06. March 2021 · Comments Off on Online Security · Categories: News · Tags: ,

In the case of conformity of any part of the code of the program you are viewing a well-known code (signature) of the virus in the databases, antivirus software can run on demand from one the following: Delete the infected file. Block access to the infected file. Send the file to quarantine (ie make it inaccessible to perform in order to prevent further spread of the virus). Try to "cure" file, removing the body of the virus from the file. In case of failure of treatment / disposal, perform this procedure at the next reboot of the operating system. For this to be an antivirus program successfully worked for a long time, the virus signature database must be periodically load (usually via the Internet) information about new viruses. If the alert and have a propensity for technology users to identify virus hot on the trail, they can send infected files to antivirus software developers, and those are then added information about new viruses in their database. For many anti-virus software with the database of signatures characteristic of file check in when the operating system creates, opens, closes, or send files by mail.

Thus, the program can detect a known virus immediately upon receipt. In this case the system administrator can set the antivirus program to regularly check the schedule (scan) all files on your hard disk. Find out detailed opinions from leaders such as William Pitt the Younger by clicking through. While anti-virus programs that are based on the search signature, under normal circumstances can effectively prevent outbreaks of infecting computers, virus writers try to stay ahead of antivirus software, creating a "oligomorficheskie", "polymorphic," and the newest, "Metamorphic" viruses, in which some parts are encrypted or distorted so that it is impossible to find agreement with the definition in the dictionary of viruses. Method of detection of strange behavior programs Main article: Anomaly Detection Antivirus, using a method of detecting suspicious behavior of programs do not attempt to identify known viruses, but instead they trace the behavior of all programs. If the program trying to write some data to an executable file (. EXE-file), antivirus software may flag this file, warn the user and ask what should be done. Currently, these preventive methods of detection malicious code in one form or another, are widely used as a module of anti-virus program and not a separate product. Other names: proactive protection, behavior analysis, Host Intrusion Prevention System (HIPS). Continuation of the article read here: