![]() That was the weakest performance in the test. The DE Cleaner Antibot did perform well on 14 attackers, a total of 5 attackers went totally undetected. The Microsoft Safety Scanner failed to detect 2 malware threats at all and was unable to remove the active component on one of the attackers. The remaining performance, however, was good. Microsoft Windows Defender as an offline version and Avast Rescue Disk did always detect all malware threats, but in 2 cases each they were unable to remove the active components of the malware. But there was practically no instance where the harmless file remnants were cleaned up as well. The rescue tools Heise Disinfect and G Data BootMedium detected all 19 malware threats and deleted the dangerous components. It left harmless file remnants behind in only 3 cases. Bitdefender Rescue Disk worked almost as well. Even harmless file remnants were no longer found. In the 19 separately-conducted test cases, all the attackers were eliminated, and each system was restored error-free. The best tool in this category also comes from Kaspersky – the Virus Removal Tool. While it did capably solve 32 test cases, in 6 instances it did not even detect the attacker. Bringing up the rear is Enigma Software with SpyHunter. Microsoft's Security Essentials also had the same problem in 3 cases, but this was compounded by 2 undetected malware threats. In 3 cases, Malwarebytes was unable to remove the detected active malware components. ![]() But the system was repaired and free of malware threats. They left only 4 to 9 harmless file remnants. This is followed by the products from Bitdefender, Avast, G Data, Avira and Symantec. The only protection package that removed all 38 tested attacks without leaving any remnants at all – not even harmless traces – is Kaspersky Internet Security. Here is how the protection packages performed The most difficult part of this test: almost everything involved manual labor, because many individual queries have to be answered for infected systems and when cleaning up and restoring the system. ![]() How often did the security package or special tool perfectly remove and repair everything? Many came out on top, and a few flopped ![]() Did any harmless file remnants remain, and were all the changes to the system reversed?Ĥ. Were the active malware components completely removed?ģ. Here is how the special tools were testedĪll the special tools were used on already infected systems, as is the case in everyday use.Ģ. This simulated the case in which the security package initially does not recognize the attacker, which is able to penetrate the system, and the solution only receives the detection information after the fact. In the second scenario, the antivirus protection was switched off briefly for infection, then reactivated. They were installed on an already infected systemĢ. Microsoft Windows Defender Offline Here is how the protection packages were testedġ. The latest test, which ran from January to June 2017, examined the following protection packages and special tools for clean-up after a malware infection:Ĩ special tools (freely available on the Internet) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |