but if comparative results aren't true, it's correct that they published false results? What about other companies? :blink:
This seems to be a comparative of anti-malware softwares done by a company, TGSoft, owner of VirIT antivirus.
But results are so...
The heuristic engine that is the subject of this beta test and that will be integral...
Added in the next updates of KAV ;)
Could you send me this file by email?
could someone send me this file by email?
why only C/C++? :)
If you think, there are a lot of programming languages that can be used to write a virus. Right, C/C++ are the most powerful...
Yes, ccproxy.exe is a proxy used by NIS 2004 to scan incoming and outcoming e-mail
the files you sent to me it's a trojan downloader that downloads from a predefined url another file called adware BetterInternet.
You could try...
I could try to imagine how it was on your pc
For example a not completed transfer on your pc. This worm use some ways to copy itself on a pc, for...
sorry for the delay, I hadn't seen your e-mail :)
Don't worry, that's a corrupted file, not dangerous :) Please delete it :)
Best Regards :)
Obviously it's important to send suspected files to well know AV and AT companies ;)
However I try to place at s.o.'s disposal my little...
can you send me the suspected file at <snip>@email.it?
email address removed to prevent harvesting--Ron
most of !readme.exe I've analyzed were infected by "Gobot" (better known as Ghost Bot) that's a trojan/IRC backdoor written by P0sitr0n using...
I wonder how removal tools (like Symantec fixes for worms) work to detect packed viruses (UPX, ASPack, PECompact etc....).
so? no reply?
I've a file that Norton and Panda say it's infected by the backdoor MoSucker.
Kaspersky, F-Prot, Avast don't find the trojan. I've...
Separate names with a comma.