STRIPPING DOWN AN AV ENGINE

Size: px
Start display at page:

Download "STRIPPING DOWN AN AV ENGINE"

Transcription

1 VIRUS BULLETIN CONFERENCE, SEPTEMBER STRIPPING DOWN AN AV ENGINE Igor Muttik Network Associates Inc (McAfee Division), Alton House, Gatehouse Way, Aylesbury, Bucks, HP4 8YD, UK Tel Fax ABSTRACT The complexity of anti-virus software has grown enormously over the last five years. The methods used to detect viruses have evolved from dumb-grunt scanning of the whole file from top to bottom for a specific search string to very intelligent methods based on a combination of heuristic and specific detection methods. This paper discusses this evolution in detail: from old-fashioned methods to the most complex contemporary ones. When speaking to the people not directly involved in the AV business I found it rather amusing that they are usually surprised to find that these days we do not use scan strings as such any more. In fact, we do, but not frequently, because for contemporary malware better methods can be used. What are they? The definitions and examples of various detection methods are given including: search string detection, checksumming or CRCing, X-raying elimination, static heuristic analysis, dynamic heuristic analysis, etc. The advantages and disadvantages of these individual methods and their combinations are presented. A theoretical battle is constantly going on. Which is better: specific, precise detection or generic ways of handling viruses? There are pros and cons for both approaches: specific methods are good at determining exact variants and can be very useful for sorting collections and can serve as an excellent base for producing detailed descriptions and discussing small differences between minor variations. Generic and heuristic methods are good at detecting and cleaning new variants but they are not good at sorting collections and determining exact variant names. Some AV products utilize both approaches. However, there are many different ways to combine two approaches. What is the best way to mix them? With the worm, Trojan and backdoor problem becoming more and more serious the scanners have to

2 60 MUTTIK, STRIPPING DOWN AN AV ENGINE deal with a lot of new malware written mostly in high level languages. Old detection methods are not very suitable for those kinds of files. Which methods can be used effectively to enable reliable and generic detection of malware without giving false alarms? Can contemporary malware be detected generically? The effect of different detection methods on the speed of scanners is analysed. The key requirement of an AV product is to ensure minimal disruption to the everyday operation of a user regarding both the AV software itself and the malware it protects the user from. Pure heuristic methods are not perfect in that respect they tend to give more false alarms then usual methods and the quality of cleaning they can achieve is less then of specific methods. The advantges and disadvantages of generic vs. specific are discussed and applied to different stages of a scanner operation: detection identification, reporting and cleaning. We analyse how different approaches affect the individual requirements of different users. 1 THE EVOLUTION OF SCANNER TECHNOLOGY A BRIEF OVERVIEW When the first viruses appeared, programmers quickly researched them and came up with an idea of how to detect them easily and reliably. As viruses copy themselves from one executable file into another, all infected files have a virus body embedded somewhere in a host file. To find a virus one only has to scan the host file for a sequence of bytes that is specific to the virus, and cannot be found in a normal program. Such stable byte sequences are called search strings. Then, it was realised that scanning the files from top to bottom is not really necessary because viruses always affected the entry point of executable files and so viral code could be found quicker by following the entry point and then looking for a search string. Then, encrypted and polymorphic viruses appeared. They either had very short stable byte sequences or none at all. As a response to the appearance of such viruses two techniques were developed X-raying and emulation. X-raying is brute-force decryption of the virus body based on the knowledge of the encrypted plain text (the search string). Emulation is a simulated execution of the viral code. It goes under program control rather than under the real processor (and so is much slower then real execution). Also, for detecting polymorphic viruses, scanners sometimes use a method of frequency analysis of the processor s opcodes found in the program. It is rather effective for some polymorphic viruses when they use only a limited set of opcodes in their decryptors or have strong preferences for particular opcodes. For example, a lot of complex polymorphic viruses never use the main DOS service interrupt (21h) in their decryptors, while most legitimate programs use it frequently and near the beginning. So, an opcode frequency table for many viruses would have 0 for CD 21. Thus we can eliminate a lot of legitimate programs from being unnecessarily analysed and emulated. Later, we saw a few viruses that used so called entry obfuscation techniques. That means the entry point of the host program is not affected but the virus modifies the code of the host program far from the entry point. The viruses that are most difficult to detect properly are those

3 VIRUS BULLETIN CONFERENCE, SEPTEMBER which combine polymorphism and entry point obfuscation. Fortunately, entry-obfuscating viruses are not very reliable and so do not present many problems for AV developers. They are also more difficult to write, so they are rare. When the first scanners appeared, nobody knew that the number of viruses would grow so fast and for so long. The sheer volume of viruses required some techniques to optimise the performance so that the scanning time would not grow as quickly as the number of viruses. One of the most difficult types of objects for scanners to deal with are viruses written in high level languages (HLL viruses) Pascal, C, Basic, etc. The problem is that HLL programs have lots of common byte sequences and it is not easy to select a search string that is specific to a virus and cannot be found in a normal HLL program. This also explains why detection for HLL viruses produces more false alarms. The solution is either to base the detection on the data areas of the file (such as relocation table or text strings) or checksum significant areas of the file. Sometimes it is more efficient to use checksums than search strings. The reason is simple a 32- bit checksum takes four bytes. A decent search string for a HLL program can hardly be shorter then 8 12 bytes. Of course, scanners cannot afford to checksum each and every file (for speed reasons), so they have to apply at least some sort of additional checking (elimination) before going into checksumming loops. For example, a file size and/or file type (COM/EXE/NE/PE/ etc.) can be used for such elimination purpose. Before starting to checksum (which is a time consuming operation) the scanner may also check for the presence of a short search string which ought to be present. Recently, the virus menace is being taken over by the Trojan threat 1. For example, in USENET newsgroups postings, backdoor Trojans are as common as viruses 2 (particularly common is Backdoor-G2 also known as SubSeven it was posted to newsgroups 835 times between May and June 2000). As backdoor Trojans are reused so frequently, scanners are very effective against them. These days most decent scanners detect many popular Trojans. When detection of Trojan horses was first implemented in scanners the techniques developed for HLL viruses appeared to be very useful because most contemporary Trojans are HLL programs. Over the last five years scanner technology changed dramatically. This is mainly because new threats have emerged macro viruses, password-stealing and backdoor Trojans, network-aware worms, script viruses. Also, new, complex containers appeared CAB files, OLE containers, MS-Install (MSI) files, RAR archives, PE-packed files, etc. To offer sufficient protection, scanners have to be able to go into these objects and scan the contents (at least in on-demand mode; for an on-access scanner, going into packed objects does not make much sense and will cause unacceptable delays). Modern OSes have complicated what should have been relatively simple scanning processes by introducing new file types and associations between data files and executables (like VBS scripts associated with WSCRIPT.EXE). All mentioned factors lead to a huge growth in the complexity of AV software. The first scanners could have been written in Pascal (e.g. FindVirus v.1) and assembly language (TbScan). These days, all of them are developed in C or C++ and have modular sources portable to many different platforms and OSes. The development of the Internet caused -borne viruses and worms. The most significant shift is that scanners were always developed to check for viruses in files. However, some contemporary viruses do not have to exist in file form to pose danger. For example, script viruses that live in the body of s (like, for example, JS/Kak) can activate from within an .

4 62 MUTTIK, STRIPPING DOWN AN AV ENGINE Only after such script is activated in Outlook will this virus attempt to modify the local file system to install itself. Before that, only an gateway scanner has the ability to catch the virus. This is a rather important change that should be acknowledged. 2 AN ENGINE AND AN AV DATABASE Any AV scanner comprises the engine and the virus detection database. They work together and are truly inseparable. In cases when bits of the database are in machine code, the distinction between where the engine stops and the database starts is nearly lost. In some implementations the engine only serves as a loader for the database and all the functionality is implemented in the database. In other cases, the engine serves as a library of commonly used functions and the database simply exercises these functions to perform the task of finding a virus. Generally, we can say that the engine is less volatile, while the AV database is very volatile. That would reflect the habit of people to upgrade the engine rarely, but update the database religiously and as frequently as possible. That strategy is poor updating the engine is also very important. It goes without saying that to achieve the best detection rates both the latest engine and the latest database update should be used. That is particularly true for the scanners where the engine carries a lot of functionality. Deciding on how to distribute scanner functionality between the engine and the database is not easy. The greatest flexibility is achieved when the engine is simple and the database carries huge chunks of the executable code. However, such setups may have stability problems because frequent updates affect the executable code. When the engine is updated less frequently the stability is better but the flexibility in covering new threats is reduced. The optimal solution is to combine the best of the two approaches. It is good to have an infrequently updated scanning engine with no active code in the database, but with the ability to implement tasks of whatever complexity in the database (via an interpreted p-code or via some sort of scripting language). That gives the necessary flexibility whilst not compromising the stability of the software. 3 HEURISTIC SCANNING When the number of viruses reached several hundred it was realised that for scanners to be more effective they have to be able to detect new, unknown viruses. There are two ways of catching new viruses the first is to select very generic search strings that would ensure detection of huge groups of related viruses. The second way is to build a rule-based system that would apply heuristic rules and produce an overall score. If the program does lots of suspicious things the score is high and the program is likely to be a virus. There are two different ways of applying heuristic rules: static and dynamic. The static method checks the presence of a suspicious code fragments (whether they are executed or not). The dynamic method emulates the program and checks which actions are really performed (that is simulation of a virus execution in a virtual environment, frequently called a sandbox or an emulator buffer). Neither the static nor dynamic method is better both have advantages and disadvantages. For example, the static method can trigger on the remnants of viral code that are not really executed, or it can miss some suspicious actions that become visible only as execution occurs. Dynamic

5 VIRUS BULLETIN CONFERENCE, SEPTEMBER methods, however, are simply slow. The best results are achieved by combining both methods. With the growing flexibility of AV databases, heuristic detection can now be implemented as part of a database so that it can be updated more easily. That is certainly a good thing as it enables the bugs and false alarms to be fixed quickly. 4 DETECTION AND CLEANING: GENERIC DETECTION AND CLEANING Should AV scanners clean out infections or not? The answer seems obvious because why would users want to know if they have a problem? Most would much rather know that they had a problem. Of course, restoring files from backups is optimal, but what if a backup policy has not been established or the tape has tangled? It is much better if a user has a choice of whether to employ a backup or the ability of a scanner to clean the infection(s). The ability of a scanner to perform disinfection may also improve user efficiency if the alternative is to call the IT department in order to restore from backups. The question for an AV producer is where to stop in distinguishing between different viruses. One may say that if we have a particular virus detected heuristically we do not need to do any more work on it. Detecting and stopping a virus at the point of entry results in the scanner not having to perform disinfection at all. Such an approach, of course, make some sense and there are scanners on the market (and some reasonably successful) that do not offer, say, cleaning of infected programs. Such a producer would have a huge chunk of viruses detected but not cleanable, because they have not built into the database the ability to distinguish between these viruses and clean them appropriately. This approach means the detection resolution is very crude and in most cases inadequate for good disinfection. Let us imagine a family of two viruses, different by only one bit in their body. An AV producer may want to distinguish between such variants (for the sake of scientific classification, for example). Of course, such differentiation is not necessary to ensure perfect disinfection. The product would have a very fine variant resolution but would not be able to clean new variants before they are added to the AV database. In other words, cleaning in such a product would be based on a particular virus variant rather than on generic family cleaning. Even if different variants in the database of such a scanner are mapped onto a single repair routine the users do not have full advantage of this generic repair, as variant checking would prevent a scanner from cleaning a new variant. And if generic repair is automatic for the whole family, there is not much benefit to having exact variant identification (see more on this topic in section 6). A third producer may say We want to have generic detection for as many families with similar cleaning as possible. In practice, the decision is made easily because generic cleaning is almost always acceptable and desirable. So, the last alternative becomes the only viable one. The advantage of this last approach is that a great deal of new viruses are detected and cleaned. That means users have a proactive scanner something that was not available a few years ago. For binary infectors the achievable detection and cleaning rate is above 50%. For macro viruses and script viruses that level can be as high as 90% (because they are much simpler and easier to handle). As macro viruses and script viruses are most common in the field, the overall cleaning rate for a new, typical field virus would be above 80%.

6 64 MUTTIK, STRIPPING DOWN AN AV ENGINE 5 WHY DO DIFFERENT SCANNERS DISAGREE? We frequently see samples submitted to our research facility with the question Why do two different scanners report the same sample differently, or one reports while other does not?. There is a plethora of reasons. Let us try to analyse them: 1. Misses. This is obviously the case when one scanner is behind in detection (to compare the detection rates properly, of course, both scanners should have been updated at the same time). 2. False alarms. This is when one scanner has a poor design or the database has not undergone sufficient testing. 3. Ghost positives. If a virus was in the file and has been subsequently removed, one scanner may consider the file clean while another can still trigger on some unremoved fragments. 4. Virus name discrepancies. This is when two different vendors use different classification schemes or naming standards (some vendors never change the names of viruses they detect). To resolve most of these discrepancies go to Project Vgrep at Classification problems. This is when, say, one producer calls a Trojan what another producer classifies as a joke and refuses to detect because it is harmless. 6. Technological differences. (a) For example, a viral macro has a wrong name and cannot replicate: one engine can ignore the macro name (and so detect the crippled virus) while another can check the name (and rightfully decide that this macro is not dangerous). (b) For example, the code for a PE-infector is found at the entry point of a DOS program (this cannot run, of course). (c) When a file has appended the virus body with no control transferred to that body (so the file runs and never infects but has some baggage at the end). 7. Different capabilities. That is when two engines can be equally good in detecting a particular virus, but one can have better handling of some obscure or unusual file formats. For example, not all engines may be able to unpack MS-Compress file format, or UPX-packed PE executables, or something embedded into.ppt files. In this case, the on-demand scanner that is lacking such functionality would miss a virus inside a non-trivial container. 6 WHAT IS BEST FOR THE USER? This question is really rhetorical, as the major selling point for a user is not the design of an AV engine, but its ability to detect and clean viruses. If two products detect and clean viruses equally well, then the better design would mainly affect the speed of operation and the probability of false alarms. The better design could also be seen by the platform coverage if the same AV engine can be used on a PC, Dec-Alpha, Macintosh and AS400 that means something about the portability and stability of the engine.

7 VIRUS BULLETIN CONFERENCE, SEPTEMBER However, let us imagine for a while that all scanners have equally good detection rates (there is a grain of truth in this assumption as according to the test carried by the Virus Test Centre at Hamburg University there are more and more scanners in their very good category, for details see 4 ). In other words, the detection rates of most scanners are high and good enough for practical purposes. The tests mentioned, however, are based on scanning a collection of known viruses so they do not tell us much how well products detect and protect from new threats. The natural assumption, of course, would be that the best overall detection is achieved by scanners with the best combination of heuristic, generic and specific detection methods. Running tests of slightly outdated scanners over contemporary virus collections can test this. However, no such test results are available. Of course, on top of decent detection rates (of known viruses), users would want the best proactive protection (heuristic detection), plus the automatic cleaning of new (and known) viruses. They would like precise variant reporting so that in case of an outbreak they could check with their vendor if they need to expect anything nasty (like when the virus corrupts data or sends any data out). However, for viruses that do not do nasty things the necessity of knowing the exact variant suffix is questionable. The total number of viruses known at the moment exceeds 54,000 and this number grows at a rate of over 100 a week. It is not realistic to expect AV producers to research all of them and document their findings. Only those viruses which are found in the field or are unusual in some way get analysed and described. Also, different producers may assign different names to virus variants (the most common is the CARO naming standard and macro viruses classification maintained by Vmacro group). This means precise identification of a virus on a user site, which, in many cases, may result in an AV vendor requesting a sample of a virus just to be sure that there is no mix-up with the variant naming. For different users, scanner requirements can be very different. Some people are actively surfing the Internet, downloading and running various files. Others may only use a PC for word processing. However, for any category, once they keep the AV database updated the ability to detect and clean new viruses is the most important. Otherwise the scanner would quite simply fail in its main goal to protect from malware. The argument can be about where to have a scanner on a desktop, on a mail gateway, or on an Exchange server. However, all in all, the scanner always has to be effective at finding known and new viruses and cleaning them. It also has to be reasonably quick. The speed is particularly important for on-access scanning. With on-demand or gateway scanning any minor delay is acceptable, whereas for on-access scanning, a 10 second delay, for example, is too long. 7 NEW KINDS OF MALWARE Modern malware is written mostly in HLL or script languages. Old detection methods are not very suitable for these kinds of files neither HLL viruses nor BAT infectors were common in the past. A common problem encountered with modern macro viruses and worms written in script languages is that their source is readily available for modification. These viruses carry their own source so we see many more variants produced accidentally (when people modify a virus using the Visual Basic Editor) or deliberately (when people want to produce a new virus, perhaps to see how AV software would react to the modification).

