Diferenças entre edições de "Antivírus"

1 370 bytes removidos ,  13h54min de 4 de agosto de 2017
jbç
m (Página marcada que carece de mais notas, usando FastButtons)
(jbç)
Etiquetas: Editor Visual Remoção considerável de conteúdo
{{Mais notas|data=abril de 2017}}
Os '''antivírus''' ou '''antimalwares''' são [[programas de computador]] concebidos para prevenir, detectar e eliminar [[vírus de computador]] e outros [[malware]]s.
 
.
Existe uma grande variedade de [[produto (economia)|produtos]] com esse intuito no mercado, sendo recomendado utilizar apenas um antivírus gratuito ou apenas um pago.<ref>[http://www.informatico.pt/13879/porque-nao-usar-2-antivirus/ Porque não usar 2 antivírus ao mesmo tempo]</ref> A diferença está nas camadas a mais de proteção que a versão paga oferece, além do suporte técnico realizado pela equipe especializada.
 
Entre os antivírus gratuitos mais conhecidos estão: [[AVG]], [[Avast]], [[Avira]] e [[Microsoft Security Essentials|Microsoft Security Essential.]]
 
Entre as opções pagas existentes no Brasil, possuem o melhor desempenho nos testes internacionais<ref>{{Citar web|url=https://bhtechinformatica.com.br/melhor-antivirus-pago/|titulo=Testes internacionais com os melhores antivirus do mercado|data=|acessodata=2017-04-14|obra=bhtechinformatica.com.br|publicado=|ultimo=|primeiro=|lingua=pt-BR}}</ref> os produtos [[Kaspersky Lab|Kaspersky]], [[BitDefender]] (que também possui versão gratuita) e [[Norton AntiVírus|Norton]].
 
== Ver também ==
{{portal|Portal=[[Portal:Tecnologias de informação|Portal das tecnologias de informação]]}}
* [[Vírus informáticos]]
* [[Lista de programas antivírus]]
* [[EICAR|EICAR - Instituto Europeu para Pesquisa de Antivírus de Computador]]
 
