@BrianN: err, maybe you should get your facts straight about the tested viruses first, before comparing them to DOS viruses. Those are very...
Sorry to destroy the image of clam yet again, it is bad. Really bad. It's technology is very very basic, and it cannot do anything against complex...
Heuristics in the AV world just mean that the detection is based on rules rather than on exact identification. Whether that is done by evaluating...
The problem is, people have a tendency to see numbers as an absolute, while often (as in this case) they do not mean exactly what they think they...
SPR has nothing to do with ADWare/Spyware and is not a limitation of the free version. But it is deactivated by default for a reason.
Believe it or not, I've heard the same from system admins in a medium-sized company (around 200 employees). "If we remove the virus, our network...
Even if your AV does not detect the three packed files you are protected just the same. Why? Archives are not dangerous until their contents are...
Re: EICAR TEST FILE TEST!! IS YOUR ANTIVIRUS WEB PROTECTION ANY GOOD?? Why oh why does that rubbish "test" raise it's ugly head again and again...
Re: Avria Antivirus That's the whole point of https...
Ham is really the term that is usually used for "good mail". So it's not "an Avira thing". It's quite common.
Just remove the /nosplash
Drew: I am not entirely certain, but you'll get a definite answer if you write there. However the naming convention indicates it's not a heuristic...
send them to heuristik2 (at) avira.com, i'm certain stefan kurtzhals will give them a look....
Unfortunately their version information is incomplete, they might have tested outdated versions (i.E. stating AntiVir Version 7.0 was tested is...
That system would have a usability rating of "well below zero". "each act being performed", like each file copied? each registry entry set?...
It avoids persistence, not infection. So if you chose to use a live-cd (which is probably what you mean) to do your home-banking and get infected...
Good heavens that idiocy about a rootkit originated from a blog by a clueless guy who tried to get more attetion to his blog by using the term...
And who exactly is "we"? Sorry to spoil the party but I´d rather not send malware to someone who is only known by a gmail address.... For all I...
I seem to keep repeating myself on this topic. A machine that has been trojanized, infected or generally got its security breached and has been...
CSJ: avira's license does update automatically. What doesn't work is downloading a hopelessly outdated installation (with invalid key) and then...
Counting by deleted files would be stupid //I'm not saying they do it that way though!) since most AVs don't allow deletion of heuristic...
IIRC NODs Advanced Heuristics are off by default for on-demand scans.. Since the document states they've used default settings for heuristics, I...
Virtual memory includes the data swapped out to the windows pagefile. So the ~60MB is the amount of memory it would need if you had no pagefile,...
The SANS article describes how to find embedded files, which CAN be the case if the exploit/shellcode brings along a file it wants to drop within...
lucas: the point you're missing is that shellcode does not have headers. No MZ, no UPX, no nothing. It's direct CPU opcodes only. You cannot...
Separate names with a comma.