Summary
Application development to protect the computer system from malicious code
Application domain of the abstract is informatics.
In the abstract describes the design and construction administration for the protection of computer systems from malicious code. The functionality of the application is as follows: Real-time protection from malware, internet security, identity protection, protection of portable devices, smart core detection and removal of malware.
1 . Browser protection (Browser protection). It contains several major modules : download Scanner , temporery file scanner , cookie protection, on screen keyboard. The scanner downloaded files (download ) scan represents a module that scans every file that is downloaded or already downloaded to the directory specified by the user. It can be set as default browser . Temporery file scanner scans each file in the temporary directory or when created by WEB browser . Cookie protection is a security module, which does not allow to save the so-called . " Cookies " . There are two types of cookies - a cookie that contains information about visited websites , passwords, user accounts and cookie , which supports the collection of information from websites with unauthorized means. On screen keyboard is part of a program to protect your Web browser that protects user accounts entered in the console keyboard . Unlike peripheral onscreen keyboard encrypted characters that are pressed by the user.
2 . USB protection is carried out by two of the main modules in the antivirus program - real-time protection and scanning. Real-time protection is activated if the user has set a setting in order to fulfill the command to protect the USB device. When the device is protected on its action as observed e. Change the file , save the file , delete the file and create a file. In this way the user can be assured that not carry any viruses with its portable memory. Scan option allows the user to make an initial scan of the USB device to monitor for the presence of active viruses.
3. Quarantine (Quarantine). This is a very important module in any antivirus program. It represents file criptor, which when placed in a file called . Quarantine was converted to the signature . The newly created signature is placed in a folder as a file to be recovered or completely deleted if the user wishes.
View attachment 8326
Application development to protect the computer system from malicious code
Application domain of the abstract is informatics.
In the abstract describes the design and construction administration for the protection of computer systems from malicious code. The functionality of the application is as follows: Real-time protection from malware, internet security, identity protection, protection of portable devices, smart core detection and removal of malware.
1 . Browser protection (Browser protection). It contains several major modules : download Scanner , temporery file scanner , cookie protection, on screen keyboard. The scanner downloaded files (download ) scan represents a module that scans every file that is downloaded or already downloaded to the directory specified by the user. It can be set as default browser . Temporery file scanner scans each file in the temporary directory or when created by WEB browser . Cookie protection is a security module, which does not allow to save the so-called . " Cookies " . There are two types of cookies - a cookie that contains information about visited websites , passwords, user accounts and cookie , which supports the collection of information from websites with unauthorized means. On screen keyboard is part of a program to protect your Web browser that protects user accounts entered in the console keyboard . Unlike peripheral onscreen keyboard encrypted characters that are pressed by the user.
2 . USB protection is carried out by two of the main modules in the antivirus program - real-time protection and scanning. Real-time protection is activated if the user has set a setting in order to fulfill the command to protect the USB device. When the device is protected on its action as observed e. Change the file , save the file , delete the file and create a file. In this way the user can be assured that not carry any viruses with its portable memory. Scan option allows the user to make an initial scan of the USB device to monitor for the presence of active viruses.
3. Quarantine (Quarantine). This is a very important module in any antivirus program. It represents file criptor, which when placed in a file called . Quarantine was converted to the signature . The newly created signature is placed in a folder as a file to be recovered or completely deleted if the user wishes.
View attachment 8326
Last edited: