SlideShare a Scribd company logo
1 of 11
avast! antivirus protection
By Ruephan & Fahmi
avast! About Us
Avast! (styled avast!) is a freemium antivirus computer program
available to Microsoft Windows, Mac OS X and Linux users, with a
user interface available in 41 languages. The name Avast is an
acronym of "Anti-Virus – Advanced Set". The official, and current
logo of Avast! is a white orb with the letter 'a' on it and an orange
circle around it, sticking out to four directions.
2
3
avast! Signature Based Detection
 Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be
very effective, but cannot defend against malware unless samples have already been obtained
and signatures created. Because of this, signature-based approaches are not effective against
new, unknown viruses.
 As new viruses are being created each day, the signature-based detection approach requires
frequent updates of the virus signature dictionary. To assist the antivirus software companies,
the software may allow the user to upload new viruses or variants to the company, allowing
the virus to be analyzed and the signature added to the dictionary.
 Although the signature-based approach can effectively contain virus outbreaks, virus authors
have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and,
more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify
themselves as a method of disguise, so as to not match virus signatures in the dictionary.
4
avast! Malicious Activity Detection
 Malicious activity detection like Heuristic-based detection , can be
used to identify unknown viruses.
 avast! free isn't the best at malware and not every program
Antivirus catches everything, remember it is a free program, all that
is are windows(MS-DOS) programs.
5
Avast Heuristic detection
 Some more sophisticated antivirus software uses heuristic analysis to identify new malware or
variants of known malware.
 Many viruses start as a single infection and through either mutation or refinements by other
attackers, can grow into dozens of slightly different strains, called variants. Generic detection
refers to the detection and removal of multiple threats using a single virus definition.
 For example, the Vundo trojan has several family members, depending on the antivirus
vendor's classification. Symantec classifies members of the Vundo family into two distinct
categories, Trojan.Vundo and Trojan.Vundo.B.
 While it may be advantageous to identify a specific virus, it can be quicker to detect a virus
family through a generic signature or through an inexact match to an existing signature. Virus
researchers find common areas that all viruses in a family share uniquely and can thus create a
single generic signature. These signatures often contain non-contiguous code, using wildcard
characters where differences lie. These wildcards allow the scanner to detect viruses even if
they are padded with extra, meaningless code. A detection that uses this method is said to be
"heuristic detection."
6
avast! File emulation
» File emulation is another heuristic approach. File emulation involves
executing a program in a virtual environment and logging what actions
the program performs. Depending on the actions logged, the antivirus
software can determine if the program is malicious or not and then carry
out the appropriate disinfection actions.
7
avast! Performance
Evaluate the performance impact and system resource usage of using anti-virus software in three
ways:
Overall system performance measured before and after installation using PCMark
Memory footprint
 Avast took up about 12 MB of system memory
Time it took to perform a full system scan
Avast took 34 minutes to scan our computer's hard drive with 122GB of data
avast! "false positive"
 A "false positive" is when antivirus software identifies a non-
malicious file as a virus. When this happens, it can cause serious
problems. For example, if an antivirus program is configured to
immediately delete or quarantine infected files, a false positive in
an essential file can render the operating system or some
applications unusable.
 All virus scanners produce false positive results as well,
identifying benign files as malware.
8
9
avast! Renewal Cost
Renewal Cost
FREE OF COST
PROS:
FREE of charge
Simple interface
Highly pro-active, extensive protection
10
Public Malware Database Website
Example Malware Database Website report:
http://www.malwaredomainlist.com/mdl.php
http://urlquery.net/index.php
11
avast!
Thanks You..

More Related Content

What's hot

Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
Loïc Naga
 
Synology product training - DSM introduction
Synology product training - DSM introductionSynology product training - DSM introduction
Synology product training - DSM introduction
Wayne An
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 

What's hot (20)

Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
 
What is Ubuntu - presentation
What is Ubuntu - presentationWhat is Ubuntu - presentation
What is Ubuntu - presentation
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
comparing windows and linux ppt
comparing windows and linux pptcomparing windows and linux ppt
comparing windows and linux ppt
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019
 
presentation on windows os
presentation on windows ospresentation on windows os
presentation on windows os
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Synology product training - DSM introduction
Synology product training - DSM introductionSynology product training - DSM introduction
Synology product training - DSM introduction
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating System
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 

Viewers also liked

3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software
Julia Szymańska
 
avar2015_ddos_trojans_slides
avar2015_ddos_trojans_slidesavar2015_ddos_trojans_slides
avar2015_ddos_trojans_slides
Jaromir Horejsi
 

Viewers also liked (11)

3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software
 
Avast-NOAH12 London
Avast-NOAH12 LondonAvast-NOAH12 London
Avast-NOAH12 London
 
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiíchNMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
NMI14 Filip Chytrý - Reálné hrozby mobilních technologiích
 
PCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktycePCC-3 - pożyczka w praktyce
PCC-3 - pożyczka w praktyce
 
Internet věcí
Internet věcíInternet věcí
Internet věcí
 
Avast - NOAH12 London
Avast - NOAH12 LondonAvast - NOAH12 London
Avast - NOAH12 London
 
Communities and user experience.
Communities and user experience.Communities and user experience.
Communities and user experience.
 
Spiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentationSpiraling Upward! Avast 2017 presentation
Spiraling Upward! Avast 2017 presentation
 
avar2015_ddos_trojans_slides
avar2015_ddos_trojans_slidesavar2015_ddos_trojans_slides
avar2015_ddos_trojans_slides
 
The Business Side | Translating and the Computer
The Business Side | Translating and the ComputerThe Business Side | Translating and the Computer
The Business Side | Translating and the Computer
 
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJSOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
 

Similar to Avast! antivirus protection

How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
Satyam Sangal
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
infantsuk
 
20111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture0220111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture02
Computer Science Club
 

Similar to Avast! antivirus protection (20)

Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
20111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture0220111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture02
 
Antivirus
AntivirusAntivirus
Antivirus
 
antivirus.pptx
antivirus.pptxantivirus.pptx
antivirus.pptx
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Virus
VirusVirus
Virus
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Anti virus slide show presentation
Anti virus slide show presentationAnti virus slide show presentation
Anti virus slide show presentation
 

More from Pusat Latihan Teknologi Tinggi (Adtec) Taiping (8)

Hello world
Hello worldHello world
Hello world
 
Hello world
Hello worldHello world
Hello world
 
Panduan WIM & Penilaian Beterusan
Panduan WIM & Penilaian BeterusanPanduan WIM & Penilaian Beterusan
Panduan WIM & Penilaian Beterusan
 
Variability?
Variability?Variability?
Variability?
 
Sukatan Kecenderungan Memusat
Sukatan Kecenderungan MemusatSukatan Kecenderungan Memusat
Sukatan Kecenderungan Memusat
 
Taburan Lengkung Normal
Taburan Lengkung NormalTaburan Lengkung Normal
Taburan Lengkung Normal
 
Panduan soalan 2013
Panduan soalan 2013Panduan soalan 2013
Panduan soalan 2013
 
Filing System
Filing SystemFiling System
Filing System
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Avast! antivirus protection

  • 2. avast! About Us Avast! (styled avast!) is a freemium antivirus computer program available to Microsoft Windows, Mac OS X and Linux users, with a user interface available in 41 languages. The name Avast is an acronym of "Anti-Virus – Advanced Set". The official, and current logo of Avast! is a white orb with the letter 'a' on it and an orange circle around it, sticking out to four directions. 2
  • 3. 3 avast! Signature Based Detection  Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be very effective, but cannot defend against malware unless samples have already been obtained and signatures created. Because of this, signature-based approaches are not effective against new, unknown viruses.  As new viruses are being created each day, the signature-based detection approach requires frequent updates of the virus signature dictionary. To assist the antivirus software companies, the software may allow the user to upload new viruses or variants to the company, allowing the virus to be analyzed and the signature added to the dictionary.  Although the signature-based approach can effectively contain virus outbreaks, virus authors have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and, more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
  • 4. 4 avast! Malicious Activity Detection  Malicious activity detection like Heuristic-based detection , can be used to identify unknown viruses.  avast! free isn't the best at malware and not every program Antivirus catches everything, remember it is a free program, all that is are windows(MS-DOS) programs.
  • 5. 5 Avast Heuristic detection  Some more sophisticated antivirus software uses heuristic analysis to identify new malware or variants of known malware.  Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Generic detection refers to the detection and removal of multiple threats using a single virus definition.  For example, the Vundo trojan has several family members, depending on the antivirus vendor's classification. Symantec classifies members of the Vundo family into two distinct categories, Trojan.Vundo and Trojan.Vundo.B.  While it may be advantageous to identify a specific virus, it can be quicker to detect a virus family through a generic signature or through an inexact match to an existing signature. Virus researchers find common areas that all viruses in a family share uniquely and can thus create a single generic signature. These signatures often contain non-contiguous code, using wildcard characters where differences lie. These wildcards allow the scanner to detect viruses even if they are padded with extra, meaningless code. A detection that uses this method is said to be "heuristic detection."
  • 6. 6 avast! File emulation » File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions.
  • 7. 7 avast! Performance Evaluate the performance impact and system resource usage of using anti-virus software in three ways: Overall system performance measured before and after installation using PCMark Memory footprint  Avast took up about 12 MB of system memory Time it took to perform a full system scan Avast took 34 minutes to scan our computer's hard drive with 122GB of data
  • 8. avast! "false positive"  A "false positive" is when antivirus software identifies a non- malicious file as a virus. When this happens, it can cause serious problems. For example, if an antivirus program is configured to immediately delete or quarantine infected files, a false positive in an essential file can render the operating system or some applications unusable.  All virus scanners produce false positive results as well, identifying benign files as malware. 8
  • 9. 9 avast! Renewal Cost Renewal Cost FREE OF COST PROS: FREE of charge Simple interface Highly pro-active, extensive protection
  • 10. 10 Public Malware Database Website Example Malware Database Website report: http://www.malwaredomainlist.com/mdl.php http://urlquery.net/index.php