Virus Bulletin Award

Discussion in 'NOD32 version 2 Forum' started by wattsvilleblues, Aug 25, 2005.

Thread Status:
Not open for further replies.
  1. wattsvilleblues

    wattsvilleblues Registered Member

    Joined:
    Sep 8, 2004
    Posts:
    29
    Eset claims to have not missed a single in the wild virus for 6 or 7 years, but on the Virus Bulletin website it gives two examples where NOD32 has failed:

    April 2002: SuSE Linux
    November 2000: Windows NT


    I was just wondering why there's a difference in these stories, since Eset uses the VB100% award to support its claims.

    Thanks.
     
  2. Firecat

    Firecat Registered Member

    Joined:
    Jan 2, 2005
    Posts:
    8,251
    Location:
    The land of no identity :D
    I hope that helped. :)
     
  3. wattsvilleblues

    wattsvilleblues Registered Member

    Joined:
    Sep 8, 2004
    Posts:
    29
    Was that with advanced heuristics enabled or just the definitions in use?

    But thanks that explains a bit:D!
     
  4. JimIT

    JimIT Registered Member

    Joined:
    Jan 22, 2003
    Posts:
    1,035
    Location:
    Denton, Texas
    These were likely due to fp's--not misses ITW.
     
  5. vee

    vee Registered Member

    Joined:
    May 29, 2005
    Posts:
    34
    Location:
    Zagreb, HR
    they never claimed they got them all... vb100% award you get everytime when vb is conducting a test and AV passes it...

    R.
    vee
     
  6. Patrician

    Patrician Registered Member

    Joined:
    Jun 3, 2005
    Posts:
    132
    And VB only tests ON Demand Scan NOT resident scanner. NOD's On-demand Scan is excelent, while it's resident scanner is some what lacking in detection capabilities.
     
  7. wattsvilleblues

    wattsvilleblues Registered Member

    Joined:
    Sep 8, 2004
    Posts:
    29
    So you mean AMON is less effective than an on demand scan?
     
  8. Blackspear

    Blackspear Global Moderator

    Joined:
    Dec 2, 2002
    Posts:
    15,115
    Location:
    Gold Coast, Queensland, Australia
    And your evidence of this would come from where exactly?

    Cheers :D
     
  9. JimIT

    JimIT Registered Member

    Joined:
    Jan 22, 2003
    Posts:
    1,035
    Location:
    Denton, Texas
    VB tests on-access scanning ability as well.
     
  10. mrtwolman

    mrtwolman Eset Staff Account

    Joined:
    Dec 5, 2002
    Posts:
    613
    You are dead wrong. Just go to the Virus Bulletin site, browse to the Virus Bulletin - issues, register for free and login afterwards. You will get access and chance to read some back issues. Then after having someimagination on the test procedure, tests and results welcome back to discussion :)
     
  11. mrtwolman

    mrtwolman Eset Staff Account

    Joined:
    Dec 5, 2002
    Posts:
    613
    Check on your own in Virus Bulletin Nov. 2000 issue and Virus Bulletin Apr. 2002 issue
     
  12. NGRhodes

    NGRhodes Registered Member

    Joined:
    Jun 23, 2003
    Posts:
    2,381
    Location:
    West Yorkshire, UK
    Patrician, where do you get your facts from ?!?

    http://www.virusbtn.com/vb100/about/index.xml

    VB100% award is "Detect all In the Wild viruses during both on-demand and on-access scanning in Virus Bulletin's comparative tests."
     
  13. irnux

    irnux Registered Member

    Joined:
    Mar 28, 2005
    Posts:
    24
    Location:
    Tehran
    Which comparatives are more reliable ?
    `Virus Bulletin' or `av-comparative' ?
    the results are very different in these 2 sites.... :eek:
     
  14. webyourbusiness

    webyourbusiness Registered Member

    Joined:
    Nov 16, 2004
    Posts:
    2,662
    Location:
    Throughout the USA and Canada
    they use different testing methodologies - you would probably want to read their methodologies and decide which one you find more appropriate.

    I like the proactive testing on AV-comparatives.org, I find it more useful to me as a "real world" user of av solutions - ie, I'm more likely to get a virus from an email before an update is out - which is exactly how Norton protection failed me in 2004 - update issued at 5-6pm and the virus/trojan landed on my machine from an email server bounce message (we run web hosting/mailservers) at 2PM...

    I don't care for any test that uses "zoo" viruses - if they aren't a "real" threat - why do I care who catches the most of them!?!?
     
  15. RejZoR

    RejZoR Lurker

    Joined:
    May 31, 2004
    Posts:
    6,426
    Now thats the misconception of many people that mess up Zoo malware with ItW. They think ItW is everything,but well... its not.
    If you think Zoo samples aren't threat too you than you're very very wrong.
    Actually i don't even understand why the hell do they call it Zoo when it can be downloaded anywhere you want,P2P,HTTP,FTP,you name it.
    If it's not actually pushed into your mailbox/IM that doesn't mean its not there.
    So yes,so called Zoo samples detection is also very important. Sometimes even more than ItW (to me for example...)
     
  16. webyourbusiness

    webyourbusiness Registered Member

    Joined:
    Nov 16, 2004
    Posts:
    2,662
    Location:
    Throughout the USA and Canada
    to you RejZor - key point... honestly, I don't care about YOUR threat exposure... sounds selfish, but it's a fact - MY threat exposure is important to me... and anything that can hit me is an ItW virus... ok - so let's assume a "zoo" virus gets out... as long as my system has solid heuristics (like NOD32), I'm RELATIVELY safe... does it make me TOTALLY safe? ummm... no - and only a fool would think so. But I feel much safer with NOD32 than I EVER did with Norton!

    I guess if I was messing with viruses and threats all the time, I'd have a different perspective... I'm not though - how many of the nod32 purchasers are? Not a significant number I'd guess... but that's MY guess...
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.