Protecting personal computers with Windows OneCare Live. How to protect your computer from viruses

Annotation: The lecture discusses the purpose and principles of operation of programs necessary for the full and effective protection of home computers from harmful effects.

General information

The main difference between a home computer and a conventional production workstation is its versatility. If in organizations computer equipment is usually acquired for a specific purpose: for typing, drawing in professional graphics packages or for programming, then a home computer is often used not only for working outside working hours, but also for computer games, personal correspondence, search and browsing the Internet, to play movies and music. Wherein administration home computer in the vast majority of cases is produced solely by the owner's own resources.

Therefore, all programs intended for home use have a transparent interface, are easy to install and manage, and are necessarily accompanied by documentation that is understandable even for a non-specialist. Anti-virus security software must also meet all of the above requirements.

Among the necessary for the full and effective protection of home computers from the harmful effects of programs are:

  • Antivirus software , which is responsible for checking files and other objects of the file system for viruses and, if they are detected, takes user-defined actions with respect to them
  • Programs for protection against unauthorized access and network hacker attacks often included in the anti-virus complex or built into the operating system
  • Spam filters- this is an additional measure that allows in some cases to significantly reduce the load on anti-virus software, thereby increasing the reliability of protection

The listed programs can either be included in one home computer protection package or be installed separately. The main advantage of the first method is the presence of a single control interface and the complementarity of each of the modules thought out by the creators of the programs. Installing individual programs, especially from different manufacturers, can only be useful in some cases, for example, when specific functions are needed for one reason or another, but no single integrated product can provide them. In the case of a home user, this is extremely rare, and if you need to install all three modules, then it is advisable to do this using a comprehensive solution.

Antivirus software

The main and part-time mandatory element in anti-virus protection is, of course, an anti-virus program. Without it, one cannot speak of effective anti-virus security when it comes to a computer capable of exchanging information with other external sources. Even if the user complies with all the rules of computer hygiene, it does not guarantee the absence of malware, unless an antivirus is used.

Antivirus software- this is a rather complex software package, its creation requires the efforts of a team of highly qualified virus analysts, experts and programmers with many years of experience and very specific knowledge and skills. The main technology of anti-virus scanning - signature analysis implies continuous monitoring of virus incidents and regular release of anti-virus database updates. For these and other reasons, antivirus programs are not built into operating systems. Only the simplest filter, which does not provide a full-fledged anti-virus scan, can be built-in.

The main elements of any anti-virus protection of a workstation or network server are continuous real-time scanning, on-demand scanning and a mechanism for updating anti-virus databases. They are also required to protect your home computer.

Real time check

As a rule, on home computer there is a constant exchange of information with external sources: files are downloaded from the Internet, copied from CDs or over a home local network and subsequently opened and launched. Therefore, the main tool in the arsenal of anti-virus protection for a home computer is a real-time scan. Its task is to prevent infection of the system.

On a home computer, it is highly recommended to use the always-on scan whenever it is turned on - regardless of whether it is currently connected to the network, whether other people's mobile storage media are being used, or only some internal tasks are being performed. Constant scanning is characterized by the minimum system requirements necessary for it to work, and therefore the antivirus launched in this mode in the vast majority of cases remains unnoticed by the user and appears only when viruses or other suspicious programs are detected.

Without much damage to the quality of anti-virus protection of a home computer, it is often possible to exclude scanning of outgoing mail messages and archives from real-time scanning, but it is recommended to scan all other objects.

On-Demand Check

As mentioned above, information is often exchanged on a home computer using CDs, floppy disks and other mobile media: new games are installed, e-books and textbooks are copied, films and music are rewritten. In order to detect malicious code that has penetrated the system, on-demand scanning is used. All home users are strongly advised to check all suspicious storage media for viruses, and each time before reading or copying files from them. This simple action takes a little time, but it can significantly reduce the chances of malware infiltrating your computer. Additionally, it is recommended to scan the entire hard drive for viruses at least once a week.

According to the scan settings, this mode is especially thorough - in an on-demand scan, all objects of the file system are usually scanned.

Updating anti-virus databases

Antivirus databases

Only timely updating of anti-virus databases can guarantee the correct and efficient operation of the most reliable part of anti-virus protection - signature analysis.

Antivirus databases are files containing virus signatures. They are produced by antivirus companies and, accordingly, they are different for different programs - for example, Kaspersky Anti-Virus will not be able to work with Dr. web and vice versa.

You can get the latest versions of the required databases from the manufacturer's website using the tools built into the anti-virus program, or by copying the files from the website yourself. In regular situations, it is recommended to update in the first way, the second is more complicated and is designed for extraordinary situations, for example, if you suspect that the built-in update modules are not working properly or you cannot access the Internet directly.

This means that in order to update anti-virus databases, a home user usually just needs to connect to the Internet and press a button in the anti-virus program interface that starts the update process. If an Internet connection is not provided, the only way out is to go to the anti-virus manufacturer's website using another computer, download and copy the databases to your computer using mobile media. A detailed description of this procedure can be found in the user manual or documentation for the program.

Maintaining the relevance of anti-virus databases

The expansion of the boundaries of the Internet, together with the improvement of communication channels between different computer networks, makes data exchange much faster. In proportion to the growth in the power of information flows, the rate of spread of viruses also increases. Today, from the release of a virus into the world to the start of mass lesions, only a few hours, and sometimes even minutes, pass. In such a situation, the dominant criterion for choosing anti-virus protection is the frequency of release of anti-virus database updates by the manufacturer of anti-virus programs, as well as the response time to the outbreak of an epidemic. Today, the leader in this area is Kaspersky Lab, which has the best release rate of anti-virus databases, releasing updates hourly, while most other companies have settled on daily updates.

However, home computers often have a very limited channel, especially when connected via a regular telephone line. Therefore, it can be difficult for such users to check for new anti-virus databases every hour. Therefore, the optimal update schedule is highly dependent on how you connect to the network. According to this parameter, the following categories of home users can be distinguished:

  • Permanent connection- in this case, scheduled anti-virus database updates are configured - once every three hours (unless the manufacturer of the anti-virus program recommends otherwise)
  • Periodic connection does not allow updating every three hours. Therefore, in this mode, it is optimal to check for new anti-virus databases every time you connect to the Internet, but at least once a day
  • Inability to connect to the Internet- the most difficult option. In this case, it is necessary to organize the delivery of updates using mobile media. However, since the exchange of information with external sources is usually limited on such computers, it is usually possible to update anti-virus databases at intervals of up to three days.

Antivirus must be installed on every Windows PC. For a long time this was considered the golden rule, but today IT security experts argue about the effectiveness of security software. Critics argue that antiviruses do not always protect, and sometimes even vice versa - due to careless implementation, they can create security holes in the system. The developers of such solutions counter this opinion with impressive numbers of blocked attacks, and marketing departments continue to assure the comprehensive protection that their products provide.

The truth lies somewhere in the middle. Antiviruses do not work flawlessly, but all of them cannot be called useless. They warn of many threats, but they are not enough to protect Windows as much as possible. For you as a user, this means the following: you can either throw the antivirus in the trash, or blindly trust it. But one way or another, it is just one of the blocks (albeit a large one) in the security strategy. We will supply you with nine more such "bricks".

Security Threat: Antiviruses

> What the critics are saying The current virus scanner controversy has been fueled by former Firefox developer Robert O'Callahan. He claims that antiviruses threaten the security of Windows and should be removed. The only exception is Microsoft's Windows Defender.

> What the developers say The creators of antiviruses, including Kaspersky Lab, cite impressive numbers as an argument. So, in 2016, software from this laboratory registered and prevented about 760 million Internet attacks on users' computers.

> What CHIP thinks Antiviruses should not be considered a relic or a panacea. They're just bricks in the security building. We recommend using compact antiviruses. But don't worry too much: Windows Defender is fine. You can even use simple third party scanners.

1 Choose the right antivirus

We, as before, are convinced that Windows is unthinkable without anti-virus protection. You only need to choose the right product. For Windows 10 users, it can even be the built-in Windows Defender. Despite the fact that during our tests it showed not the best degree of recognition, it is perfectly and, most importantly, without any problems for security, built into the system. In addition, Microsoft has improved its product in the Creators Update for Windows 10 and made it easier to manage.

Anti-virus packages from other developers often have a higher degree of recognition than Defender. We advocate a compact solution. The leader of our rating at the moment is Kaspersky Internet Security 2017. Those who can refuse such additional options as parental control and a password manager should turn their attention to a more budget option from Kaspersky Lab.

2 Follow updates

If only one measure had to be chosen to keep Windows secure, we would definitely choose updates. In this case, of course, we are talking primarily about updates for Windows, but not only. Installed software, including Office, Firefox, and iTunes, should also be updated regularly. On Windows, getting system updates is relatively easy. Both in the "seven" and in the "ten" patches are installed automatically at the default settings.

In the case of programs, the situation is more difficult, since not all of them are as easy to update as Firefox and Chrome, which have a built-in automatic update function. The SUMo (Software Update Monitor) utility will support you in this task and notify you when updates are available. The sister program DUMo (Driver Update Monitor) will do the same job for drivers. Both free assistants, however, only inform you about new versions - you will have to download and install them yourself.

3 Set up firewall


The built-in firewall in Windows does a good job and reliably blocks all incoming requests. However, it is capable of more - its potential is not limited to the default configuration: all installed programs have the right to open ports in the firewall without asking. Free Windows utility Firewall Control puts more features in your hands.

Run it and in the "Profiles" menu, set the filter to "Medium Filtering". Thanks to this, the firewall will also control outgoing traffic according to a given set of rules. What measures will be included there, you set yourself. To do this, in the lower left corner of the program screen, click on the note icon. So you can view the rules and with one click grant permission to a particular program or block it.

4 Use special protection


Updates, antivirus and firewall - you have already taken care of this great trinity of security measures. It's time for fine tuning. The problem with additional programs for Windows is often that they do not use all the security features offered by the system. An exploit tool such as EMET (Enhanced Mitigation Experience Toolkit) further enhances installed software. To do this, click on "Use Recommended Settings" and let the program run automatically.

5 Strengthen Encryption


You can significantly enhance the protection of personal data by encrypting it. Even if your information falls into the wrong hands, a hacker will not be able to remove good coding, at least not immediately. Professional versions of Windows already have the BitLocker utility configured through the Control Panel.

VeraCrypt will become an alternative for all users. This open source program is the unofficial successor to TrueCrypt, which was discontinued a couple of years ago. If it is only about protecting personal information, you can create an encrypted container through the "Create Volume" item. Select the "Create an encrypted file container" option and follow the wizard's instructions. Access to a ready-made data safe is carried out through Windows Explorer, like a regular disk.

6 Protect user accounts


Many vulnerabilities remain unexploited by hackers only because the work on the computer is carried out under a standard account with limited rights. Thus, for everyday tasks, you should also set up such an account. In Windows 7, this is done through the Control Panel and the Add or Remove User Accounts item. In the "ten" click on "Settings" and "Accounts", and then select "Family and other people".

7 Activate VPN when away from home


At home on a wireless network, your level of security is high, since only you control who has access to the local network, as well as being responsible for encryption and access codes. Everything is different in the case of hotspots, for example,
in hotels. Here, Wi-Fi is distributed among outsiders, and you are not able to exert any influence on the security of network access. For protection, we recommend using a VPN (Virtual Private Network). If you just need to browse sites through a hotspot, the built-in VPN in the latest version of the Opera browser will be enough. Install the browser and in "Settings" click on "Security". In the "VPN" section, check the box for "Enable VPN".

8 Cut off unused wireless connections


Even the details can decide the outcome of a situation. If you are not using connections such as Wi-Fi and Bluetooth, simply turn them off and thus close potential loopholes. In Windows 10, the easiest way to do this is through the Action Center. "Seven" offers for this purpose the "Network Connections" section on the Control Panel.

9 Manage passwords


Each password must be used only once and must contain special characters, numbers, uppercase and lowercase letters. And to be as long as possible - ten or more characters is best. The concept of password security has reached its limits today because users have too much to remember. Therefore, where possible, such protection should be replaced by other methods. Take Windows sign-in as an example: if you have a Windows Hello-enabled camera, use facial recognition to sign in. For other codes, we recommend that you turn to password managers such as KeePass, which should be protected with a strong master password.

10 Protect privacy in the browser

There are many ways to protect your privacy online. For Firefox, the Privacy Settings extension is ideal. Install it and set it to "Full Privacy". After that, the browser will not give out any information about your behavior on the Internet.

Lifebuoy: backup

> Backups are essential
themselves not only after contracting the virus. It also proved to be excellent in case of problems with the hardware. Our advice: make a copy of the entire Windows once, and then additionally and regularly backup all important data.

> Full archiving of Windows Windows 10 inherited from the "seven" module "Archiving and Restoring". With it, you will create a backup copy of the system. You can also use special utilities such as True Image or Macrium Reflect.

> True Image File Protection and the paid version of Macrium Reflect can make copies of certain files and folders. Personal Backup is a free alternative for archiving important information.

PHOTO: manufacturing companies; NicoElNino/Fotolia.com

In today's world, where it is difficult to do without the Internet, which has become a part of everyday life for most people, and home and office computers store a huge part of the user's confidential information, we become targets of attack by intruders. Computer protection, as a necessary minimum of installed security software and user behavior rules, is a means of countering illegal actions from outside.

If you do not take any steps to protect your device and confidential data, consider that by this action or inaction you are voluntarily opening all possible loopholes for malware and hackers who can not only steal this data, but also damage your computer. The latter may consist not only in the infection of the operating system itself with viruses, but also in the incapacitation of expensive PC components.

Even though viruses and malware come in many different types, one thing is for sure, you don't want them inside your operating system. To counter this, Windows 10 users have many tools to deal with all kinds of malware.

As many people know, most of these security tools are already built into the OS by default. Additionally, you need to know that protecting your computer and your personal files is not only about installing security applications, but also in combination with knowing how to avoid potential threats.

COMPUTER PROTECTION

Let's take a closer look at the issue of securing a computer, laptop or tablet, as well as protecting the user's confidential data. Our tips will help you minimize the possibility of infiltrating your PC with almost all types of malware, including viruses, ransomware, spyware, adware, and more.

UPDATE WINDOWS 10

Updating the Windows 10 operating system and related software is the most important step you need to take to keep your device and data safe. Microsoft periodically releases packages to fix potential vulnerabilities that could be exploited by hackers.

With default settings, updates are downloaded and installed automatically, under certain conditions and within a certain period of time. Even in this case, it will not be superfluous to make sure that all the necessary patches are installed on your system. To do this, in the "Parameters" of the OS in the "Update and security" section, you must click on the "Check for updates" button.

In addition, it is important to periodically check and install updates for any software you have installed. Apps downloaded from the Windows Store will be updated automatically as soon as a new version is available. And about classic desktop programs, in most cases, you need to take care of the user himself. Always check the official software website to download and update them.

Next, decide on the relevance of the OS itself. Even if a computer is running one version, it does not necessarily mean that it is running the latest one. The new operating system was introduced in 2015, and since then the corporation has released several big updates. Added new features, improved performance and significantly improved security.

To find out which version is currently running on your PC, use the Win + R key combination on your keyboard and “winver” in the input field that appears. Version 1709 is the latest version at the time of this writing.

WINDOWS DEFENDER

Use an antivirus, which is a required component on every computer. Help detect and remove malware before it can compromise your files, affect performance, or crash your device.

Windows Defender, included in the System Security Center by default, offers excellent real-time computer protection. If you want even more protection, you can level it up. This built-in solution should be more than enough for most users. However, there are many third-party security solutions that you can use. Some of them are free and some are not. You can also add a popular solution called "Malwarebytes" as a second layer of protection.

ACCESS TO CONTROLLED FOLDERS

Ransomware is another type of malware that can lock your device by encrypting all your files and require you to pay a certain amount to unlock it. Starting with the Fall Creators Update, Windows 10 includes a feature known as Controlled Folder Access. It not only prevents capture, but also blocks unwanted changes to your files.

FIREWALL

Firewall - blocks access to your computer from the Internet and local network. You'll find plenty of third-party tools that provide network security protection, but the new version 10 of the OS already includes a very effective firewall.

To make sure it works correctly, find it there in the "Security Center" and make sure that each network connection is labeled "Firewall Enabled". Enable it otherwise.

PROVEN PROGRAMS

By all means, avoid downloading and installing applications from unknown sources, always try to download software from official websites. A great solution is to install apps from the Microsoft Store that are already verified by Microsoft. To increase your security level, enable the non-store installation prevention feature using the SmartScreen filter settings.

BACKUP

One of the best ways to keep your files safe is to make regular backups. You should always think about making at least 2 backups. One can be saved to a removable drive, and the other in the cloud storage.

If you're using Windows 10, you don't need to get a third party program to Reserve copy, since you can use the built-in tool. Alternatively, if you don't have a lot of files, you can copy your documents to a USB stick regularly.

Online backup is probably one of the best ways. The best option is to create an account in OneDrive or. In their functionality, you can use the version history of files.

NETWORK SECURITY

The best tool to protect your computer and data is yourself. As a rule, a computer can be infected with viruses and data is compromised as a result of the user clicking on an unverified link in an email or a website pop-up window, or installing an application (game) from an untrusted source.

Use only modern web browsers such as Google Chrome, Microsoft Edge and Mozilla Firefox. They are always up to date, have great built-in security, alert you to a potential problem, and filter out unsafe websites. If you get a warning, don't try to find a way around it, there's probably a good reason for it.

If any type of malware does infiltrate the operating system, the first thing to do is disconnect the computer from the network by unplugging the Ethernet cable or turning off the router. Then open Antivirus and do a full scan hard drive. Remove detected malware.

There are also many other ways in which you can return the OS to a working state. But, before that, it is necessary to establish the cause of the failure or infection, and only then eliminate the consequences. In the absence of the necessary technical knowledge and experience, entrust this matter to a specialist.

Our other computer tips are listed in . We recommend that you familiarize yourself with them.


Steegle.com - Google Sites Tweet Button

Unauthorized access (UAS) of an attacker to a computer is dangerous not only by the possibility of reading and/or modifying processed electronic documents, but also by the possibility of introducing a controlled software bookmark by an attacker, which will allow him to take the following actions:

2. Intercept various key information used to protect electronic documents.

3. Use the captured computer as a springboard for capturing other computers on the local network.

4. Destroy the information stored on the computer or disable the computer by running malicious software.

Protecting computers from unauthorized access is one of the main problems of information security, therefore, various subsystems for protecting against unauthorized access are built into most operating systems and popular software packages. For example, performing user authentication when logging into operating systems of the Windows 8 family. However, there is no doubt that the built-in tools of operating systems are not enough to seriously protect against UA. Unfortunately, the implementation of security subsystems in most operating systems is often criticized due to regularly discovered vulnerabilities that allow access to protected objects bypassing access control rules. The service packs and patches released by software vendors objectively lag behind the information about discovered vulnerabilities. Therefore, in addition to the standard means of protection, it is necessary to use special means of restricting or delimiting access.


These funds can be divided into two categories:

1. Means of restricting physical access.

2. Means of protection against unauthorized access over the network.

Means of restricting physical access

The most reliable solution to the problem of restricting physical access to a computer is the use of hardware for protecting information from unauthorized access, which is performed before the operating system is loaded. The means of protection in this category are called "electronic locks".
Theoretically, any software access control tool can be exposed to an attacker in order to distort the algorithm of such a tool and subsequently gain access to the system. It is almost impossible to do this with hardware protection: the electronic lock performs all user access control actions in its own trusted software environment, which is not subject to external influences.
At the preparatory stage of using an electronic lock, it is installed and configured. The setup includes the following steps, usually performed by the person in charge, the Security Administrator:

1. Creating a list of users who are allowed access to the protected computer. For each user, a key carrier is generated (depending on the interfaces supported by a particular lock - a flash drive, an iButton electronic tablet or a smart card), which will be used to authenticate the user upon entry. The list of users is stored in the non-volatile memory of the lock.

2. Formation of a list of files, the integrity of which is controlled by the lock before loading the operating system of the computer. Important files of the operating system are subject to control, for example, the following:

§ Windows 8 system libraries;

§ executable modules of the applications used;

§ Microsoft Word document templates, etc.

File integrity control is the calculation of their reference checksum, for example, hashing according to the GOST R 34.11-94 algorithm, storing the calculated values ​​in the non-volatile memory of the lock and then calculating the real file checksums and comparing them with the reference ones.
In the normal mode of operation, the electronic lock receives control from the BIOS of the protected computer after the latter is turned on. At this stage, all actions to control access to the computer are performed, namely:

1. The lock asks the user for a carrier with key information necessary for his authentication. If key information of the required format is not presented or if the user identified by the information provided is not included in the list of users of the protected computer, the lock blocks the computer from booting.

2. If the user authentication was successful, the lock calculates the checksums of the files contained in the list of controlled files and compares the received checksums with the reference ones. If the integrity of at least one file from the list is violated, the computer will be blocked from loading. To be able to continue working on this computer, the problem must be resolved by the Administrator, who must find out the reason for the change in the monitored file and, depending on the situation, take one of the following actions to allow further work with the protected computer:

§ restore the original file;

§ remove a file from the list of controlled files.

3. If all checks are passed successfully, the lock returns control to the computer to load the standard operating system.


Since the above steps are performed before the computer's operating system is loaded, the lock usually loads its own operating system (located in its non-volatile memory - usually MS-DOS or similar low-resource OS) in which user authentication and file integrity checks are performed. . This also makes sense from a security point of view - the lock's own operating system is not subject to any external influences, which does not allow an attacker to influence the control processes described above.
Information about user logins to the computer, as well as unauthorized access attempts, is stored in a log, which is located in the non-volatile memory of the lock. The log can be viewed by the Administrator.

When using electronic locks, there are a number of problems, in particular:

1. The BIOS of some modern computers can be configured in such a way that boot control is not transferred to the BIOS of the lock. To counteract such settings, the lock must be able to block the computer boot (for example, by closing the Reset contacts) if the lock has not received control within a certain period of time after turning on the power.

2. An attacker can simply pull the lock out of the computer. However, there are a number of countermeasures:

§ Various organizational and technical measures: sealing the computer case, ensuring that users do not have physical access to the computer system unit, etc.

§ There are electronic locks that can lock the case of the computer system unit from the inside with a special latch at the command of the administrator - in this case, the lock cannot be removed without significant damage to the computer.

§ Quite often, electronic locks are structurally combined with a hardware encoder. In this case, the recommended security measure is to use the lock in conjunction with transparent (automatic) encryption software for computer logical drives. In this case, the encryption keys can be derived from the keys used to authenticate users in the electronic lock, or separate keys, but stored on the same medium as the user's keys to enter the computer. Such a comprehensive protection tool will not require the user to perform any additional actions, but will not allow an attacker to gain access to information even when the electronic lock equipment is removed.

Means of protection against unauthorized access over the network

The most effective methods of protection against unauthorized access over computer networks are virtual private networks (VPN - Virtual Private Network) and firewalls. Let's consider them in detail.

Virtual Private Networks

Virtual private networks provide automatic protection of the integrity and confidentiality of messages transmitted over various public networks, primarily the Internet. In fact, a VPN is a collection of networks on the outer perimeter of which VPN agents are installed. A VPN agent is a program (or software and hardware system) that actually provides protection for transmitted information by performing the operations described below.
Before sending any IP packet to the network, the VPN agent does the following:

1. Information about its destination is extracted from the header of an IP packet. According to this information, based on the security policy of this VPN agent, security algorithms (if the VPN agent supports several algorithms) and cryptographic keys are selected with which this packet will be protected. In the event that the security policy of the VPN agent does not provide for sending an IP packet to a given addressee or an IP packet with these characteristics, sending an IP packet is blocked.

2. Using the selected integrity protection algorithm, an electronic digital signature (EDS), an imitator or a similar checksum is generated and added to the IP packet.

3. Using the selected encryption algorithm, the IP packet is encrypted.

4. Using the established packet encapsulation algorithm, the encrypted IP packet is placed in an IP packet ready for transmission, the header of which, instead of the original information about the destination and the sender, contains information about the destination VPN agent and the sender VPN agent, respectively. Those. network address translation is in progress.

5. The packet is sent to the destination VPN agent. If necessary, it is split and the resulting packets are sent one by one.

When receiving an IP packet, the VPN agent does the following:

1. Information about its sender is extracted from the IP packet header. If the sender is not allowed (according to the security policy) or unknown (for example, when receiving a packet with a deliberately or accidentally corrupted header), the packet is not processed and discarded.

2. According to the security policy, algorithms for protecting this package and keys are selected, with the help of which the package will be decrypted and its integrity checked.

3. The informational (encapsulated) part of the packet is extracted and decrypted.

4. The integrity of the package is checked based on the selected algorithm. If an integrity violation is detected, the packet is discarded.

5. The packet is sent to the destination (over the internal network) according to the information in its original header.

The VPN agent can be located directly on the protected computer. In this case, with its help, only the information exchange of the computer on which it is installed is protected, however, the principles of its operation described above remain unchanged.


The basic rule for building a VPN is that communication between a secure LAN and an open network should be carried out only through VPN agents. There should absolutely be no communication methods that bypass the protective barrier in the form of a VPN agent. Those. a protected perimeter must be defined, communication with which can only be carried out through an appropriate means of protection.
A security policy is a set of rules according to which secure communication channels are established between VPN subscribers. Such channels are usually called tunnels, an analogy with which can be seen in the following:

1. All information transmitted within one tunnel is protected from both unauthorized viewing and modification.

2. Encapsulation of IP packets makes it possible to hide the topology of the internal LAN: from the Internet, the exchange of information between two protected LANs is visible as an exchange of information only between their VPN agents, since in this case all internal IP addresses do not appear in IP packets transmitted over the Internet . .

The rules for creating tunnels are formed depending on the various characteristics of IP packets, for example, when building most VPNs, the IPSec (Security Architecture for IP) protocol sets the following set of input data, according to which tunneling parameters are selected and a decision is made when filtering a specific IP packet:

1. Source IP address. This can be not only a single IP address, but also a subnet address or a range of addresses.

2. Destination IP address. It can also be a range of addresses, specified explicitly using a subnet mask or wildcard.

3. User ID (sender or recipient).

4. Transport Layer Protocol (TCP/UDP).

5. Port number from which or to which the packet was sent.

Firewall
A firewall is a software or software and hardware tool that protects local networks and individual computers from unauthorized access from external networks by filtering a two-way message flow during information exchange. In fact, the firewall is a "cut down" VPN agent that does not encrypt packets and control their integrity, but in some cases it has a number of additional functions, the most common of which are the following:
antivirus scanning;
packet correctness control;
control of the correctness of connections (for example, the establishment, use and termination of TCP sessions);
content control.

Firewalls that do not have the functions described above and perform only packet filtering are called packet filters.
By analogy with VPN agents, there are also personal firewalls that protect only the computer on which they are installed.
Firewalls are also located on the perimeter of protected networks and filter network traffic according to the configured security policy.

Comprehensive protection

An electronic lock can be developed on the basis of a hardware encoder. In this case, one device is obtained that performs the functions of encryption, random number generation and protection against unauthorized access. Such an encoder is able to be the security center of the entire computer; on its basis, you can build a full-featured cryptographic data protection system that provides, for example, the following features:

1. Protecting your computer from physical access.

2. Protecting your computer from unauthorized access over the network and organizing a VPN.

3. File encryption on demand.

4. Automatic encryption of computer logical drives.

5. Calculation/verification of EDS.

6. Protection of email messages.

Undoubtedly, one of the most important programs on a computer is an antivirus. Even one "accidentally" virus on a PC can make work unbearable! In addition, it's "good" if the virus just shows ads, but there are viruses that can destroy dozens of files on a disk (which may have been worked on for more than one month).

About 10-15 years ago, the number of antiviruses was relatively small and the choice was limited to some dozen. Now there are hundreds of them!

In this article I want to focus on the most popular today (in my opinion). I think that for many this information will be useful for cleaning and protecting their home PCs. And so let's get started...

Keys for antiviruses at affordable prices below market prices you can buy at …

10 best antivirus programs to protect your computer

Malwarebytes Anti-Malware

Malwarebytes Anti-Malware is not quite the antivirus that most users are used to. This program (in my opinion) is more suitable as an addition to the main antivirus, but nevertheless, it will help to do one important job!

Malwarebytes 3.0 is equipped with a number of specialized modules:

  • Anti-Malware
  • Ransomware Protection
  • Exploit Protection
  • Malicious website protection

Most antiviruses are bad (at least for now) at finding and removing various adware that are often embedded in browsers (for example). Because of this, various advertising windows, teasers, banners (sometimes from adult sites), etc. begin to appear. Malwarebytes Anti-Malware will quickly and easily clean your PC from such “garbage”.

Features of Malwarebytes Free (free version)

  • Ability to scan all drives for a complete system check.
  • Signature database updated daily to protect against the latest malware.
  • Intelligent heuristic detection of even the most persistent threats without significant impact on system resources.
  • Adding detected threats to Quarantine and the ability to restore them at a convenient time.
  • Black list of exclusions for scanning and protection modules.
  • List of additional utilities for manual malware removal (Malwarebytes Anti-Rootkit, Malwarebytes FileASSASSIN, StartupLite, Chameleon).
  • Malwarebytes Chameleon dynamic technology that allows Malwarebytes Anti-Malware to run when it is blocked by malware.
  • Multilingual support.
  • Context menu integration for checking files on demand.

Features of Malwarebytes Premium

Malwarebytes- free program, however, you can upgrade to the Premium version, which provides real-time protection, scans, and scheduled updates.

  • Real-time protection works in conjunction with leading antivirus programs to make your computer more secure.
  • Real-time protection detects and blocks threats as they attempt to execute.
  • Real-time exploit protection: Eliminates zero-day exploits and malware vulnerabilities
  • Real-time ransomware protection: Prevents ransomware from encrypting your files.
  • Malicious website blocking prevents access to malicious and infected web resources.
  • The presence of the “Quick scan” mode for checking critical areas of the system - RAM and startup objects.
  • Extra options. Customize Malwarebytes Premium Protection Behavior for Advanced Users.
  • Scheduled updates to automatically use the latest protection.
  • Scheduled scans for regular checks at your convenience.
  • Password protection of settings to prevent unauthorized changes to Malwarebytes Premium security components.

It should be borne in mind that not everything written will be available or work in the free version of the program. In order for the software to work at the proper level, you need to install the Premium version

Advanced SystemCare Ultimate

It seems to me that many users are often dissatisfied with one “quality” of most antiviruses - they slow down the computer ... So, in this regard, Advanced SystemCare Ultimate is a very interesting product - an antivirus with built-in programs for optimizing, cleaning and speeding up Windows.

The antivirus, I must tell you, is quite reliable (BitDefender technologies are used) + the program's own algorithms. Protects PC from: spyware, Trojans, dangerous scripts, ensures safe work with payment systems on the Internet (relevant, especially recently with the development of Internet banks).

By the way, the program is compatible with many antiviruses (that is, it can be installed in addition to provide additional protection). Moreover, it will not greatly affect the speed and performance of your PC. We have described how to maximize speed and performance using Advanced SystemCare Ultimate.

Maximum protection and maximum performance

  • Protection against viruses, spyware, hackers, phishing, botnets, etc.
  • Online payment and banking security
  • Optimizes, cleans and fixes all PC problems in 1 click
  • Works fast, compatible with other antiviruses

New in IObit Malware Fighter

  • Added antivirus engine Bitdefender;
  • Improved IObit engine;
  • The database of signatures has been updated and significantly expanded;
  • Improved scanning speed by adapting the caching mechanism;
  • Minimized resource consumption during scanning and cleaning;
  • Improved real-time protection;
  • New quarantine method;
  • New simplified and convenient user interface;
  • Improved web protection;
  • Full support for Windows 10.

Main components of IObit Malware Fighter

Safety

Startup Protection
Network protection
· File protection
Checking files in the cloud
・Cookie Protection
Browser ad blocker
Antivirus engine Bitdefender Pro
Process Protection Pro
USB drive protection Pro
Tracking malicious activities Pro

Browser protection

· Homepage Defender protects your homepage and search engine from malicious modification.
· DNS Protection: Prevent malware from modifying DNS system settings.
· Surf Protection: Block various online threats to ensure you surf the web safely.
· Browser protection from malicious plugins / toolbars.
· Anti-Spying: Auto-clean your browser data from malicious tracking as soon as it closes. Pro

One of the best free antivirus. Every year it is gaining more and more popularity. The advantages of antivirus are obvious:

  1. some of the best algorithms for searching and detecting viruses (even those that are not yet known to the antivirus and are not included in the update databases);
  2. support for all popular Windows operating systems (including Windows 10);
  3. low system requirements for a PC (works fast enough even on older machines);
  4. fully functional free version of the antivirus.

Main components of Avast Free Antivirus

(1) The component is available for an additional fee (1500 RUB/year)
(2) The component is available for an additional fee (from 650 rubles / year)

Version comparison

Functions / VersionsFreeProIS*Premier
Antivirus
Spy protection
Stream updates
Power Mode
CyberCapture
Do Not Track, SiteCorrect
Phishing and malware protection
Home network security
HTTPS scanning
Smart Scan
Passwords
SafeZone Browser
Software Updater**
Sandbox
SecureDNS
Antispam
Firewall
file shredder
Cleanup***
SecureLine VPN***

* IS is the version of Internet Security.
** Software Updater is installed automatically in Premier, manually in other versions.
***Cleanup, SecureLine VPN - paid add-ons for all versions

New in Avast Free Antivirus Nitro Update

New features and technologies

New features: CyberCapture, SafeZone browser.

Improvements: Home network security, Antivirus and malware protection.

Key features of Avast Free Antivirus

New! CyberCapture

This proprietary technology developed by AVAST Software allows you to automatically submit unknown files to the Avast Online Threat Lab. Potentially dangerous files are carefully checked by our analysts in real time, which eliminates the slightest risk of infecting your PC.

New! SafeZone Browser

Designed for a safer and more comfortable browsing experience, SafeZone is also the most secure browser in the world. The secure payment mode ensures complete privacy when shopping and banking online, the Ad Blocker ensures that you are not bothered by ads, and the Video Downloader allows you to watch videos offline at your convenience.

Improved! Home network security

Even more advanced protection for your home network and all devices connected to it. Thanks to the new Nitro technology, Avast Free Antivirus is able to detect more types of router vulnerabilities, which will provide even more reliable protection for Wi-Fi cameras, SMART TVs, printers, network drives and routers.

Avast Passwords

It's time to break the bad habit of storing your passwords in your browser or using the same password for multiple services. Avast's new password manager lets you store all your passwords in a secure, easy-to-use vault that only requires you to remember one master password to access.

HTTPS scanning

The improved Web Shield allows Avast Free Antivirus to thoroughly scan HTTPS sites for malware and other threats. You can whitelist the websites and certificates of your online banking so that scanning does not slow down access to services.

Browser cleaning

Don't let outsiders change your search engine without your permission. Cleaning your browser will remove all questionable plugins and toolbars so you can return to your original browser configuration.

Unique! 230 million users

Avast is the choice of 230 million users around the world, which allows the antivirus to detect malware much faster than others, regardless of where it appears. The combination of the state-of-the-art AI engine at the heart of the antivirus program and millions of virus sensors around the world allows Avast Free Antivirus to continuously detect and eliminate the latest cyber threats, keeping you 100% safe.

Improved! Antivirus and malware protection

The developers are constantly working on improving the innovative anti-virus engine to provide you with reliable protection against all types of cyber threats. Through continuous updates no larger than a text message, Avast distributes new threat intelligence several times an hour to keep your antivirus up to date.

Smart Scan technology

Comprehensive intelligent scanning for all types of problems. Scan your PC for performance status, check for online threats, malware or viruses, and find outdated programs with just one click. The easiest way to stay completely safe.

Software Updater

Hackers love to exploit vulnerabilities in outdated software to get into a system. Software Updater notifies you when updates are available for your software so you can fix any vulnerabilities before attackers can exploit them.

Integration with MyAvast

Smartphone, PC and tablet protected by Avast? Wonderful! You can control and manage devices through your personal account directly in the user interface of the program

AVG

A very, very good antivirus, which, by the way, has won many awards. There is a free version available that can cover the needs of most users. Judge for yourself, the free version includes: an antivirus (which protects in real time from viruses, spyware, etc.), a complex for protecting against dangerous links on the Internet, as well as a complex for protecting e-mail.

By the way, the antivirus can be installed not only on a laptop (computer), but also on a phone! In general, the antivirus is very worthy, protecting the PC well (while working fast enough)!

Bitdefender Antivirus

A very well-known antivirus that provides comprehensive computer protection: antivirus, firewall, complex for enhanced protection of personal data. By the way, in many independent ratings, this antivirus is on the top lines.

Among the features of this antivirus, I can highlight the following:

  • protection of everything and everything (the user, in practice, can not be distracted by thoughts about protecting the PC - the program itself knows everything: what, where and when to block ...);
  • low consumption of system resources (for example, 100-200 MB of RAM when working in Windows 10 with documents);
  • convenient and intuitive interface.

Key features of Bitdefender Antivirus Free Edition

real time protection– Real-time screen provides protection during access. All files are scanned at the moment they are launched or copied. For example, files that you have just downloaded from the Internet are scanned immediately.

Cloud technologies- Bitdefender Antivirus Free Edition uses cloud-based scanning to speed up detection and detect new or unknown threats that other antiviruses miss.

Active virus control is an innovative proactive detection technology that uses advanced heuristics to identify new potential threats in real time. Bitdefender's free antivirus heuristic provides a high level of protection against new threats that have not yet been added to virus signatures. Active Virus Control in Bitdefender Antivirus Free Edition monitors every program running on your computer and detects malware based on their actions.

HTTP Scan- Bitdefender free antivirus analyzes and blocks fraudulent and phishing websites.

Antirootkit The technology is used to search for hidden malware, also known as rootkits. Rootkits are a hidden type of software, often malicious, aimed at hiding certain processes or programs from conventional detection methods, while rootkits allow you to gain privileged access to a computer.

Periodic update– Bitdefender Antivirus Free Edition is updated periodically without user intervention, providing an optimal level of protection against new threats.

Early Scan at System Boot- This technology ensures that the system is checked at boot time, once all important services have been started. It allows you to improve virus detection at system startup, as well as speed up system boot time.

Scan while idle- Free antivirus Bitdefender detects when the use of computer resources is minimal in order to scan the system without affecting the user's activities. System resource usage is calculated based on the processor (CPU) and hard disk drive (HDD) usage.

Smart Scan Technology- Files that were previously scanned by Bitdefender Antivirus Free Edition will not be scanned again using the smart file scan skip engine.

