SlideShare une entreprise Scribd logo
1  sur  11
avast! antivirus protection
By Ruephan & Fahmi
avast! About Us
Avast! (styled avast!) is a freemium antivirus computer program
available to Microsoft Windows, Mac OS X and Linux users, with a
user interface available in 41 languages. The name Avast is an
acronym of "Anti-Virus – Advanced Set". The official, and current
logo of Avast! is a white orb with the letter 'a' on it and an orange
circle around it, sticking out to four directions.
2
3
avast! Signature Based Detection
 Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be
very effective, but cannot defend against malware unless samples have already been obtained
and signatures created. Because of this, signature-based approaches are not effective against
new, unknown viruses.
 As new viruses are being created each day, the signature-based detection approach requires
frequent updates of the virus signature dictionary. To assist the antivirus software companies,
the software may allow the user to upload new viruses or variants to the company, allowing
the virus to be analyzed and the signature added to the dictionary.
 Although the signature-based approach can effectively contain virus outbreaks, virus authors
have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and,
more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify
themselves as a method of disguise, so as to not match virus signatures in the dictionary.
4
avast! Malicious Activity Detection
 Malicious activity detection like Heuristic-based detection , can be
used to identify unknown viruses.
 avast! free isn't the best at malware and not every program
Antivirus catches everything, remember it is a free program, all that
is are windows(MS-DOS) programs.
5
Avast Heuristic detection
 Some more sophisticated antivirus software uses heuristic analysis to identify new malware or
variants of known malware.
 Many viruses start as a single infection and through either mutation or refinements by other
attackers, can grow into dozens of slightly different strains, called variants. Generic detection
refers to the detection and removal of multiple threats using a single virus definition.
 For example, the Vundo trojan has several family members, depending on the antivirus
vendor's classification. Symantec classifies members of the Vundo family into two distinct
categories, Trojan.Vundo and Trojan.Vundo.B.
 While it may be advantageous to identify a specific virus, it can be quicker to detect a virus
family through a generic signature or through an inexact match to an existing signature. Virus
researchers find common areas that all viruses in a family share uniquely and can thus create a
single generic signature. These signatures often contain non-contiguous code, using wildcard
characters where differences lie. These wildcards allow the scanner to detect viruses even if
they are padded with extra, meaningless code. A detection that uses this method is said to be
"heuristic detection."
6
avast! File emulation
» File emulation is another heuristic approach. File emulation involves
executing a program in a virtual environment and logging what actions
the program performs. Depending on the actions logged, the antivirus
software can determine if the program is malicious or not and then carry
out the appropriate disinfection actions.
7
avast! Performance
Evaluate the performance impact and system resource usage of using anti-virus software in three
ways:
Overall system performance measured before and after installation using PCMark
Memory footprint
 Avast took up about 12 MB of system memory
Time it took to perform a full system scan
Avast took 34 minutes to scan our computer's hard drive with 122GB of data
avast! "false positive"
 A "false positive" is when antivirus software identifies a non-
malicious file as a virus. When this happens, it can cause serious
problems. For example, if an antivirus program is configured to
immediately delete or quarantine infected files, a false positive in
an essential file can render the operating system or some
applications unusable.
 All virus scanners produce false positive results as well,
identifying benign files as malware.
8
9
avast! Renewal Cost
Renewal Cost
FREE OF COST
PROS:
FREE of charge
Simple interface
Highly pro-active, extensive protection
10
Public Malware Database Website
Example Malware Database Website report:
http://www.malwaredomainlist.com/mdl.php
http://urlquery.net/index.php
11
avast!
Thanks You..

Contenu connexe

Tendances (20)

Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Dropbox
DropboxDropbox
Dropbox
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

En vedette

3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST SoftwareJulia Szymańska
 
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiíchNMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiíchNew Media Inspiration
 
PCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktycePCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktyceKrystianMularczyk
 
Internet věcí
Internet věcíInternet věcí
Internet věcíPetr Dvorak
 
Communities and user experience.
Communities and user experience.Communities and user experience.
Communities and user experience.Julia Szymańska
 
Spiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentationSpiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentationWendy Wallbridge
 
avar2015_ddos_trojans_slides
avar2015_ddos_trojans_slidesavar2015_ddos_trojans_slides
avar2015_ddos_trojans_slidesJaromir Horejsi
 
The Business Side | Translating and the Computer
The Business Side | Translating and the ComputerThe Business Side | Translating and the Computer
The Business Side | Translating and the ComputerRichard Brooks
 
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJSOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJJulia Szymańska
 

En vedette (11)

3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software
 
Avast-NOAH12 London
Avast-NOAH12 LondonAvast-NOAH12 London
Avast-NOAH12 London
 
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiíchNMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
 
PCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktycePCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktyce
 
Internet věcí
Internet věcíInternet věcí
Internet věcí
 
Avast - NOAH12 London
Avast - NOAH12 LondonAvast - NOAH12 London
Avast - NOAH12 London
 
Communities and user experience.
Communities and user experience.Communities and user experience.
Communities and user experience.
 
Spiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentationSpiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentation
 
avar2015_ddos_trojans_slides
avar2015_ddos_trojans_slidesavar2015_ddos_trojans_slides
avar2015_ddos_trojans_slides
 
The Business Side | Translating and the Computer
The Business Side | Translating and the ComputerThe Business Side | Translating and the Computer
The Business Side | Translating and the Computer
 
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJSOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
 

Similaire à Avast! antivirus protection

How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virusmissstevenson01
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docxinfantsuk
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
20111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture0220111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture02Computer Science Club
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spywaredragaunus14
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsSomanath Kavalase
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studydilsherece
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 
Anti virus slide show presentation
Anti virus slide show presentationAnti virus slide show presentation
Anti virus slide show presentationHaseebIbnMoheb
 

Similaire à Avast! antivirus protection (20)

Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
20111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture0220111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture02
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antivirus
AntivirusAntivirus
Antivirus
 
antivirus.pptx
antivirus.pptxantivirus.pptx
antivirus.pptx
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Virus
VirusVirus
Virus
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Anti virus slide show presentation
Anti virus slide show presentationAnti virus slide show presentation
Anti virus slide show presentation
 

Plus de Pusat Latihan Teknologi Tinggi (Adtec) Taiping (8)

Hello world
Hello worldHello world
Hello world
 
Hello world
Hello worldHello world
Hello world
 
Panduan WIM & Penilaian Beterusan
Panduan WIM & Penilaian BeterusanPanduan WIM & Penilaian Beterusan
Panduan WIM & Penilaian Beterusan
 
Variability?
Variability?Variability?
Variability?
 
Sukatan Kecenderungan Memusat
Sukatan Kecenderungan MemusatSukatan Kecenderungan Memusat
Sukatan Kecenderungan Memusat
 
Taburan Lengkung Normal
Taburan Lengkung NormalTaburan Lengkung Normal
Taburan Lengkung Normal
 
Panduan soalan 2013
Panduan soalan 2013Panduan soalan 2013
Panduan soalan 2013
 
Filing System
Filing SystemFiling System
Filing System
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Avast! antivirus protection

  • 2. avast! About Us Avast! (styled avast!) is a freemium antivirus computer program available to Microsoft Windows, Mac OS X and Linux users, with a user interface available in 41 languages. The name Avast is an acronym of "Anti-Virus – Advanced Set". The official, and current logo of Avast! is a white orb with the letter 'a' on it and an orange circle around it, sticking out to four directions. 2
  • 3. 3 avast! Signature Based Detection  Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be very effective, but cannot defend against malware unless samples have already been obtained and signatures created. Because of this, signature-based approaches are not effective against new, unknown viruses.  As new viruses are being created each day, the signature-based detection approach requires frequent updates of the virus signature dictionary. To assist the antivirus software companies, the software may allow the user to upload new viruses or variants to the company, allowing the virus to be analyzed and the signature added to the dictionary.  Although the signature-based approach can effectively contain virus outbreaks, virus authors have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and, more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
  • 4. 4 avast! Malicious Activity Detection  Malicious activity detection like Heuristic-based detection , can be used to identify unknown viruses.  avast! free isn't the best at malware and not every program Antivirus catches everything, remember it is a free program, all that is are windows(MS-DOS) programs.
  • 5. 5 Avast Heuristic detection  Some more sophisticated antivirus software uses heuristic analysis to identify new malware or variants of known malware.  Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Generic detection refers to the detection and removal of multiple threats using a single virus definition.  For example, the Vundo trojan has several family members, depending on the antivirus vendor's classification. Symantec classifies members of the Vundo family into two distinct categories, Trojan.Vundo and Trojan.Vundo.B.  While it may be advantageous to identify a specific virus, it can be quicker to detect a virus family through a generic signature or through an inexact match to an existing signature. Virus researchers find common areas that all viruses in a family share uniquely and can thus create a single generic signature. These signatures often contain non-contiguous code, using wildcard characters where differences lie. These wildcards allow the scanner to detect viruses even if they are padded with extra, meaningless code. A detection that uses this method is said to be "heuristic detection."
  • 6. 6 avast! File emulation » File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions.
  • 7. 7 avast! Performance Evaluate the performance impact and system resource usage of using anti-virus software in three ways: Overall system performance measured before and after installation using PCMark Memory footprint  Avast took up about 12 MB of system memory Time it took to perform a full system scan Avast took 34 minutes to scan our computer's hard drive with 122GB of data
  • 8. avast! "false positive"  A "false positive" is when antivirus software identifies a non- malicious file as a virus. When this happens, it can cause serious problems. For example, if an antivirus program is configured to immediately delete or quarantine infected files, a false positive in an essential file can render the operating system or some applications unusable.  All virus scanners produce false positive results as well, identifying benign files as malware. 8
  • 9. 9 avast! Renewal Cost Renewal Cost FREE OF COST PROS: FREE of charge Simple interface Highly pro-active, extensive protection
  • 10. 10 Public Malware Database Website Example Malware Database Website report: http://www.malwaredomainlist.com/mdl.php http://urlquery.net/index.php