P. 1
Malwares

Malwares

|Views: 702|Likes:

More info:

Published by: Markus Johan Kiril Klyver on Jan 14, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/20/2013

pdf

text

original

type

Malware detection and removal

oS

Windows 2000, XP, Vista

Hardware

License

Commercial

nIAP Validated

no

Common Criteria

Developer

Ashampoo GmbH (Germany)

Availability

http://www2.ashampoo.com/webcache/
html/1/product_2_0149___USD.htm

Ashampoo®

AntiSpyware 2

Section 4 Anti-Malware tools

32 IA Tools Report

Abstract

Command Anti-Malware scans for viruses, spyware,

malware, and other potentially unwanted programs.

Te tool implements a four-phase detection system to

signifcantly minimize incidence of false-positives.

Te tool uses heuristics to identify threats based on

behavior that uses a neural network learning

capability to recognize and block novel threats. Te

tool’s anti-virus engine simulates the execution of

programs to determine which Windows OS calls they

attempt to make; this capability runs in a fully

quarantined environment entirely segregated from

the host OS. Te tool provides real-time scanning.

Authentium advertises that its malware signature

database contains over 800,000 discrete pieces of

malicious code.

Command Anti-Virus v5

type

Anti-malware detection

oS

Client—Windows Vista, XP, 2000;
Server—Windows XP, Server 2003, 2000

Hardware

License

Commercial

nIAP Validated

no

Common Criteria

Developer

Authentium, Inc.

Availability

https://www.authentium.com/mainv2/
command.htm

Authentium®

Command Anti-Virus v5

33

IA Tools Report

Section 4 Anti-Malware Tools

Abstract

AVG 8.5 Internet Security includes the following tools—

X

X Anti-Virus and Anti-Spyware, to detect and remove
viruses, worms, spyware and Trojans;

X

X Identity Protection, to help protect against
identity theft;

X

X Anti-Rootkit, to detect and remove rootkits;

X

X Web Shield, to scan downloaded fles and instant
messages for malware;

X

X LinkScanner, to block malicious Web sites;

X

X Anti-Spam, to flter junk mail and phishing mail;

X

X Firewall, to protect against network-based threats;

X

X System Tools, to control AVG Internet Security.

AVG 8.5 Internet Security leverages real-time

scanning and automatic signature updates to protect

computer systems against malicious code.

AVG 8.5 Internet Security

type

Virus, spyware, and rootkit detection
and removal

oS

Windows 2000 and later

Hardware

License

Commercial

nIAP Validated

no

Common Criteria

Developer

AVG technologies CY, Ltd. (Cyprus)

Availability

http://www.avg.com/
product-avg-internet-security

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->