Antivirus is a computer program which is used to detect, remove and protect from computer viruses including other viruses such as malicious browser helper objects, browser hijackers, keyloggers, rootkits, Trojan horses, worms, etc. In market, you can find various antivirus programs each of which uses different virus identification methods. Below mentioned some various virus identification methods just go through them in detail.

Virus identification methods use in antivirus programs

There are various methods which antivirus software can use to identify malware:

Signature based detection is one of the common method used to identify viruses and malware in system. In order to find them, antivirus program compares the content of a file to dictionary of virus signatures. Since virus can store themselves in already created files, hence the entire file is scanned.

Heuristic based detection like malicious activity detection can be used to identify unknown viruses.

File emulation is another heuristic approach, which involves running an application in a virtual environment and logging what tasks the program does. Based on actions logged, the antivirus application can detect whether a program is malicious or not and performs the appropriate disinfection tasks.

Cloud antivirus is a technology that uses lightweight agent software on the protected system. This involves scanning suspicious files using multiple antivirus engines. It is proposed by an implementation of the cloud antivirus concept called CloudAV.

Network firewall does not make any attempt to detect or remove any viruses from system instead it protects against infection from outside the protected system or network and limit the activity of  malicious program which is present by blocking incoming or outgoing requests on certain TCP/IP ports. Other methods include usage of specialist tools such as MacAfee, AVG, Avira, Symantic, etc.

Disadvantages of Antivirus

  • Slows down system or network performance
  • Does not fully protect system
  • It’s cost is too high
  • Antivirus checks must run regularly

Click on given link to learn how to recover lost data in simple steps with the assistance of Remo Recover application.

Safe and Secure
Safe and Secure