Tagged: comodo

Comodo cloud antivirus version 1 – Review & settings

Malware is detected using comodo cloud engine. So computer must be connected to internet inorder to detect malware.

Malware detection rate is good.

Weak in detecting new malwares. But your computer will remain protected because unknown files will be automatically sandboxed.

Antivirus scan speed is slow.

Autosandboxing will sandbox some good applications also.

There is no malicious and phishing URL protection.

Comodo cloud antivirus can be used as an additional protection together with other antivirus softwares.

DOWNLOAD LINK

 

  • After installation tick “Don’t show this windows again”

COMODO CLOUD ANTIVIRUS INSTALL_30042016_130845

  • The main interface of comodo cloud antivirus

COMODO CLOUD ANTIVIRUS INTERFACE_30042016_131015

 

  • Various types of scan available

COMODO CLOUD ANTIVIRUS MANUAL SCAN_30042016_131054

  • Quick scan in progress

COMODO CLOUD ANTIVIRUS MANUAL SCAN_30042016_131133

  • Custom scan detects malware

COMODO CLOUD ANTIVIRUS MANUAL SCAN_30042016_131804

  • Various actions that can be taken on detected malware

COMODO CLOUD ANTIVIRUS MANUAL SCAN_30042016_132027

SETTINGS

You can click on ? icon at top right corner to see the detail help file about the various settings

COMODO CLOUD ANTIVIRUS SETTINGS_30042016_203146

 

COMODO CLOUD ANTIVIRUS SETTINGS_30042016_203154

  • Excluded path contains files & folders which will not be scanned by comodo antivirus
  • Excluded Applications contains executable softwares which will not be scanned by comodo antivirus

COMODO CLOUD ANTIVIRUS SETTINGS_30042016_203208

 

COMODO CLOUD ANTIVIRUS SETTINGS_30042016_203212

 

COMODO CLOUD ANTIVIRUS SETTINGS_30042016_203217

 

COMODO CLOUD ANTIVIRUS SETTINGS_30042016_203224

 

COMODO CLOUD ANTIVIRUS SETTINGS_30042016_203227

 

COMODO CLOUD ANTIVIRUS SETTINGS_30042016_203241

QUARANTINE

  • Various actions that can be done on quarantined malware

COMODO CLOUD ANTIVIRUS QUARANTINE_30042016_203328

AUTOSANDBOXING

  • By default comodo sandboxes an unknown application when executed.
  • If it is a safe application then click “Don’t sandbox it again”.
  • Warning : If you click “Don’t sandbox it again” and the unknown application is malware then your computer will be in danger of destruction done by malware.

COMODO CLOUD ANTIVIRUS AUTOSANDBOXING_30042016_213307

INSTALLING & UNINSTALLING AN APPLICATION

  • It is advisable by me that before you install or uninstall a safe software, turn OFF the sandbox as shown below.
  • After the install or uninstall of safe application is completed, turn ON the sandbox.

COMODO CLOUD ANTIVIRUS AUTOSANDBOXING_30042016_213358

MALWARE DETECTION

  • If a malware is detected by comodo cloud antivirus then this message will be shown.
  • Click “Clean” to quarantine the malware which is recommended action

COMODO CLOUD ANTIVIRUS MALWARE DETECTION_30042016_214246

Comodo Internet Security Premium 8 : Review + settings

COMODO INTERNET SECURITY PREMIUM 8

Malware detection rate is good.

Firewall is very good.

Proactive protection is very good.

HIPS protects the system from unknown malwares and is heavily user dependent. So Comodo is not for novice users.

Viruscope monitors the activities of processes running on your computer and alerts you if they take actions that could potentially threaten your privacy and/or security. Apart from forming yet another layer of malware detection and prevention, the sub-system represents a valuable addition to the core process-monitoring functionality of the Defense+ by introducing the ability to reverse potentially undesirable actions of software without necessarily blocking the software entirely. This feature can provide you with more granular control over otherwise legitimate software which requires certain actions to be implemented in order to run correctly.

YOU MUST READ COMODO HELP FILE

FEATURES

  • Firewall
    Comodo’s Firewall consistently ranks among the highest in industry tests.
  • Defense+ Technology
    Proactive protection to automatically isolate threats from suspicious files so they can’t cause harm actually preventing infections not just detecting them. Cloud based whitelisting of trusted publisher easily identifies a safe file and vendor.
  • Policy based automatic-sandboxing
    • Ability to create automatic sandboxing rule based on various parameters such as file reputation, file origin, file source etc.
    • New default auto-sandboxing policy which is fine-tuned to isolate risky unknown applications
  • Hardware virtualization support
    • When Intel VT-x or AMD SVM Virtualization extensions are available, Enhanced Protection Mode makes use of these technologies and CIS operates at hypervisor level
  • Minimal Interruptions
    Comodo Internet Security  8 relieves you of the responsibility of deciding whether to block or allow untrusted files – it makes the decisions for you. Game Mode suppresses operations that could interfere with a user’s gaming experience such as alerts, virus database updates or scheduled scans.
  • Spyware Scanning
    Spyware Scanner detects and cleans malware infections in PC registry and disks.
  • Cloud based Antivirus
    Cloud based antivirus scanning detects malicious file even if a user does not have up-to-date virus definitions.

 DOWNLOAD Comodo Internet Security Premium 8

INSTALLATION

  • You can customize the installation by clicking  “Customize Installation

COMODO INTERNET SECURITY 8.2 INSTALL_07-04-2015_17-11-53

  • Untick the feature you don’t want to install

 

COMODO INTERNET SECURITY 8.2 INSTALL_07-04-2015_17-12-06

COMODO INTERNET SECURITY 8.2 INSTALL_07-04-2015_17-12-27

COMODO INTERNET SECURITY 8.2 INSTALL_07-04-2015_17-12-44

  • The main interface

 

COMODO INTERNET SECURITY 8.2 INTERFACE_07-04-2015_19-20-03

 

COMODO INTERNET SECURITY 8.2 INTERFACE_07-04-2015_19-20-08

 

  • When asked to choose the location, select correct one.
  • If you are not sure just select “I am at public place

COMODO INTERNET SECURITY 8.2 NETWORK LOCATION_07-04-2015_17-16-28

 

COMODO INTERNET SECURITY 8.2 TASKS_07-04-2015_19-20-55

 

COMODO INTERNET SECURITY 8.2 TASKS_07-04-2015_19-21-00

 

COMODO INTERNET SECURITY 8.2 TASKS_07-04-2015_19-21-05

 

COMODO INTERNET SECURITY 8.2 TASKS_07-04-2015_19-21-09

BETTER SETTING

  • User may un-tick “Show messages from COMODO Message center
  • Un-tick “Show welcome screen on startup
  • Un-tick “Show the upgrade button in the main interface

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-22-57

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-24-11

  • Tick “Enable enhanced protection mode

 

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-27-14

  • When shown this window click “yes

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-27-10

 

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-27-41

 

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-27-45

  • Select the auto-sandboxed rule as shown below and click “Edit”

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-27-51

  • Set “Any” under tab “Origin” as shown below

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-27-57

  • Tick “Do NOT show popup alerts

COMODO INTERNET SECURITY 8.2 BETTER SETTINGS_07-04-2015_20-51-00

 

  • Select “Block requests” next to “Do NOT show popup alerts

COMODO INTERNET SECURITY 8.2 BETTER SETTINGS_07-04-2015_20-51-10

 

  • Un-tick “Do NOT show popup alerts

COMODO INTERNET SECURITY 8.2 ADVANCED SETTINGS_07-04-2015_17-29-26

RATING SCAN

The ‘Rating Scan’ feature runs a cloud-based assessment on files on your computer to assess how trustworthy they are.

Based on the trustworthiness, the files are rated as:

  • Trusted – the file is safe
  • Unknown – the trustworthiness of the file could not be assessed
  • Bad – the file is unsafe and may contain malicious code. You will be presented with disinfection options for such files.

 

COMODO INTERNET SECURITY 8.2 RATING SCAN_07-04-2015_20-58-46

 

COMODO INTERNET SECURITY 8.2 RATING SCAN_07-04-2015_20-58-50

 

COMODO INTERNET SECURITY 8.2 RATING SCAN_07-04-2015_21-00-47

COMODO INTERNET SECURITY 8.2 RATING SCAN_07-04-2015_21-01-03

 COMODO CLOUD LOOKUP

  •  Cloud lookup checks the rating of selected files using online Comodo databse
  • Select all the files and select “lookup”

COMODO INTERNET SECURITY 8.2 COMODO CLOUD LOOKUP_08-04-2015_10-11-51

  • Comodo lookup shows the rating of scanned files

 

COMODO INTERNET SECURITY 8.2 COMODO CLOUD LOOKUP_08-04-2015_10-12-45

 

COMODO INTERNET SECURITY 8.2 COMODO CLOUD LOOKUP_08-04-2015_10-59-29

COMODO INTERNET SECURITY 8.2 COMODO CLOUD LOOKUP_08-04-2015_10-59-40

 

  • When asked for submitting unknown files click “yes“, to upload those files to Comodo for analysis

COMODO INTERNET SECURITY 8.2 COMODO CLOUD LOOKUP_08-04-2015_10-59-52

  • Submitting files may take some time depending on your internet speed

COMODO INTERNET SECURITY 8.2 COMODO CLOUD LOOKUP_08-04-2015_11-02-39

  • Don’t worry about failed upload

COMODO INTERNET SECURITY 8.2 COMODO CLOUD LOOKUP_08-04-2015_11-27-19

  • You may Clean the list of submitted files

 

COMODO INTERNET SECURITY 8.2 SUBMIT FILES_08-04-2015_11-28-46

 

INSTALLING APPLICATIONS

Since auto-sandboxing has been enabled, while installing some applications the installer application may get sandboxed. This will cause unsuccessful installation.

To successfully install safe applications

  • Disable auto-sandboxing

COMODO INTERNET SECURITY 8.2 ENABLE DISABLE AUTOSANDBOXING_07-04-2015_20-52-42

 

COMODO INTERNET SECURITY 8.2 ENABLE DISABLE AUTOSANDBOXING_07-04-2015_20-53-00

 

 

  • Install the safe application

 

  • After the installation is complete, enable the auto-sandoxing

COMODO INTERNET SECURITY 8.2 ENABLE DISABLE AUTOSANDBOXING_07-04-2015_20-53-11

While installing some safe application, user may get this alert. This is false positive

  • Tick “Do not ask me this question again”
  • Click “No. i will try to clean it myself”

COMODO INTERNET SECURITY 8.2 CLOUD LOOKUP_07-04-2015_19-38-24

 

  • Click “Ignore

COMODO INTERNET SECURITY 8.2 CLOUD LOOKUP_07-04-2015_19-38-29

  • Click “Ignore and Report as False Alert

 

COMODO INTERNET SECURITY 8.2 CLOUD LOOKUP_07-04-2015_19-38-41

RUNNING UNKNOWN APPLICATIONS

While trying to run unrecognized application user will get this message because the unrecognized application will be forced to run inside sandbox.

This unrecognized application can be a good application or it can be malware which can harm the computer.

  • If user is sure that this is a safe application then click “Do not isolate next again”
  • Close the application.
  • Start it again

 

COMODO INTERNET SECURITY 8.2 APP AUTOSANDBOXING_07-04-2015_20-55-40

  • Open File List
  • Find application with file rating “unrecognized”. If it is good application then change the “file rating” to “trusted”

COMODO INTERNET SECURITY 8.2 FILE RATING_07-04-2015_21-04-53

 

 

 

 

Comodo Firewall 8 : Review + Settings

COMODO FIREWALL 8

Malware detection rate is good and is based on cloud. When you run an application Comodo will check if its malware or not using cloud based detection.

Protection from unknown malware is based on HIPS and Sandboxing of unknown applications.

HIPS is heavily user dependent. So be careful what option you choose.

Firewall will ask user if an unknown application tries to connect to internet.

 FEATURES

  • Default Deny Protection™
    Makes sure that only known PC-safe applications execute
  • Prevention-based security
    Stops viruses and malware before they access your computer…so it isn’t too late to stop them.
  • Auto Sandbox Technology™
    The sandbox is a virtual operating environment for untrusted programs – ensuring viruses and other malicious software are completely isolated from the rest of your computer
  • Personalized alerts
    Firewall remembers which software is allowed to operate and changes its alerts accordingly.
  • Cloud based Behavior Analysis
    Cloud based behavior analysis system detects zero-day malware INSTANTLY.
  • Cloud based Whitelisting
    Cloud based whitelisting of trusted publisher easily identifies a safe file and vendor
  • Game Mode
    Suppresses operations that could interfere with a user’s gaming experience such as alerts, virus database updates or scheduled scans.
  • Application Control
    Provides users with the ability to lockdown their PC so only known good applications can run.
  • Automatic updates
    Stay current with the latest protection.
  • Precise and specific alert system
    Warnings specify the level and type of possible threat from each source.
  • Easy to configure
    Tell the free firewall to scan upon installation and add all current applications to the safe-list.
  • Detailed summary screen
    Easily access an at-a-glance snapshot of current security settings
  • Uncluttered, user-friendly interface
    Quickly navigate through the various parts of Firewall protection without getting lost
  • Thorough security “wizards”
    Preset security settings for simple point-and-click setup
  • ‘Training Mode’ lets Firewall automatically create ‘allow’ rules
    Firewall software learns your trusted programs to minimize alerts

ONLINE HELP LINK

DOWNLOAD Comodo Firewall 8

 

 

  • When asked to choose location for the network, choose the proper location
  • If not sure then select “I am at a public place”

COMODO FIREWALL 8.2 NETWORK LOCATION_07-04-2015_00-48-20

 

MAIN INTERFACE

COMODO FIREWALL 8.2 INTERFACE_07-04-2015_01-18-16

 

COMODO FIREWALL 8.2 INTERFACE_07-04-2015_01-18-20

  • User can remove shortcuts from task bar as shown below

COMODO FIREWALL 8.2 INTERFACE_07-04-2015_01-18-43

 

COMODO FIREWALL 8.2 INTERFACE_07-04-2015_01-19-18

 

COMODO FIREWALL 8.2 INTERFACE_07-04-2015_01-19-22

  • User can add any of these tasks shortcut to task bar by right clicking on it and selecting “Add to task bar

 

COMODO FIREWALL 8.2 INTERFACE_08-04-2015_15-48-20

 

COMODO FIREWALL 8.2 INTERFACE_07-04-2015_01-19-28

SETTINGS

  • Un-tick “Show messages from COMODO message Center
  • Un-tick “Show welcome screen at startup

 

COMODO FIREWALL 8.2 SETTINGS_07-04-2015_13-59-22

 

  • On 64 bit system, tick “Enable enhanced protection mode

COMODO FIREWALL 8.2 SETTINGS_07-04-2015_14-00-15

  • Tick “Do NOT Show popup alerts

COMODO FIREWALL 8.2 SETTINGS_08-04-2015_17-32-55

 

  • Select “Block requests” next to “Do NOT show popup alerts

COMODO FIREWALL 8.2 BETTER SETTINGS_08-04-2015_15-45-05

  • Untick “Do NOT show popup alerts

 

COMODO FIREWALL 8.2 SETTINGS_07-04-2015_14-02-18

RATING SCAN

The ‘Rating Scan’ feature runs a cloud-based assessment on files on your computer to assess how trustworthy they are.

Based on the trustworthiness, the files are rated as:

  • Trusted – the file is safe
  • Unknown – the trustworthiness of the file could not be assessed
  • Bad – the file is unsafe and may contain malicious code. You will be presented with disinfection options for such files.

 

  • Start the rating scan

COMODO FIREWALL 8.2 RATING SCAN_08-04-2015_16-21-57

COMODO FIREWALL 8.2 FILE RATING SCAN_07-04-2015_14-41-41

  • Select “unrecognized files” next to Show
  • If you know that these files are safe then select Action as “Trusted

COMODO FIREWALL 8.2 FILE RATING SCAN_07-04-2015_14-44-46

COMODO FIREWALL 8.2 FILE RATING SCAN_07-04-2015_14-46-14

FILE LIST

The ‘File List’ pane displays a list of executable files, programs and applications on your system with their trust rating. CIS rates the files as:

COMODO FIREWALL 8.2 SETTINGS_07-04-2015_14-03-52

CLOUD LOOKUP

Cloud lookup rates the selected file using comodo cloud database

 

  • Select all the files in File list
  • Right click and select “Lookup”

COMODO FIREWALL 8.2 CLOUD LOOPKUP_08-04-2015_14-35-52

  • It will show the Rating of scanned files

COMODO FIREWALL 8.2 CLOUD LOOPKUP_08-04-2015_14-36-32

 

  • Don’t worry about Failed rating

COMODO FIREWALL 8.2 CLOUD LOOPKUP_08-04-2015_14-47-31

 

COMODO FIREWALL 8.2 CLOUD LOOPKUP_08-04-2015_14-47-49

 

  • When asked to submit unknown files, click “Yes
  • tick “Remember my answer

COMODO FIREWALL 8.2 CLOUD LOOPKUP_08-04-2015_14-48-01

 

 

COMODO FIREWALL 8.2 CLOUD LOOPKUP_08-04-2015_15-02-27

INSTALLING APPLICATIONS

While installing applications comodo HIPS may show this alert

  • Click “Treat As

COMODO FIREWALL 8.2 INSTALL APPLICATION_08-04-2015_17-00-03

 

  • Select “Installer or Updater

COMODO FIREWALL 8.2 INSTALL APPLICATION_08-04-2015_17-00-07

 

