Free Download Antivirus-360 Safeguard

Saturday, October 29, 2011

360 Safeguard (Chinese: 360安全卫士) is a program developed by Qihoo 360, a company based in China. 360 Safeguard's main focus is on stopping computer viruses, malware, trojan horses, and security patching for Windows. 360 Safeguard trojan horses scanner is cloud-based. It also has a heuristics engine built into the scanner.

Features

Anti trojan capabilities
Real-time Protection
Trojan Firewall
Webshield— Protection against Internet threats.
Software Manager
Junk file cleaner
Internet Explorer Repair
Leak Fixer
Self Protection— Prevents malware from terminating 360 Safeguard processes and damaging 360 Safeguard files
Software isolation area
Eye protection-aids in reducing stress on eyes and notices for a rest on eyes

Source :http://en.wikipedia.org
READ MORE - Free Download Antivirus-360 Safeguard

Free Download Smadav Antivirus

Thursday, October 27, 2011

SmadAV is not paying local Antivirus (freeware) which is devoted to cope with local viruses or foreign widespread in Indonesia. SmadAV can run well on Windows Platforms.

SmadAV can be combined with almost all international antivirus. Once combined, SmadAV will protect your computer from local and international anti-virus that will protect you from viruses entire international

SmadAV name is taken from the name of the school stands Nafarin Zainuddin, Smada (SMA 2) in Palangkaraya in Central Kalimantan, while the AV stands for antivirus.

Sources :http://id.wikipedia.org/wiki/Smadav
READ MORE - Free Download Smadav Antivirus

Dowload Free Norton 360 antivirus

Norton 360 is a computer security application that was developed by Symantec Corporation for the Microsoft operating system Windows XP and Vista. Norton 360 offers traditional computer security protection, plus a Web security, backup and computer maintenance tool.

Features

Norton 360 has a protection from most forms of malware, including viruses, trojans, spyware, and adware, as well as personal firewalls and anti-phishing features. A single license of Norton 360 can be used to protect hinnga 3 computers at no additional cost. Users can also use Norton 360 to backup personal data locally or online drives (the standard version provides 2 GB of free space and provide premier version of the space 10 GB, although additional space could be purchased). In addition, Norton 360 includes a basic level of maintenance tools , including a disk optimizer and registry cleaner, which was made to optimize the user's computer.

Add-on packages that provide other features (including parental control and anti-spam) is available from Symantec.Norton 360 has a display face which is simpler than most other similar Symantec products and made ​​more automatic.

Source :http://id.wikipedia.org/wiki/Norton_360
READ MORE - Dowload Free Norton 360 antivirus

How to fight Trojan Attack

Wednesday, October 26, 2011

Trojan Horse or better known as a Trojan in the computer security refers to a form of suspicious software (malicious software / malware) that can damage a system or network. The purpose of the Trojan was to obtain information from the target (passwords, user habits are recorded in the system log, data, etc.), and control target (gain privileges on the target).

How it Works

Trojans differ from other types of suspicious software such as computer viruses or worms because two of the following:

1. Trojan is "stealth" (invisible and not seen) in its operations and are often shaped as if the program is a good program, while computer virus or worm to act more aggressively by damaging the system or make system to crash.

2. Trojans are controlled from another computer (the computer the attacker).
Checking Listening Ports

Detect the presence of a Trojan is an action that is rather difficult. The easiest way is to see which ports are open and are in a state of "listening", by using certain utilities like Netstat. This is because many of the Trojan runs as a system service, and work in the background (background), so the Trojans-Trojan is able to receive commands from remote attackers. When a UDP or TCP transmission is done, but the transmission from the port (which is in a state of "listening") or the address is not recognized, then it can be used as guidelines are concerned that the system has been infected by a Trojan Horse.

Sources :http://id.wikipedia.org/wiki/Trojan
READ MORE - How to fight Trojan Attack