.
4shared.com - Free file sharing and storage

Kamis, 11 Maret 2010

Security Test, How to Prove Reliability Strategies Antivirus

0 comments
Jakarta - How can users know the effectiveness of antiviral agents used? Do you have to wait for the computer virus attack first? Fortunately, because there is a recognized safety testing in the industry.

Testing was, for example, is conducted by AV-comparatives or by AV-Test.org. Both tests have been recognized by the industry and believed it could find out how powerful an antivirus software.

During recent years, the landscape distribution of a computer security threat has undergone fundamental changes. If you had only a small number of threats that could affect millions of users, this time millions of new threats appear each month and are threatened only a pinch of users around the world.

The following data from our analysts at Symantec may illustrate how big this issue: during 2009, Symantec software has blocked more than 2.7 billion effort to attack around the world. This means that, with this condition, the solution 'just antivirus' traditionally been less effective.

To overcome this, Symantec has made a change to the approach to defense-in-depth. This approach uses multiple layers of security to protect users.

AV-Comparative Testing and AV-Test.org has also reflect changes in testing methods for evaluating the comprehensive protection offered by the latest security products.

Test results from two independent institutions that demonstrate the ability Symantec security products. Anugerah Best Anti-Virus Product of 2009 provided AV-comparatives in Symantec, the first position is also found in real-world testing conducted by AV-Test.org.

Award from AV-comparatives reflect the ability of various tests on the main areas of security, in terms of protection and performance. While testing conducted by AV-Test.org is the protection of the daily activities of users, such as browsing and downloading files.

Stephen Trilling, senior VP, Security Technology and Response, Symantec, said that tests conducted to evaluate the product's ability in dealing with real malware.

AV-comparatives

One type of award given by AV-comparatives is a gold medal for Best Anti-Virus Product of 2009. This award is the result of tests on the Norton AntiVirus and a few other vendors products against eight types of tests, including: On-Demand Malware Detection, On-Demand Proactive Malware Detection, False Positives, On-Demand Scanning Speed, Overall Performance (Low-Impact System) , On-Demand Applications Potentially Unwanted Detection, Malware Removal Capabilities and Dynamic Whole-Product Protection.

According to Andreas Clementi, chief executive officer, AV-comparatives, the overall outcome is good for Symantec, in 2009 the test, showing how its products have been doing a good job and balanced in terms of performance, a high detection rate and false-positive rate of low.

AV-Test.org

AV-Test.org recently testing a new version to answer the question how effective the antivirus and Internet security products to detect malicious programs that really new in everyday situations.

In that test security products tested 12 different. Symantec's Norton AntiVirus to detect 98 percent of the existing threat, this is the best of the 12 products tested.

Andreas Marx, chief executive officer, AV-Test.org says that this new test provides an opportunity for security products to try all of their protective coating. And, therefore, better protection of predicting what users will experience in the field everyday.

Currently, most computer users infected by malicious programs such as Internet-based attacks silently download (drive-by download) and social engineering-based attacks, often disguised as sly as a user clicks on a particular link. AV-Test.org attempt to create a test that can reflect the threats that exist today.

For three months, until December 2009, AV-Test.org test of security products to 10 new threats per day. Each sample is run on a clean machine and arranged in order to show how users can get the attack in real conditions.

This approach allows testing on all the different layers of protection from any security product, and not just one layer only. Throughout the testing, each product exposed to 600 different security threats, and also clean the file 400 to ensure no errors clean files detected as malware - aka False Positive (FP). In the test, the Symantec obtain the highest detection rate (98 percent) and the best FP.

Technology Behind the Product

The main technology behind a Symantec security solutions presented by the organization's Security Technology and Response (STAR). During 2009, STAR has developed and produced a number of security technologies so innovative that contribute to the protection of high value in the tests above.

