Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 17 March 2013

How do I make sure my Antivirus Software is protecting me?

Posted on 17:06 by Unknown
You are a computer user concerned about malware, you have antivirus software, but you do not know if it is protecting you. What do you do?

One thing you could do is find a sample of malware and then scan the file and see if your antivirus program detects it. But if your program does not detect it you are infected with malware that may have already done its work to your computer.

Your second option is to buy the most expensive protection out there. because if it's expensive it has to be good.... right? Sorry, but no. Cost is not an indication by any means of how good an antivirus program is.

Your last option is to try to download a file on the internet called the EICAR Standard Anti-Virus Test File. This is a harmless file that has become the industry standard for testing antivirus software without actually infecting the computer with malware.

So, what's it going to be? The Test File? Excellent choice. But first, lets talk a little be about this test file.

This file was made by the European Institute For Computer Antivirus Research. This organization was founded in 1991, and it aims to further antivirus research and improve antivirus programs out there today. The file was developed in collaboration with the Computer AntiVirus Research Organization (CARO).

The file will not harm your computer in any way, shape, or form if your antivirus program does not pick it up after a scan.

Let me state for the record that this test file is NOT malware and will not harm any computer if downloaded. Please do not claim or report that I am distributing malware.

Go to This website and download eicar.com using the http protocol. Your antivirus should give off alarms if it is protecting you in real time. If your antivirus program is not designed to protect you in real time, you can run a custom scan for the location of the test file.

After detection, your antivirus program will either delete the file or quarantine it depending on your exact settings.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ▼  March (7)
      • Malware Spotlight Double Header: Bagle and Netsky.
      • What Does It Mean? Layered Defense
      • What's In A Name: Rootkits
      • How do I make sure my Antivirus Software is protec...
      • Spotlight On Malware: The Conficker Worm.
      • Where did this whole issue with Malware begin?
      • My Take on Third Party Tech Support.
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile