![]() ![]() ![]() AVZ can not only detect the RootKit, but also correctly block the UserMode RootKit for its process and the KernelMode RootKit at the system level. The search for RootKit is carried out without the use of signatures based on the study of the basic system libraries for the interception of their functions. In particular, the built-in process manager highlights safe processes and services in color, searching for files on the disk can exclude known files from the search (which is very useful when searching for Trojans on the disk) ![]() The database is connected to all AVZ systems and works on the principle of "friend / foe" - safe files are not quarantined, they are blocked from deleting and displaying warnings, the database is used by an anti-rootkit, a file search system, and various analyzers. It includes digital signatures of tens of thousands of system files and files of known secure processes. Firmware searches for known SpyWare and viruses by indirect signs - based on the analysis of the registry, files on disk and in memory. Firmware heuristic check of the system.AVZ - AVZ antivirus utility is designed to detect and remove: SpyWare and AdWare modules - this is the main purpose of the utility Dialer (Trojan.Dialer) Trojans BackDoor modules Network and mail worms TrojanSpy, TrojanDownloader, TrojanDropper Features of the AVZ utility (in addition to the typical signature scanner) are: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |