History of antivirus software

Keywords: antivirus software introduction, antivirus technology history

Antivirus Software

History of Antivirus Software

There are contending cases for the innovator of the first antivirus product. Possibly the first publicly noted removal of a computer virus in the wild was performed by Brent Fix in 1987. An antivirus program to counter the Polish MKS disease premiered in 1987. Dr. Solomon's Anti-Virus Toolkit, AIDSTEST and AntiVir were released by in 1988. Dr. Ahn Chul Soo (Charles Ahn, founder of AhnLab Inc) in South Korea also released the Anti-Virus software called 'V1' in June 10, 1988. By late 1990, nineteen split antivirus products were available including Norton AntiVirus and McAfee VirusScan. Early on contributors to work on computer infections and countermeasures included Fred Cohen, Peter Tippett, and John McAfee.

Before Internet connectivity was widespread, infections were typically disperse by afflicted floppy disks. Antivirus software came into use, but was kept up to date relatively infrequently. During this time, trojan checkers essentially possessed to check on executable data files and the shoe sectors of floppy and devices. However, as internet utilization became common, at first by using modems, viruses pass on throughout the Internet.

Powerful macros found in word cpu applications, such as Microsoft Term, presented an additional risk. Virus freelance writers started out using the macros to write viruses embedded within documents. This meant that pcs could now also be vulnerable from infection by documents with invisible attached macros as programs.

Later email programs, specifically Microsoft Outlook Exhibit and Prospect, were susceptible to viruses inserted in the e-mail body itself. Now, a user's computer could be contaminated by just beginning or previewing a message. This designed that disease checkers had to check a lot more types of data files. As always-on broadband cable connections became the norm and increasingly more viruses were released, it became essential to update disease checkers more and more frequently. Even then, a fresh zero-day pathogen could become widespread before antivirus companies released an revise to protect against it.

What can be an Antivirus program?

An antivirus program is used as a security measure and coverage tool against computer infections. The job of the antivirus program is to check out, detect preventing viruses. Not all antivirus programs can perform these basic jobs, but this will be reviewed later on in this article.

Antivirus programs are an essential tool you'll want installed on your computer or network. Antivirus programs offer real-time, on-access and on-demand safeguard for your personal computer. The way the programs works is dependant on the version of the antivirus program you have. Antivirus programs can be considered a standalone or can be contained in a protection collection and are allocated in 32 and 64-bit versions on multiple operating systems such as Home windows, Linux and Macintosh, allowing all different types of computers to be shielded from harmful software.

Why is Antivirus Software Necessary?

Security is a significant concern when it comes to the safeness of your individual information. If someone were to access your information and utilize it, the consequence would be drastic. Information security is concerned with three main areas;

  • Confidentiality - people's information should only be available to anyone who has the right to notice.
  • Availability - information should only be accessible when someone needs it.
  • Integrity - information should only be changed by people who are authorized to change it.

These concepts apply to home Internet users as much as they would to any commercial or federal government network. You probably wouldn't let a stranger look over your important documents. Just as, you might keep the responsibilities you perform on your pc confidential, be it tracking your assets or sending electronic mails to family and friends. Also, you ought to have some guarantee that the information you enter your computer remains intact and is available when you need it.

Some security risks come up from the opportunity of intentional misuse of your computer by intruders via the Internet. Others are risks that you'll face in case you weren't connected to the web (e. g. hard disk drive failures, theft, electricity outages). The bad reports is that you almost certainly cannot plan for every possible risk. The glad tidings are that you may take some simple steps to reduce the chance that you'll be affected by the most common threats -- plus some of those steps assist with both intentional and accidental risks you might face.

Virus? Exactly what is a Virus?

Before we continue and let you know how an antivirus program scans, detects and prevents infections and malware, let us discuss what exactly a trojan is. Like its genetic equivalent, a computer virus is an application that spreads unwanted and unexpected activities through the insides of your personal computer. Not all infections are destructive, but many are written to ruin particular types of data, applications or even operating systems. Some examples of trojans are; Trojan horses viruses, worms, spyware and adware, adware, rootkits, and many other types of malware.