{{referências|lifehacker: The Difference Between Antivirus and Anti-Malware (and Which to Use) "What is antivirus software?". Microsoft. John von Neumann: "Theory of self-reproducing automata" (1949) Thomas Chen, Jean-Marc Robert (2004). "The Evolution of Viruses and Worms". Retrieved 2009-02-16. From the first email to the first YouTube video: a definitive internet history. Tom Meltzer and Sarah Phillips. The Guardian. 23 October 2009 IEEE Annals of the History of Computing, Volumes 27-28. IEEE Computer Society, 2005. 74. Retrieved from Google Books on 13 May 2011. "[...]from one machine to another led to experimentation with the Creeper program, which became the world's first computer worm: a computation that used the network to recreate itself on another node, and spread from node to node." John Metcalf (2014). "Core War: Creeper & Reaper". Retrieved 2014-05-01. Creeper - The Virus Encyclopedia What was the First Antivirus Software? "Elk Cloner". Retrieved 2010-12-10. "Top 10 Computer Viruses: No. 10 - Elk Cloner". Retrieved 2010-12-10. "List of Computer Viruses Developed in 1980s". Retrieved 2010-12-10. Fred Cohen: "Computer Viruses – Theory and Experiments" (1983) Fred Cohen 1988 "On the implications of Computer Viruses and Methods of Defense" Péter Szőr: "The Art of Computer Virus Research and Defense" (2005) VirusBulletin: "In memoriam: Péter Szőr 1970-2013" (2013) History of viruses Leyden, John (January 19, 2006). "PC virus celebrates 20th birthday". The Register. Retrieved March 21, 2011. Panda Security (April 2004). "(II) Evolution of computer viruses". Retrieved 2009-06-20.[dead link] Kaspersky Lab Virus list Wells, Joe (1996-08-30). "Virus timeline". IBM. Archived from the original on 4 June 2008. Retrieved 2008-06-06. G Data Software AG (2011). "G Data presents security firsts at CeBIT 2010". Retrieved 22 August 2011. Karsmakers, Richard (January 2010). "The ultimate Virus Killer UVK 2000". Retrieved 22 August 2011. "McAfee Becomes Intel Security". McAfee Inc. Retrieved 15 January 2014. Cavendish, Marshall (2007). Inventors and Inventions, Volume 4. Paul Bernabeo. p. 1033. ISBN 0761477675. Cohen, Fred, An Undetectable Computer Virus (Archived), 1987, IBM Patricia A. Yevics:"Flu Shot for Computer Viruses" How friends help friends on the Internet: The Ross Greenberg Story Anti-virus is 30 years old A Brief History of Antivirus Software Antivirus software history http://www.frisk.is/fyrirtaeki.html VIRUS-L mailing list archive Symantec Softwares and Internet Security at PCM SAM Identifies Virus-Infected Files, Repairs Applications, InfoWorld, May 22, 1989 SAM Update Lets Users Program for New Viruses, InfoWorld, Feb 19, 1990 TG Soft History Skúlason and Bontchev: "Virus Naming Scheme" (1991) "CARO Members". CARO. Retrieved 6 June 2011. CAROids, Hamburg 2003 "F-Secure Weblog : News from the Lab". F-secure.com. Retrieved 2012-09-23. "About EICAR". EICAR official website. Retrieved 28 October 2013. David Harley, Lysa Myers & Eddy Willems. "Test Files and Product Evaluation: the Case for and against Malware Simulation". AVAR2010 13th Association of anti Virus Asia Researchers International Conference. Retrieved June 30, 2011. "Dr. Web LTD Doctor Web / Dr. Web Reviews, Best AntiVirus Software Reviews, Review Centre". Reviewcentre.com. Retrieved 2014-02-17. [In 1994, AV-Test.org reported 28,613 unique malware samples (based on MD5). "A Brief History of Malware; The First 25 Years"] "BitDefender Product History". "InfoWatch Management". InfoWatch. Retrieved 12 August 2013. Linuxvirus [1] "Sourcefire acquires ClamAV". ClamAV. 2007-09-17. Retrieved 2008-02-12. "Cisco Completes Acquisition of Sourcefire". cisco.com. 2013-10-07. Retrieved 2014-06-18. "(german) Interview with Morten Lund in Brandeins". "The digital detective: Mikko Hypponen’s war on malware is escalating." (March 2012, Wired) James Lyne: "Everyday cybercrime – and what you can do about it" (February 2013, TED) Szor 2005, pp. 66–67 "New virus travels in PDF files". 7 August 2001. Retrieved 2011-10-29. Slipstick Systems (February 2009). "Protecting Microsoft Outlook against Viruses". Archived from the original on 2 June 2009. Retrieved 2009-06-18. Jon Oberheide: "CloudAV: N-Version Antivirus in the Network Cloud” (2008, Usenix) Szor 2005, pp. 474–481 A Machine Learning Approach to Anti-virus System Data Mining Methods for Malware Detection Data mining and Machine Learning in Cybersecurity Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection A survey of data mining techniques for malware detection using file features Intelligent automatic malicious code signatures extraction Malware Detection by Data Mining Techniques Based on Positionally Dependent Features Data mining methods for detection of new malicious executables IMDS: Intelligent Malware Detection System Learning to Detect and Classify Malicious Executables in the Wild Malware detection using statistical analysis of byte-level file content An intelligent PE-malware detection system based on association mining Malware detection based on mining API calls "Andromaly": a behavioral malware detection framework for android devices Szor 2005, pp. 252–288 "Generic detection". Kaspersky. Retrieved 2013-07-11. Symantec Corporation (February 2009). "Trojan.Vundo". Archived from the original on 9 April 2009. Retrieved 2009-04-14. Symantec Corporation (February 2007). "Trojan.Vundo.B". Archived from the original on 27 April 2009. Retrieved 2009-04-14. "Antivirus Research and Detection Techniques". ExtremeTech. Archived from the original on 27 February 2009. Retrieved 2009-02-24. Rootkit Kaspersky Lab Technical Support Portal Archived 13 February 2011 at WebCite Kelly, Michael (October 2006). "Buying Dangerously". Retrieved 2009-11-29. Bitdefender (2009). "Automatic Renewal". Retrieved 2009-11-29. Symantec (2014). "Norton Automatic Renewal Service FAQ". Retrieved 2014-04-09. SpywareWarrior (2007). "Rogue/Suspect Anti-Spyware Products & Web Sites". Retrieved 2009-11-29. Emil Protalinski (November 11, 2008). "AVG incorrectly flags user32.dll in Windows XP SP2/SP3". Ars Technica. Retrieved 2011-02-24. McAfee to compensate businesses for buggy update, retrieved 2 December 2010 Buggy McAfee update whacks Windows XP PCs, archived from the original on 13 January 2011, retrieved 2 December 2010 Aaron Tan (May 24, 2007). "Flawed Symantec update cripples Chinese PCs". CNET Networks. Retrieved 2009-04-05. David Harris (June 29, 2009). "January 2010 - Pegasus Mail v4.52 Release". Pegasus Mail. Archived from the original on 28 May 2010. Retrieved 2010-05-21. "McAfee DAT 5958 Update Issues". 21 April 2010. Archived from the original on 24 April 2010. Retrieved 22 April 2010. "Botched McAfee update shutting down corporate XP machines worldwide". 21 April 2010. Archived from the original on 22 April 2010. Retrieved 22 April 2010. John Leyden (December 2, 2010). "Horror AVG update ballsup bricks Windows 7". The Register. Retrieved 2010-12-02. MSE false positive detection forces Google to update Chrome, retrieved 3 October 2011 Sophos Antivirus Detects Itself as Malware, Deletes Key Binaries, The Next Web, retrieved 5 March 2014 Shh/Updater-B false positive by Sophos anti-virus products, Sophos, retrieved 5 March 2014 Microsoft (January 2007). "Plus! 98: How to Remove McAfee VirusScan". Archived from the original on 27 September 2014. Retrieved 2014-09-27. Robert Vamosi (May 28, 2009). "G-Data Internet Security 2010". PC World. Retrieved 2011-02-24. Kelly Jackson Higgins (May 5, 2010). "New Microsoft Forefront Software Runs Five Antivirus Vendors' Engines". Darkreading. Retrieved 2011-02-24. Microsoft (April 2009). "Steps to take before you install Windows XP Service Pack 3". Archived from the original on 8 December 2009. Retrieved 2009-11-29. "Upgrading from Windows Vista to Windows 7". Retrieved 24 March 2012. Mentioned within "Before you begin". "Upgrading to Microsoft Windows Vista recommended steps.". Retrieved 24 March 2012. "How to troubleshoot problems during installation when you upgrade from Windows 98 or Windows Millennium Edition to Windows XP". Last Review: May 7, 2007. Retrieved 24 March 2012. Check date values in: date= (help) Mentioned within "General troubleshooting". "Troubleshooting". Retrieved 2011-02-17. "Spyware, Adware, and Viruses Interfering with Steam". Retrieved 11 April 2013. Steam support page. Field Notice: FN - 63204 - Cisco Clean Access has Interoperability issue with Symantec Anti-virus - delays Agent start-up Dan Goodin (December 21, 2007). "Anti-virus protection gets worse". Channel Register. Retrieved 2011-02-24. [2] Dan Illett (July 13, 2007). "Hacking poses threats to business". Computer Weekly. Retrieved 2009-11-15. Tom Espiner (June 30, 2008). "Trend Micro: Antivirus industry lied for 20 years". ZDNet. Retrieved 2014-09-27. AV Comparatives (December 2013). "Whole Product Dynamic "Real World" Production Test". Archived from the original on 2 January 2013. Retrieved 2 January 2014. Guidelines released for antivirus software tests Harley, David (2011). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 487. ISBN 9780080558660. Retrieved 2013-06-10. Kotadia, Munir (July 2006). "Why popular antivirus apps 'do not work'". Retrieved 14 April 2010. The Canadian Press (April 2010). "Internet scam uses adult game to extort cash". CBC News. Archived from the original on 18 April 2010. Retrieved 17 April 2010. Researchers up evilness ante with GPU-assisted malware - Coming to a PC near you, by Dan Goodin GIBSON RESEARCH CORPORATION SERIES: Security Now! "Cryptolocker Ransomware: What You Need To Know". Retrieved 2014-03-28. "How Anti-Virus Software Works". Retrieved 2011-02-16. "BT Home Hub Firmware Upgrade Procedure". Retrieved 2011-03-06. "The 10 faces of computer malware". July 17, 2009. Retrieved 2011-03-06. "New BIOS Virus Withstands HDD Wipes". 27 March 2009. Retrieved 2011-03-06. "Phrack Inc. Persistent BIOS Infection". June 1, 2009. Retrieved 2011-03-06.[dead link] "Turning USB peripherals into BadUSB". Retrieved 2014-10-11. "Why the Security of USB Is Fundamentally Broken". 2014-07-31. Retrieved 2014-10-11. "How Antivirus Software Can Slow Down Your Computer". Support.com Blog. Retrieved 2010-07-26. "Softpedia Exclusive Interview: Avira 10". Ionut Ilascu. Softpedia. 14 April 2010. Retrieved 2011-09-11. "Norton AntiVirus ignores malicious WMI instructions". Munir Kotadia. CBS Interactive. 21 October 2004. Retrieved 2009-04-05. Zeltser, Lenny (October 2010). "What Is Cloud Anti-Virus and How Does It Work?". Archived from the original on 10 October 2010. Retrieved 2010-10-26. Jon Erickson (August 6, 2008). "Antivirus Software Heads for the Clouds". Information Week. Retrieved 2010-02-24. Brian Krebs (March 9, 2007). "Online Anti-Virus Scans: A Free Second Opinion". Washington Post. Retrieved 2011-02-24. Ryan Naraine (February 2, 2007). "Trend Micro ships free 'rootkit buster'". ZDNet. Retrieved 2011-02-24. Neil J. Rubenking (March 26, 2010). "Avira AntiVir Personal 10". PC Magazine. Retrieved 2011-02-24. Neil J. Rubenking (September 16, 2010). "PC Tools Spyware Doctor with AntiVirus 2011". PC Magazine. Retrieved 2011-02-24. Neil J. Rubenking (October 4, 2010). "AVG Anti-Virus Free 2011". PC Magazine. Retrieved 2011-02-24. Neil J. Rubenking (November 19, 2009). "PC Tools Internet Security 2010". PC Magazine. Retrieved 2011-02-24. Carrie-Ann Skinner (March 25, 2010). "AVG Offers Free Emergency Boot CD". PC World. Retrieved 2011-02-24. "FBI estimates major companies lose $12m annually from viruses". 30 January 2007. Retrieved 20 February 2011. Michael Kaiser (April 17, 2009). "Small and Medium Size Businesses are Vulnerable". National Cyber Security Alliance. Retrieved 2011-02-24. "Nearly 50% of women don't use antivirus". SPAMfighter. = }}
 
Utilizador anónimo