Vous êtes sur la page 1sur 18

A computer virus is a computer program that can replicate itself[1] and spread from one computer to another.

The term "virus" is also commonly, but erroneously used, to refer to other types ofmalware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.[2][3] Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent is Fred Cohen's compression virus.[4] However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorised changes to a computer, which is undesirable even if no damage is done or intended.

Prevention Tips: The following tips should be used as best practices for detecting and preventing viruses on your computer.

Do not open any files attached to an email from an unknown, suspicious or untrustworthy source.

Do not open any files attached to an email unless you know what it is, even if it appears to come from a friend, co-worker or someone you know. Some viruses can replicate themselves and spread through email. Better to be safe than sorry and confirm that they really sent it.

Do not open any files attached to an email if the subject line is questionable or unexpected. If the need to do so is there always save the file to your hard drive before doing so.

Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network.

Exercise caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one. Verify that an antivirus program checks the files on the download site. If you're uncertain, don't download the file at all or download the file to a floppy and test it with your own anti-virus software.

Back up your files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy. You should store your backup copy in a separate location from your work files, one that is preferably not on your computer.

When in doubt, always err on the side of caution and do not open, download, or execute any files or email attachments. Not executing is the more important of these.

Types Of Viruses
Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Below I list and discuss some of the most common types of computer viruses. Trojan Horse: A trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls. Worms: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail. Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are

typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes. Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files. Polymorphic Viruses: A polymorphic virus not only replicates itself by creating multiple files of itself,

but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect. Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.
Overwriting Virus: this type of virus overwrites files with their own copy. Of course, this is a very primitive technique, but it is certainly the easiest approach of all. Overwriting viruses cannot be disinfected from a system. Infected files must be deleted from the disk. Companion Infection: one approach to becoming a companion to an EXE file is to give the virus the same base name as the targeted program, but use a .COM extension instead of .EXE. This technique was employed by the Globe virus, first detected in 1992. When the victim attempts to launch an EXE program, he or she usually types its name without the extension. In such cases, Windows gives priority to a file with the .COM extension over a file with the same base name but with the .EXE extension. Appending Virus: In this technique, a jump (JMP) instruction is inserted at the front of the host to point to the end of the original host. A typical example of this virus is Vienna. The appender technique can be implemented for any other type of executable file, such as EXE, NE, PE, and ELF formats, and so on. Such files have a header section that stores the address of the main entry point, which, in most cases, will be replaced with a new entry point to the start of the virus code appended to the end of the file. Cavity or spacefiller Virus: This virus attempts to install itself in this empty space while not damaging the actual program itself. An advantage of this is that the virus then does not increase the length of the program and can avoid the need for some stealth techniques. The Lehigh virus was an early example of a cavity virus. Because of the difficulty of writing this type of virus and the limited number of possible hosts, cavity viruses are rare.

Compressing Virus: A special virus infection technique uses the approach of compressing the content of the host program. Sometimes this technique is used to hide the host program's size increase after the infection by packing the host program sufficiently with a binary packing algorithm. Encrypted Virus: consists of a constant decryptor, followed by the encrypted virus body. Relatively easy to detect because decryptor is constant. The first known virus that implemented encryption was Cascade on DOS. Oligomorphic virus changes its decryptors in new generations. The simplest technique to change the decryptors is to use a set of decryptors instead of a single one. The first known virus to use this technique was Whale. Whale carried a few dozen different decryptors, and the virus picked one randomly. Boot Sectors Virus: this virus takes advantage of the executable nature of master boot record (MBR) and partition boot sector (PBS). A PC infected with a boot sector virus will execute the virus's code when the machine boots up. Michelangelo virus is an example of a Boot Sectors Virus. macro virus: infects a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an e-mail virus. A well-known example in March, 1999 was the Melissa virus

Detecting a virus
Viruses reproduce by infecting "host applications," meaning that they copy a portion of executable code into an existing program. So to ensure that they work as planned, viruses are programmed to not infect the same file multiple times. To do so, they include a series of bytes in the infected application, to check if has already been infected: This is called a virus signature. Antivirus programs rely on this signature, which is unique to each virus, in order to detect them. This method is called signature scanning, the oldest method used by antivirus software. This method is only reliable if the antivirus program's virus database is up-to-date and includes

signatures for all known viruses. However, this method cannot detect viruses which have not been archived by the publishers of the antivirus software. What's more, virus programmers have often given them camouflage features, making their signature hard to detect, if not undetectable: These are "polymorphic viruses". Some antivirus programs use an integrity checker to tell if the folders have been changed. The integrity checker builds a database containing information on the executable files on the system (date modified, file size, and possibly a checksum) That way, when an executable file's characteristics change, the antivirus program warns the machine's user. The heuristic method involves analysing the behaviour of applications in order to detect actvity similar to that of a known virus. This kind of antivirus program can therefore detect viruses even when the antivirus database has not been updated. On the other hand, they are prone to triggering false alarms

