Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

Say if I want to test www.abc.com

How to do this ?

Thanks
0
On Demand Webinar - Networking for the Cloud Era
LVL 10
On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Hello,

We have a server which we believe being infected by rootkit virus.

There is a EXE keeps showing up triggering a process and spikes up the CPU of the server.

Malwarebytes detects the threats and reboot the server and clean.

Also, how to

But the issue comes back.

Please advise what tool I should use.

Thanks.
0
Should blocking EICAR be considered a minimum requirement for AV software?

Please note that the operative word here is "minimum."  In other words, if an antivirus program does not detect EICAR, should it be eliminated from selection?

Or is this too much of an over-generalization, i.e., that "anti-virus" software now comes in all manner of flavors, including those that might detect a ransomware attack, but not check the symptoms for an oldie like EICAR?
0
Hi Experts,

I realized that lately my pc is reacting very slow to my keystrokes, especially when using the mouse to move objects in Access forms, any idea what can be the reason?

I checked task manager and CPU usage is low, and RAM is not to high either..

PS. Windows 7 Pro, NO VIRUS as per AVG..

Thanks in advance.
0
1
Message saying essentials support ended
0
My colleague has managed to configure one of the PC as Super-Agent ie
other PCs could get the McaFee AV signature updates from it or

Q1:
is this a 'push' update ie from Super Agent, it pushes to the slave PCs
or it's a pull ie Slave PCs pull signature updates from it?

Q2:
How do we configure the slave PC portion (screen by screen will be good)?
0
I have a Windows SBS 2011 version installed with Kaspersky endpoint 10 anti-virus which is blocking local access of users to the server. I have folder redirection configured but could neither redirect any folders nor ping or open the server shared folder.

After pausing Kaspersky Endpoint, i can access all server resources. I have tried to add the local network on Kaspersky allow trusted networks but could not manage.

Please assist.
0
1
Receive a ICMP block from my DC server in the Symantec traffic log on the Exchange server. Is that normal ? I have already fully scaned both servers but nothing found

ThxICMPPing.png
0
Automating Your MSP Business
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Hello,

A newly installed Dell all-in-one computer with windows 10 pro got a popup malware named "RDN/Trojan.worm!055BCC2967574 Infection”. Attached file shows the popup.

The installed anti Malwarebyte did not detect anything. I ran the app manually again. In addition I downloaded few more and scanned the computer , neither of these tools find anything..

Last week He hit with similar popup and again the tools claimed his PC is cleaned.
Can anyone advise if I should take any step further or his computer in fact is clean?

The following are the tools that I used.
1- Malwarebytes (Paid License).
2- Malwarebytes Anti Exploit (Paid License).
3- HitManPro (Evaluation - Free download).
4- Adware Cleaner (Evaluation- Free download).
5- Zemana (Evaluation- Free download)

Thank you.
VirusPict.PNG
0
Many are looking to uninstall Kaspersky Lab software from their computers, amidst recent plans by the Department of Homeland Security to "remove and discontinue present and future use of the products."

While Kaspersky’s instructions for this may paint the process as straight-forward, we’ve often seen issues in uninstalling Kaspersky anti-virus, for example:

If you do plan to uninstall Kaspersky and run into any issues, don’t hesitate to Ask your question in the Anti-Virus Apps topic.

And as always, make sure you have an antivirus and malware protection system installed, like Webroot or Immunet.
6
 
LVL 18

Expert Comment

by:Lucas Bishop
Yeah @Nicholas. Generally you'd expect the accusations to have some evidence to back them up. Will be interesting to see what emerges from this and how Kaspersky's business is able to handle the fallout.
1
 
LVL 66

Expert Comment

by:Jim Horn
That matches up with the hard sell tactics Micro Center used on me when I bought my last laptop in an effort to upsell me on Kaspersky's anti-virus software.
0
How can I easily detect malware on smartphones? I have some on my network with strange behavior after a security incident. Unfortunately they were on the same network as the attacked machines.
0
There's eicar for Android & Windows.  Is there any for IOS?

Appstore doesn't show eicar for IOS  tho playstore has it.

I need to test an Mobile Threat Prevention product for IOS.
Any other test files/IOCs I can use for IOS to test this new MTP called Lookout?
0
Inherited computers from another IT company that have Trend Micro Security Agent installed on them without the uninstall password, does anyone know how to go about changing the password to uninstall. It's causing network issues.
0
I am thinking of the following scenario. A Windows 8 or 10 computer hangs on startup. You suspect it may be a virus. You can't boot into the GUI but you can use a boot rescue USB and get to a command line. Is there an antivirus executable you can run from the command line? Preferably one that's free.
0
Is windows defender a good enough anti-virus program or should i use something else?
My e-mail is    *Removed by MIT*
My name is Clarence
0
I want to provide a way of excluding a file from some anti-virus software's scanning routine for all my users.

Entering the file path in the AV software for exclusion for a single user works for me. see below:

X:\Users\johns\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\                   [this works for the user johns]

How can I describe this generically so that the exclusion will work for all users
0
I had this question after viewing anti virus software protecting against ransom ware.

Is this for a single computer or network of them?  

The best and cheapest protection is a solid regular backup of your system. Windows 10 has built in backup utilities.

I am looking for a product I can put on 4 personal computers windows 10,8,7 so I can defend my new and old computers
Not for business use
0
Important Lessons on Recovering from Petya
LVL 10
Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Hello -

I am trying to uninstall Symantec Endpoint Protection and replace with new AV within SCCM 2012. I have the install application for Symantec and new AV. The Symantec application should have a uninstall switch, however not sure how to double check that with .exe I have for Symantec. I have tried to run uninstall of Symantec with Uninstall.exe however no luck. I have also tried to run a batch file from my desktop with wmic product where "name like 'Symantec Endpoint Protection%'" call uninstall /nointeractive, however no luck.
0
Please provide me with the URL address to download the Mac Symantec antivirus evaluation product.
0
I am assigned to bring the best end point solution .what parameters should i consider for choosing the solution with respect to cost and features to protect 4000 Users.
if there is any comparison available between different endpoint solution specially comparison with paloalto TRAP ll be really appreciated.
0
What is a good anti virus software

Something that may combat ransomware
on windows 10
1
I would like to get opinions on the best antivirus for a small (less than 6 Windows devices) LAN. Thanks for your help.
0
Hi All,

We have just moved to Kaspersky EndPoint security 10 (10.3.0.6294) from Sophos.
Some of the users have complained that now it takes them few minutes when they start there computer in morning and when they shutdown.
Is there anyway we can monitor whats taking up resources when the computer starts and how can we minimize Kaspersky resource utilization?

thanks.
0

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.