Saturday, July 27, 2013

Norton Antivirus


Norton Antivirus Tips and Tricks Application talks about the tips of using the Norton Antivirus software is software used to prevent, detect and remove malware , such as: malicious BHOs, hijackers, ransomware, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from techniques, is commonly offered in products and services of antivirus software companies.
A variety of strategies are typically employed.
Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files.
No matter how useful antivirus software can be, it can sometimes have drawbacks.
-Antivirus software can impair a computer's performance.
-Inexperienced users may also have problems understanding the prompts and decisions that antivirus software presents them with.
-If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives.
-Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.
There are several methods which antivirus software can use to identify malware.
Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the of a file to a of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces.
Heuristic-based detection, like malicious activity detection, can be used to identify unknown viruses.

File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs.
Norton Technical Support Number Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate actions.
Signature-based detection
Although the signature-based approach can effectively contain virus outbreaks, virus authors have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and, more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
Heuristics

Some more sophisticated antivirus software uses heuristic analysis to identify new malware or variants of known malware.
Detection

Anti-virus software can attempt to scan for rootkits; a rootkit is a type of malware that is designed to gain administrative-level control over a computer system without being detected. Rootkits can change how the operating system functions and in some cases can tamper with the anti-virus program and render it ineffective.
Norton Support
, Real time scanning on-access scanning, background resident shield, auto protect, and other synonyms refer to the automatic protection provided by most antivirus, anti-spyware, and other anti-malware programs. This monitors computer systems for suspicious activity such, spyware, adware, and other malicious objects in 'real-time', in other words while data loaded into the computer's active memory: when inserting a CD, opening an email, or browsing the web, or when a file already on the computer is opened or executed.

No comments:

Post a Comment