FIREWALL
If your house has an alarm system, surveillance cameras, or any type of security equipment to prevent burglars, then you can compare it to a firewall. A firewall will monitor and limit connections to your computer from the internet and other users. A computer without a firewall is defenseless, and makes it easier for hackers or unwanted programs to invade your computer. There are two types of firewalls, hardware or software. Firewalls may give the user increased security by protecting your computer from hackers, as opposed to having no firewall. Hackers will try anything to get into your computer by searching through your computer's ports. Your computer has many ports. They are used to connect to the internet, but sometimes they are left open. Hackers can send a virus or spyware to these ports, and take control of your computer. To prevent this from happening, a firewall will make sure all unused ports are closed.

Types of Antivirus Programs(detection)


There are two types of anti virus programs. Both do more or less the same thing, but use different methods. Both types of programs are constantly on the lookout for viruses on your computer, but they do so in different ways. The first one keeps a list of known viruses and virus types, called "virus definitions." This list of virus definitions is called a virus library. It constantly looks through your computer, checking to see if anything coming into your computer is a virus. It does so by comparing all things coming in with what it has stored in its "virus library". Any file, document, or program coming into your computer is inspected and compared to this library to see if it matches any of the "virus definitions." One disadvantage of this system is that if a new virus comes out that is different than the viruses stored in your library, this type of antivirus program will not detect it

and will allow it onto your computer. When using such a program, it is important to have a subscription, and to be connected to the Internet, so that your virus definitions are constantly updated. New viruses come out every day. If you choose such a program, one of the things to check for is how often the virus definitions are updated. This will play an important role in keeping your computer safe. The second type of anti-virus program is called a HEURISTIC program. "Heuristic" means "learning by discovery or trail and error." It comes from the Greek word "heuriskin," which means "to discover". In other words, the program is capable of discovering new viruses not already known. It is written in such a way that it is able to learn and discover new viruses, without having to refer to a library. This program will most likely also have a library of virus definitions. But in addition to detecting already known viruses, it is able to detect new viruses, and is therefore a more secure program.

Function
o

Antivirus software is used to detect harmful viruses and other spyware on a computer system. Hackers frequently embed viruses on popular websites to infect the computer of anyone that visits their website. You'll need to locate a suitable type of antivirus software to stop them from invading your computer system unknowingly. With antivirus software, viruses and spyware will be properly removed from your infected computer system to protect your important data. Most antivirus software programs can usefully identify common and uncommon malware applications that have been unwittingly installed on a computer system.

Features
o

Antivirus software have the capability of searching an entire file on a computer system. Instead of just looking at a small section of an existing computer file, the antivirus software thoroughly analyzes it. This prevents viruses, spyware, and malware from hiding on your computer system and compromising the data stored on it. On-access scanning is another useful feature of many antivirus software. The real time protection will notify you of any irregular file activity that may indicate your computer system has been infected. Virus removal features are also included in antivirus software to take them off your current computer system. With frequent virus database updates, your antivirus software will effectively keep track of the latest threats that could harm your computer system.

Firewall Operations Mgmt

Types
o

There are a large number of antivirus software programs available. Some are free to use and others will cost you a specific fee to gain access to their virus-protecting features. AVG AntiVirus Free can be downloaded from its homepage and installed on your computer system to begin the protection process. There's no cost to use this antivirus software and it frequently updates itself from the latest virus threat. Bitdefender Free Edition is another totally free antivirus program that will protect your computer system from viruses, spyware and other malware. Download this program to your computer by navigating to the Bitdefender website. Norton Antivirus has built-in features to prevent spyware, viruses or malicious software from exposing personal information located on your computer system. For a fee, you'll be able to purchase the Norton Antivirus software to analyze and detect computer threats. (See Resources.)

Misconceptions
o

Although there are multiple types of antivirus software to help keep your computer system safe, you shouldn't use more than one at a time. Having several antivirus software programs installed on a single computer system will expose it to vulnerabilities. A missed malicious file could cause your entire computer system to crash or prevent it from accessing a stable Internet connection. Instead of tracking a virus threat, each antivirus software will prevent the other from correctly functioning.

Warning
o

If you don't update your antivirus software to its most recent version, it will not effectively protect your computer system. Activate the feature that allows automatic connection to the Internet for virus database updates. This can usually be done by accessing the "Settings" feature within your antivirus software.

TYPES
AVG Free Edition AVG Resident Shield provides real-time protection executions of files and programs. It features a smart e-mail scanner, virus updates and virus vault for secure handling of the files which are infected by viruses. The base version for windows is Free for private and noncommercial use.

BitDefender Online Scan System BitDefender Scan Online scans systems memory, boot sector, all files and folders and also comes with automatic file cleaning option. Overall, it scans for over 70,000+ viruses, worms, trojans and other malicious applications. Inexpensive product received excellent scores in our performance tests, although its scan speed was sluggish. McAfee VirusScan for Windows: This antivirus package detects all virus types, including Word and Excel macros; boot-sector infections; and file, multipartite, stealth, polymorphic, and encrypted viruses. Kaspersky Anti-Virus Personal Pro A commonly used virus protection solution offering full protection against macro-viruses and unknown viruses. It offers reliable data integrity control and protection of e-mails from viruses. ESET NOD32 Antivirus ESET NOD32 Anti-virus is available as an antivirus for small businesses, individuals and for large networks. The trialware enables the user to try the application for a period of 30 days. avast! Home Edition A free antivirus solution for scanning disk, CDs, in E-mail, HTTP, NNTP, IM and P2P. Panda Antivirus Platinum A complete virus protection package for home and business users. It comes with an easy installation and automatic protection from latest viruses. Norton AntiVirus Norton AntiVirus is the most popular and secure virus scanner for checking boot sector records at startup. The live update feature automatically installs new updates for regular protection against viruses. HandyBits A free for personal use virus scanner integrator with features like auto-search which scans for already installed virus scanner. It scans for files using installed virus scanners there by utilizing the strengths of installed programs. HijackThis Software HijackThis is a small application for scanning and cleaning spyware, malware infections in computer. It enables the user to save the scan log in a txt file which can be examined later for system security analysis. And Here are Some Online Scanners Stinger A stand-alone application for automatic detection and removal of viruses. It acts as more of an assistance for administrators and is not meant

to be a full time anti-virus replacement. It is available as freeware for Windows. Avast! Online Scanner An online virus scanner from alwil software for scanning files smaller than 512KB. Dr. Web Dr. Web is an online scanner for curing system viruses. Users can select viruses from system and can scan selected files. BitDefender Online Scan System BitDefender Scan Online scans systems memory, boot sector, all files and folders and also comes with automatic file cleaning option. Overall, it scans for over 70,000+ viruses, worms, trojans and other malicious applications. ESET Online Scanner ESET is a powerful user-friendly scanner for removing malware from users computer. Free online Trojan Scanner An online scanner for detection and removal of Trojan horses. F-Secure An online virus scanner for detecting and clearing viruses.It supports Windows XP and Windows 2000. Kaspersky Online Scanner A fast and effective online scanner for checking individual files, folders, drives or even files related to emails. Mcafee Virusscan Online A trusted VirusScan service for search and display of infected files. Once the infected files are displayed McAfee scan provides detailed information about the virus, its type and removal instructions. Symantec Security Check An effective online scanner for testing various types of viruses and threats on user computers.

6 Antivirus Open Problems Detection Methods have some major problems. Firstly, they are only good against known viruses and not very good against evolutionary or new viruses. Secondary, they tend to take a noticeable amount of time to scan a system or networks for the patterns. Thirdly, a scanner or its virus pattern database must be updated very often to remain effective. Subsequence the following problems must be solved:

If the virus is cleverly written to always stay within this normal behavior, it may be difficult to detect its presence using the current monitoring techniques. Can we introduce new reliable monitoring techniques to discover the new viruses? Metamorphic viruses are difficult to detect because their creators have the advantage of knowing the weaknesses of antivirus scanners. The limits of antivirus scanners come from the limits of static and dynamic analysis techniques. If we have some copies of a metamorphic virus, is there a new method to detect all metamorphic virus copies? Can we use public key cryptography to solve the computer virus problem? In this case all the developers must embed their digital signature within their software and they must prepare a certificate that is signed by a will known certificate authority. The developers of operating systems must offer a new procedure to copy, download and install the new software. Trojans Executable code Do not self-replicate Unexpected result Usually malicious payload A Trojan Horse is a computer program masquerading as a game or a cute program. However, when it runs it does something else - like erasing your hard drive or blocking your screen with a graphic will not go awayWhen a Trojan is activated on your computer, the
results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create abackdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Viruses Self replication Require a host Executable path Side effects

Disguise A Trojan Horse is a computer program masquerading as a game or a cute program. However, when it runs it does something else - like erasing your hard drive or blocking your screen with a graphic will not go awayA computer virus attaches itself to
a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses asattachments in the email.