  • You may get this alert saying comodo has detected a threat.
  • If you know that you are installing a safe application, select “No I try to clean it myself

COMODO FIREWALL 8.2 INSTALL APPLICATION_08-04-2015_17-00-30

 

  • Select “Ignore

COMODO FIREWALL 8.2 INSTALL APPLICATION_08-04-2015_17-00-37

 

  • Select “Ignore and report as false positive

COMODO FIREWALL 8.2 INSTALL APPLICATION_08-04-2015_17-00-41

 USING AUTO SANDBOXING

By default autosandboing is disabled. Some user may want to turn it ON. If they choose to do so then do these settings

  • Tick “Enable Auto-Sandboxing
  • Edit the auto-sandbox rule as shown below

 

COMODO FIREWALL 8.2 SETTINGS_07-04-2015_14-01-12

  • Select “Any” under the tab “Origin” as shown below

COMODO FIREWALL 8.2 SETTINGS_07-04-2015_14-01-22

INSTALLING APPLICATIONS WITH AUTO-SANDBOX TURNED ON

Since auto-sandboxing has been enabled, while installing some applications the installer application may get sandboxed. This will cause unsuccessful installation.

To successfully install safe applications

  • Disable auto-sandboxing

COMODO INTERNET SECURITY 8.2 ENABLE DISABLE AUTOSANDBOXING_07-04-2015_20-52-42

 

COMODO INTERNET SECURITY 8.2 ENABLE DISABLE AUTOSANDBOXING_07-04-2015_20-53-00

 

  • Install the safe application
  • After the installation is complete, enable the auto-sandoxing

COMODO INTERNET SECURITY 8.2 ENABLE DISABLE AUTOSANDBOXING_07-04-2015_20-53-11

While installing some safe application, user may get this alert. This is false positive

 

DISABLING HIPS

If you are using Auto-sandboxing then you can disable HIPS.

COMODO FIREWALL 8.2 DISABLE HIPS_08-04-2015_17-19-08

 

 

 

Best free antivirus 2017 for Windows 7/8.1/10 (x86/x64)

The virus, Trojans, and worms can infect your computer. They can cause the slowdown of the computer. They modify the registry settings. They can delete your important files. They can steal your personal information. They can steal you bank account information and password. All of these are can cause serious trouble in your life.

If you already have an antivirus installed in your computer then first uninstall that old antivirus before installing new antivirus . Restart your computer so that all the component of old antivirus gets uninstalled.

Install the latest version of antivirus. After the installation, it is recommended that you restart the computer. Also, keep your antivirus updated.

Also, scan your computer once every week. You can schedule the scanning in the antivirus.

Keep in mind that installing antivirus in a computer which is free from the virus is not the same as installing the antivirus on an infected computer. In an infected computer it may very hard or even impossible to install antivirus because the active virus, malware will not let the antivirus install on the computer. So it is a good habit that you install antivirus in a computer as early as possible after the fresh installation of Windows operating system.

AVCOMPARATIVE REALWORLD PROTECTION MARCH 2016_29042016_111932

  1. Tencent PC Manager
  2. Qihoo 360 Total Security
  3. Bitdefender Antivirus Free
  4. Avast Free Antivirus
  5. AVG Free Antivirus

 

1. Tencent PC Manager

Tencent PC manager is a free antivirus which uses Tencent cloud, Tencent Antivirus engine, Bitdefender antivirus engine and Tencent system repair engine

Malware detection rate is good. Improvements can be done.

Malicious URL detection is the best.

Proactive protection is good. It takes decision most of the time. Sometimes the user will need to take the decision.

It is light on system resources. RAM usage around 200 MB

 

DOWNLOAD LINK

Know more about Tencent PC manager

TENCENT PC MANAGER 11.4 INTERFACE_24042016_164046

2. QIHOO 360 TOTAL SECURITY

  • Qihoo uses Bitdefender and Avira antivirus engine which leads to a very high level of malware detection. In addition, it uses 360 cloud scan engine and cloud-based QVMII AI engine. If you are not connected to the internet while scanning files then you will get lower detection rate. In that case, you will be using offline Bitdefender or Avira engine to detect malware in offline mode.
  • Fast malware detection & removal.
  • Very Good in Block phishing websites & malicious URLs.
  • Stop unauthorized keylogger and webcam access.
  • Protection for the webcam is good. protection from keylogger is weak.
  • Impact on system resources is low. RAM usage between 60 MB to 230 MB depending on which virus database you choose to use.
  • Proactive Protection is good. But requires the user to take proper decision sometimes.
  • Need some computer know-how to use it.

