Well Xvirus has more signatures than malware bytes. If you see the behavior blocker settings you can see what it monitors.
The number of signatures means nothing. Take Comodo for example. MBAM has strong generic/family signatures.
I looked at the screenshots earlier, but only see a behavior guard swith at slide four, no settings just a switch, that is why I asked (ask again) where can the options of the behavior guard be seen to get an impression of what it monitors?
Exactly. It shouldn't be that hard to be better than Iobit malware fighter, if that is their goal, but become better than Malwarebytes, well good luck with that. MBAM have excellent researchers and is no longer a small company. And their product is well established.
Here you can see some threads where Xvirus detection is tested http://malwaretips.com/search/303739/?q=xvirus&o=date You can judge for yourself whether it can be useful or not.
I think you got me wrong so I edit my previous post. MBAM has great generic signatures and is also recommended to install it along your existing AV.
Xvirus is recommended to install along side an av too and you can not say which signatures are best without trying both. They are well known because they have more time in the market and because of marketing.
That is the point: marketing! Explain what the behavioral monitors additionally to understand the benefits and compensate for the lesser analysis resources (which makes your claim incredible to say that XVIRUS has a better data base asMBAM). When I cherry picked through the list of Azure Phoenix provided, that was no promotion for XVIRUS (may be my bad luck of picking the wrong results). So less resources, disappointing cherry pick on test results and this image is easily set: you can't proof your promise. @Dani Santos Is it to much trouble to get an answer to the question what does behavioral guard monitor, besides execution or file access of blacklisted fingerprints?
It's always interesting to see a new emerging product in early development. But doesn't look good to keep avoiding the basic questions of functionality when users are trying to get an understanding of how certain components work. I am curious to hear a little more on how the behavior component works as well.
We have malware hunters searching and adding hashes to the database and users submiting files to add.
The behavior blocker has 4 options: 1.Monitors startup entries and alerts if there is a new one. 2.Monitors unknown drivers on windows. 3.Monitors hidden files running in memory. 4.Monitors every unknown process, it's like the avast hardened mode
You can see this in the settings? Can you tell me how it monitors for "invisible processes" as seen in the BB settings? Are these processes hidden from the Task Manager?
Avast hardened mode (as far as I know, but correct me when I am wrong) pops-up when a file not known in the cloud to be okay (so when it is not in the OK-list = white list), therefore I asked
Can you give some more details, I have never heard of hidden files in memory, I do know that they can be hidden from disk. Normally it's processes who get hidden in memory, a tactic often used by root-kits.