Anti-virus software synonyms

Category:
Part of speech:
Detects viruses and notifies the user that a virus is present on his or her computer. This kind of software keeps a data set of “fingerprints” on file—characteristic bytes from known viruses. The anti-virus software then searches files and programs on a computer for that fingerprint, and when it discovers a recognized fingerprint belonging to a virus, the anti-virus software alerts the user. Detects viruses and notifies the user that a virus is present on his or her computer. This kind of software keeps a data set of “fingerprints” on file—characteristic bytes from known viruses. The anti-virus software then searches files and programs on a computer for that fingerprint, and when it discovers a recognized fingerprint belonging to a virus, the anti-virus software alerts the user. Virus writers have begun to use code-morphing techniques to avoid detection by anti-virus software by altering the machine code of the virus program while maintaining its malicious functionality. Thus, the signature of the virus is changed and detection by anti-virus software is avoided. In short, anti-virus software is not foolproof. On February 25, 2005, for example, a critical vulnerability was reported in the anti-virus engine used by Trend Micro’s complete product line of client, server, and gateway security products. For that month alone, it was, in fact, the third report of flaws found in recognized security firms’ anti-virus software. Although reported vulnerabilities in security products are more rare than they are in operating systems such as Windows, they do indeed exist. For example, the well-recognized Symantec company has had 108 reported vulnerabilities in its products (including Anti-Virus, Norton Utilities, Raptor Firewall, NetProwler, Anti-Spam, Web Security, Gateway, and others). Trend Micro has had 59 reported vulnerabilities in its products (including OfficeScan and VirusBuster), and F-Secure has had 12 reported vulnerabilities in its products (including Policy Manager, Backweb, and Anti-Virus). Therefore, because anti-virus software products do have vulnerabilities, they tend to provide a false sense of security to purchasers who think they are 100% reliable. Though users buy firewalls to halt “bad traffic,” they can inadvertently install software that allows intruders into their system. Keizer, G. Security Firms Follow Unwritten Code When Digging Up Dirt on Each Other. [Online, February 25, 2005.] CMP Media LLC Website. http:// www.informationweek.com/story/showArticle.jhtml;jsessiionid=POBBDHOZK2B4AQSND ­BCCKHOCJUMEKJVN?articleID=60403683; Schell, B.H. and Martin, C. Contemporary World Issues Series: Cybercrime: A Reference Handbook. Santa Barbara, CA: ABC-CLIO, 2004.
0
0
A device used for computing and otherwise processing information; specif., an electronic machine which, by means of stored instructions and information, is used to perform rapid, often complex calculations, compile and correlate data, download and play audio and video communications, access the World Wide Web, send and receive e-mail, etc.; now, esp., digital computer
0
0
A firewall is an installed feature on a computer network that has access to the Internet. Firewalls are basically named after their function, as they work as a digital blocker for harmful material trying to enter a network from the Internet. Firewalls monitor information in and out of your computer to make sure that only safe information reaches your computer.
0
0
The definition of a virus is an extremely tiny parasite that can only reproduce if it is within a living being, or anything that corrupts something else.
0
0
Detects viruses and notifies the user that a virus is present on his or her computer. This kind of software keeps a data set of “fingerprints” on file—characteristic bytes from known viruses. The anti-virus software then searches files and programs on a computer for that fingerprint, and when it discovers a recognized fingerprint belonging to a virus, the anti-virus software alerts the user. Detects viruses and notifies the user that a virus is present on his or her computer. This kind of software keeps a data set of “fingerprints” on file—characteristic bytes from known viruses. The anti-virus software then searches files and programs on a computer for that fingerprint, and when it discovers a recognized fingerprint belonging to a virus, the anti-virus software alerts the user. Virus writers have begun to use code-morphing techniques to avoid detection by anti-virus software by altering the machine code of the virus program while maintaining its malicious functionality. Thus, the signature of the virus is changed and detection by anti-virus software is avoided. In short, anti-virus software is not foolproof. On February 25, 2005, for example, a critical vulnerability was reported in the anti-virus engine used by Trend Micro’s complete product line of client, server, and gateway security products. For that month alone, it was, in fact, the third report of flaws found in recognized security firms’ anti-virus software. Although reported vulnerabilities in security products are more rare than they are in operating systems such as Windows, they do indeed exist. For example, the well-recognized Symantec company has had 108 reported vulnerabilities in its products (including Anti-Virus, Norton Utilities, Raptor Firewall, NetProwler, Anti-Spam, Web Security, Gateway, and others). Trend Micro has had 59 reported vulnerabilities in its products (including OfficeScan and VirusBuster), and F-Secure has had 12 reported vulnerabilities in its products (including Policy Manager, Backweb, and Anti-Virus). Therefore, because anti-virus software products do have vulnerabilities, they tend to provide a false sense of security to purchasers who think they are 100% reliable. Though users buy firewalls to halt “bad traffic,” they can inadvertently install software that allows intruders into their system. Keizer, G. Security Firms Follow Unwritten Code When Digging Up Dirt on Each Other. [Online, February 25, 2005.] CMP Media LLC Website. http:// www.informationweek.com/story/showArticle.jhtml;jsessiionid=POBBDHOZK2B4AQSND ­BCCKHOCJUMEKJVN?articleID=60403683; Schell, B.H. and Martin, C. Contemporary World Issues Series: Cybercrime: A Reference Handbook. Santa Barbara, CA: ABC-CLIO, 2004.
0
0
Find another word for anti-virus software. In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for anti-virus software, like: code or source code, computer, firewall, virus and vulnerabilities in computers.