1. Antivirus software cannot kill all types of viruses.
2. Antivirus software may find a virus, but may not be able to kill it.
3. Each computer or operating system cannot install two or more antivirus software, unless they are compatible versions.
4. Antivirus software can act on infected files in a variety of ways:
a. clear
b. delete
c. prohibit access
c. isolate
d. do not handle
Once you clear a file that is infected with worms, the file will go back to normal, just as a sick person who is given treatment will recover. If it is a virus file, as opposed to a file infected by viruses, it cannot be cleared and you must delete it.
Users who choose not to clear or delete a virus file, can prohibit access to the file by creating an error dialog box with the message "the file is not a valid Win32 file".
With isolation, the virus is transferred to the quarantine area. Quarantined files cannot run any activity, but users can retrieve files from quarantine.
Do not handle means the user is not sure if it is a virus file, and chooses not to deal with it.
Good information.
ReplyDeleteWow! amazing post. Your article means a lot to me it provides interesting and brilliant insights! Hair loss treatment
ReplyDeleteWhen you have noticed the memory and CPU utilization without the trial programming introduced on your framework you would now be able to simply ahead and introduce the trial antivirus bundle. top antivirus
ReplyDeleteOn the off chance that you have a favored antivirus bundle yet it is affecting excessively on your PCs execution.click through the following website
ReplyDeleteFor the most part Microsoft has been able to fix most of the bugs that Vista has had since its release.4 tech tips for work productivity
ReplyDeleteAntivirus applications that check for potential PC infection action can be more valuable at recognizing the most recent dangers than those dependent on mark identification.how to make PC run faster
ReplyDeleteThis article will provide you with the steps avg website scanner required to performance test any antivirus software suites that you may be interested in purchasing to run on your PC.
ReplyDeleteWow, What an Excellent post. I really found this too much information. It is what i was searching for.I would like to suggest you that please keep sharing such type of info. Remote Virus Removal Service UK
ReplyDeleteAwesome article, it was exceptionally helpful! I simply began in this and I'm becoming more acquainted with it better! Cheers, keep doing awesome! ip cameras
ReplyDeleteThis is my first time visit to your blog and I am very interested in the articles that you serve. Provide enough knowledge for me. Thank you for sharing useful and don't forget, keep sharing useful info: https://yebhideal.com/product-category/quick-heal/
ReplyDeleteI got some valuable points through this blog. Sophos Partner Brisbane
ReplyDeleteShare great information about your blog , Blog really helpful for us . Leicester Cyber Security Essentials
ReplyDeleteOutstanding as well as powerful suggestion by the writer of this blog site are truly valuable to me. IT Support Brisbane
ReplyDeleteThanks for sharing the best information and suggestions, I love your content, and they are very nice and very useful to us. If you are looking for the best Top Antivirus, then visit K7 Computing. I appreciate the work you have put into this.
ReplyDeleteI am grateful to this blog site providing special as well as useful understanding concerning this subject. Hosted Phone Systems
ReplyDeleteThe biggest threat in your M2M contraptions goes to be interfacing to open net sources. Anytime any instrument interfaces to the common open Web - like Wi-Fi or routine cellular - they may be revealed to each distinctive device this can be related to the net. M2M Sim Card
ReplyDelete