8 66 MUTTIK, STRIPPING DOWN AN AV ENGINE As an example, just after the original VBS/LoveLetter outbreak we saw about 40 rewrites of the original worm within a month. Since we employed generic detection of these scripts, we only had to update our VBS/LoveLetter detection three or four times to accommodate all the new variants (some of which were apparently written in an attempt to defeat it!). From a scientific point of view, any modification may be a new virus because what travels would be a different object. However, the ability of scanners to detect and clean on a family basis, ignoring unimportant changes, is becoming extremely important these days. With backdoor and password-stealing Trojans becoming more common, and developing rapidly over the last couple of years 1, the necessity to develop heuristic and generic approaches against these threats also increases. This is, however, a complex task because developing good generic detection requires much manual analysis, while automated analysis for the purpose of heuristics is not simple and very time consuming for programs written in HLL languages. The first steps down that route, however, have been taken and a lot of malware is caught using generic and heuristic drivers these days. 8 SCANNER SPEED To say scanner speed is important is an understatement. Scanner speed is probably as important as the ability to detect viruses. Slow scanners simply cannot be used effectively they do not reduce the cost of computer ownership (and that is the goal of any service software) and should not be used. Just imagine the problem of a network administrator who is to schedule a daily server scan that cannot complete within 24 hours because the scanner is not able to scan the server quickly enough. Which AV engine peculiarities are most important to achieve good performance? I believe there are four most important points: database design, file access, utilisation of the emulator and computing checksums. The virus detection database should be designed properly. The scanner should be smart enough to have the virus definitions sorted somehow so that only a few are applied to a particular file. The first, and probably the most important, step is to ensure that the virus definitions are applied to the right type of files. It does not make sense to look for a virus infecting only COM files in EXE files. Or if a scanner is, for example, scanning memory for the WM/Npad virus, it is an example of poor design as macro viruses do not infect memory. Even within the right file type, database records should be organised correctly (e.g. in a binary tree or with hashes and quick lookup tables). The second important thing to achieve high data processing rate is to read as little from the file as possible before starting to analyse it seriously. Optimally, if a scanner can read the first cluster of the file (you cannot really read less if you do not access the disk hardware directly and under modern OSes it is virtually impossible) and determine whether file is clean or not, that would be exceptionally quick. It is not usually possible to decide if the file is clean after analysing just the first cluster but certainly the less disk I/O that is performed during the analysis, the better. The reason for this is obvious disk operations are relatively slow and amount to approximately 50% of the total time spent performing a scan. The third, but certainly not the least important, component that causes slowdown is the emulator. Emulation is used to decrypt polymorphic and encrypted viruses in order to be able to detect

9 VIRUS BULLETIN CONFERENCE, SEPTEMBER some constant parts of the virus body. As some viruses require very long emulation it is important to ensure that clean, legitimate, common programs are not emulated for long. Emulation should therefore be avoided when it is not essential. So the AV database should consist of rules that describe differences between viruses and clean programs. These rules (let us call them eliminations ) should be applied as soon as possible and preferably before the emulation is started to prevent as many legitimate programs from being emulated as possible. However, it sometimes happens that an innocent file passes all the eliminations and enters a long emulation loop simply because it happened to be similar enough to some other virus and there was no rule defined to distinguish this file from a virus early enough. The fourth slow component involves computing the checksum. Any checksum calculation is a loop that continues for as long as the area that you are checksumming. The longer the area, the longer the computation time. And you cannot optimise that if you are to calculate a checksum over 10,000 bytes it would take twice as long as if you do it over 5,000 bytes. When creating an AV database record it is important to write a virus definition in a way that would minimise the disk accesses and find good rules to eliminate virus definitions that may require a lot of emulation and checksumming. Finding good elimination rules is a complex and time-consuming operation and it requires deep analysis of malware. Also, when a scanner is analysing the file, it should make sure that before it starts checksumming it performs some kind of elimination. For example, if a module of a macro virus has a specific CRC, the engine should first check if the module size and/or name is what should be expected for this virus. Otherwise lots of macros would be unnecessarily checksummed, thereby reducing the scan speed and increasing the potential for false alarms. 9 COMBINING HEURISTIC AND VIRUS-SPECIFIC APPROACHES As we just saw, good elimination is important but achieving this is sometimes tricky. However, the brute-force method can be used here too heuristic elimination. Any heuristic analysis produces a lot of information about the file in question. If the scanner runs heuristics over all files anyway, it would certainly make sense to store all this data (which heuristic rules were satisfied, how many times, where and when etc) and match it to corresponding data collected over known viruses. If there is a mismatch, the scanner can be certain that some viruses cannot be present in the analysed file. That would be a good heuristic elimination. One easy way to speed up a scanner is to turn on all heuristic capabilities and exclude all specific database records that are covered by the heuristics. That may well increase the speed (if heuristic analysis is quick enough, of course). However, people prefer to know which particular virus they have detected, so for a scanner it would be advantageous if, after finding a virus heuristically, it could switch to a specific detection and report the name. In essence, this approach is very similar to specific detection using the heuristic elimination. Combining a heuristic approach with specific detection methods also has the advantage of reducing false alarm rates. For example, if a script file invokes Outlook and goes through its address book, it is suspicious. However, some legitimate programs may do that too. If, however, such a script also has a string barok (which is a nickname of the VBS/LoveLetter author), then that is extremely suspicious.

10 68 MUTTIK, STRIPPING DOWN AN AV ENGINE CONCLUSION Clever engine design, careful programming of an AV database, and the combination of generic and heuristic detection methods can achieve stunning results in detecting and cleaning the majority (up to 80 90%) of new field viruses. A few years ago, heuristic detection rates for DOS viruses were at that level! These days, when macro viruses and script worms are the most common items of malware, the achievable cleaning rates can be much higher because such viruses/ worms are far simpler. REFERENCES 1 Dr I. Muttik, Trojans The New Threat, Proceedings of IVPC 98 International Conference: Protecting the Workplace of the Future, April 1998, Orlando, Florida. 2 D. Gryaznov and P. Nolan, personal communications Scanner test April 2000, Hamburg University Virus Test Center Report, April 2000.

Retrospective Testing - How Good Heuristics Really Work

Retrospective Testing - How Good Heuristics Really Work Retrospective Testing - How Good Heuristics Really Work Andreas Marx amarx@gega-it.de AV-Test.org University of Magdeburg GEGA IT-Solutions GbR Retrospective Testing I What it is: Use an old (archived)

More information

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall, Among the several Internet Security Suites available for the Windows operating system, is Kaspersky Internet Security (KIS). The latest version Kaspersky Internet Security is pretty impressive in terms

More information

An Introduction to Virus Scanners

An Introduction to Virus Scanners From the SelectedWorks of Umakant Mishra August, 2010 An Introduction to Virus Scanners Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/76/ An Introduction to Virus Scanners Umakant

More information

Antivirus Technology

Antivirus Technology Antivirus Technology CSH6 Chapter 41 Antivirus Technology Chey Cobb & Allysa Myers 1 Copyright 2015 M. E. Kabay. All rights reserved. Topics AV Terminology AV Issues History of Viral Changes Antivirus

More information

Malware Analysis and Antivirus Technologies: Antivirus Engine Basics

Malware Analysis and Antivirus Technologies: Antivirus Engine Basics Malware Analysis and Antivirus Technologies: Antivirus Engine Basics Protecting the irreplaceable f-secure.com Detecting Malware Blacklisting Detecting badness Typically fairly reactive but heuristic and

More information

No Time for Zero-Day Solutions John Muir, Managing Partner

No Time for Zero-Day Solutions John Muir, Managing Partner No Time for Zero-Day Solutions John Muir, Managing Partner Executive Summary Innovations in virus construction and propagation have created a zero-day threat from email attachments that can wreak significant

More information

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections:

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections: This chapter contains the following sections: Scanning Overview, page 1 Sophos Filtering, page 2 McAfee Filtering, page 4 How to Configure the Appliance to Scan for Viruses, page 6 Sending an Email to

More information

Contradictions in Improving Speed of Virus Scanning

Contradictions in Improving Speed of Virus Scanning From the SelectedWorks of Umakant Mishra May, 2013 Contradictions in Improving Speed of Virus Scanning Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/109/ Contradictions in Improving

More information

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last

More information

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: Intruders significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: masquerader misfeasor clandestine user varying levels of competence

More information

Artificial Intelligence Methods invirus Detection & Recognition

Artificial Intelligence Methods invirus Detection & Recognition Artificial Intelligence Methods in Virus Detection & Recognition Introduction to heuristic scanning Wojciech Podgórski http://podgorski.wordpress.com October 16, 2008 Presentation outline 1 Introduction

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

BITDEFENDER. White paper

BITDEFENDER. White paper BITDEFENDER Antivirus Technology White paper Introduction This is an executive summary of the architecture, design and general structure of the BitDefender Antivirus. The BitDefender Antivirus System presents

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Beyond Testing: What Really Matters. Andreas Marx CEO, AV-TEST GmbH

Beyond Testing: What Really Matters. Andreas Marx CEO, AV-TEST GmbH Beyond Testing: What Really Matters Andreas Marx CEO, AV-TEST GmbH Microsoft Security Response Alliance Summit 2013 - July 10th, 2013 1 AGENDA About AV-TEST GmbH Innovations and Presentations The AV-TEST

More information

How to Predict Viruses Under Uncertainty

How to Predict  Viruses Under Uncertainty How to Predict Email Viruses Under Uncertainty InSeon Yoo and Ulrich Ultes-Nitsche Department of Informatics, University of Fribourg, Chemin du Musee 3, Fribourg, CH-1700, Switzerland. phone: +41 (0)26

More information

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...

More information

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus

More information

Kaspersky PURE 2.0. Mail Anti-Virus: security levels

Kaspersky PURE 2.0. Mail Anti-Virus: security levels Mail Anti-Virus: security levels Content Mail Anti-Virus. Security levels... 2 Operation algorithm of Mail Anti-Virus... 2 Security levels of Mail Anti-Virus... 2 Customizing security level... 4 Creating

More information

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

More information

Security with FailSafe

Security with FailSafe Email Security with FailSafe Anti spam and anti virus protection and email continuity for your mail server Email Security provides comprehensive and highly effective virus, spam and content filtering of

More information

Avira AntiVir Server

Avira AntiVir Server Avira AntiVir Server Support March 2010 www.avira.com Errors in design and contents cannot be excluded Avira GmbH Content 1. Setup Modes... 3 2. Configuration... 7 3. Jobs in the scheduler... 13 4. Different

More information

Antivirus Myths and Facts. By Helmuth Freericks

Antivirus Myths and Facts. By Helmuth Freericks By Helmuth Freericks Introduction As an active, veteran member of the antivirus community and a pioneer of one of the earliest antivirus companies, I have spoken with thousands of people with an interest

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

The WildList is Dead, Long Live the WildList!

The WildList is Dead, Long Live the WildList! The WildList is Dead, Long Live the WildList! Andreas Marx, Frank Dessmann AV-Test GmbH, Magdeburg, Germany http://www.av-test.org Presented at the Virus Bulletin 2007 Conference in Vienna, Austria http://www.virusbtn.com/conference/vb2007

More information

iq.suite Watchdog - Central virus protection - Intelligent server-based virus protection and file blocking through fingerprint technology

iq.suite Watchdog - Central virus protection - Intelligent server-based virus protection and file blocking through fingerprint technology iq.suite Watchdog - Central virus protection - Intelligent server-based virus protection and file blocking through fingerprint technology Contents 1 Executive Summary... 2 2 Introduction... 2 3 Computer

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

whitepaper: Whitelisting Without The Complexity

whitepaper: Whitelisting Without The Complexity : Whitelisting Without The Complexity The Endpoint Security Advantages of Whitelisting: A Whitepaper for System Administrators In the 10-year time frame from 2002 to 2012, the volume of known-good executable

More information

Small Office Security 2. Scan PC for viruses and vulnerabilities

Small Office Security 2. Scan PC for viruses and vulnerabilities Small Office Security 2 Scan PC for viruses and vulnerabilities Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application

More information

Backup challenge for Home Users

Backup challenge for Home Users PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com

More information

Virus Analysis. Introduction to Malware. Common Forms of Malware

Virus Analysis. Introduction to Malware. Common Forms of Malware Virus Analysis Techniques, Tools, and Research Issues Part I: Introduction Michael Venable Arun Lakhotia, USA Introduction to Malware Common Forms of Malware Detection Techniques Anti-Detection Techniques

More information

Defend what you create. Why Dr.Web

Defend what you create. Why Dr.Web Defend what you create Why Dr.Web 1. Company Russian anti-virus software developer Doctor Web has been in operation since 1992. Our customers The Russian government has trusted Doctor Web anti-virus products

More information

Full file at

Full file at Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. The Melissa virus was transported by. c. e-mail 2. Which of the following are used for updates in Windows XP Professional? (Choose all that

More information

Undetectable Metamorphic Viruses. COMP 116 Amit Patel

Undetectable Metamorphic Viruses. COMP 116 Amit Patel Undetectable Metamorphic Viruses COMP 116 Amit Patel Abstract Signature scanning is an efficient technique employed by anti-virus systems to detect known malware. Signature scanning involves scanning files

More information

CBS For Windows CDROM Backup System Quick Start Guide Installation Preparation:

CBS For Windows CDROM Backup System Quick Start Guide Installation Preparation: CBS For Windows CDROM Backup System Quick Start Guide Installation If you have your CBS CD Writer Backup system on CD, simply insert the CD. It will automatically start and install the software. If you

More information

IT Security Cost Reduction

IT Security Cost Reduction Quantifying the Impact of Greater Endpoint Security Effectiveness, Higher Performance, and Smaller Footprint In the constant drive for increased productivity and cost-effectiveness, enterprises are continuously

More information

Tales from cloud nine. Mihai Chiriac, BitDefender

Tales from cloud nine. Mihai Chiriac, BitDefender Tales from cloud nine Mihai Chiriac, BitDefender Talk outline Motivation Technical challenges Implementation results Future ideas Conclusions Reasons Malware numbers have grown at exponential rates 5000000

More information

Module 20: Security. The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption. Operating System Concepts 20.

Module 20: Security. The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption. Operating System Concepts 20. Module 20: Security The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption 20.1 The Security Problem Security must consider external environment of the system,

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

Small Office Security 2. File Anti-Virus

Small Office Security 2. File Anti-Virus Small Office Security 2 File Anti-Virus Table of content Table of content... 1 File Anti-Virus... 2 What is File Anti-Virus... 2 Enabling/Disabling File Anti-Virus... 2 Operating algorithm of File Anti-Virus...

More information

Comodo Antivirus Software Version 2.1

Comodo Antivirus Software Version 2.1 Comodo Antivirus Software Version 2.1 User Guide Guide Version 2.1.030515 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

ClamXav a free antivirus application for the Mac

ClamXav a free antivirus application for the Mac ClamXav a free antivirus application for the Mac Background Why anti-virus software for Mac OS X, which has been virus-free for years? -Viruses for OS X will eventually appear. -You presumably don't want

More information

Crash Course in Modernization. A whitepaper from mrc

Crash Course in Modernization. A whitepaper from mrc Crash Course in Modernization A whitepaper from mrc Introduction Modernization is a confusing subject for one main reason: It isn t the same across the board. Different vendors sell different forms of

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

ANALYSIS OF MODERN ATTACKS ON ANTIVIRUSES

ANALYSIS OF MODERN ATTACKS ON ANTIVIRUSES ANALYSIS OF MODERN ATTACKS ON ANTIVIRUSES 1 SILNOV DMITRY SERGEEVICH, 2 TARAKANOV OLEG VLADIMIROVICH Department of Information Systems and Technologies, National Research Nuclear University MEPhI (Moscow

More information

EXECUTIVE REPORT 20 / 12 / 2006

EXECUTIVE REPORT 20 / 12 / 2006 EXECUTIVE REPORT 20 / 12 / 2006 1 Executive summary Audit start date Audit end date 07 / 09 / 2006 19:12 08/ 09 / 2006 09:34 Licenses contracted: 300 Computers audited: 161 items scanned: 703499 Computers

More information

Lecture 12 Malware Defenses. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422

Lecture 12 Malware Defenses. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422 Lecture 12 Malware Defenses Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422 Malware review How does the malware start running? Logic bomb? Trojan horse?

More information

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE TABLE OF CONTENTS Overview...3 A Multi-Layer Approach to Endpoint Security...4 Known Attack Detection...5 Machine Learning...6 Behavioral Analysis...7 Exploit

More information

Report Course name ABSTRACT. Research and reporting. Survey Report. Nguyen Ngoc Long. Ann Viitala. Adesh Chymariya. Shu Sheng 5/2/2010.

Report Course name ABSTRACT. Research and reporting. Survey Report. Nguyen Ngoc Long. Ann Viitala. Adesh Chymariya. Shu Sheng 5/2/2010. Course name Assignment Authors Research and reporting Survey Nguyen Ngoc Long Ann Viitala Adesh Chymariya Shu Sheng Date of the report 5/2/2010 ABSTRACT CONTENTS 1 INTRODUCTION 3 2 THEORETICAL FRAMEWORK,

More information

MAKING A COMEBACK: Everything You Need to Know About Backup and Disaster Recovery

MAKING A COMEBACK: Everything You Need to Know About Backup and Disaster Recovery MAKING A COMEBACK: Everything You Need to Know About Backup and Disaster Recovery Twin Cities Northern MN 1330 E. Superior St. Duluth, MN 55805 Phone: (218) 724-0600 It is a fact of life that, at some

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

Overcoming limitations of Signature scanning - Applying TRIZ to Improve Anti-Virus Programs

Overcoming limitations of Signature scanning - Applying TRIZ to Improve Anti-Virus Programs From the SelectedWorks of Umakant Mishra January, 2012 Overcoming limitations of Signature scanning - Applying TRIZ to Improve Anti-Virus Programs Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/81/

More information

Choosing the web s future. Peter-Paul Koch Van Lanschot, 9 February 2017

Choosing the web s future. Peter-Paul Koch   Van Lanschot, 9 February 2017 Choosing the web s future Peter-Paul Koch http://quirksmode.org http://twitter.com/ppk Van Lanschot, 9 February 2017 Four problems 1. Web developers want to emulate native apps, which I think is not possible

More information

Network Security Fundamentals

Network Security Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 5 Viruses & Worms, Botnets, Today s Threats Viruses

More information

SymbOS Malware Classification Problems

SymbOS Malware Classification Problems SymbOS Malware Classification Problems Vesselin Bontchev, anti virus researcher FRISK Software International Postholf 7180, 127 Reykjavik, ICELAND E mail: bontchev@complex.is SymbOS Malware Classification

More information

Software. CPU implements "machine code" instructions. --Each machine code instruction is extremely simple. --To run, expanded to about 10 machine code

Software. CPU implements machine code instructions. --Each machine code instruction is extremely simple. --To run, expanded to about 10 machine code Software Software - code that runs on the hardware I'm going to simplify things a bit here CPU implements "machine code" instructions --Each machine code instruction is extremely simple --e.g. add 2 numbers

More information

Comodo Antivirus Software Version 2.0

Comodo Antivirus Software Version 2.0 Comodo Antivirus Software Version 2.0 User Guide Guide Version 2.0.010215 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

1 GSW Bridging and Switching

1 GSW Bridging and Switching 1 Sandwiched between the physical and media access layers of local area networking (such as Ethernet) and the routeing of the Internet layer of the IP protocol, lies the thorny subject of bridges. Bridges

More information

FRISK Software International F-Prot AVES Managed Security Service

FRISK Software International F-Prot AVES Managed  Security Service FRISK Software International F-Prot AVES Managed E-mail Security Service WHITE PAPER Table of Contents 1. INTRODUCTION...1 2. WHY DEVELOP F-PROT AVES?...1 3. PRODUCT DESCRIPTION AND ANALYSIS...2 3.1. How

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Kaspersky Open Space Security

Kaspersky Open Space Security Kaspersky Open Space Security Flexible security for networks and remote users Kaspersky Open Space Security Kaspersky Open Space Security offers new flexibility to network security by extending beyond

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

XP: Backup Your Important Files for Safety

XP: Backup Your Important Files for Safety XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to

More information

File Systems. OS Overview I/O. Swap. Management. Operations CPU. Hard Drive. Management. Memory. Hard Drive. CSI3131 Topics. Structure.

File Systems. OS Overview I/O. Swap. Management. Operations CPU. Hard Drive. Management. Memory. Hard Drive. CSI3131 Topics. Structure. File Systems I/O Management Hard Drive Management Virtual Memory Swap Memory Management Storage and I/O Introduction CSI3131 Topics Process Management Computing Systems Memory CPU Peripherals Processes

More information

Real Fast PC. Real Fast PC Win 7.

Real Fast PC. Real Fast PC Win 7. Real Fast PC Win 7 www.realfastpc.com 1 Real Fast PC Win 7 Disclaimer: Please note that while every effort is made to ensure that the information provided in this ebook is up to date, effective, and useful,

More information

Real protection against real threats

Real protection against real threats Real protection against real threats Protection for any device For home and office For new purchases and renewals * PCs, Macs and mobile devices running OS supported by Dr.Web. www.drweb.com OOO Doctor

More information

CSCD 303 Essential Computer Security Fall 2018

CSCD 303 Essential Computer Security Fall 2018 CSCD 303 Essential Computer Security Fall 2018 Lecture 10 - Malware Evasion, Prevention, Detection, Removal Reading: Chapter 6 CompTIA Book, Links Overview Malware Techniques for Evasion Detection/Removal

More information

CSCD 303 Essential Computer Security Fall 2017

CSCD 303 Essential Computer Security Fall 2017 CSCD 303 Essential Computer Security Fall 2017 Lecture 13 - Malware Evasion, Prevention, Detection, Removal Reading: Chapter 6 CompTIA Book, Links Overview Malware Techniques for Evasion Detection/Removal

More information

AVG File Server. User Manual. Document revision ( )

AVG File Server. User Manual. Document revision ( ) AVG File Server User Manual Document revision 2015.07 (5.2.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist Herd Intelligence: true protection from targeted attacks Ryan Sherstobitoff, Chief Corporate Evangelist Complexity Web Based Malware Attacks Crimeware Intelligent Botnets Vulnerabilities Worm/ Outbreaks

More information

Best Practice for Creation and Maintenance of a SAS Infrastructure

Best Practice for Creation and Maintenance of a SAS Infrastructure Paper 2501-2015 Best Practice for Creation and Maintenance of a SAS Infrastructure Paul Thomas, ASUP Ltd. ABSTRACT The advantage of using metadata to control and maintain data and access to data on databases,

More information

Common Preventive Maintenance Techniques for Operating Systems

Common Preventive Maintenance Techniques for Operating Systems Common Preventive Maintenance Techniques for Operating Systems OS Preventive Maintenance Plan To ensure that an OS remains fully functional, you must implement a preventive maintenance plan. A preventive

More information

Potential Threats to Mobile Network Security

Potential Threats to Mobile Network Security Potential Threats to Mobile Network Security (Can WAP virus infect the mobile phones?) BY K.NAGA MOHINI and P.RAMYA IV Btech (CSE) mohini.cse521@gmail.com IV Btech (CSE) ramya_pragada@yahoo.com COMPUTER

More information

ELEC 377 Operating Systems. Week 1 Class 2

ELEC 377 Operating Systems. Week 1 Class 2 Operating Systems Week 1 Class 2 Labs vs. Assignments The only work to turn in are the labs. In some of the handouts I refer to the labs as assignments. There are no assignments separate from the labs.