Viruses have been with us since the early 1970's. Even though they never had an internet connection back in the 70's trojans still infected personal computers by floppy disks. Yes, FLOPPY DISKS, the old 5 1\4" disks. The first saved virus is at 1971 and it was called the Creeper Pathogen, which was written by Bob Thomas. What the Creeper virus did was it afflicted a distant computer by the ARPNET and copied itself showing the concept "I'M THE CREEPER: CATCH ME IF YOU CAN!". Ironically the "Reaper" was made to erase the Creeper. The Reaper program was not like the anti-virus programs we know today, but in reality was a trojan itself in that it was self replicating and distributed by way of a network.

How an Antivirus Program Works

The first & most important task of the antivirus program is to protect, prevent, or prevent any destructive activity in your personal computer or home and office network in real-time. The real-time coverage should bring about an alert or provide programmed action whenever a suspected or positively identified malware activity is diagnosed. Most antivirus programs will only screen some critical areas in your personal computer.

When an antivirus program is installed, it will start monitoring the activity of the machine by searching data files that are being accessed, transferred, or stored to or from the hard disks and exterior/removable drives. Data files that are being downloaded from the Internet are scanned. In case a suspicious activity is diagnosed, the antivirus program will automatically remove the file or stop the operations that are posing risk to your system, your associates, or other computer systems or devices in on your network, if you don't trust the document that you are receiving.

Antivirus programs offer various kinds detection methods to identify malware, but the most typical detection methods is heuristic examination and by using traditional pathogen diagnosis (signature-based).

1. Characteristics of an application - This is called heuristics scanning. Heuristic scanning motors focus on the basic principle that viruses will most likely use certain "tricks" or methods of infecting, and for that reason if a program looks like it might be using those stunts, there is a possibility that the program is a disease. Reasonable simple? No, not necessarily, it's actually amazingly hard to write a foolproof 100% effective heuristics engine unit. (Engine, simply put, is just a word we use to describe the little bit that drives the computer virus detector and compares files to the database of known infection agents) A lot more aggressive heuristic scanner may well find large numbers of so called "False Positives" i. e. data files that are actually totally innocent but appear to be they might change other data files, the less hostile ones might miss data that really are viruses. A method of heuristic examination is for the anti-virus program to decompile the suspicious program, and then evaluate the source code included within. In reality heuristics work quite well for a few types of viruses, such as Macro Infections, but not so well for other types. However, they are really a reasonable try out at providing protection against currently unknown viruses. The advantage to the method is the actual fact that there surely is no time period when the computer is not guarded after specific infections are released. The drawbacks include the fact that false positives may occur and some infections might not exactly be identified during the length of a check. The first heuristic machines were released to identify DOS viruses in 1989. However, nowadays there are heuristic engines for practically all classes of viruses.

2. Footprint or Signature-based diagnosis of virus program - A pathogen signature is a particular routine of 'bits' or information within a pathogen that looks in no other document or program in the world, aside from that virus. This technique is the most frequent method used to identify viruses and incorrect positives are very uncommon. It compares the virus footprint against a library of known footprints which match viruses. A footprint is a routine in the data contained in a file. Like this, trojans must be determined as trojans, and then added to the library of footprints. The advantage to this method lies in the fact that false positives are incredibly rare. The disadvantage to the method is the fact that there is a time period between when the virus is released to when the catalogue of known footprints is modified. During this time period, the trojan will not be recognized and could infect your computer.

How do antivirus programs rate possible risk?

Antivirus programs use a threat level index to determine what type of action to take. If this program is adware only, most antivirus programs will display a dialog pack to inform the user why a program or related data file associated with an adware program was discovered. If the discovered object is posing security and personal privacy risks, the hazard level is medium, high, or severe. The threat level ratings by antivirus programs aren't yet. Some antivirus programs might not discover or even scan for tracking cookies. A few of these are installed when respectable software downloaded from third-party websites is bundled with another installer from an organization that is known to have a spyware and adware or adware business.

Quarantine and Phony Positives in Antivirus Programs

Antivirus programs work also by quarantining suspect and malware files. This process is to prevent the offending stuff from doing any damage in the machine and to permit the end-user to restore back again a quarantined subject to its original location if it's found to be a false positive.

A incorrect positive detection is when a malware signature recognized an uninfected record or process. In some instances, a incorrect positive can cause a system never to to boot or run properly. If another program is influenced by the phony detection, the system will run normally, however, not the program that the Antivirus have falsely recognized and removed.

Types of Antivirus Programs WHICH ARE Available

On the next page there is a list, in alphabetical order, of some the firms who provide Antivirus programs and the websites on which they are supported.

Company

Windows

Apple

Linux

Mobile

Free?

AntiVir

Yes

No

Yes

No

Yes

AVG

Yes

No

No

No

Yes

Avira

Yes

No

Yes

Yes

Yes

BitDefender

Yes

No

Yes

Yes

No

ClamWin

Yes

No

No

No

Yes

ESET NOD32

Yes

No

Yes

Yes

No

F-Prot

Yes

No

Yes

No

No

Kaspersky

Yes

Yes

Yes

Yes

No

McAfee

Yes

Yes

Yes

Yes

No

MSE

Yes

No

No

No

Yes

Network Associates

Yes

Yes

Yes

Yes

No

Panda Software

Yes

No

Yes

No

No

RAV

Yes

Yes

Yes

No

No

Sophos

Yes

Yes

Yes

No

No

Symantec (Norton)

Yes

Yes

Yes

Yes

No

Trend Micro

Yes

No

No

Yes

No

Vipre

Yes

No

No

No

No

Webroot

Yes

No

No

No

No

Antivirus Software

Now which you have a basic knowledge of how an antivirus program works and why you need one, here are some types of three of the primary antivirus programs available today. The primary three that this report will discuss is Norton, Bitdefender, and Kaspersky. There will vary types of antivirus programs available for each manufacturer and the next information will discuss these types of programs.

Norton by Symantec

Norton offers 3 antivirus programs;

Here is a complete list of what Norton by Symantec offers because of their product line. (Symantec)

Core Protection

  • Blocks viruses, spyware and adware, Trojan horses, worms, bots, and rootkits
  • Defends against hackers with quiet two-way firewall
  • Pulse revisions every 5 - 15 minutes for up-to-the minute protection

Advanced Protection

  • Norton Bootable Restoration Tool repairs, restores and boots greatly afflicted, unbootable PCs
  • Leverages cloud-based online brains for real-time detection of threats
  • Download Insight proactively warns of potential dangers in recently downloaded data and applications before you mount or run them
  • Guards against Web episodes that exploit software vulnerabilities
  • Stops dangers unrecognized by traditional antivirus techniques
  • Filters unwanted email with professional-strength antispam
  • Helps keep your children safe online with parental settings (Microsoft Glass windows only)

Networking

  • Helps secure and screen your home network
  • Automatically secures your personal computer when attaching to public cordless networks

Identity Protection

  • Block hackers from being able to access your computer
  • Blocks phishing websites and authenticates respected sites
  • Secures, stores, and manages login and personal information
  • Prevents hackers from eavesdropping and stealing information as you type
  • Identifies unsafe Sites in your search results

Backup and Restore

  • Automatically saves important data files locally or even to anchored online storage
  • Restores lost data files and folders

PC Tuning

  • Optimizes the hard drive to release disk space
  • Optimizes Personal computer performance with disk cleanup
  • Provides clear perception into recent Computer activities to help prevent slowdowns
  • Optimizes software performance with one-click

Support

  • Free email, talk, or cellphone support
  • Automatically detects and fixes common Laptop or computer problems

The pursuing is a table of what exactly the three antivirus programs from Norton offer.

 

Norton Internet Security

Norton 360

Norton Antivirus

Blocks viruses, spy ware, Trojan horses, worms, bots, and rootkits

Yes

Yes

Yes

Defends against hackers with a quiet two-way firewall

Yes

Yes

No

Pulse improvements every 5-15 minutes for up-to-the minute protection

Yes

Yes

Yes

Intelligence-driven technology for faster, fewer, shorter scans

Yes

Yes

Yes

Norton Bootable Restoration Tool auto repairs, restores and boots seriously afflicted, unbootable PCs

Yes

Yes

Yes

Leverages cloud-based online cleverness for real-time detection of threats

Yes

Yes

Yes

Download Information proactively warns of potential dangers in newly downloaded documents and applications before you install or run them

Yes

Yes

Yes

Guards against Web disorders that exploit software vulnerabilities

Yes

Yes

Yes

Stops hazards unrecognized by traditional antivirus techniques

Yes

Yes

Yes

Filters unwanted email with professional-strength antispam

Yes

No

No

Helps keep your kids safe online with parental settings (Microsoft House windows only)

Yes

Yes

No

Helps secure and monitor your home network

Yes

Yes

No

Automatically secures your PC when linking to public cellular networks

Yes

Yes

No

Block hackers from accessing your computer

Yes

Yes

No

Blocks phishing websites and authenticates trusted sites

Yes

Yes

No

Secures, stores, and manages login and personal information

Yes

Yes

No

Prevents hackers from eavesdropping and stealing information as you type

Yes

Yes

No

Identifies unsafe Web sites in your search results

Yes

Yes

No

Automatically will save important documents locally or to anchored online storage

No

Yes

No

Restores lost data and folders

No

Yes

No

Optimizes the hard drive to release disk space

No

Yes

No

Optimizes Personal computer performance with disk cleanup

No

Yes

No

Provides clear understanding into recent Laptop or computer activities to assist in preventing slowdowns

Yes

Yes

Yes

Optimizes request performance with one-click

Yes

Yes

Yes

Free email, chat, or cellphone support

Yes

Yes

Yes

Automatically detects and fixes common PC problems

Yes

Yes

Yes

Bitdefender

Bitdefender's products for antivirus software is;

Bitdefender Antivirus

Bitdefender Internet Security

Bitdefender Total Security

Here is a set of what Bitdefender offers for there products. (Bitdefender)

Protection

  • Antivirus
  • Protects against trojans and other malware with industry-leading technology
  • Multi-layered proactive protection against new and anonymous threats
  • Antispyware
  • Blocks hidden programs that keep track of your online activities
  • Antiphishing
  • Blocks web pages that try to grab your credit credit card data
  • Antispam
  • Stops unwanted e-mails from attaining your Inbox
  • Firewall
  • Automatically secures your web interconnection wherever you are
  • Helps prevent outsiders form accessing your Wi-Fi network

Performance

  • Special Operating Modes
  • Game Setting reduces system weight & postpones scans
  • Laptop Mode prolongs power supply life
  • Tune-up
  • Removes unnecessary documents & registry entries, for optimized performance

Privacy

  • IM Encryption
  • Keeps your discussions private on Yahoo! And MSN Messenger
  • File Vault
  • Locks up confidential files within an encrypted vault
  • File Shredder
  • Ensures that no traces of removed sensitive files remain on your PC

Control

  • Parental Control
  • Blocks access to incorrect websites and e-mail
  • Limits kids' access to the Internet, video games, etc. . . to specific times
  • Home Network
  • Manages the security of your entire network from an individual location
  • Data Backup
  • Automatically backs up data files and folders

The pursuing is a stand of just what the three antivirus programs from Bitdefender offer.

 

Bitdefender Antivirus

Bitdefender Internet Security

Bitdefender Total Security

Antivirus

Yes

Yes

Yes

Antispyware

Yes

Yes

Yes

Antiphishing

Yes

Yes

Yes

Antispam

No

Yes

Yes

Firewall

No

Yes

Yes

Special Operating Modes

Yes

Yes

Yes

Tune-up

No

Yes

Yes

IM Encryption

No

Yes

Yes

File Vault

No

Yes

Yes

File Shredder

No

No

Yes

Parental Controls

No

Yes

Yes

Home Network

Yes

Yes

Yes

Data Backup

No

No

Yes

Kaspersky

Kaspersky's products for antivirus software is;

Kaspersky Antivirus

Kaspersky Internet Security

Here is a set of what Kaspersky offers for there product line. (Kaspersky)

Protection from. . .

  • Viruses and spyware
  • Infected websites
  • Hacker attacks
  • Spam and phishing
  • Identity theft

Features Comparison

  • Virus and vulnerability scanner
  • Proactive safety against programs predicated on their behaviour
  • Restriction of access to private data by suspicious programs
  • Application control
  • Safe run setting (sandbox) to check questionable programs

Network Protection

  • Two-way personal firewall
  • Secure wireless relationships in public areas

Email Protection

  • Real-time scanning of email
  • Anti-spam, Anti-phishing

Web Protection

  • Virtual computer keyboard to safely enter in sensitive data
  • Removal of Internet activity (record, cookies, etc)
  • Parental Control
 

Kaspersky Antivirus

Kaspersky Internet Security

Viruses and spyware

Yes

Yes

Infected Websites

Yes

Yes

Hacker attacks

No

Yes

Spam and phishing

No

Yes

Identity theft

No

Yes

Virus and vulnerability scanner

Yes

Yes

Proactive safety against programs predicated on their behavior

Yes

Yes

Restriction of usage of private data by dubious programs

No

Yes

Application control

No

Yes

Safe run method (sandbox) to check questionable programs

No

Yes

Two-way personal firewall

No

Yes

Secure wireless links in public areas areas

No

Yes

Real-time scanning of email

Yes

Yes

Anti-spam, Anti-phishing

No

Yes

Virtual keyboard to safely enter sensitive data

Yes

Yes

Removal of Internet activity (record, cookies, etc)

Yes

Yes

Parental Control

Yes

Yes

As you can view from the previous lists, there is a difference in what the manufacturers of these programs offer. They all offer disease and spyware on their basic applications. If you want more features/security you are going to have to spend the excess money to acquire those features/protection.

All of these versions of Antivirus software offer real-time safeguard and do regular scans. Kind of a at the rear of the scenes scan. Which is a good feature to own, knowing that most users just want to buy there to do its thing, similar to knowing it is safeguarding you but don't want to deal with it.

Norton and Kaspersky offer safeguard for one season. At the end of that season you have to invest more money before you obtain more revisions from them. The good thing about Bitdefender is that whenever you purchase a registration from them you obtain it for 2 years. So for the price tag on one year from Norton or Kaspersky, you get 24 months from Bitdefender. That's a good deal right? 2 for the price of 1? If you factor in how the program actually works you may begin to think that it's not that good of a deal. Bitdefender is a good Antivirus program, but it's not really the type of program you want to utilize if your not so computer savvy.

Bitdefender has a great deal of features that could shut down your personal computer from having any network traffic whatsoever. Also there is a known concern with Bitdefender and Microsoft's Service Load up 2 for Vista. In the event that you try and install SP2 while Bitdefender is installed on your machine, your computer will loop from installing and upgrade and restarting over and over again. Also the install, of Bitdefender, takes about 30 to 40 minutes from begin to completion. Who would like to sit around and watch a program install for that amount of time.

As explained before Norton offers cover for only 1 year. Norton accocunts for for only having twelve months of safeguard by the how user-friendly it is. The new editions of Norton (2010 editions) install in under a minute. Hard to believe? It's true, it does install within 1 minute.

The features on these new variations are extremely user friendly. Even if you are an initial time computer user, you'll be able to utilize these programs. Prior version of Norton were, as some would call, "A recourse hog", and therefore while Norton was working it made your personal computer run very sluggish. That's not the situation any more. These new version uses less than 8mb of storage. Seriously that is true, you don't even understand that Norton is owning a scan in the background.

Why Viruses WILL OFTEN Elude Antivirus Programs

A stealth pathogen is the one that conceals the changes it creates. This is done by firmly taking control of system functions that interpret documents or system sectors. When other applications request data from portions of the machine improved by the virus, the infection studies back the appropriate, unchanged data, instead of the harmful code. For this to occur, the pathogen must be actively within the memory space.