Worms Self-contained viruses Usually use the Internet A Worm uses computer networks to replicate itself. It searches for servers with security holes and copies itself there. It then begins the search and replication process again. A worm is similar to a
virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line

Features: NORTON ANTIVIRUS


o

Blocks all major types of malware, including: o Viruses. o Trojans. o Worms. o Bots. o Spyware. o Rootkits. Uses both signature and heuristics detection methods to increase accuracy and level of protection. o Norton's extensive database of recognized malware threats prevents the common viruses from getting through. o 'SONAR 2' technology observes how files behave to detect new threats, Compatible with Windows XP (Service Pack 2 or later), Vista and 7. Consistently performs well or excellently in product testing by different test labs. Attractive and easy-to-navigate user-interface. Pulse updates provide new virus definitions every 5-15 minutes. Quick and simple installation, with no need to reboot. Includes facilities to help optimize computer performance. Email scanning on POP3 and SMTP compatible clients. Many tasks are delayed until an appropriate time, when: o The computer is idle, so they do not disturb your activities. o Laptops/notebooks are plugged in, so battery life is not wasted. A number of features minimize adverse affects on performance, including: o Small use of hard drive space. o Low use of system memory. o Minimal addition to reboot and application launch time. Full support system, including: o Free email and chat support.

o o

o o o o o o

o o o

Phone support - usually free though fees may apply. Automatic problem check to identify what you need help with. Comprehensive software help section.

Editor's Verdict:
A bestseller for years, Norton AntiVirus remains at the head of the market for antivirus software. Although pre-2010 editions received a level of criticism, in 2010 the company introduced a large number of new features and improved on much of what was already there. The 2011 version further extends on the 2010 version. Norton's highly effective scanning capabilities, extraordinarily regular updates and full support package are what make it our highest rated anti-virus program. In addition to all this, it is easy to use, has an attractive interface design and has been developed to run as seamlessly as possible alongside your other programs. Therefore, not only is it the most effective anti-virus program on the market, but it is also the most ergonomic. The program offers three types of scan: quick, full and custom. In each of these, scanning times are a lot faster than many of the product's competitors, but as always will depend on the amount of used disk space on your hard drive and other factors. Of course, the most important feature to look out for in anti-virus software is the effectiveness of virus detection and removal. Here, Norton AntiVirus excels. The software has preformed well historically in the major anti-virus tests, indicating that its protection is up-to-date and effective. Indeed, Norton commonly ranks above all other anti-virus software in these tests. As well as offering the most regular virus definitions updates of any similar product, the program's makers, Symantec, are constantly developing technology that will find the threats that haven't yet been cataloged. The software uses advanced algorithms to work out the likelihood that a particular file could be a threat, meaning that as well as being highly effective at protecting you from malware, Norton AntiVirusis very unlikely to delete something that is in fact benign. Whereas some of the products reviewed here have come onto the scene fairly recently, after years of producing antivirus products, with Symantec you know you are getting a tried and tested solution. Those who have been dissatisfied with previous Norton products will find a lot here to address their concerns. Whereas older versions of the software would typically take up a lot of memory and affect your computer's performance, every effort has been made here to minimize these problems. Of course, anti-virus software always slows down operations such as reboots, file conversions and downloads. However, if you are used to using an old version of Norton AntiVirus you will be surprised to see how far the software has come in improving speed and performance. And