More information

READYNAS SOLUTIONS SERIES. Simplifying Backups. Infrant Technologies, Inc Skyway Court, Fremont, CA

READYNAS SOLUTIONS SERIES. Simplifying Backups. Infrant Technologies, Inc Skyway Court, Fremont, CA READYNAS SOLUTIONS SERIES Simplifying Backups Infrant Technologies, Inc. 3065 Skyway Court, Fremont, CA 94539 www.infrant.com Introduction Backup arguably the single most confused and ignored subject in

More information

Best Practical Response against Ransomware

Best Practical Response against Ransomware Best Practical Response against Ransomware AhnLab MDS: Holistic Response on Both Networks and Endpoints 2016. 02. 09 Table of Contents Overview... 3 Ransomware and Advanced Malware: Different, Yet Similar...

More information

Unit 5. System Security

Unit 5. System Security Unit 5 System Security Intrusion Techniques The password file can be protected in one of two ways: One-way function: The system stores only the value of a function based on the user's password. When the

More information

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for  . White Paper Barracuda Advanced Threat Protection Bringing a New Layer of Security for Email White Paper Evolving Needs for Protection Against Advanced Threats IT security threats are constantly evolving and improving,

More information

Detecting and correcting mistakes

Detecting and correcting mistakes Chapter 6 Detecting and correcting mistakes 6.1 Errors and the law! In chapter 4 we saw that random noise will tend to reduce the amount of information transmitted or collected by making us uncertain that

More information

GUIDE. MetaDefender Kiosk Deployment Guide

GUIDE. MetaDefender Kiosk Deployment Guide GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect

More information

Annexure E Technical Bid Format

Annexure E Technical Bid Format Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security

More information

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide How the Two Approaches Compare and Interoperate Your organization counts on its security capabilities

More information

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise, Prevx 3.0 v3.0.1.65 Product Overview - Core Functionality April, 2009 includes overviews of MyPrevx, Prevx 3.0 Enterprise, and Prevx 3.0 Banking and Ecommerce editions Copyright Prevx Limited 2007,2008,2009

More information

Managing SonicWall Gateway Anti Virus Service

Managing SonicWall Gateway Anti Virus Service Managing SonicWall Gateway Anti Virus Service SonicWall Gateway Anti-Virus (GAV) delivers real-time virus protection directly on the SonicWall security appliance by using SonicWall s IPS-Deep Packet Inspection

More information

MYOB Exo PC Clock. User Guide

MYOB Exo PC Clock. User Guide MYOB Exo PC Clock User Guide 2018.01 Table of Contents Introduction to MYOB Exo PC Clock... 1 Installation & Setup... 2 Server-based... 2 Standalone... 3 Using Exo PC Clock... 4 Clocking Times... 5 Updating

More information

MANAGING ELECTRONIC COMMUNICATION TOOLS. Advantages of Electronic Communication. General Principles

MANAGING ELECTRONIC COMMUNICATION TOOLS. Advantages of Electronic Communication. General Principles MANAGING ELECTRONIC COMMUNICATION TOOLS Advantages of Electronic Communication Probably the greatest advantage of electronic communication is that it can increase interaction between faculty and students.

More information

April 2010 Rosen Shingle Creek Resort Orlando, Florida

April 2010 Rosen Shingle Creek Resort Orlando, Florida Data Reduction and File Systems Jeffrey Tofano Chief Technical Officer, Quantum Corporation Today s Agenda File Systems and Data Reduction Overview File System and Data Reduction Integration Issues Reviewing

More information

Retrospect 8 for Windows Reviewer s Guide

Retrospect 8 for Windows Reviewer s Guide Retrospect 8 for Windows Reviewer s Guide 2012 Retrospect, Inc. About this Reviewer s Guide This document provides a concise guide to understanding Retrospect 8 for Windows. While it is not designed to

More information

Enhanced Debugging with Traces

Enhanced Debugging with Traces Enhanced Debugging with Traces An essential technique used in emulator development is a useful addition to any programmer s toolbox. Peter Phillips Creating an emulator to run old programs is a difficult

More information

Perform Manual System Restore Xp Safe Mode Command Prompt

Perform Manual System Restore Xp Safe Mode Command Prompt Perform Manual System Restore Xp Safe Mode Command Prompt Dell support article tagged with: System restore, windows, XP, WinXP, Safe Mode, Command Prompt. This is This article provides information on the

More information

PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS

PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS Objective PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS Explain what is meant by compiler. Explain how the compiler works. Describe various analysis of the source program. Describe the

More information

Installation guide. OS/2 single user

Installation guide. OS/2 single user Installation guide OS/2 single user Document date: February 2007 Sophos Anti-Virus installation guide Contents About this guide 3 1 Installing Sophos Anti-Virus 4 2 Using Sophos Anti-Virus via the GUI

More information

Get BitDefender Client Security 2 Years 30 PCs software suite ]

Get BitDefender Client Security 2 Years 30 PCs software suite ] Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -

More information

ESET Remote Administrator 6. Version 6.0 Product Details

ESET Remote Administrator 6. Version 6.0 Product Details ESET Remote Administrator 6 Version 6.0 Product Details ESET Remote Administrator 6.0 is a successor to ESET Remote Administrator V5.x, however represents a major step forward, completely new generation

More information

19.1. Security must consider external environment of the system, and protect it from:

19.1. Security must consider external environment of the system, and protect it from: Module 19: Security The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT 19.1 The Security Problem Security must consider external

More information

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary. Security Solutions Our security suite protects against email spam, viruses, web-based threats and spyware while delivering disaster recovery, giving you peace of mind so you can focus on what matters most:

More information

Operating System Concepts Ch. 11: File System Implementation

Operating System Concepts Ch. 11: File System Implementation Operating System Concepts Ch. 11: File System Implementation Silberschatz, Galvin & Gagne Introduction When thinking about file system implementation in Operating Systems, it is important to realize the

More information

Improved Signature-Based Antivirus System

Improved Signature-Based Antivirus System Improved Signature-Based Antivirus System Osaghae E. O. Department of Computer Science Federal University, Lokoja, Kogi State, Nigeria Abstract: The continuous updating of antivirus database with malware

More information