Wednesday, June 17, 2009

Morro:antivirus free version cloud computing?

This solution was adopted to fight against the continued growth of bases of signatures and the use of local resources. Concretely, this translates to the following process: opening a suspicious file triggers the sending of a request (with imprint and vector) to the data center hosting the antivirus engine and a full database of signatures.

If the code is identified as malicious, a warning message informs the user. Changes in the parameters of the workstation can also be proposed to prevent infection and developed an antidote. This real-time protection not herald the end of traditional signatures. This technology is presented as complementary rather than a substitute.

Several antivirus vendors, including McAfee, Trend Micro and Panda Security have implemented since 2008 this new technique. It is however not the case according to Kaspersky that this approach has too many limitations.

General, understanding of antivirus and antispyware proves useful in times of sudden computer attack.

No comments:

joomla hosting DreamHost codes