SlideShare ist ein Scribd-Unternehmen logo
1 von 11
avast! antivirus protection
By Ruephan & Fahmi
avast! About Us
Avast! (styled avast!) is a freemium antivirus computer program
available to Microsoft Windows, Mac OS X and Linux users, with a
user interface available in 41 languages. The name Avast is an
acronym of "Anti-Virus – Advanced Set". The official, and current
logo of Avast! is a white orb with the letter 'a' on it and an orange
circle around it, sticking out to four directions.
2
3
avast! Signature Based Detection
 Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be
very effective, but cannot defend against malware unless samples have already been obtained
and signatures created. Because of this, signature-based approaches are not effective against
new, unknown viruses.
 As new viruses are being created each day, the signature-based detection approach requires
frequent updates of the virus signature dictionary. To assist the antivirus software companies,
the software may allow the user to upload new viruses or variants to the company, allowing
the virus to be analyzed and the signature added to the dictionary.
 Although the signature-based approach can effectively contain virus outbreaks, virus authors
have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and,
more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify
themselves as a method of disguise, so as to not match virus signatures in the dictionary.
4
avast! Malicious Activity Detection
 Malicious activity detection like Heuristic-based detection , can be
used to identify unknown viruses.
 avast! free isn't the best at malware and not every program
Antivirus catches everything, remember it is a free program, all that
is are windows(MS-DOS) programs.
5
Avast Heuristic detection
 Some more sophisticated antivirus software uses heuristic analysis to identify new malware or
variants of known malware.
 Many viruses start as a single infection and through either mutation or refinements by other
attackers, can grow into dozens of slightly different strains, called variants. Generic detection
refers to the detection and removal of multiple threats using a single virus definition.
 For example, the Vundo trojan has several family members, depending on the antivirus
vendor's classification. Symantec classifies members of the Vundo family into two distinct
categories, Trojan.Vundo and Trojan.Vundo.B.
 While it may be advantageous to identify a specific virus, it can be quicker to detect a virus
family through a generic signature or through an inexact match to an existing signature. Virus
researchers find common areas that all viruses in a family share uniquely and can thus create a
single generic signature. These signatures often contain non-contiguous code, using wildcard
characters where differences lie. These wildcards allow the scanner to detect viruses even if
they are padded with extra, meaningless code. A detection that uses this method is said to be
"heuristic detection."
6
avast! File emulation
» File emulation is another heuristic approach. File emulation involves
executing a program in a virtual environment and logging what actions
the program performs. Depending on the actions logged, the antivirus
software can determine if the program is malicious or not and then carry
out the appropriate disinfection actions.
7
avast! Performance
Evaluate the performance impact and system resource usage of using anti-virus software in three
ways:
Overall system performance measured before and after installation using PCMark
Memory footprint
 Avast took up about 12 MB of system memory
Time it took to perform a full system scan
Avast took 34 minutes to scan our computer's hard drive with 122GB of data
avast! "false positive"
 A "false positive" is when antivirus software identifies a non-
malicious file as a virus. When this happens, it can cause serious
problems. For example, if an antivirus program is configured to
immediately delete or quarantine infected files, a false positive in
an essential file can render the operating system or some
applications unusable.
 All virus scanners produce false positive results as well,
identifying benign files as malware.
8
9
avast! Renewal Cost
Renewal Cost
FREE OF COST
PROS:
FREE of charge
Simple interface
Highly pro-active, extensive protection
10
Public Malware Database Website
Example Malware Database Website report:
http://www.malwaredomainlist.com/mdl.php
http://urlquery.net/index.php
11
avast!
Thanks You..

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Malware
MalwareMalware
Malware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Antivirus
AntivirusAntivirus
Antivirus
 
Seguridad Informática
Seguridad InformáticaSeguridad Informática
Seguridad Informática
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
Mobile security
Mobile security Mobile security
Mobile security
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Firewall
Firewall Firewall
Firewall
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Sandbox
SandboxSandbox
Sandbox
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishing
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
Deep Web
Deep WebDeep Web
Deep Web
 

Andere mochten auch

3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST SoftwareJulia Szymańska
 
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiíchNMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiíchNew Media Inspiration
 
PCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktycePCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktyceKrystianMularczyk
 
Internet věcí
Internet věcíInternet věcí
Internet věcíPetr Dvorak
 
Communities and user experience.
Communities and user experience.Communities and user experience.
Communities and user experience.Julia Szymańska
 
Spiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentationSpiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentationWendy Wallbridge
 
avar2015_ddos_trojans_slides
avar2015_ddos_trojans_slidesavar2015_ddos_trojans_slides
avar2015_ddos_trojans_slidesJaromir Horejsi
 
The Business Side | Translating and the Computer
The Business Side | Translating and the ComputerThe Business Side | Translating and the Computer
The Business Side | Translating and the ComputerRichard Brooks
 
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJSOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJJulia Szymańska
 

Andere mochten auch (11)

3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software
 
Avast-NOAH12 London
Avast-NOAH12 LondonAvast-NOAH12 London
Avast-NOAH12 London
 
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiíchNMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
 
PCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktycePCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktyce
 
Internet věcí
Internet věcíInternet věcí
Internet věcí
 
Avast - NOAH12 London
Avast - NOAH12 LondonAvast - NOAH12 London
Avast - NOAH12 London
 
Communities and user experience.
Communities and user experience.Communities and user experience.
Communities and user experience.
 
Spiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentationSpiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentation
 
avar2015_ddos_trojans_slides
avar2015_ddos_trojans_slidesavar2015_ddos_trojans_slides
avar2015_ddos_trojans_slides
 
The Business Side | Translating and the Computer
The Business Side | Translating and the ComputerThe Business Side | Translating and the Computer
The Business Side | Translating and the Computer
 
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJSOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
 

Ähnlich wie Avast! antivirus protection

How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virusmissstevenson01
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docxinfantsuk
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
20111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture0220111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture02Computer Science Club
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spywaredragaunus14
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsSomanath Kavalase
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studydilsherece
 

Ähnlich wie Avast! antivirus protection (20)

Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
20111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture0220111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture02
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antivirus
AntivirusAntivirus
Antivirus
 
antivirus.pptx
antivirus.pptxantivirus.pptx
antivirus.pptx
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Antivirus
AntivirusAntivirus
Antivirus
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Virus
VirusVirus
Virus
 

Mehr von Pusat Latihan Teknologi Tinggi (Adtec) Taiping (8)

Hello world
Hello worldHello world
Hello world
 
Hello world
Hello worldHello world
Hello world
 
Panduan WIM & Penilaian Beterusan
Panduan WIM & Penilaian BeterusanPanduan WIM & Penilaian Beterusan
Panduan WIM & Penilaian Beterusan
 
Variability?
Variability?Variability?
Variability?
 
Sukatan Kecenderungan Memusat
Sukatan Kecenderungan MemusatSukatan Kecenderungan Memusat
Sukatan Kecenderungan Memusat
 
Taburan Lengkung Normal
Taburan Lengkung NormalTaburan Lengkung Normal
Taburan Lengkung Normal
 
Panduan soalan 2013
Panduan soalan 2013Panduan soalan 2013
Panduan soalan 2013
 
Filing System
Filing SystemFiling System
Filing System
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Avast! antivirus protection

  • 2. avast! About Us Avast! (styled avast!) is a freemium antivirus computer program available to Microsoft Windows, Mac OS X and Linux users, with a user interface available in 41 languages. The name Avast is an acronym of "Anti-Virus – Advanced Set". The official, and current logo of Avast! is a white orb with the letter 'a' on it and an orange circle around it, sticking out to four directions. 2
  • 3. 3 avast! Signature Based Detection  Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be very effective, but cannot defend against malware unless samples have already been obtained and signatures created. Because of this, signature-based approaches are not effective against new, unknown viruses.  As new viruses are being created each day, the signature-based detection approach requires frequent updates of the virus signature dictionary. To assist the antivirus software companies, the software may allow the user to upload new viruses or variants to the company, allowing the virus to be analyzed and the signature added to the dictionary.  Although the signature-based approach can effectively contain virus outbreaks, virus authors have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and, more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
  • 4. 4 avast! Malicious Activity Detection  Malicious activity detection like Heuristic-based detection , can be used to identify unknown viruses.  avast! free isn't the best at malware and not every program Antivirus catches everything, remember it is a free program, all that is are windows(MS-DOS) programs.
  • 5. 5 Avast Heuristic detection  Some more sophisticated antivirus software uses heuristic analysis to identify new malware or variants of known malware.  Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Generic detection refers to the detection and removal of multiple threats using a single virus definition.  For example, the Vundo trojan has several family members, depending on the antivirus vendor's classification. Symantec classifies members of the Vundo family into two distinct categories, Trojan.Vundo and Trojan.Vundo.B.  While it may be advantageous to identify a specific virus, it can be quicker to detect a virus family through a generic signature or through an inexact match to an existing signature. Virus researchers find common areas that all viruses in a family share uniquely and can thus create a single generic signature. These signatures often contain non-contiguous code, using wildcard characters where differences lie. These wildcards allow the scanner to detect viruses even if they are padded with extra, meaningless code. A detection that uses this method is said to be "heuristic detection."
  • 6. 6 avast! File emulation » File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions.
  • 7. 7 avast! Performance Evaluate the performance impact and system resource usage of using anti-virus software in three ways: Overall system performance measured before and after installation using PCMark Memory footprint  Avast took up about 12 MB of system memory Time it took to perform a full system scan Avast took 34 minutes to scan our computer's hard drive with 122GB of data
  • 8. avast! "false positive"  A "false positive" is when antivirus software identifies a non- malicious file as a virus. When this happens, it can cause serious problems. For example, if an antivirus program is configured to immediately delete or quarantine infected files, a false positive in an essential file can render the operating system or some applications unusable.  All virus scanners produce false positive results as well, identifying benign files as malware. 8
  • 9. 9 avast! Renewal Cost Renewal Cost FREE OF COST PROS: FREE of charge Simple interface Highly pro-active, extensive protection
  • 10. 10 Public Malware Database Website Example Malware Database Website report: http://www.malwaredomainlist.com/mdl.php http://urlquery.net/index.php