FEATURES

  • Virus Scan : Integrating award-winning antivirus engines from 360 Cloud Engine,360 QVMII, Avira and BitDefender to provide you with the ultimate in Virus detection and protection capabilities.
  • Speedup : Manage and optimize your system services, boot up items and plugins – Shorten your boot time and get going sooner!
  • Cleanup frees your disk space by removing junk files and plugin which can improve system performance – With cleanup, you can decide which areas and files to clean.
  • Protection offers 4 different user selectable modes – Performance/Balanced/Security and Custom. Each mode offers a different level of protection from malware, phishing attacks, and backdoors.
  • WiFi Security Check will analyze your Routers settings to ensure a safe and secure internet experience.
  • You can run risky programs in Sandbox, threats will be kept separate from your system and isolated in the Sandbox.
  • Patch up offers the latest patches and security updates available for your operating system including Windows Operating system updates, using patch up allow you to keep your system up to date and running smoothly.

360 TOTAL SECURITY 5.2_22102014_063434 The proactive defense will generate a lot of messages while installing applications. You need to “allow” when you are installing good applications. But you need to block when you are not sure if the application is safe or unknown application is causing Qihoo to generate a message.

Know more about Qihoo 360 Total security

Download Qihoo 360 Total Security

3. BITDEFENDER ANTIVIRUS FREE

  • Bitdefender provides  a high level of security.
  • Also, malware detection and removal capability is very good.
  • Very easy to use. Good for novice users.
  • Also, it is very light on system resources.Perhaps the lightest of all free antivirus.
  • Its web protection effectively protects from malicious web links.
  • Very accurate.
  • It can take all the decision itself. So very good for novice users that cannot take the correct decision themselves.
  • It updates and upgrades automatically. So install once and you don’t need to worry for years.
  • Proactive protection is very good. So you are protected from new unknown malware.
  • Only negative thing is that you cannot configure it. Manual scanning of a huge number of files may take a long duration of time.
  • Real-time Shield The real time shield is designed to protect your entire system from infected files coming from the outside before they have a chance to spread inside your PC.
  • Active Virus Control Proactive technology that quickly and accurately detects potential threats, even in cases of new viruses for which there is no default protection released yet.
  • Intrusion Detection System Ensures that applications trying to access the Internet or the network are not masked malware. Intrusion Detection is automatically alerted when such apps behave in a suspect manner and blocks them when they go over the limit.
  • B-Have Proactively detects unknown threats that other products miss, by analyzing how apps behave in a safe environment. If no malicious actions are detected, B-Have starts the program normally. Otherwise, it will automatically quarantine or delete it.
  • HTTP Scanning Protects you from scams such as credit card phishing attempts, Bitdefender Antivirus Free Edition scans all the links you access from your browser and blocks them when they prove to be unsafe.
  • Anti-rootkit Rootkits are a type of stealth software, often malicious, that can help hackers get control of your computer. Bitdefender Antivirus Free Edition uses special technology that detects and blocks such malicious software.

bitdefender-free-antivirus_06-12-2016_22-48-14


Know more about Bitdefender Antivirus Free

4. AVAST FREE ANTIVIRUS 

  • Avast has improved. Avast provides a high level of security .
  • it is very easy to use.
  • Its web protection is effective and blocks malicious URL.
  • Its malware detection and removal capability is very good & fast.
  • It is light on system resources.
  • uses very less RAM.
  • Provides a very high level of customization.
  • Good in detecting new unknown malware.
  • Browser Cleanup Get rid of annoying browser add-ons.

AVAST FREE ANTIVIRUS 2015_25102014_083203 Know more about Avast free antivirus 2016

DOWNLOAD Avast Free Antivirus

5. AVG Free Antivirus

  • AVG AntiVirus Free  is fast and free antivirus for Windows OS.
  • It is light on system resources.
  • Updates are small in size. So users with slow internet can also  use it without any problem.
  • Easy to use.
  • AVG malware detection rate is good.
  • Its scanning speed is fast.
  • Proactive protection is good. It will detect most of the new unknown malware on its execution

AVG FREE ANTIVIRUS 2015 INTERFACE_001_17122014_114427

DOWNLOAD AVG ANTIVIRUS FREE

AVG AntiVirus 2016 User Guide : http://files-download.avg.com/doc/AVG_Free/avg_free_uma_en_ltst_20.pdf