Review of top anti-virus software for PCs

Anti-virus, these days has turned out to be one of the inevitable requirements for the personal computer. With the novel ideas of hacking erupting every now and then, there is a need for a perfect information security system that has all your confidential information safeguarded. Reviews of the latest top brands of anti virus systems are as follows.

Kaspersky Anti-Virus 2011

An anti virus system that has all the required features of any good anti virus software, though advanced is simple in installation and usage. It is designed in such a way that it protects, prevents and removes all the malware that causes harm to the PC and robs you of your secret information.

The protection that the software provides is from all the traditional computer virus types in addition to having the capacity of detecting new threats. There is also an online download and installation facility that keeps you at ease. Its usage of iChecker and iSwift scanning technology helps in keeping your resources safe. The other features include a virtual keyboard, desktop security gadget which offers better access to your system security and gamer mode.

Norton Anti-Virus 2011

This brand of anti virus has always been on the forefront ever since anti virus software saw its light of day. It supports a number of browsers like Chrome and Opera, email clients like Outlook and IM clients like Yahoo and MSN messenger. This is also known for its simple-to-use characteristic and easy installation. It provides information security to the hilt so that the ones who know how to create viruses and spread it can never ever cause harm.

The most important feature of this software is the bootable recovery tool that helps in the fixing of a crashed PC. The advantage of Norton Anti-virus 2011 is that there is a Norton Safe Web for Facebook. This scans the videos posted by your friends for virus

Bit Defender Anti-Virus Pro 2011

The best aspect of this easily accessible anti virus software is its flexibility. It can work when controlled manually or automatically. The feature of the Bit Defender Anti-Virus Pro 2011 that is worth a mention is the inclusion of the Search Advisor that provides protection while surfing on the net using any browser.

Apart from providing all the features that a reputable anti virus software provides, it does all the optimization with the maximum speed. Therefore, it provides a complete information security from different types of virus. A specialty mode is also offered for the laptop which can automatically run even when the laptop is left unplugged.

ESET NOD 32 Anti- Virus 4

The latest version from the house of ESET NOD 32 Anti-Virus has a number of features that were missing in the previous version. From keeping your PC safe from Trojans, spyware and viruses this high speed anti-virus version knows how to prevent computer viruses at all times.

It is provided with a smart scanner that detects even the hidden threats that can harm your system. Along with the email scanner it also has the necessary system tools that help in the cleaning of the infected system effectively with the help of Integrated SysInspector and SysRescue.

This article was submitted by one of our guest author: Sweta Menon

Brief introduction on Computer Virus

Virus imageWhat is a Virus?
A virus is a self replicating code that produces its own code by attaching copies of itself into other executable codes and operates without the knowledge or desire of a computer user. Virus was discovered in early 1980s. Viruses require human activity such as booting a computer, executing an autorun on a CD, or opening an email attachment.

In day today life most of computers get attacked or infected with the viruses or worms. 4% attacks are due to viruses and worms are reported,  rest are due to human error (53%) and so on. But that 53% also includes viruses and worms which get attached to our system due to human error. So, whatever be the matter , every computer user should at least know the basics of viruses and worms and how one can try to avoid such stuffs from the system.

There are three basic ways viruses propagate through the computer world: Master boot record: This is the original method of attack.. It works by attacking the master boot record of floppy disks or the hard drive. This was effective in the days when everyone passed around floppy disks.

  • Document Virus: A slightly newer form of virus that relies on the user to execute the file.. Extensions, such as .com and .exe, are typically used. Some form of social engineering is normally used to get the user to execute the program. Techniques include renaming the program or trying to mask the .exe extension and make it appear as a graphic or .bmp.
  • Macro Virus: The most modern type of virus began appearing in the 1990s. Macro viruses exploit scripting services installed on your computer. Most of you probably remember the I Love You virus, a prime example of a macro infector.

Viruses must place their payload somewhere so that  they can overwrite a portion of the infected file. Most virus writers want to avoid detection for as long as possible One way the virus writer can accomplish this is to place the virus code either at the beginning or end of the infected file. 

Prependers infect programs by placing their viral code at the beginning of the infected file. Appenders infect files by placing their code at the end of the infected file.. This leaves the file intact while the malicious code is added to the beginning or end of the file or append at both sides.

Component/Working of a Virus: Working of VirusViruses that can spread without human intervention are known as worms. ->The search routine is responsible for locating new files, disk space, or RAM to infect -> Infection Routine is responsible for copying the virus and attaching it to a suitable host. ->Trigger Routine: is to launch the pay-load at a given date and time. The trigger can be set to perform a given action at a given time.

Characteristics of Virus

  • Virus resides in the memory and replicates itself.
  • It does not reside in the memory after completing its task
  • It may transform itself into other programs to hide its identity

Reason for the creation of Viruses:

  • It may be created for research purpose
  • May be to play pranks with friend and foes what we usually do J
  • Someone may intentionally wish to harm others computer i.e. vandalism
  • To gain over some companies content for financial or threat purpose i.e extortion
  • To have an eye over the people say in a computer lab or on any product distribution i.e Spyware.
  • For spreading threats and terrors at the people through internet by thefting others identity and misusing that and many more may be the reason.

Symptoms that computer get an attack

  • System will work in unmannered way
  • Process may take more time that its expected.
  • floppy drive or disk drive suddenly get opened
  • Hang up at the starting time.
  • Computer name gets changed.
  • Drive names get changed
  • Firefox or other browsers not working properly
  • Getting sudden restart or freezes fast on warning
  • Other gets vulgar messages what you have not sent to them and so on.

Basic Difference between Virus  and worm:

  • A worm is a special kind of virus that can replicate itself and use memory, but don’t attach itself to other programs what a virus does.
  • A worm spread through the infected network automatically but virus does not.

Types of Viruses:

What they infect

  • Boot virus: infects disk boot sectors and records.
  • File Virus: infects executables files in OS file system.
  • Macro Virus: infects documents, data sheets etc like word, excel
  • Network Virus: spread through email using command and protocols of computer network.
  • Source Code Virus: override host codes by adding Trojan code in it

How they infect

  • Parasitic Virus: attach itself to executable files and replicates itself
  • Memory resident Virus: resides and do changes in main memory
  • Stealth Virus: which can hide itself from anti-virus programs
  • Polymorphic Virus: A virus that mutates and changes accordingly.
  • Cavity Virus: overwrites a host file with constant null but with the same size and functionality
  • Famous Viruses and Worms: I love you which is a win-32 email based worm
  • Melissa Virus: it’s a Microsoft word macro virus
  • JS.spth: It’s a JavaScript internet worm which spreads through e-mail, p2p networks etc.
  • Klez virus: its an email attachment that automatically runs when viewed with MS word and uses its own SMTP engine to spread mail
  • Slammer/Sapphire worm: it was the fastest worm in history which doubles itself within 9 seconds. others are top rated viruses in 2008 detnat,  netsky,  mytob , bagle, mywife, virut, Zafi, mydoom, Lovegate and bagz.

Always remember Prevention is better than cure so don’t accept strange files, don’t do double click on everything, try to check file’s extension and learn little bit batch file commands.

Install good antivirus(Nod32, AVG, McAfee, Bitdefender , Kaspersky etc.) and regulary scan your whole sytem, always try to check processes and all.

For more information check Wikipedia, howstuffsworks.com , Ec-council CEH guide and don’t forget to google to get latest news and stuffs related to this topic. This was just an introduction!

Uncategorized

ESET’s nod32 and smart security 4

ESET v4 (latest one)Hi friends I am using this anti-virus from last 3 years and believe me i never got anything in mind to change this software and to use other. What i like most in ESET’s Nod32 is:

  • It doesn’t slowdown your system
  • It updates recent virus signature database automatically
  • Very user friendly and its just like a German shepherd, it will never allow any unwanted stuffs to get in.
  • It is written in assembly language, so its but obvious that it will have fast execution than other software.

ESET is having its two products mainly. They are ESET Nod32 and ESET Smart Security and it comes for home edition, business edition and enterprise edition. you can download softwares related to eset from its own site. click here

Features of NOD32 4.0.467 :

  •  ThreatSense technology — a single optimized Anti-Threat engine for analyzing code to identify malicious behavior, such as viruses, spyware, adware, phishing and more
  •  Unprecedented heuristic analysis capable of discovering new malware threats as they emerge • Powerful virtual PC emulation technology enables unpacking and decryption of all types of archives and run-time packing • Able to clean active malware running in memory
  •  Protects at multiple infiltration points, including HTTP, POP3, SMTP and all local and removable media
  • Removes infections from files that are locked for writing (e.g., loaded DLL file) • Prevents infected files from being opened and executed, and warns on creation of infected files
  •  Automatic execution on system startup • Supports multiple Terminal Server environments
  •  Supports scanning of mapped network disks and many more .

It will be hardly 34 MB and its latest version is 4.0.467 Final It has home edition, business edition, mobile edition as an option; whatever you need you can get the download link form here. You can give it a trial i am sure you will be loving it. One thing i will suggest that use USB disk security system with it then you will never have any kind of virus problem in your system.