial scan our test system 122GB hard drive that contains data about two hours, which is very long. Norton Antivirus 2010 time 44 minutes with the comparison. The second scan took only 47 minutes, however, because the files that previously had spent scanned. Something that we noticed is how many objects Kaspersky scan - 728,144 - versus Norton - 304,748. Kaspersky seems to be doing a more thorough scan, although I can not verify this.
Conclusion
Kaspersky Anti-Virus 2010 remains a class-leading safety package for home users. It's very proactive protection and sleek and polished interface that is easy to navigate. Including additional utilities such as vulnerability scanners and browsers are welcome to add value. Kaspersky Anti-Virus 2010 with MSRP $ 59.99, but includes three licenses. We strongly recommend Kaspersky Anti-Virus 2010 for the reasons mentioned.
Pros:
* Very proactive
* Sleek interface
* Extra including utility
Cons:
* Long initial scan time
* Higher-price (but includes 3 licenses)
* Contains upsells to other products
Kaspersky Anti-Virus 2010 promising a full PC protection and ease of use for end users. Kaspersky protects against threats including viruses, spyware, Trojans, worms, and bots. Updates done every hour. Two new scanning technology incorporated for 2010 - iSwift and iChecker. ISwift designed to adjust the scanning depending on user activity, maintain the performance. IChecker remember which files are safe after scanning and will only scan them again if they are modified, which means faster scan times.
Include new technologies for the year 2010 is a white list and Application Control Kaspersky, which determines the application security, and Kaspersky Advisory URL, which makes users safe by warning them of the dangerous link.
Like other anti-virus Kaspersky suite not have a personal firewall, which is included in the more-expensive Kaspersky Internet Security 2010 suite.
Installation and Activation
Kaspersky takes three clicks to install and two clicks to complete. Not including download time process only takes a few minutes and no restart is required. After accepting the license agreement installer give users the option to allow anonymous Kaspersky to send information to the company's network security, which is used to detect new threats. Once installed, users must enter their activation code to continue, once it contacts the server installer and license activation is enabled.
We have a problem with the activation license last year, the problems that absent this time.
On the whole installation process simple and painless.
Interface Program
Kaspersky Anti-Virus in 2010 the risk of system
Kaspersky's sleek and polished interface that is easy on the eye and well laid-out. Navigation is handled on the left through the four main categories, the support link at the bottom left, and advanced settings in the upper right. The layout is similar to last years' but smooth with a more convenient access to the navigation items.
Protection status is displayed at the top of the window. Like many of Kaspersky anti-virus applications using color codes to status. Green bar means the computer is protected and yellow means the risk as shown on the left. If at risk, it seems the "Fix now" - we click a button and the program did so without further instructions.
Kaspersky Anti-Virus protection component 2010
Kaspersky provides a comfortable flow chart detailing how the various modules to protect by clicking on one of the items on the protection of the main screen. This serves as a bit of an ad for more expensive Internet Security suite by showing what is not included in the Anti-Virus suite, but still we like the features of protection because it makes it easier to understand; we have not seen other antivirus applications, including something like this .
Kaspersky includes several other items not explicitly advertised. Click on the Security tab allows use to make a rescue disk, use the virtual keyboard, deleting activity history, analyzing browser security, and troubleshoot Windows.
Browser security adviser identified several weaknesses in Internet Explorer and keep them. Small objects like this is a nice touch and added value.
In the Use and Effectiveness
Kaspersky Anti-Virus 2010 history
Kaspersky does not interfere and does not interfere with Internet surfing or office productivity. Advisor clean URL is integrated with Firefox and Internet Explorer. The "K" system tray icon serves as an indication only application running. Renewal is completely automated.
To test the effectiveness of Kaspersky I use several virus files from Eicar.org, an IT security site. The four files available for download, which has a different extension, including. Com,. Zip, and. Txt, contains a virus. Please see the description of tests for complete information about the test. Antivirus software should detect the file as a threat.
Kaspersky identified as a threat prior to file download initialized and deny download - This is the most pro-active antivirus application we have tested to date, same as last year. All other antivirus applications we tested this file is identified as a threat but often only after the download is completed or the hard drives are scanned.