Here are some technologies that:

  • Reputation-Based Security: STAR has created a reputation-based technology that brings the knowledge of millions of Symantec users who participated to produce a safety rating which is very accurate for almost all jenus existing files on the Internet. This gives users the power to Symantec to make good choices on their software download and install on your computer.
  • Advanced Heuristic Protection: STAR has introduced a series of heuristics to detect malicious programs that have not known before a malicious program is active and doing damage. This approach can detect malicious programs that really new and variants of spyware or adware without the need for 'fingerprints'. Things he did was look for suspicious process or series of instructions commonly used by malicious programs.
  • Protection of Advanced Behavioral: STAR has redesigned the protection behavior (behavioral) Symantec, allowing it to recognize and block thousands of new variants of malware by analyzing the behavior of the software, all without traditional fingerprints.
  • Engine Slim and Efficient: STAR optimize the main scan engine, helping Symantec products to be the fastest in the industry.


(Choi)
Read full story

Security System Gray on Facebook

0 comments
Jakarta - A few days ago have been held with the Conference of the CERT in the Asia Pacific region or also known as The Asia Pacific Computer Emergency Response Team (APCERT). CERT cooperation among the Asia Pacific region has been established since 2003 and began conducting the conference since 2004.

APCERT 2010 held in Phuket, Thailand on 3-5 March 2010 and acted as host this time is the THAI-CERT. Of course Indonesia participated as one of the countries that already have national CERT and has been recognized that the Asia Pacific CERT ID-SIRTII (Indonesia Security Incident Response Team on Internet Infrastructure). ID-SIRTII had just formed in early 2007 and officially became the General APCERT Member since June 2009.

Whatever APCERT discussed in this Conference. The most crucial issues currently considered by the members of the CERT is safety in Social Networking (Security on Social Network) can be said that it is safe and not safe.

Say safe, because all the information protected. On a social networking site of Facebook is very popular, they protect the only way Facebook Facebook members are able to connect to social networking sites and only the official account can have spoken to each other and exchange information, protect user accounts with some security such as user id and password (standard), master, security can personalize the settings set by the user itself, to close the account if Facebook does not want to use.

It said it was not safe because if we've become a member / member, information can be retrieved by anyone and at any time by a friend or a friend who claims to be a user / object of exploitation. The information placed on Facebook accounts are meant for the hackers to gather information in an attempt to break down user accounts in other places.

APCERT Delegates dazzled by what is delivered by a team APCERT conference in Indonesia this time, because Indonesia (ID-SIRTII) as the last team to join the APCERT, it occupies the largest Internet user number 2 in Asia Pacific after China with over 380 million users (total population 1.5 billion more).

Indonesia already has a number of Internet users reached 45 million more (total population 250 million more) and supported by more than 300 ISPs who have official permission from the Director General of Post and Telecommunication, Internet users is growing exponentially every day.

Internet Indonesia

Why is the number of Internet users in Indonesia may increase significantly? First, it is influenced by the thirst of information consumed by the internet user.

The second is the growth of social networking sites like Facebook, the Twitter, blogs and many others. Third, the Internet is very cheap to buy a monthly subscription can be so cheap Rp 50,000, even on demand, anytime connectivity to the Internet user can directly contact each provider and with a very enthusiastic internet provider will serve its customers.

Fourth is the device that is already terjangkaunya using qwerty keyboard, such as BlackBerry, Nokia, and others. Moreover, China's mobile phone under a million with keyboradnya qwerty, gsm modem plus an affordable and can be used anywhere and anytime. And of course the Internet user growth is also a potential marketing for the product owners, because it started growing a variety of messenger services.

Facebook representatives from the United States presented the Indonesian Facebook user has reached the largest sequence number 2 after the U.S. with 20.5%. Compared to other countries, visitors to social networking on the Internet continues to grow every day and can be said as a community to look for new things, mutual sharing of information, images, and other content.

But Facebook does not deny the existence of several cases that occur because of the impact of facebook like kidnapping, rape, harassment until the most hits is committing suicide.

Facebook said it was concerned with these things, but all returned to the user, because they are very close to a network of friends, then Facebook can not control the user content uploaded to the account.

In closing this report, the Chairman APCERT this time carried by the HK-CERT (Hong Kong) and the deputy is SING-CERT (Singapore), APCERT Secretariat is still being done in Japan (JP-CERT), Indonesia (ID-SIRTII) because it is still very new, General Member and still can assume it is not one of these positions in APCERT, compared with the Thai-Sing-CERT and CERT are already a member of CERT since 2003.

(Choi)
Read full story

VBWorm.AGR, Virus Local ruffled IE

0 comments
Jakarta - One of the local virus that computer users should watch out for is VBWorm.AGR. Although not too fierce, these viruses can mess up the look of Internet Explorer.

Analysts described the Vaksincom antivirus, Adang Jauhar Taufik, this virus will change the IE default page to a blog that addresses the http://www.hellspawn.de.be and provide 'bonus' to change the default search page to an account in Friendster.

The virus is created with Visual Basic language program with a file size of around 58 KB, the file type 'Application' and the file extension 'EXE'.

"Actually it is not too difficult to identify this virus, one of them is to see the home page and search page of Internet Explorer. In addition, when running regedit program will display an error message."

At the time the virus is active in the victim's computer, it will create some master files that will run when the computer is first turned on. In order for these files can be automatically executed, he will make a few strings in the registry windows.

"To defend himself, he will do a block of several main windows functions such as Task Manager, Registry Editor, Msconfig or a system restore, this is also done to enable him at the time of the user executing the application, this virus will hide the file regedit.exe and Notepad.exe, "continued Adang.

The main target of this virus is hiding folders and subfolders found. Meanwhile, to spread himself he will use Flash media disk with a duplicate file in accordance with the file name are hidden.

"Unlike what most local virus, he will not use the Windows autorun feature to activate him," he concluded.

(Choi)
Read full story

Senin, 08 Maret 2010

Smadav 2010 Rev 8.1

0 comments
Addition of new virus database 100
Virus (or more precisely Malware) that a lot of spread in Indonesia today are mostly foreign-made virus in nature is similar to the local virus. These viruses to become the targets of this latest version SmadAV. Own local virus is currently spreading began to decline and very rarely found. This we conclude from virus samples uploaded by the www.smadav.net Smadaver.

SmadAV Virus Scanner Engine (SmadEngine.dll)
SmadAV old engine that has been used since 2006 is not used since 2010 SmadAV Rev. Is 8.1. Re reform Virus Scanner Engine that makes SmadAV release delayed over a month. This new engine completely rewritten from scratch using the programming language C + + with a complete engine that was previously written with Visual Basic. Most virus detection techniques in this new engine has been revamped and improved for the better. Memory usage on the new engine is more stable and efficient than the old engine, as well as the scanning speed is also faster.

Compatible on Windows Vista & 7
In Rev. 8-rev and previous rev SmadAV is still not 100% compatible on Windows Vista and Windows 7. But the Rev. This 8.1 SmadAV both scanner and his protector has supported and 100% compatible for use in Windows Vista and Windows 7.

The following is a complete list of improvements SmadAV Rev. 2010. 8.1:

Engine new scanner (SmadEngine.dll) to detect the virus more quickly and accurately.
External Database (Smadav.loov) to make it easier to update the database for the next revision.
Plug-in explorer right click on the latest (SmadExtc.dll) the better.
Compatible in Windows Vista & 7.
Detection of several viruses that many international spread in Indonesia (Sality & Alman) was more rapid and accurate.
Adding a database of more than 100 new viruses and their variants
Improved false alarm on some files.
Completion of key blacklist illegal methods SmadAV Pros
Changes SmadAV team structure for 2010
Added uninstall menu in the Tray Icon for easy uninstall
And many other improvements ...

Free Download Smadav 2010 Rev 8.1 | Miror
Read full story
Twitter Delicious Facebook Digg Stumbleupon Linkedin Yahoo! Bookmarks Google Buzz Google Reddit Mixx Technorati RSS Favorites
 

Blog Archive

News Antivirus © 2008 Business Ads Ready is Designed by Choi Rozs Supported by Blogger