AVZ 4.30

Discussion in 'other anti-malware software' started by EASTER, Apr 6, 2008.

Thread Status:
Not open for further replies.
  1. Tarq57

    Tarq57 Registered Member

    Joined:
    Oct 7, 2006
    Posts:
    966
    Location:
    Wellington NZ
    I'm liking what I've seen of this application, as a beginner/intermediate user. Think I'm going to learn a bit, here.
     
  2. Franklin

    Franklin Registered Member

    Joined:
    May 12, 2005
    Posts:
    2,517
    Location:
    West Aussie
    A reg search/backup function, standalone along with many other features.Yep, a keeper here and thanks for the heads up Easter.:thumb:
     
  3. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Glad to help.

    It's one of the few apps of it's kind that practically profiles the entire system as well as identifies and captures potential malicious files/reg entries as well as a whole other many useful information. All in a single package plus updates.
     
  4. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    It doesn't use the signatures of Ad-aware or Trojan Hunter. What the translation says is that it's in the same area of functionality as these two, namely removal of spyware and trojans.

    I just started to test this program; looks like a fine program so far!

    Are there any other free programs similar to this one?
     
  5. Baz_kasp

    Baz_kasp Registered Member

    Joined:
    May 1, 2008
    Posts:
    593
    Location:
    London
    AVZ is actually now built into KAV/KIS 2009, and it is the standard tool we use on the forum for finding and extracting new/nasty infections.

    It works well in capable hands but has the potential to hose a system if used without care.


    AVZ signatures are proprietary, updated by Oleg Zaitsev, the creator of the utility and Kaspersky security expert (he works at the viruslab I think).


    Logfiles can be generated in different formats and used to create "scripts" to be executed to quarantine or remove suspicious files and perform cleanup.

    Typical structure for scripts would be as so:

    begin
    SetAVZGuardStatus(True);
    SearchRootkit(true, true);
    DeleteFile('');
    QuarantineFile('','');
    BC_ImportDeletedList;
    ExecuteSysClean;
    BC_Activate;
    RebootWindows(true);
    end.


    Those are just a few of the commands available, you can also delete registry entries, folders, reset system settings, delete BHO entries etc. Very useful for helping novice users to clean up their machines. Expert creates the script, user pastes it into window and presses "run"
     
    Last edited: Jul 9, 2008
  6. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Last edited: Jul 9, 2008
  7. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Heuristic detection of keyloggers by neural networks! Fantastic :).
     
  8. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Here is a nice English summary of the program's capabilities.
     
  9. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Appreciate sharing the link with us:

    Indeed, this is a very useful full featured tool that's one-of-a-kind.

    I cleaned a neighbors very bugged PC with it a few months ago and scraped out every malware that was long lodged in it.

    The PC ran better then ever i was told after i added a deep positioning Defrag to top matters off for them after that.

    EASTER
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.