Thursday, May 12, 2011

Microsoft Office 2010 is a big change of the world

 regain AV - the highest prize Comparatives evaluation
This test there are 16 product participation, all products of the virus library are updated to February 4. Tests used 2008 February 5 to 12 daytime received all the new samples of the virus, which is older library to scan the emergence of new virus, with this to detect anti-virus software to Office 2010 –save your time and save your money.
the unknown virus detection rate. Only at least able to detect malicious software samples 97% of the antivirus software products, will only be awarded honor on +. Microsoft Office is so great!

The test also contains the misstatement test, in order to better evaluate testing quality. Misstatement refers to anti-virus product mistakenly put a normal file marked as infected files, it will cause the system files or other normal file was mistakenly removed. The rate of false positives more easily get the product with high higher virus detection rate, good anti-virus product is in the detection rate and the rate of false positives made a very good balance.
One excellent anti-virus software should possess the high active defense ability, in the full Office 2007 is so powerful.
recognition unknown viruses at the same time will rarely appear misstatement. ESET NOD32 unique heuristic technology includes genetic code detection (Generic), it can our for the virus for feature extraction, can let most of the variant virus not update the virus in the case was killing out.
Secondly, ESET NOD32 will in the system of a controllable operation of virtual environment for The invention of Microsoft Office 2010 is a big change of the world.
files in its operation, when the virus begins to disguise runtime will in this virtual environment will be killing.
Finally, ESET NOD32 against unknown viruses and a insurance is the code analysis technology, he can according to some unknown viruses to judge whether the behavior characteristics, such as threatening judge whether or not the program literacy sensitive documents, self delete, self-replicating, obtain operating system underlying permissions, etc.

No comments:

Post a Comment