Jumat, 01 Oktober 2010

Avast! Internet Security 5.0.545

avast! is a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly,
and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infectedby a virus, and thus the risk of losing important or private data.
These help files have been created to help you understand how the program works as awhole, as well as describing the properties and functions of its component parts. We assume the user has knowledge of basic terms and the basic skillsneeded to use the Windows operating system. If you are not familiar with terms such as “folder”, “file”, or“window”, or what it means to “activate a window” or “click a button”, we recommend that you consult theappropriate user manual before proceeding.
Based on the award-winning avast! antivirus engine, avast! antivirus 5.0 contains all of the features youwould expect in a modern antivirus program. It incorporates anti-spyware technology certified by West Coast Labs’ Checkmark process, as well asanti-rootkit and strong self-protection capabilities, but now provides even faster scanning with improved detection ability. It contains severalreal-time “Shields” which continuously monitor your email and internet connections and check the files on your computer whenever they areopened or closed.
1. Continuous protection against viruses and spyware
2. Ensures all mails sent and received are clean
3. Keeps you protected from“chat” infections
4. Stops attacks from hijacked websites
5. Lets you safely browse suspicious websites or run unknown applications
6.Allows safe and uninterrupted gaming
Here are some key features of “Avast! Pro Antivirus”:
Core and detection
Antivirus and anti-spywareengine
State of the art scanning engine provides reliable protection against viruses, spyware and other forms of malicious software.
Real timeanti-rootkit protection
Unique “on access” technology checks all kernel-mode drivers that the operating system is loading for signs ofrootkit behavior. This enables even unknown rootkits to be detected and stopped before they can do any damage.
avast! Sandbox
Enables potentiallyexploitable programs (such as web browsers) and/or suspicious executables to be run in a safe, virtual environment. The avast! Sandbox is unique as itruns on both 32 and 64bit platforms.
avast! Community IQ
Most samples we process come from sensors deployed throughout the avast! community in theBehavior shield and anti-rootkit modules. This is a unique source of data made possible only thanks to our huge user base. Most of the collectedsamples are analysed by a number of automated processes and only a small fraction of the samples need to be processed manually by our virusanalysts.
Code emulator
When a suspicious executable is encountered (during both on-demand and on-access scanning), avast! is able to emulate theprogram s code in an isolated environment. The code emulator is used for two purposes. First, it is used for generic unpacking. Secondly, it is used inthe heuristics engine. Technically, this is done using dynamic translation, a method much faster than traditional emulation techniques.
Heuristicsengine
Starting with version 5.0, avast! features a new heuristics engine designed to proactively detect malware undetectable with normal definitions.The heuristics engine is able to cover both binary (executable) and script malware.
Potentially unwanted programs detection
New in version 5.0, avast!now detects potentially unwanted programs, such as remote admin tools and commercial key loggers. Custom rules can be set for dealing with these typesof programs.
Scanning
Boot-time scanner
Allows you to scan your computer for infections before the operating system has started and before a virus canbe activated (32-bit operating systems only).
Command-line scanner
Enables you to run a scan directly from the command line.
Wake-up for scan
MicrosoftWindows is woken from sleep or hibernation mode, performs a scheduled scan, then returns back to sleep mode.
Scheduled scanning
Allows users to definethe scan time and files to be scanned.
avast! Intelligent Scanner
Can reduce the number of required file scans by up to 80% through a white list ofproven safe applications. Files identified as safe are not rescanned unless they change.
Shields
Behavior Shield
Monitors activity on your computerusing a number of sensors (file system, registry and network based) and reports/blocks any suspicious behavior.
Behavioral Honeypots
avast! sensorsidentify and monitor suspicious file activity on selected computers, automatically submitting files to the Virus Lab for additional analysis.
FileSystem Shield
Real-time scanning of opened/executed files.
Mail Shield
Scans all incoming/outgoing e-mails for malware. For MS Outlook, a specialplug-in is used. Other email clients are protected by a generic POP3/IMAP4/SMTP proxy. New in version 5, the proxy also supports scanning of SSLcommunication (gmail.com, sympatico.ca, .)
Web Shield
Scans all visited web pages and checks all files, pages and java scripts downloaded from theinternet. Thanks to the Intelligent Stream Scan feature, the Web shield doesn’t slow down your web browsing.
P2P Shield
Checks files downloadedusing P2P programs. – ABC, Ares, Azureus, BearShare, Bit Torrent, BitComet, BitLord, BitPump, CZDC++, Direct Connect, eDonkey, eMule, iDC++,iMesh, Kazaa, Kceasy, LimeWire, Morpheus, Opera’s DC++, Overnet, Qtrax, Shareaza, SoulSeek, StrongDC++, uTorrent, Vuze, WinMX, Winny2,Zultrax.
IM Shield
Checks files downloaded while using instant messaging or chat programs. – AIM (AOL Instant Messenger), Gadu-Gadu, gaim/Pidgin,Google Talk, ICQ, IM2 Messenger, Infium, Miranda, mIRC, MSN/Windows Messenger, Odigo, PalTalk Messenger, Psi Jabber Client, QIP, QQ, SIM, Skype, Tlen,Trillian, WengoPhone, XFire, Yahoo! Messenger.
Network Shield
Provides protection against network-based viruses. The module has two main components: aURL blocker, designed to block malicious URLs (as defined by the Virus Lab), and a lightweight intrusion-detection system.
Script Shield
Detectsmalicious scripts hidden in internet web pages and prevents them from running and hijacking or potentially causing damage to your computer (InternetExplorer only, 32-bit only).
Updates
Smart virus definition updates
Incremental updating system minimizes the size of regular update files.
Fastapplication of updates
New format for the virus definition file speeds up application of updates into avast! 5.0 and reduces demand on CPU/memory,resulting in uninterrupted computer use.
New format for the virus definition file means faster updates and reduces demand on CPU/memory, resulting inuninterrupted computer use.
Gaming
Silent/Gaming Mode
New Silent/Gaming Mode automatically detects full-screen applications and disables pop-ups andother on-screen notifications without degrading security.
Optimized for latest Intel Core i7 CPUs
Critical sections of the avast! scanning engine codehave been optimized to deliver unrivaled performance on the latest Intel chips.
CPU optimization
Multi-threaded scanning optimization
avast! runsfaster on new multi-core CPUs. A new avast! feature allows the splitting of large individual files between cores, accelerating the scanningprocess.
Green computing
Reduced demands on the disk drive result in lower energy consumption.
Miscellaneous
avast! iTrack
Real-time graphic scanningreports.
Graphical user interface
Easy to navigate graphical interface.
Automatic processing
Infected files are processed automatically withoutrequiring user instructions.
Here are some key features of “Avast! Internet Security”:
1. High performance antivirus engine
2. Anti-rootkitprotection
3. Anti-spyware protection
4. Script shield
5. Process virtualization
6. Command line scanner
7. Anti-spam filter
8. Built-infirewall
Requirements:
1. Processor Pentium 3,
2. 128 MB RAM,
3. 100 MB of free hard disk space

Tidak ada komentar:

Posting Komentar