It might be surprising for you, but GDATA people are watching the detections of the particular engines - and they select the engines that give...
I think it was only in the server version - the consumer version used avast! and Kaspersky engines.
I would like to know how many of those 800 vulnerabilities are real (=dangerous) vulnerabilities... I've seen some "vulnerabilities" discovered by...
The text file (eicar.com.txt) is not detected when you open it from disk because text files are not scanned by default. You can add "TXT" into the...
Neither does avast! 4.8, of course.
What OS, which skin?
Could you post some more details? What exactly does avast! report? Thanks.
Vlk's post didn't say that the VBS itself was 1.5 years old - only that it tried to exploit a 1.5 years old vulnerability, long fixed. I didn't...
Many anti-rootkit programs work by checking the system in a special low level mode, then by usual Windows API and then comparing the results - to...
Depends on why exactly it's unbootable, I guess. You can mount registry from the other OS, remove driver entries, fix stuff... but if the...
There are still a few issues in the beta, so a few beta-refresh releases are expected soon.
Well, you can use the free version of avast! (under the Home license). I mean, you can use it anywhere, of course - not just in Korea - just that...
The numbers may depend on the particular system. Even on one system - if you wait a few minutes or run some other programs, you may get completely...
I'm afraid the numbers are those appearing on Task Manager. Therefore yes, they are useless.
Re: Most performance efficient Free AV? Yes, I agree that personal experience (regarding the computer responsiveness etc.) is the only thing that...
Re: Most performance efficient Free AV? As usually - wrong. You can't say how much memory a program uses just from the Task Manager (or similar...
That's just terminology - I consider "parsing" and "unpacking" being mostly the same thing in this context (i.e. when I say that the antivirus...
Of course I don't consider the embedded Eicar detectable directly ;) Embedding Eicar into RTF is just packing it into an archive. So, if the...
They are not contradictory - so what's the problem? ;)
When posting a list such that the one in the initial post, it's necessary to realize that: - many packers have a (sometimes huge) number of...
That's not a solution at all, unfortunatelly. The malicious file has to be detected before it's started, not afterwards - when it's already...
The problem is not with (multiple) engines, but rather with the resident protection "modules" (drivers, hooks, ...) A multi-engine antivirus has...
Depends on settings od the particular scanners. While the realtime scanner may not unpack the content of specific archives (e.g. ZIP) for...
The answer is basically the same as the one to "are antivirus programs necessary?". Sure, you can do without, if you carefully obey other...
Anything accessed... yes. Anything making the access... I'm not sure if I believe this (and even if it did, it would most probably be file-wise,...
Separate names with a comma.