It is important to learn that many viruses not only conceal, but encrypt the initial data they have infected. Some patients might use traditional DOS commands such as FDISK/MBR or SYS to fix the problem, an instance that will make things much worse. If the computer virus is overwritten with FDISK/MBR, the hard drive will haven't any way to recognize what's in the partition stand and cannot gain access to the encrypted data without aid of the pathogen. For this reason, anti-virus software is preferred to eliminate a stealth pathogen rather than home maintenance.

Virus coders mainly use the stealth method of elude disease scanners. Those which have not been designed to do so, because the malicious code is rather new or the user's anti-virus software isn't up to date, are often described as stealth viruses as well. The stealth approach is a adding factor to why most anti-virus programs function best when the machine is booted from a clean Disc or floppy disk. Using this method, the infection is not able to assume control of the machine and the changes it creates can be open and immediately dealt with.

In basic, a stealth disease will conceal itself in system storage every time an application scanner is run. It utilizes various ways to hide any changes so that when the scanner searches for altered sections, the disease redirects it to any area which has the clean, uninfected data. A far more advanced anti-virus program can detect a stealth computer virus by looking for proof changes within system areas along with areas that are usually more susceptible to harm, it doesn't matter how it is booted.

Some cannot even be detected by condition of-the-art anti-virus software. These "stealth" infections often assault the antivirus software itself. Others, called "mutation engine" infections, elude the immune system systems and create mutated varieties of themselves, multiplying hundreds, even a large number of times. Each new mutated form differs. Even whether it's detected, only that particular form can be eradicated. All others must be individually located and killed.

Even those you'd least be prepared to be vulnerable-computer software companies themselves--are not immune. Lotus Development Corp. , for just one, was red-faced at a recent conference, when a virus contaminated and crashed the computer network it was using. In this specific case, the disease functioned like a series of letter bombs. Each time a user opened his / her email the server crashed.

In some extreme cases, the sole solution is to "burn" (in other words, reformat) the afflicted disks and start over. Reformatting the disks wipes out the pathogen (unless, of course, it connects itself to the format program).

The problems don't automatically stop there. For example, what if the computer virus was backed up accidently on a backup disk? However, you then recover both the disease and the nice programs and data. On its appointed particular date after that it comes alive and creates the same problems as before. Since this circumstance doesn't even cross most bankers' thoughts unless they are "burned" in the past, it is all too common.

Norton Antivirus

Norton Internet Security -

Norton 360

8 | Page

  • More than 7,000 students prefer us to work on their projects
  • 90% of customers trust us with more than 5 assignments
Special
price
£5
/page
submit a project

Latest posts

Read more informative topics on our blog
Shiseido Company Limited Is A Japanese Makeup Company Marketing Essay
Marketing Strength: Among the main talents of Shiseido is its high quality products. To be able to satisfy customers, the company invested a great deal...
Fail To Plan You Plan To Fail Management Essay
Management This report will concentrate on two aspects of project management, their importance within the overall project management process. The report...
Waste To Prosperity Program Environmental Sciences Essay
Environmental Sciences Urban and rural regions of India produce very much garbage daily and hurting by various kinds of pollutions which are increasing...
Water POLLUTING OF THE ENVIRONMENT | Analysis
Environmental Studies Pollution Introduction Many people across the world can remember having walked on the street and seen smoke cigars in the air or...
Soft System Methodology
Information Technology Andrzej Werner Soft System Methodology can be described as a 7-step process aimed to help provide a solution to true to life...
Strategic and Coherent methods to Recruiting management
Business Traditionally HRM has been regarded as the tactical and coherent method of the management of the organizations most appreciated assets - the...
Enterprise Rent AN AUTOMOBILE Case Analysis Business Essay
Commerce With a massive network of over 6,000 local rental locations and 850,000 automobiles, Organization Rent-A-Car is the greatest rental car company...
The Work OF ANY Hotels Front Office Staff Travel and leisure Essay
Tourism When in a hotel there are careers for everyone levels where in fact the front office manager job and responsibilities,assistant professionals...
Strategy and international procedures on the Hershey Company
Marketing The Hershey Company was incorporated on October 24, 1927 as an heir to an industry founded in 1894 by Milton S. Hershey fiscal interest. The...
Check the price
for your project
we accept
Money back
guarantee
100% quality