- Jun 14, 2011
- 101
I'm killing myself by not being able to decide. Which internet security is better? I'm currently using COMODO, and I'm just curious if there's anything better.
Why?What made you chose Avast 6 IS over Comodo or AVG?Tuan Arsenal said:vote Avast IS 6
thewolfsmith72 said:As i stated in previous post in this thread, it really comes down to your system,uses and knowledge.. I personally prefer CIS of the 3 choices, it is extremely light on the system, and if you take the time to learn how to adjust it, it will give you exceptional control of your system.
gbpackerfan said:I see a lot of people are hating on AVG.. why?
gbpackerfan said:thewolfsmith72 said:As i stated in previous post in this thread, it really comes down to your system,uses and knowledge.. I personally prefer CIS of the 3 choices, it is extremely light on the system, and if you take the time to learn how to adjust it, it will give you exceptional control of your system.
I see a lot of people are hating on AVG.. why?
gbpackerfan said:thewolfsmith72 said:As i stated in previous post in this thread, it really comes down to your system,uses and knowledge.. I personally prefer CIS of the 3 choices, it is extremely light on the system, and if you take the time to learn how to adjust it, it will give you exceptional control of your system.
I see a lot of people are hating on AVG.. why?
McLovin said:gbpackerfan said:I see a lot of people are hating on AVG.. why?
Because, it's not that good at all, it uses tons of RAM, and so many false positives.
Comodo has a better heuristic engine while Avast has better definitions.......gbpackerfan said:So what anti-virus has the best detection rate?
gbpackerfan said:So what anti-virus has the best detection rate?
In addition to AVG’s multi-layered protection, utilizing signature-based antivirus, heuristics and behavior-based threats detection, AVG 2012 comes with the all-new AVG Accelerator and AVG Advice features as well as additional protection technologies
AVG DETECTION METHODS
The key to AVG’s efficiency in detecting infected files and exploits is the technology’s multiple layers of protection. Files are pre-processed - and those deemed unnecessary for virus analysis are excluded to enable faster scanning.
Signature-based detection
This attempts to match files to known virus signatures - a sequence of bytes known to be characteristic of a specific virus. Detailed analysis is then performed to identify the exact infection.
Polymorphic-based detection
A common method for detecting known viruses, this is used to determine new variants of recognized viruses, even if the new variant behaves differently. This method is particularly effective in the detection of macro viruses and script viruses.
Heuristic-based analysis
The third layer for detecting viruses is heuristic analysis, which looks at the way software behaves in order to identify whether or not it is malicious. This allows it to detect a virus, which is not included in the internal virus database.
Behavior-based analysis
This is the fourth layer for detecting viruses. This patent-pending technology looks at how software behaves to determine hostile file behavior and preventing their execution.