although there are still anti-virus products out there that are even faster than Norton, none can match this software's effectiveness with such a relatively low footprint. A number of clever features mean that most of the time you won't be aware that the Norton AntiVirus is even running. The developers have clearly had the user in mind and know how intrusive some anti-virus software can be. If you are using a computer away from a power source, the program will delay all non-essential tasks until you are plugged back in. This will not lower your level of protection, but will help you to conserve battery life without stopping the software entirely - a useful feature, as all notebook users will know. A distinctive feature of Norton AntiVirus 2011 is its ability to convey quite technical details in an easy-to-understand way. If you are not particularly technically minded, or are simply confused by the huge range of threats to your computer's safety and performance, this software will run itself effectively and quietly in the background of your computer. However, should you want more detailed information about how your computer is running, it provides a range of graphs and statistics detailing different aspects of the computer's performance. Not only this, but the software actually offers to solve any problems relating to this. Your input to this can be as much or as little as you like, from targeting particular problems, to allowing the software to run a onebutton optimization tool. If you have used Norton in the past, you will probably be aware that they offer a variety of products, including Norton 360 and Norton Internet Security. Norton AntiVirus is less comprehensive than these alternatives, only being usable on one computer, and not providing help with other computer and internet issues such as identity protection, backup and restore. If you are looking for these features, it would be worth investing in one of Norton's other products. However, as far as pure antivirus protection and removal goes, you cannot go far wrong with this program. No anti-virus product will provide you with 100% protection. But if you are looking for the next best thing,Norton AntiVirus is it. Very competitively priced and offering superb protection at every level, it earns its place as our top rated anti-virus product.

Features (mcaffe)

Detects and removes the majority of major malware, including: o Viruses. o Spyware. o Adware. o Rootkits. o Trojans. o Bots. o Worms. Compatible with Windows 2000, XP, Vista and 7. Email and Instant Message scanning. Shows safety ratings of sites before you click on them. QuickClean feature clears your hard drive of unnecessary files that can slow it down. Battery mode delays non-vital tasks until your laptop is plugged in, conserving power and improving performance. Runs quietly and smoothly in the background, without disturbing your other activities. Recognizes new viruses quickly and efficiently. Updates virus definitions several times daily. Provides anti-phishing protection while browsing. Passes the majority of product lab tests. Strong support package, including: o Free email and chat support. o Extensive help files. o McAfee Virtual Technician tries to solve problems intelligently by itself. o Phone support. (Costs apply). o Optional additional help package at extra expense.

o o o o

o o o o o

Editor's Verdict:

McAfee AntiVirus Plus 2011 offers everything you can expect from anti-virus software, and does everything to a very satisfactory level. For this reason alone it is certainly worth having a closer look at. However, we have found that there are very few standout features, and there is little here that puts McAfeeabove the competition in any particular field. The software's makers have done a largely good job, and it is certainly effective at malware detection and removal. It even offers protection against rootkits, something that many anti-virus solutions cannot provide. Updates are every few hours, which sounds impressive, but in the world of internet viruses this is long enough for a new threat to emerge. Some of the better anti-virus software, by comparison, updates its virus definitions hourly or every few minutes. As the other top programs in the business are offering, McAfee provides a safety rating of sites in your search results, so that you can avoid anything that could be a potential danger. This is done simply, using easy-to-understand color-coding, and is a great way to engage children in ideas about internet safety and show them how to avoid dangers. This is probably the feature that McAfee does best - simple, but effective. The user interface of McAfee, however, leaves much to be desired. It appears dreary and unattractive, contrasting heavily with most of the software's competitors, some of which almost go too far in the other direction. Not only this, but it is also less clear than many of its kind, and may be slightly confusing to computer novices. It is by no means the worst user interface we have seen, but it certainly is not the best, and may require some practice navigation before you feel confident to use all of the software's features. The support package is again good, but cannot compete with the top-rated products in this category. Email and chat support are useful features, but can now be found with nearly all good anti-virus software, and McAfee makes few efforts to go the extra mile. The exception is the Virtual Technician, which, once you have downloaded it, will try to solve problems by itself. But although this may pick up some of the more simple problems, it is no substitute for a helpful human technician! And although there is a useful online area, this is not as extensive as those that can be found with some of the more comprehensive support packages. WithMcAfee AntiVirus Plus, if you want the best support you have to pay for it. This is fine for a business, but is certainly a lot to expect of a family. If you are after the anti-virus software that comes with the best free support, this is definitely not for you. Overall,McAfee AntiVirus Plus is a strong product, but does not truly excel in any area. What you should ask yourself is this: is there anything that McAfee can do better than any other software? The answer is probably 'no'. For one user, however,

it works out at quite good value for money, and if you are offered a special deal, it certainly may be something to consider. But if you want the top protection that money can buy or are after software that offers a specific feature, we suggest you look at one of our other top-rated products

Vous aimerez peut-être aussi