Zillya! Internet Security

Discussion in 'other anti-virus software' started by OlegSych, Jun 30, 2010.

Thread Status:
Not open for further replies.
  1. OlegSych

    OlegSych Registered Member

    Joined:
    Jul 5, 2005
    Posts:
    43
    Location:
    Kiev, Ukraine
    New product from Zillya! team released - Zillya! Internet Security
    Product page http://zillya.ua/en/zillya_internet_security.html

    Full anti-virus functionality:
    - Real-time file checking that detects and prevents viruses or other malware
    - Mail filter checks all incoming and outgoing mail messages for malware enabling safe and secure e-mail communication
    - Heuristic analysis allows detection of new and unknown malware
    - There are three types of scanning - quick scan that checks only critical areas on the computer, full scan that checks all files on the computer and custom scan which allows user to select files and folders to be scanned
    - Daily updates of anti-virus bases guarantee maximum safety

    Application-level firewall:
    - Control of application network access.
    - Protection against external attacks.
    - Automatic mode that does not require deep understanding of applications network functionality.
    - Interactive mode for experienced users.
    - Built-in set of rules.
    - System-wide application rules.

    WEB-filtering (scanning of HTTP traffic)
    - Blocking of dangerous sites. Zillya! Internet Security might block user from accessing certain sites that are known to be malicious.
    - Blocking of malicious content from untrusted sites. Some sites are added to database of Zillya! Internet Security as untrusted, these are the ones that might contain malicious content. If site is listed this way user might browse it, but any attempts to download executable, archive or other types of files would be blocked.
    - Creation of own list of sites to block.
     
  2. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    Congratulations for your Internet Security Suite. And Belated "Happy B'Day"
     
  3. OlegSych

    OlegSych Registered Member

    Joined:
    Jul 5, 2005
    Posts:
    43
    Location:
    Kiev, Ukraine
    Thank you :)
     
  4. Nizarawi

    Nizarawi Registered Member

    Joined:
    May 26, 2008
    Posts:
    137
    Happy B'Day :D :D
     
  5. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
    Happy B'day indeed:D

    Thou how can you say that Zillya! is "light" on system resources I wonder?

    From your website:
    ""Low system resources consumption Zillya! Internet Security takes only 120-130Mb of memory.""
     
  6. guest

    guest Guest

    has it log ability?
     
  7. OlegSych

    OlegSych Registered Member

    Joined:
    Jul 5, 2005
    Posts:
    43
    Location:
    Kiev, Ukraine
    Thank you :)

    Do you think 120-130Mb it's too many?
    Compare it's with other AV's. Look this, for example: http://www.eset.com.sg/comparison/
     
  8. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    Are you using 256 MB of RAM? If "YES" then probably Zillya IS is not for you...;) Oh C'mon on Man...These days everybody have more than 1 GB in their working system, so why are you bothering about 120 MB onlyo_O?
     
  9. gery

    gery Registered Member

    Joined:
    Mar 8, 2008
    Posts:
    2,175
    Happy B'Day
    @ Avinash
    it is true that many have more than 1 gig of ram but to me it is not normal that just FW AV and nothing else takes more than 120 meg
     
  10. OlegSych

    OlegSych Registered Member

    Joined:
    Jul 5, 2005
    Posts:
    43
    Location:
    Kiev, Ukraine
    85% of this memory usage - AV bases, loaded to memory. Most AVs use much more, but do not always show it.
     
  11. OlegSych

    OlegSych Registered Member

    Joined:
    Jul 5, 2005
    Posts:
    43
    Location:
    Kiev, Ukraine
    No, it's too simple, and have no such functionality.
     
  12. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
    Because I only got 512MB of RAM, and not 256 :D

    Even if I had 4GB of RAM I would not like my AV/IS to use more than 0-80MB of RAM while idle, however while scanning on-demand it's OK if it uses more.
     
    Last edited: Jun 30, 2010
  13. gery

    gery Registered Member

    Joined:
    Mar 8, 2008
    Posts:
    2,175
    Most? enlighten us please
     
  14. clocks

    clocks Registered Member

    Joined:
    Aug 25, 2007
    Posts:
    2,787
    Really? How do they hide it? Can you give some examples?
     
  15. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    Increase your liking upto 135 MB :D
     
  16. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
  17. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    LOL ...Really RWL ...

    If you have 4 GB then why don't you use it. For what reason you are keeping it free? Any specific reason for not using it full?
     
  18. clocks

    clocks Registered Member

    Joined:
    Aug 25, 2007
    Posts:
    2,787
    Many people like to leave resources open for resource intensive apps, likes games, etc..
     
  19. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
    Because I don't have 4GB of RAM, I only got 512MB unfortunately.

    What I meant was, EVEN if I had 4GB of RAM I would not like that my AV/IS used that amount of resources anyway;)
     
    Last edited: Jun 30, 2010
  20. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1

    Windows uses an API call to get the list of processes and their memory usage, you could manipulate the results of the API. Its same like Rootkit activity...:ninja:

    Its just like hiding your process from the process list...
     
  21. clocks

    clocks Registered Member

    Joined:
    Aug 25, 2007
    Posts:
    2,787
    Can anyone give examples of current AVs that do this?
     
  22. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    I can give you...But i don't want to spoil my relationships with those vendors...:D
     
  23. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
    You can always send clocks and me "SweX" a PM with the vendors names?;)
     
  24. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    I can't break their trust...Hope you understand..:)
     
  25. Matthijs5nl

    Matthijs5nl Guest

    The real story:

    There is a huge difference between idle RAM usage and memory usage (memory usage: total memory consumed (physical and virtual) by the protection components installed on an idle computer).

    Let's take my security product for example, ESET. It has always been praised for it's low resource usage. But the last years people are saying it hogs system resources: because it uses a "staggering" 50MB of RAM. Nowadays that is more than other products claim to do. So people say ESET is heavy.
    Now let's look at it's memory usage, it is 162MB (remember: both physical and virtual). I see some people will be shocked, and they will now think ESET is extremely heavy. But you are wrong, let's look at some competitors. [I am sorry for the the fanboyism, but I think it is within the limits.]

    ESET Smart Security 4: 162MB
    Kaspersky Internet Security 2010: 246MB
    Norton Internet Security 2009: 363MB
    Trend Micro Internet Security 2009: 431MB
    AVG Internet Security 8.5: 719MB
    McAfee Internet Security 2009: 973MB

    The test also tested more performance aspects: boot time, on-access scan, on-demand scan and open a large file. See the link.
    The overall rankings based on all the above mentioned tests:
    1. Kaspersky, 2. ESET, 3. Norton, 4. Trend Micro, 5. McAfee, 6. AVG

    One note: the source of this information is june 2009 and so it is exactly one year old, but really, in that 12 months it didn't change that much. Most products are just 1 version higher (All products with year version are 1 year version higher, ESET a minor version higher (4.0 -> 4.2) and AVG a major version higher (8.5 -> 9.0)), no shocking differences. Maybe 5% better performance max, if I am really optimistic. Also notice KIS2010 and NIS2009. KIS is always released earlier: May each year, just like this year. Now we have KIS2011 and NIS2010. In fact like I said it is exactly one year ago. And I think it is still really valid.

    The test was performed by Cascadia Labs, requested by Kaspersky to test their product performance against their main competitors.

    For more information, results and methology, see:
    http://www.cascadialabs.com/reports/Cascadia_Labs_Kaspersky_KIS_2010.pdf
     
    Last edited by a moderator: Jun 30, 2010
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.