Kaspersky provides a rather comprehensive history of action, as shown on the left.
Performance Impact
We evaluate the performance impact of antivirus software in three ways:
1. Overall system performance is measured before and after the installation of antivirus using PCMark
2. Memory footprint
3. Full system scan time
Our test system is an HP Pavilion dv5t:
* Intel Core 2 Duo P8400 (2.26GHz/3MB L2/1066MHz FSB)
* 4GB RAM
* 500GB 5400RPM hard drive
* Windows Vista Home Premium x86
Impact overall system performance is measured with PCMark Vantage
Below are the before-(left) and after installation (right) PCMark benchmark for Kaspersky Anti-Virus 2010 on our test PC:
Kaspersky Anti-Virus 2010 preinstall benchmark
Kaspersky Anti-Virus 2010 post-install benchmark
Very small differences can be caused by errors benchmark.
System Memory Footprint and Scan Time
Task Manager shows Kaspersky uses less than 10MB memory, which describes the efficiency program.
Initial scan our test system 122GB hard drive that contains data about two hours, which is very long. Norton Antivirus 2010 time 44 minutes with the comparison. The second scan took only 47 minutes, however, because the files that previously had spent scanned. Something that we noticed is how many objects Kaspersky scan - 728,144 - versus Norton - 304,748. Kaspersky seems to be doing a more thorough scan, although I can not verify this.
Conclusion
Kaspersky Anti-Virus 2010 remains a class-leading safety package for home users. It's very proactive protection and sleek and polished interface that is easy to navigate. Including additional utilities such as vulnerability scanners and browsers are welcome to add value. Kaspersky Anti-Virus 2010 with MSRP $ 59.99, but includes three licenses. We strongly recommend Kaspersky Anti-Virus 2010 for the reasons mentioned.
Pros:
* Very proactive
* Sleek interface
* Extra including utility
Cons:
* Long initial scan time
* Higher-price (but includes 3 licenses)
* Contains upsells to other products
Free Download AVG Internet Security 9 2009/2010
AVG Internet Security will provide a safe refuge for you when the surf, browse, download, transaction banking, and shop online safely. And protect your computer from attacks such as viruses, spyware, adware and trojans ......
With AVG Internet Security, you always get safe online experience. With several layers of protection from Internet Security, you do not have to worry about identity theft, spam, or viruses. And it even prevents you from accidentally visiting malicious sites.
Security faster and smarter this will not slow your computer
* Transaction banking and shopping online safely without fear of identity theft thanks to a new identity protection technology from AVG
* Navigating and exploring with confidence, with LinkScanner ® check web pages in the most decisive moment - just before you click that link
* Exchange images and other files with friends through IM and social networking, safe from the risk of viral infection unintentional
* Downloading music and applications securely
* Keep your inbox clean of the phishers, scammers, and spammers, so you can focus on the use of email to stay connected with friends and family* Enjoy high-speed scanning performance that is consistent with modern virus scanners from our NEW
Which is in AVG Internet Security 9:
* Anti-Virus & Anti-Spyware: protection against viruses, spyware, adware and trojans
* LinkScanner Search-Shield: real-time safety ratings to all search results of Google, Yahoo and MSN / Live search
* LinkScanner Active Surf-Shield: Protects from infected web pages in real time as you browse the web* Web Shield: Filtering your downloads and prevent infection accidentally through IM chat
* Anti-Rootkit: protection against hidden threats that deliver malicious content / damage
* Free Support: Free support and service at all times and throughout the world
* Firewall: stops hackers (hackers) and the spread of viruses on the Internet
* Anti-Spam: Capturing the e-mail threats including identity theft (phishing), fraud and spam
INSTALL INSTRUCTIONS:
* Download the file setup AVG Anti Virus
* Perform Installation* When the install process is in progress and appear the menu "Activate Your AVG License", enter the data and the serial number / her key .......
* Continue the installation process until the completion
* Finished
Click below to get AVG Internet Security 9
Download Key / Serial Number AVG 9
For key / Serial Numbernya Please click below
Download AVG Internet Security 9
Key / Serial Number AVG Internet Security 9 is valid until February 26, 2018 (9 years).
AVG internet security 9.0 is compatible with :Windows2000,Windows XP,Windows Vista, Windows 7
With AVG Internet Security, you always get safe online experience. With several layers of protection from Internet Security, you do not have to worry about identity theft, spam, or viruses. And it even prevents you from accidentally visiting malicious sites.
Security faster and smarter this will not slow your computer
* Transaction banking and shopping online safely without fear of identity theft thanks to a new identity protection technology from AVG
* Navigating and exploring with confidence, with LinkScanner ® check web pages in the most decisive moment - just before you click that link
* Exchange images and other files with friends through IM and social networking, safe from the risk of viral infection unintentional
* Downloading music and applications securely
* Keep your inbox clean of the phishers, scammers, and spammers, so you can focus on the use of email to stay connected with friends and family* Enjoy high-speed scanning performance that is consistent with modern virus scanners from our NEW
Which is in AVG Internet Security 9:
* Anti-Virus & Anti-Spyware: protection against viruses, spyware, adware and trojans
* LinkScanner Search-Shield: real-time safety ratings to all search results of Google, Yahoo and MSN / Live search
* LinkScanner Active Surf-Shield: Protects from infected web pages in real time as you browse the web* Web Shield: Filtering your downloads and prevent infection accidentally through IM chat
* Anti-Rootkit: protection against hidden threats that deliver malicious content / damage
* Free Support: Free support and service at all times and throughout the world
* Firewall: stops hackers (hackers) and the spread of viruses on the Internet
* Anti-Spam: Capturing the e-mail threats including identity theft (phishing), fraud and spam
INSTALL INSTRUCTIONS:
* Download the file setup AVG Anti Virus
* Perform Installation* When the install process is in progress and appear the menu "Activate Your AVG License", enter the data and the serial number / her key .......
* Continue the installation process until the completion
* Finished
Click below to get AVG Internet Security 9
Download Key / Serial Number AVG 9
For key / Serial Numbernya Please click below
Download AVG Internet Security 9
Key / Serial Number AVG Internet Security 9 is valid until February 26, 2018 (9 years).
AVG internet security 9.0 is compatible with :Windows2000,Windows XP,Windows Vista, Windows 7
Know Your Computer Virus
Introduction
As usual, kesayanganya computer Fascal already menemai for six years. During that time, there were no complaints about the computer's performance. Everything was normal. But this morning, he was surprised when turned on his computer and discovered some important files have changed size of the file. 2.1 MB initially became 15kB, originally measuring 3.5 MB changed to 15kB. All file changes size to 15kB. What's this?
If at any time such a thing happens, it is certain that computers infected with the virus through several media including: Internet, documents, network or email.
We often hear the word "virus" but does not understand exactly what he meant, how they spread, how the characteristics that have been exposed to computer viruses, how to prevent it and how to handle if it is infected or how to avoid them to avoid contracting the virus. All of these questions we must find the answer to a time when the computer virus can be solved easily without causing concern about the threat of the virus.
Some Understanding Virus
"A program that can infect other programs by modifying them to include a slighty altered copy of itself. A virus can spread throughout a computer system or network using the authorization of every user using it to infect their programs. Every programs that gets infected can also act as a viral infection that grows "
(Fred Cohen, the U.S. Computer Specialist)
A computer virus is a computer program that can duplicate itself and spread by inserting copies of itself into other programs or documents. Computer viruses can be spread on computers or networks by making copies of itself without the knowledge of the user's computer. The virus can cause harmful effects, such as starting from displaying messages, steal data or even control the computer remotely. Computer viruses can be destructive (for example by destroying the data on the document), making computer users feel annoyed, or no effect at all.
Istilan "virus" was first used by Fred Cohen in 1984 in the United States. A computer virus called "virus" because it has some fundamental similarities with the virus at a medical term (biological viruses).