Avira Free 2015

The most famous German-made antivirus (“umbrella”, “red umbrella”, as many in our country called it). It provides a good degree of PC protection (by the way, virus search and detection algorithms are among the best among programs of this kind), high performance (I remember recommending installing this antivirus even on budget laptops 5-6 years ago),

  1. Russian language support;
  2. support for all popular Windows OS: XP, 7, 8, 10 (32/64 bits);
  3. low system requirements;
  4. excellent algorithms for searching and detecting viruses and potential threats for PCs;
  5. user-friendly interface (everything unnecessary is hidden from beginners, but nevertheless accessible to experienced users).

Main features of Avira Free Antivirus

Antivirus and antispyware

Effective real-time and on-demand protection against various types of malware: viruses, trojans, worms, spyware and adware. Constant automatic updates and AHeAD heuristic technology reliably protect against known and new threats.

Cloud protection

Avira Protection Cloud - real-time threat classification and fast system scan.

Rootkit protection

Avira's anti-rootkit protects against difficult-to-detect threats - rootkits.

Windows Firewall Management

Avira Free Antivirus allows you to edit network rules for applications, change network profiles (Private, Public) and manage advanced settings for Windows Firewall with Advanced Security.

Internet protection **

Safe search, blocking of phishing and malicious websites, tracking protection.

** This feature is part of the toolbar Avira Browser Safety for Chrome browsers, Firefox and Opera (installed separately from Avira Free Antivirus).

Parental control

Not available in the Russian version. For use, you can use the link to the service in the description.

With the function of social networks based on technology Avira Free Social Shield you can monitor your children's online activities: check their online accounts in social networks for comments, photos, etc. that may affect your child in a negative way.

Protecting Android Devices

Antivirus solution Avira Free Antivirus, in addition to protecting your computer from various threats, offers to install the application Avira Antivirus Security for Android, which will protect your smartphone or tablet from loss and theft, as well as block unwanted calls and SMS messages.

Kaspersky Anti-Virus

I'm not afraid to say that Kaspersky Anti-Virus is the most famous and popular anti-virus in the post-Soviet space. The anti-virus database of Kaspersky is really huge. It easily catches all possible viruses available on the network. But, as the developers did not declare about acceleration and, most importantly, about a radical decrease in computer resources, they did not complete this task to the end.

Kaspersky Anti-Virus, as it slowed down the PC earlier, so it continues to do so now. Moreover, using it on a fairly powerful machine does not save you from slowdowns - Kaspersky's gluttony is unlimited, this can only be fixed by very careful tuning of the program.

New in Antivirus Kaspersky Free 2017

Kaspersky Free Anti-Virus 2017 has the following new features:

  • Improved program update in the background. Now, when upgrading, you do not need to re-accept the terms of the License Agreement if it has not changed.
  • Improved Mail Anti-Virus. The default heuristic analysis depth has been increased to medium.

Version comparison

Comparison of the functions and capabilities of the free antivirus Kaspersky Free with paid solutions Kaspersky Anti-Virus(KAV), internet security(KIS) and Total Security(KTS).

Functions / VersionsFreeKAVKISKTS
File Anti-Virus
Web Anti-Virus
IM Antivirus
Mail antivirus
Anti-Phishing
Screen keyboard
Kaspersky Security Network
Kaspersky Secure Connection*
Network monitoring
Activity monitoring
Internet management
Application Control (HIPS)
OS change control
Webcam access
Firewall
Protection against network attacks
Anti-Spam
Anti-Banner
Data collection protection
Secure payments
Secure data entry
Trusted Applications Mode
Software update
Uninstalling programs
Parental control
Backup
Virtual safes
Password Manager

Main features of Kaspersky Free Anti-Virus

File Anti-Virus

File Anti-Virus Kaspersky Free Anti-Virus allows you to avoid infection of the computer's file system. The component starts at the start of the operating system, resides permanently in the computer's RAM, and checks all opened, saved, and launched files on your computer and on all attached drives.

Mail Anti-Virus

Mail Anti-Virus scans incoming and outgoing mail messages on your computer. The letter will be available to the addressee only if it does not contain dangerous objects.

Web Anti-Virus

Web Anti-Virus intercepts and blocks the execution of scripts located on websites if these scripts pose a threat to the computer's security. Web Anti-Virus in Kaspersky Free Anti-Virus also monitors all web traffic and blocks access to dangerous websites.

IM Antivirus

IM Anti-Virus ensures the security of working with IM clients. The component protects information received on your computer via IM client protocols. IM Anti-Virus ensures safe work with many instant messaging programs.

Secure connection

The VPN client Kaspersky Secure Connection, which is installed with the antivirus, is designed for a secure connection. The application protects your data when using public Wi-Fi networks, provides anonymity on the Internet and allows you to visit blocked sites.

* The Kaspersky Secure Connection component has a traffic limit of 200 MB per day. Removing the restriction and the ability to select VPN servers are available with an additional subscription.

Participation in Kaspersky Security Network

To improve the protection of your computer, Kaspersky Free Anti-Virus uses protection from the cloud. Protection from the cloud is implemented using the infrastructure Kaspersky Security Network using data received from users around the world.

Benefits of Kaspersky Free Anti-Virus

One of the best antiviruses in terms of searching and detecting unknown viruses (that is, the heuristic analysis in the program is so advanced that thanks to it this antivirus finds dangerous files, even if the antivirus databases do not yet have this threat).

After installing Dr.Web, access to the Internet is often blocked, which can only be corrected by proper configuration and making exceptions to the program. So before installing this software, do not be lazy and read the setup instructions and help on the developers' website.

Main features of Dr.Web Anti-virus for Windows

· Dr.Web Scanner for Windows is an anti-virus scanner with a graphical interface that runs at the user's request or according to a schedule and performs an anti-virus scan of the computer.

· Anti-rootkit Dr.Web (Anti-rootkit API, arkapi)- background scanning for rootkits and the new arkapi. A subsystem for background scanning and neutralization of active threats has been implemented. The implementation of the subsystem required significant reworking of the Dr.Web software libraries.

· Preventive protection– advanced features of preventive protection of Dr.Web Anti-virus user's computer from infection by blocking automatic modification of critical Windows objects, as well as control of some unsafe actions.

Dr.Web anti-virus provides control over the following objects using preventive protection:

– HOSTS file;
– Possibility of low-level disk access;
- the ability to download drivers;
– access to Image File Execution Options;
– access to User Drivers;
– parameters of the Winlogon shell;
– Winlogon notifiers;
– Windows shell autorun;
– associations of executable files;
– Program Restriction Policies (SRP);
– Internet Explorer plug-ins (BHO);
- autostart programs;
– autostart policies;
– safe mode configuration;
– Session Manager parameters;
- system services.

The improved Dr.Web ShellGuard technology of the Dr.Web Process Heuristic non-signature (behavioral) blocking in the Dr.Web Preventive Protection system will protect against attacks using zero-day vulnerabilities.

