Does a-squared Guard use signatures?

Discussion in 'other anti-trojan software' started by bellgamin, Aug 9, 2005.

Thread Status:
Not open for further replies.
  1. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    When I initiate an *on-demand scan* with a-squared, it takes it a bit of time to load its HUGE base of malware signatures.

    My question is this....
    Does a-squared's Guard (realtime monitor) have this huge signature base loaded at all times, or does it operate solely on heuristics, or what?
     
  2. .....

    ..... Registered Member

    Joined:
    Jan 14, 2005
    Posts:
    312
    It uses both the sigs and its IDS database ;)
     
  3. JRCATES

    JRCATES Registered Member

    Joined:
    Apr 7, 2005
    Posts:
    1,205
    Location:
    USA
    I wonder how A-Squared's "real-time" protection compares to that of ewido's. I haven't used A-Squared's real-time guard (only the on-demand scanner), and I trialed ewido's 3.0 version and used the RT monitor for the two week period (but it didn't catch or detect anything). I've heard that ewido 3.5 is markedly improved, but I've also heard good things about A-Squared. I know Andreas and the A-Squared team is very good as far as customer relations goes (which is VERY important to me), but I'm curious if anyone has used both and can comment on their effectiveness, as well as other issues (like memory and CPU usage, ease of use, update frequency, etc.)
     
  4. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    Thanks. That is the answer I was hoping for. I have a RELATED question...

    If Guard has all the signatures already loaded, I wonder why those same signatures must be loaded AGAIN when doing an on-demand scan? Any theories?

    @JR- To enhance your possibilities for cogent answers to your OT questions, maybe you should start another thread instead of diverting this one. :p
     
  5. toadbee

    toadbee Registered Member

    Joined:
    Nov 10, 2003
    Posts:
    123
    Hey Bellgamin :)

    I'll theorize in general terms - the guard and the scanner are two different processes and work in two totally different ways. So the scanner can't borrow "what the guard knows" to do its work.

    By the by - files have to traverse the sigs before the IDS gets a looksee, which is they right order of events :)
     
  6. JRCATES

    JRCATES Registered Member

    Joined:
    Apr 7, 2005
    Posts:
    1,205
    Location:
    USA
    LOL....sorry bellgamin, I certainly was not trying to hijack your thread.....I apologize if it came across that way. I didn't mean to be off topic, I just thought that perhaps maybe YOU may have actually tried both and could answer, that's all.

    Good idea, maybe I'll start that thread. Sorry for "hijacking" :oops:
     
  7. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    Or maybe PM Toadbee. He knows a lot about a-squared (& other security stuff, as well). Maybe he has taken Ewido for a test drive. As for moi, I never try a program when I don't know how to pronounce its name..... eh-WEE-doh? ee-WAI-doh? hey-WHY-do? duhhhh :blink:

    Concerning a-squared, I've appended a scrshot of part of Security Task Manager's data. In addition to the data for a-squared, notice the data on WinPatrol. It's flying virgin 9.7 and there are some awesome spikes in its cpu usage. Even so, I'm delighted with WP's added capabilities, especially RID.
     

    Attached Files:

Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.