Computer viruses can be interpreted as an ordinary computer program. But it has fundamental differences with other programs, which created the virus to infect other programs, change, manipulate and even to damage it. There is to be noted here, the virus will infect only if the trigger program or programs that have been infected had executed. So, for files that have been infected with the virus have not opened it will not infect the other files. But when the file diaktikan / opened, the second was also directly infect the other documents.In medicine, the virus is a living micro-organisms in life that can only be seen uses the electron microscope. In computer science, a virus is a computer program that has the ability to reproduce itself by inserting the program / programming language into another file. There are similarities with biological viruses, computer viruses can spread quickly on the files in a computer, or even infect other files on your computer, either through a network or through exchange activities through several media file storage.
The origin of word "Virus"
In 1949, a mathematician expresses "self altering automata theory" in which the theory is the result of research mathematicians.Then in tahun1960, Bell Labs (AT & T), the experts in laboratory BELL (AT & T) mencob theory expressed by John von Neumann, by making a type of game / game. They create a program that can reproduce itself and can destroy your opponent artificial programs. The program is able to survive and destroy all other programs, would be considered the winner. This game eventually became the favorite game in each computer lab. However, the longer the program that created the more dangerous, so they conduct surveillance and strict security of this game.
If at any time such a thing happens, it is certain that computers infected with the virus through several media including: Internet, documents, network or email.
We often hear the word "virus" but does not understand exactly what he meant, how they spread, how the characteristics that have been exposed to computer viruses, how to prevent it and how to handle if it is infected or how to avoid them to avoid contracting the virus. All of these questions we must find the answer to a time when the computer virus can be solved easily without causing concern about the threat of the virus.
Some Understanding Virus
"A program that can infect other programs by modifying them to include a slighty altered copy of itself. A virus can spread throughout a computer system or network using the authorization of every user using it to infect their programs. Every programs that gets infected can also act as a viral infection that grows "
(Fred Cohen, the U.S. Computer Specialist)
A computer virus is a computer program that can duplicate itself and spread by inserting copies of itself into other programs or documents. Computer viruses can be spread on computers or networks by making copies of itself without the knowledge of the user's computer. The virus can cause harmful effects, such as starting from displaying messages, steal data or even control the computer remotely. Computer viruses can be destructive (for example by destroying the data on the document), making computer users feel annoyed, or no effect at all.
Istilan "virus" was first used by Fred Cohen in 1984 in the United States. A computer virus called "virus" because it has some fundamental similarities with the virus at a medical term (biological viruses).
Computer viruses can be interpreted as an ordinary computer program. But it has fundamental differences with other programs, which created the virus to infect other programs, change, manipulate and even to damage it. There is to be noted here, the virus will infect only if the trigger program or programs that have been infected had executed. So, for files that have been infected with the virus have not opened it will not infect the other files. But when the file diaktikan / opened, the second was also directly infect the other documents.In medicine, the virus is a living micro-organisms in life that can only be seen uses the electron microscope. In computer science, a virus is a computer program that has the ability to reproduce itself by inserting the program / programming language into another file. There are similarities with biological viruses, computer viruses can spread quickly on the files in a computer, or even infect other files on your computer, either through a network or through exchange activities through several media file storage.
The origin of word "Virus"
In 1949, a mathematician expresses "self altering automata theory" in which the theory is the result of research mathematicians.Then in tahun1960, Bell Labs (AT & T), the experts in laboratory BELL (AT & T) mencob theory expressed by John von Neumann, by making a type of game / game. They create a program that can reproduce itself and can destroy your opponent artificial programs. The program is able to survive and destroy all other programs, would be considered the winner. This game eventually became the favorite game in each computer lab. However, the longer the program that created the more dangerous, so they conduct surveillance and strict security of this game.
Twenty years later, ie on tahun1980, these programs eventually known as the "virus". Next Perkembanga, this virus had spread outside the laboratory environment, and begin circulating in the general population.Picture code detected virus program
Criteria virus
If calculated from the initial discovery of the virus in 1980 until now, have not calculated the amount of virus that spread throughout the world and is no longer known names of new viruses, both locally and internationally. You do not be surprised if the virus is called local because there are some viruses that are made by Indonesian students with different goals each.
A program can be called a virus if it meets a minimum of 5 criteria:
1. The ability to obtain information
Generally the virus requires a list of file names contained in a directory in order to obtain a list of files that can be infected. For example, the macro virus will infect all berekstensi *. doc files or in other words, the macro virus will infect all documents processed by Microsoft Word. Here's ability to gather information necessary for the virus can make a list of all files and then sort them by looking for files that can be infected. This data is usually created when the file is opened by the infected user.
If calculated from the initial discovery of the virus in 1980 until now, have not calculated the amount of virus that spread throughout the world and is no longer known names of new viruses, both locally and internationally. You do not be surprised if the virus is called local because there are some viruses that are made by Indonesian students with different goals each.
A program can be called a virus if it meets a minimum of 5 criteria:
1. The ability to obtain information
Generally the virus requires a list of file names contained in a directory in order to obtain a list of files that can be infected. For example, the macro virus will infect all berekstensi *. doc files or in other words, the macro virus will infect all documents processed by Microsoft Word. Here's ability to gather information necessary for the virus can make a list of all files and then sort them by looking for files that can be infected. This data is usually created when the file is opened by the infected user.
Picture Information on a folder
The virus will soon conduct data collection and will usually be placed in RAM, so if the computer is turned off all the data lost. But these data will be created again each time the virus is activated. Usually this data is also stored as hidden files by the virus. If knowing the information in a folder there are 44 objects (plus 4 hidden), then suspect a virus in that folder, although not always the case.
2. The ability to check a program
A virus must also be able to check a file to be infected, for example, he served infect berekstensi program *. doc, then he should check whether the document files have been infected or not, because if it is, will waste menularinya again. This is very useful to improve the ability of a virus in terms of speed infects a file / program. Commonly done by the virus is to have / give alert in the files / programs that have been infected so it is easy to recognize by the virus. Examples of such labeling is to provide a unique bytes in each file that has been infected.
3. Ability to multiply
The core of the virus is the ability mengandakan itself by infecting other files. A virus has been discovered when the victim so she would recognize him with a look. If not infected then the virus will begin transmission action by writing bytes to the file identifier, and so on mengkopikan / write the object code file viruses on the target. folder duplication process by the virus
The virus will soon conduct data collection and will usually be placed in RAM, so if the computer is turned off all the data lost. But these data will be created again each time the virus is activated. Usually this data is also stored as hidden files by the virus. If knowing the information in a folder there are 44 objects (plus 4 hidden), then suspect a virus in that folder, although not always the case.
2. The ability to check a program
A virus must also be able to check a file to be infected, for example, he served infect berekstensi program *. doc, then he should check whether the document files have been infected or not, because if it is, will waste menularinya again. This is very useful to improve the ability of a virus in terms of speed infects a file / program. Commonly done by the virus is to have / give alert in the files / programs that have been infected so it is easy to recognize by the virus. Examples of such labeling is to provide a unique bytes in each file that has been infected.
3. Ability to multiply
The core of the virus is the ability mengandakan itself by infecting other files. A virus has been discovered when the victim so she would recognize him with a look. If not infected then the virus will begin transmission action by writing bytes to the file identifier, and so on mengkopikan / write the object code file viruses on the target. folder duplication process by the virus
Langganan:
Postingan (Atom)
SPEAKER SCAN
Blog Archive
-
▼
2009
(27)
-
▼
Desember
(12)
- History About Antivirus
- ESET NOD32
- About ESET NOD32
- Kaspersky Anti Virus 2010
- Free Download AVG Internet Security 9 2009/2010
- Know Your Computer Virus
- Zeus Trojan
- Prevention Avoid To Computer Viruses and Spyware
- Maximizing Computer Use To Play Game GameBooster
- Download PCMAV 2.2b Anti Virus Indonesia 2010 Port...
- AntiVirus Portable AMPclamav 2009 (1.0.1.139)
- SmadAV 2009 Rev 7.5
-
▼
Desember
(12)