· Dr.Web HyperVisor is a component that made it possible to improve the system for detecting and treating threats, as well as to strengthen Dr.Web self-defense by using the capabilities of modern processors. The component starts and runs below the operating system level, which ensures control of all programs, processes, and operation of the OS itself, as well as the impossibility of malware intercepting control over the protected Dr.Web system.

· SpIDer Guard– anti-virus watchman, which is constantly in the RAM, checking files and memory on the fly, as well as detecting manifestations of virus activity;

· SpIDer Mail– a mail anti-virus guard that intercepts requests from any computer mail clients to mail servers using the POP3/SMTP/IMAP4/NNTP protocols (IMAP4 means IMAPv4rev1), detects and neutralizes mail viruses before the mail client receives messages from the server or before sending the letter to mail server. The mail watchman can also check correspondence for spam using Dr.Web Antispam;

· Dr. Web Firewall– a personal firewall of Dr.Web Anti-virus designed to protect your computer from unauthorized access from the outside and prevent leakage of important data over the network;

· Update module, which allows registered users to receive updates of virus databases and other files of the complex, and also installs them automatically; allows unregistered users to register or receive a demo key.

· SpIDer Agent– a module used to configure and manage the operation of Dr.Web Anti-virus components.

Dr.Web CureIt! is a free anti-virus scanner based on the core of the Dr.Web anti-virus program that will quickly and efficiently scan and cure your computer without installing Dr.Web anti-virus itself.

Antivirus Dr.Web CureIt! detects and removes mail and network worms, file viruses, Trojans, stealth viruses, polymorphic, incorporeal and macro viruses, viruses that infect MS Office documents, script viruses, spyware (Spyware), password stealers, dialers, adware, hack tools, potentially dangerous software and any other unwanted code.

Using the utility, you can check the computer's BIOS for infection with "bios kits" - malware that infects the PC's BIOS, and a new rootkit search subsystem allows you to detect complex hidden threats.

Free payment:

1. Does not provide real-time protection.

2. The program does not include a module automatic update anti-virus databases, so in order to scan your computer next time with the latest anti-virus database updates, you will need to download again Dr.Web CureIt!

– Use of the special free version of the software is only legal on your personal computer. If you use a special free version of the software, you are fully subject to the terms License Agreement, with the exception of paragraphs 6.1-6.3.

Dr.Web also has one wonderful utility - Dr.Web Cureit (which does not need to be installed)! The portable utility can be run even from a flash drive, it is absolutely free and does not require any activation. Finds all viruses available and paid versions of Dr.Web. It often helps to detect both and when on a computer.

But be careful before treatment, carefully read the detected Dr.Web Cureit threats. All processes that monitor the computer in real time, such as CCleaner or Advanced SystemCare Ultimate, are determined by the utility to be unsafe. During treatment, the software is not completely removed, but only some files, but the program no longer starts after that, and is also not subject to standard removal - you will have to clean it manually.

The utility is available on the developers website https://free.drweb.com/cureit

Comodo Antivirus

Website: https://antivirus.comodo.com/

What captivates in this antivirus is that, in addition to the “normal” antivirus databases, it has built-in databases for searching and detecting various adware (which is very popular lately). If you want to protect your browsers and programs for working with the Internet from all sorts of banners (which often appear so intrusively on the floor of the screen ...) - I recommend trying Comodo Antivirus (especially since the program is free).

Some antivirus software vendors offer free products where some features are not available and are reserved for paid versions. The free Comodo Antivirus includes absolutely everything in the company's paid solution, with just one major exception. The antivirus does a great job at basic protection tasks, but some of the advanced features are quite complicated and more suitable for geeks than ordinary users.

Advantages

  • high scores in tests of independent laboratories;
  • good results in our own malware blocking tests;
  • contains secure browser, virtual desktop, virtualization system.

Flaws

  • Comodo participates in tests from a limited number of labs;
  • weak blocking of malicious links based on test results;
  • nominal phishing protection;
  • recognized some trusted PC Magazine utilities as malware;
  • the HIPS system (disabled by default) in the active state displays a large number of notifications that mislead the user.

Overall rating

Comodo Antivirus offers reliable antivirus protection and a rich collection of additional security tools. However, the implementation of auxiliary components is more for advanced users.

360 Internet Security

Website: https://www.360totalsecurity.com/


A very interesting free antivirus that is rapidly gaining popularity. In addition to the built-in antivirus, there are functions for eliminating some vulnerabilities in Windows, functions for installing patches and fixes, optimizing and speeding up the system, and cleaning the PC of “garbage” (unnecessary and temporary files).

Key features of 360 Total Security

AT new version 360 Total Security added the Avira antivirus engine and System Repair for system recovery to the existing Bitdefender engines, the proactive QVM II and the cloud-based 360 Cloud.

Also added are the functions of acceleration and cleaning “in one click” to optimize the performance of the computer.

Total Security solves the vulnerability problems of the Windows operating system by checking the system for uninstalled patches and updates, allowing you to download and install them.

System check
– One-click quick check of the general health and security of your computer

Antivirus scanning
– Use of 5 engines, including antivirus 360 Cloud Engine / QVMII / Avira and Bitdefender for comprehensive protection and better detection, as well as System Repair for system recovery.

System acceleration
– Allows you to manage and optimize the startup of applications, plugins and services. Reduce your PC boot time.

Cleaning the system
- Helps free up hard drive space by cleaning up junk files from your computer and making you work more efficiently.

Real time protection
– Protect your computer from malware, hidden threats and the latest threats using fast and intelligent cloud technology.

Fixing vulnerabilities
– 360 Total Security detects vulnerabilities in Windows system and allows you to download and install all necessary security updates.

Security in a sandbox environment
– The Sandbox allows you to run selected applications (for example, a browser) in an isolated environment and work with them without the risk of harming the main system. It is possible to launch applications in the sandbox from the context menu and add to the list for automatic launch in the sandbox.

Firewall (firewall)
– Includes stand-alone tool GlassWire- network security monitor and firewall to control your network. The program protects your computer by visualizing network activity on a convenient graph and helping you to detect unusual behavior of malware on the Internet.

remote assistance
360 Connect is a mobile application for Android that allows you to manage protection remotely using your smartphone and receive notifications about the status of a computer with 360 Total Security antivirus installed.

Installation and use rights

– 360 Total Security is a free product for personal use. Qihoo 360 Software only grants a limited license to download, install, use and copy the software on a single device for non-commercial use with no limit on the number of uses.

The best antivirus is a backup copy of important documents on third-party media…

When creating the article, materials were used http://www.comss.ru/

mob_info