Toggle navigation
Don't have an Account ?
Register
SignUp
Login
Quick Signup
Home
About TekTips
Most Active Users
Toggle navigation
Topics
Learning
Information Technology
C++ / VC++
C++ Beginner Tutorials
Armstrong Number Checker
Time Converter
Leap Year Finder
State Tax Calculator
Inductive Reactance Calculator
GCD Checker
Cylinder Total Surface Area Finder
Integer Number into Words Converter
Critical Speed Calculator
Cone Volume Finder
Hemisphere Volume Calculator
C++ Advanced Tutorials
C++ Multi Dimensional Arrays
VC++ Beginner Tutorials
Windows and Graphics Programming
Balloon Designer
Pencil Designer
Cricket ball Designer
Pipe Designer
Tanwave Generator
TV Designer
Gate Designer
Currency Converter
Parabola Generator
Bulb Designer
Tag Designer
Clock Designer
Overriding Close event in a dialog
Dialog Box with Background Image
VC++ Advanced Tutorials
C#.NET
C#.NET Beginner Tutorials
Data structure Library Performance test
Resizable Data Entry Window Forms
VB / VB Script / VB Macros
Excel VB Macros Beginner Tutorials
Pyramid Volume Calculator
Medical Shop Management System
Cone Volume Calculator
Salary Converter
Car Showroom Servicing Billing
Kinetic Energy Calculator
Basic Calculator
Shoe mart Billing System
Tank Volume Calculator
Android
VB.NET
JAVA
ASP.NET
Insert User Controls in GridView
PHP
Physics
Mathematics
Chemistry
Life Science
Mechanical Engineering
Electronics Engineering
Electrical Engineering
Civil Engineering
Communication Engineering
Nano Technology
Photonics
Bio Technology
Videos
Programming Video Tutorials
C++ Video Tutorials
How To Develop A Hello World Application In C++
How To Work With C++ Template Libraries Using VC++ MFC Template Libraries
How To Create One Two And Multi Dimensional Array In C++
How to implement Exception Handling in C++
How to implement Operator Overloading in C++
How to implement namespace in C++
How to implement IF statement in C++
How to implement Switch Statement in C++
VC++ Video Tutorials
Familiarization of VC++ 6.0 environment
How To Create A Basic Hello World Application Using VC++
How To Develop A Windows Application Using VC++
How To Create A Multi-threaded Application Using VC++
How To Create Client Server Network Program Using VC++
How To Develop COM Application Using VC++
How To Create Database Application Using VC++
How To Create Single Document Interface Using VC++
How To Create Graphics Application Using VC++
How To Develop Managed C++ Application Using VC++
Familiarization Of VC++ .NET Environment
Familiarization Of VC++ IDE
How To Create Application For Handling Array And File Using VC++
How to trap all windows messages
C#.NET Video Tutorials
How To Get Familar With C#.Net
OOPs Concept- Inheritance Using C#.Net
OOPs Concept- Encapsulation Using C#.Net
OOPs Concept-Polymorphism Using C#.Net
How To Handle Array File And Exception In C#.Net
How To Develop Multithreaded Application Using C#.Net
How To Develop A Basic Windows Application Using C#.Net
How To Create Dot Net Component Using C#.Net And Windows Controls
How To Develop A DataBase Application Using C#.Net And MS Access
How To Develop A Network Program Using Client Server Application In C#.Net
How to Develop a Simple WPF Windows Application
Simple Web Browser Applicationin C#.NET
Addin/Plugin Development
Developing MS Word and MS Office Addin applications
How to develop IE Addons using VC++ and ATL - Video Tutorial
Developing a Google Chrome Extension
Developing a Firefox Extension
How to develop an MS Outlook Addin
How to develop an Opera Browser Extension
Java Video Tutorials
How To Create A Simple Interest Windows Application In Java
How To Create A Matrix Grid Using Java Graphics Application
How To Create A Database Application In Java Using JDBC
How To Create A Client Server Application In Java Using Network Programming
How To Develop Applets In Java Using Applet And Swing
How To Implement Ternary Operator In Java
How To Implement Type Conversion In Java
How To Implement Logic Operators In Java
How To Implement Math Class In Java
How To Implement Recursion In Java
How To Implement Dynamic Binding In Java
How To Implement Private Class In Java
How To Implement Protected Class In Java
How To Implement Encapsulation In Java
How To Implement Interface In Java
How To Implement Final Class In Java
How To Implement Mouse event In Java
How To Implement Final Method In Java
How To Implement Graphics In Java
How To Implement Exception In Java
How To Implement Keyboard Events In Java
How To Implement Bitwise Operators In Java
How To Implement Shift Operators In Java
How To Implement Access Specifiers In Java
How To Implement Constants In Java
How To Implement Inner Class In Java
How To Implement This Operator In Java
How to implement function Overloading in Java
VB.NET Video Tutorials
Familarization of VB.NET Environment
Basic OOP concepts in VB.NET
Creating Simple Windows application using VB.NET
How To Create Database Application Using VB.NET
How to Create a Multithreaded application using VB.NET
Client Sever Network Programming Using VB.NET
How To Develop Custom Controls Using VB.NET
How To Develop Graphics And Game Application Using VB.NET
Android Video Tutorials
How To Develop Android User Interface Using GUI Programming Libraries
How To Send Data From One Activity To Another Using Android Application Development
How To Develop Android Graphics Programs Using Java And Android SDK
How To Develop Android Data Base Using SQLite And Java
How To Develop Networking Application Using Android
How To Develop A MultiThreaded Program Using Android SDK And Java
How To Install Visual Studio Addin For Android Application
Device Driver Video Tutorials
How to develop a Hello World Windows Device Driver
ASP.NET Video Tutorials
How To Develop ASP.NET Web Applications Using C# .NET
How To Develop ASP.NET Web Applications Using VB.NET
Developing Web Services using C#.NET
How to Create and Apply styles to master page in ASP.NET
How to Creat and Use ASP.NET Master Page
How to use ASP.NET Session Object
How to use ASP.NET User Control with Place Holder and with Gird view
QT C++ Video Tutorials
QT C++ Graphics Programming Tutorial Video
QT C++ Basic GUI Video Tutorial
QT C++ Multithreading Video Tutorial
QT C++ Database Programming Video
QT C++ Network Programming Video Tutorial
QT C++ GUI Video Tutorials Simple Interest Example
How to develop Damped Harmonic Oscillator Simulation using QT C++
How to develop Simple Pendulum Simulation using QT C++
Sine Wave Simulation Using QT C++
Image Viewer Application Using QT C++
Raspberry PI Video Tutorials
How to configure raspberry pi environment.
Getting familiar with raspberry pi tools
How to use the python editor to write a simple hello world application in Raspberry PI
How to use gcc leafpad to write a simple hello world application
Basic OOP concepts in python
Basics of OOP using c++
simple dialog based application (ohms law) using Raspberry PI and python
Dancing LED using Raspberry PI and GPIO and Python
Controlling a fan using Raspberry PI and GPIO
Installing qt c++ development environment in Raspberry PI
Video Tutorial Forums
Video Playlist
Programming Video Playlist
C++ Programming Playlist
VC++ Programming Playlist
VC++ Environment Familiarization List
VC++ Beginner Video Play List
VC++ Intermediate Tutorials Video List
VC++ Advanced Tutorials Video List
Java Programming Playlist
VB.NET Programming Playlist
C#.NET Programming Playlist
Android Programming Playlist
Device Driver Programming Playlist
Addin - Plugin Programming Playlist
VB Programming Playlist
Physics Video Playlist
Mathematics Video Playlist
Download
System Administration
How to setup GMail in Outlook
Home
Projects
Computer Related Projects
C++ Projects
VC++ Projects
Introduction to Object Tracking
QT C++ Projects
Simple Audio Processing Utility
C#.NET Projects
VB.NET Projects
PHP Projects
