avast! is a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data.Based on the award-winning avast! antivirus engine, avast! antivirus 6.0 contains all of the features you would expect in a modern antivirus program. It incorporates anti-spyware technology certified by West Coast Labs' Checkmark process, as well as anti-rootkit and strong self-protection capabilities, but now provides even faster scanning with improved . detection ability. It contains several real-time "Shields" which continuously monitor your email and internet connections and check the files on your computer whenever they are opened or closed.
avast! antivirus 6.0 includes an AutoSandbox so that suspicious applications can be run automatically in a safe, secure environment without the risk of any damage being caused to your system. It also includes the optional avast! WebRep feature, which provides you with information about the content and security of websites that you visit based on ratings provided by the avast! user community.
The real-time shields are the most important part of the program, as they are working continuously to prevent your computer from becoming infected. They monitor all your computer's activity, checking all programs and files in real-time - i.e. at the moment a program is started or whenever a file is opened or closed.
Normally, the real-time shields start working automatically whenever your computer is started. The presence of the orange avast! icon in the bottom-right corner of your computer screen tells you that the real-time shields are working. Any of the shields can be turned off at any time, but this is not normally recommended as it may reduce the level of your protection. If any of the shields is turned off, you will see a warning message whenever you open the user interface telling you that your computer is not fully protected (if one or more shields are turned off) or "Unsecured" (if all the shields are turned off).
Realtime Shields
File system shield checks any programs at the moment they are started and other files at the moment they are opened or closed. If anything suspicious is detected, the file system shield will prevent the program from being started or the file from being opened to prevent any damage being caused to your computer and data.
Web shield protects your computer from viruses while using the internet (browsing, downloading files etc). It will detect and block known or potential threats coming from the web e.g. hacked web pages infected with (potential or actual) malicious scripts. If a virus is detected while downloading a file from the internet, the download will be stopped to prevent the infection from reaching your computer.
Script shield detects malicious scripts and prevents them from being run. The script shield will detect and block not only malicious scripts coming from the web (remote threats) but also scripts coming from other sources, such as web pages saved to disk or in the browser cache etc (local threats). Unlike the web shield, the script shield can also detect and block malicious scripts that come from HTTPS (encrypted) connections.
Behavior shield monitors all activity on your computer and detects and blocks any unusual activity that might indicate the presence of malware. It does this by continuously monitoring your computer's entry points using special sensors to identify anything suspicious.
P2P shield checks files downloaded using common peer-to-peer (file sharing) programs.
IM shield checks files downloaded by instant messaging or "chat" programs.
Mail shield checks incoming and outgoing email messages and will stop any messages containing a possible virus infection from being accepted or sent.
Network shield monitors all network activity and blocks any threats that are detected on the network. It also blocks access to known malicious websites based on the avast! database of infected URLs.
System Requirements
Windows® XP/Vista™/Windows® 7
300MHz processor or Above
RAM:
256 MB (Microsoft Windows® XP)
512 MB (Microsoft Windows® Vista™, Windows® 7)
150 MB Available Hard Disk Space
Internet Explorer 6 or Above
LICENCE KEY:
W6754380R9978A0910-4TZ59467
0 comments:
Post a Comment