Advice Request Do HitmanPro and Zemana Antimalware need active data connection for scanning?

Please provide comments and solutions that are helpful to the author of this topic.

Status
Not open for further replies.

KillerSpy007

Level 1
Thread author
Dec 29, 2017
9
Do HitmanPro and Zemana Antimalware need active data connection for scanning?
Do they offer offline scanning?
 
Last edited by a moderator:
  • Like
Reactions: spaceoctopus

Cats-4_Owners-2

Level 39
Verified
Honorary Member
Top Poster
Well-known
Dec 4, 2013
2,800
Realtime protections would require being connected.
If used as secondary scanners, you would connect in order to update their database files.
Additionally, here is an excerpt of a thread from bleepingcomputer.com :
  • "...Zemana has partnered with SurfRight, and incorporated SurfRight's proven Hitman Pro 3 technology into Zemana Anti-Malware. Zemana Anti-Malware was designed to be used in conjunction with other malware-fighting programs."
Read more: Had Zemana antimalware real time protection on while also having Emsisoft on - Anti-Virus, Anti-Malware, and Privacy Software

I recommend taking advantage of the benefits of UAC (User Activated Control) by using it set (at least) to default.
In addition, you might consider
VoodooShield™ - The User-Friendly Toggling Computer Lock.

Am I correct in noting you do not have realtime protections because you opt not to be connected online?

Either way, thank you for sharing & allowing us to share with you.:D
 

South Park

Level 9
Verified
Well-known
Jun 23, 2018
431
During an Internet outage here, the HMP on-demand scanner wouldn't scan, giving an error message instead.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top