VB Projects
Java Projects
Tic Tac Toe
Android Projects
Hardware related Projects
Physics Projects
Electronics Projects
Electrical Projects
Mechanical Projects
Mathematics Projects
Civil Projects
Instrumentation Projects
Chemistry Projects
Biotechnology Projects
Life Science Projects
Photonics Projects
Nano Technology Projects
Communication Projects
Articles
General Technical Articles
Computer Science Articles
Electronics Articles
Forums
All Discussion Forums
Electronics Engineering Forum
Computer Science and Engineering Forum
VC++ Discussion Forum
C#.NET Discussion Forum
VB.NET Discussion Forum
Java Discussion Forum
C/C++ Discussion Forums
ASP.NET Discussion Forum
PHP Discussion Forum
Android Discussion Forum
Computer Science Forum
Civil Engineering Forum
Mechanical Engineering Forum
Electrical Engineering Forum
Physics Forum
Mathematics Forum
Science and Technology Jobs Forum
General Discussion Forum
Tektips Open Source Projects
Ask Question
Online Test
Test your Programming skills
Test your C Programming skills
Test Your C++ Programming Skills
Test Your VC++ Programming Skills
Test Your Java Programming Skills
Test Your C#.NET Programming Skills
Test Your VB.NET Programming Skills
GATE Exam Practice Test
Computer GATE Exam Practice Test
Electronics GATE Exam Practice Test
Electrical GATE Exam Practice Test
Physics GATE Exam Practice Test
Civil GATE Exam Practice Test
Mechanical GATE Exam Practice Test
Aptitude Test
FAQ
Computer Science and Engineering
Computer Hardware Related FAQ
Computer Software Related FAQ
Computer Engineering Related FAQ
Programming FAQ
C++ FAQ
VC++ FAQ
C#.NET FAQ
VB.NET FAQ
Java FAQ
VB FAQ
PHP FAQ
Android FAQ
Physics Topics FAQ
Electronics Topics FAQ
Civil Engineering Topics FAQ
Mechanical Engineering Topics FAQ
Electrical Engineering Topics FAQ
Communication Engineering Topics FAQ
Nano Technology Topics FAQ
Bio Technology Topics FAQ
Photonics Topics FAQ
Chemistry Topics FAQ
Mathematics Topics FAQ
Biology Topics FAQ
Help
About TekTips
General FAQ
Contact Us
Join TekTips Experts Group
Most Active Users
Computer Science and Engineering Forum
Computer Software and Applications
| Antivirus
Antivirus
Posted Date Unknown
0 Comment
1.
What is the best antivirus to use?
The best antivirus software is the one that works best on your system, has the features you want, and is easy for you to use.
2.Do we need to have both an antivirus and an anti-spyware scanner?
It depends. Some antivirus products, notably McAfee Virus-scan, include stellar spyware protection - but many others do not. If you are experiencing ongoing problems with spyware, you might want to consider adding a dedicated spyware scanner to the mix.
3.Do we have to uninstall the existing antivirus program before installing a new one?
If you are changing to a new antivirus product, you will need to uninstall the previous antivirus scanner first. After uninstalling, you must reboot your PC before installing the new scanner.
4.What is the antivirus report you produce?
Our antivirus reporting is the feature that we offer for our users: programs authors and web site visitors. We publish the report in the program description,so, the visitors can see is this program clean to be downloaded and installed. Also it's useful for the authors because they can refer to this report to inform the visitors that they care for them and their software is clean.
5.Why do you send notification to the program author? Is this SPAM?
Of course it's not a SPAM. We send only the message for author one time after the program was checked.
6.How often do you check program files?
When the size or date of program file is changed. We check this periodically.
7.Which are the available antivirus programs?
Avira ,Bit Defender ,ClamWin ,ESET NOD32 ,F-Prot ,Kaspersky,McAfee,MSE,Network Associates,Panda Software, RAV ,Sophos,Symantec (Norton) ,Trend Micro,Vipre,Webroot
8.How do I remove a virus from a computer?
Before removing any file from your computer you should verify if the file is a virus or other malware.If you've determined that a file is infected with a virus the best method of removal is to run an antivirus scan on the computer. If the virus is preventing you from entering Windows or running the antivirus can boot the computer into Safe Mode and run the scan there. If you do not have an antivirus scan, but still believe a file is infected with a virus, try running an online virus scan. These web sites will scan your computer hard disk drive for any infections.
9.If I have a firewall do I need an antivirus?
Yes. A firewall will not protect you from viruses and other malware. A firewall limits outside network access to a computer or local network by blocking or restricting ports. This helps prevent your computer from communicating with other computers on the network and on the Internet you may not want.
10.Can two antivirus scanners be run on the same system at the same time?
It is never a good idea to run two antivirus scanners simultaneously. However, if only one of the scanners has real-time protection enabled and the second scanner is used only to manually scan selected files, they may possible co-exist peacefully. In some cases, an antivirus scanner will not install if it detects another antivirus scanner already installed on the system.
11.Why does one scanner detect a virus but another does not?
Antivirus is largely signature-based. The signatures are created by the individual vendors and are unique to their products (or the products that use those particular scanning engines. Hence one vendor may have added detection (i.e. a signature) for a particular malware while another vendor may not have.
12.What is mean by Real time protection?
Scanning of files stored on computer drives or disks
13.Can replace default antivirus software?
These companies usually pick something their customers have heard of, but make no mistake it's there also because the PC maker gets a cut of the purchase price when you purchase and renew that software. The thing is, everyone has their own needs when it comes to PC security so one size doesn't fit all.
14.What are DAT files?
Antivirus applications like Virus Scan require information such as virus signatures to detect viruses. McAfee refers to this information as virus definitions. As new viruses are discovered, McAfee releases new virus definitions files (DAT files) to enable Virus Scan to detect them.
15.What is Auto Update?
Auto Update is a feature in Virus Scan that automates getting DAT files. In Virex, this feature is called eUpdate. Auto Upate can be configured to obtain DAT files automatically at startup or scheduled to obtain them at any time. Auto Update can also download and install incremental DATs, EXTRA.DATs, software engine upgrades, Service Packs, and HotFixes.
16.What is MailScanner?
MailScanner is software that automatically scans all incoming and outgoing email on campus for viruses and suspicious attachments. MailScanner uses a Unix version of VirusScan to detect viruses. VirusScan is updated hourly to make sure the latest virus definition (DAT) files are used.
17.Can we block email with MailScanner?
At the present time MailScanner has been configured to block (that is, delete) email messages infected with all variants of the following viruses: SirCam, Klez, Yaha, Sobig, Bugbear, Dumaru, Holar, Bagle, Mydoom, and Netsky.
18.Why not block all viruses?
The current policy at Information Technologies is to block any virus that exceeds 300 detections per day on Mail Scanner and that is capable of sending infected messages using its own SMTP (Simple Mail Transport Protocol) engine. So far, only a few viruses have met these two requirements. These viruses however constitute the vast majority of the detections on Mail Scanner.
19.What is the purpose of an anti-virus?
An anti-virus program protects a computer from getting malicious viruses from the internet, through websites, email, and instant messenger. Usually it consists of a firewall, a virus scanner and remover, and sometimes other tools as well.
20.Common drawbacks of Signature-based detections?
Signature-based detections,it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so called zero day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions.
21. What are the different types of anti-viruses?
Antivirus Personal Edition (offers the effective protection against computer viruses for the individual and private use on a single PC-workstation.)
Avast! 4 Home Edition ( full-featured antivirus package designed exclusively for home users, non-commercial users Home Edition is free of charge,)
AVG Free Edition i( well-kn anti-virus protection tool. AVG Free is available free-of-charge to home users for the life of the product!)
BitDefender Free Edition
ClamWin is an Antivirus tool that comes with an easy installer and is open source code at no cost.
22.What is Spyware & Anti-Spyware?
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. Major anti-virus firms such as Symantec, PC Tools, McAfee and Sophos have come later to the table, adding anti-spyware features to their existing anti-virus products. SymantecAnti-Virus, for instance, categorizes spyware programs as "extended threats" and now offers real-time protection from them.
23.Define Malware& Anti -Malware programs?
Computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables. Viruses may also contain a payload that performs other actions, often malicious. A worm is a program that actively transmits itself over a network to infect other computers. As malware attacks become more frequent, attention has begun to shift from viruses and spyware protection, to malware protection, and programs have been developed specifically to combat them.
24.Common Features of Antivirus Software?
Scans of incoming files
Scans of the computer
Tools to clean up computers
Tools to prevent spam
25.What is difference between antivirus,anti spyware and internet security?
Anti-virus programs scan for viruses and related malware by examining the files on your system for patterns of data that have been identified as being viruses. ,Anti-spyware programs monitor your system as you use it for behaviours that are known to be spyware-related. ,Firewalls prevent malware from reaching your machine through your network. They don't prevent things you control, like downloads or email, but rather stop attempts to connect to or infiltrate your machine without your knowledge or participation.
26.What is the Need of USB Drive Antivirus ?
Data leakage: account information, bids, contracts and much more commercial confidentiality data can easily be downloaded onto any removable media devices- from a memory stick to iPod . And once it leaves your computer, the integrity of that sensitive data is at risk.
Virus infection: more and more viruses,worms and Trojans infect computer via USB drives, once an infected USB drives is plugged into computer,the virus in it will spread through the whole system.
27.Advantages of USB Drive Antivirus uses?
Prevent data leakage via USB removable devices,100% protection against any virus via USB drives,Remove USB virus in your infected system,The best solution to protect offline computer,The world's fastest and smallest antivirus software,100% compatible with other antivirus,Easy to use,No recurring payment, the license key is lifetime.
28.What are the Identification methods of virus?
Signature based detection.
Heuristic-based detection,like malicious activity detection, can be used to identify unknown viruses.
File emulation-File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions.
Root kit detection-Anti-virus software can attempt to scan for root kits; a root kit is a type of malware that is designed to gain administrative-level control over a computer system without being detected.
29.What is Cloud antivirus?
Cloud antivirus is a technology that uses lightweight agent software on the protected computer, while offloading the majority of data analysis to the provider's infrastructure.
30.What is the Need of a Network firewall?
Network firewalls prevent unknown programs and processes from accessing the system. However, they are not antivirus systems and make no attempt to identify or remove anything. They may protect against infection from outside the protected computer or network, and limit the activity of any malicious software which is present by blocking incoming or outgoing requests on certain TCP/IP ports. A firewall is designed to deal with broader system threats that come from network connections into the system and is not an alternative to a virus protection system.
31.What do you mean by online Scanning?
Some antivirus vendors maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files. Periodic online scanning is a good idea for those that run antivirus applications on their computers because those applications are frequently slow to catch threats.
32.What is Antivirus Specialist tools?
Virus removal tools are available to help remove stubborn infections or certain types of infection. Examples include Trend Micro's Rootkit Buster and rkhunter for the detection of root kits,Avira's AntiVir Removal Tool,PC Tools Threat Removal Tool, and AVG's Anti-Virus Free 2011.
33.What is Traditional Antivirus Programs?
Generically labeled "Antivirus Software" is the main type of antivirus software used by consumers. It eliminates most viral infections, but does not always detect specialized malware and other less overt infections.
34.Which are the most Powerful and Efficient Antivirus for PC?
ESET NOD32
Avast
Kaspersky
Norton 360
AVG Antivirus 2011
35.Which are the different types of Scanners and Other Antivirus Software Protection?
Conventional Disk Scanners.,Memory-Resident Scanners,Behavior-Based Detection,Startup Scanners,Inoculation.
36.What is the most powerful Anti-virus of all?
ESET Smart security but is it not free.in free avast works fine.
37.Which are the different types of Spyware?
Parasite Ware,Page Hijackers,Dialers.
38.What is Anti-Spyware Programs?
Spyware can take a viral, self-replicating form. Spyware viruses are removable with most types of antivirus software, but more benign, non-viral spyware may be overlooked; anti-spyware is important for protecting financial information.
39.How Anti-virus Programs Work?
Real time protection,Repair the file that has the virus. Usually this is attempted first.Quarantine the file that has the virus so no program can access it but it could be restored. Usually this is done when a virus laden file cannot be repaired.Delete the file that has the virus.
40.Define Anti-Virus Measures?
Viruses transmitted through e-mail messages are one of the more significant threats to your organization. E-mail viruses can attack individual computer systems or your entire e-mail environment. Therefore, you must ensure that you have adequate protection against viruses in your Exchange 2003 environment.
41.Does Linux operating system need anti-virus protection?
Linux is for the most part Virus free.
42.What is Open Source Antivirus?
Clam Av can only detect viruses and move any infected files into a quarantined folder; it cannot remove them from files. Clam Av detects viruses on all platforms, but it is primarily useful for Windows viruses and malware.
43.What is Heuristic approach on virus detection?
Heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions.
44.What are the Issues of concern with anti -virus?
Unexpected renewal costs
Rogue security applications
Problems caused by false positives
System and interoperability related issues
Effectiveness
New viruses
Root kits
45.What is Anti-Adware Programs?
As with viral spyware, most viral adware programs can be removed using traditional antivirus programs, but benign adware requires specialized anti-adware software; adware is usually more of a nuisance than a security threat.
46.What is Trojan Horse Programs?
Trojan horses are not technically viral, but many people call them viruses. Trojan horses are designed to remain dormant until active, making them hard to detect. Anti-Trojan programs are necessary for most web users.
47.What is Inoculation?
This is a totally different approach to virus detection. Instead of looking for the viruses themselves, this technique looks for the changes that the viruses make to files and boot sectors. Starting with a clean system, the software "inoculates" each boot sector and program file by storing a snapshot of information about it based on its content and size.
48.Can two antivirus scanners be run on the same system at the same time?
It is never a good idea to run two antivirus scanners simultaneously. However, if only one of the scanners has real-time protection enabled and the second scanner is used only to manually scan selected files, they may possible co-exist peacefully. In some cases, an antivirus scanner will not install if it detects another antivirus scanner already installed on the system.
49.Why does one scanner detect a virus but another does not?
Antivirus is largely signature-based. The signatures are created by the individual vendors and are unique to their products (or the products that use those particular scanning engines. Hence one vendor may have added detection (i.e. a signature) for a particular malware while another vendor may not have.
50.Which are the best Free Antivirus Software for Windows Operating Systems?
Avira AntiVir Personal for Windows
AVG Free Edition for Windows
Microsoft Security Essentials
Avast Home Edition for Windows
Panda Cloud Antivirus
Comodo Internet Security
See All Responses Below...
Author
Message Rating
Author Name
Posted on:
Report Spam
Please Login to Post Your Comments
Name
(Max. 100 characters)
Select Language
---Select Language---
English
Others
Comments
Paragraph
Normal
Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Formatted
Address
Size
1
2
3
4
5
6
Color
Black
Gray
DarkGray
LightGray
White
Aquamarine
Blue
Navy
Purple
DeepPink
Violet
Pink
DarkGreen
Green
YellowGreen
Yellow
Orange
Red
Brown
BurlyWood
Beige
Design
HTML
Attach File
(Max. Size: 2 MB)
A few simple rules when posting your Comments,
Please post only answers relevant to the topic of discussion.
Please dont misuse this site or do not be abusive, offensive, inappropriate,harass anyone on the boards or post ads or spam. Doing so will delete your inappropriate messages and will block or delete your account on this site.
Related Threads
run time error(at 59:1471): NIL Interface Exception. What this error message means
what is AJAX and How it works
How can i use Network Programming using VC++ and Winsock Library
How can i create MultiThreaded programming using VC++
How can i create Array and File handling using VC++ and MFC
How to Create an Extension for Opera
Firefox 11+ Add-on SDK can you create a toolbar at the top of window below address bar?
c# - How to develop addin for MS Outlook
How to Build a Chrome Extension
How to create full screen window with MFC?
Sitemap
Home
Quick Signup
Terms of Use
About TekTips
Most Active Users