Packers support tests

  • warning: Creating default object from empty value in /var/www/anti-malware-test.com/modules/taxonomy/taxonomy.pages.inc on line 33.
  • strict warning: Non-static method view::load() should not be called statically in /var/www/anti-malware-test.com/modules/views/views.module on line 906.
  • strict warning: Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /var/www/anti-malware-test.com/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter::options_submit() should be compatible with views_handler::options_submit($form, &$form_state) in /var/www/anti-malware-test.com/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter_term_node_tid::value_validate() should be compatible with views_handler_filter::value_validate($form, &$form_state) in /var/www/anti-malware-test.com/modules/views/modules/taxonomy/views_handler_filter_term_node_tid.inc on line 302.
  • strict warning: Declaration of views_plugin_style_default::options() should be compatible with views_object::options() in /var/www/anti-malware-test.com/modules/views/plugins/views_plugin_style_default.inc on line 24.
  • strict warning: Declaration of views_plugin_row::options_validate() should be compatible with views_plugin::options_validate(&$form, &$form_state) in /var/www/anti-malware-test.com/modules/views/plugins/views_plugin_row.inc on line 134.
  • strict warning: Declaration of views_plugin_row::options_submit() should be compatible with views_plugin::options_submit(&$form, &$form_state) in /var/www/anti-malware-test.com/modules/views/plugins/views_plugin_row.inc on line 134.
  • strict warning: Non-static method view::load() should not be called statically in /var/www/anti-malware-test.com/modules/views/views.module on line 906.
  • strict warning: Non-static method view::load() should not be called statically in /var/www/anti-malware-test.com/modules/views/views.module on line 906.
  • strict warning: Declaration of views_handler_field_comment::init() should be compatible with views_handler_field::init(&$view, $options) in /var/www/anti-malware-test.com/modules/views/modules/comment/views_handler_field_comment.inc on line 49.
  • strict warning: Declaration of views_handler_filter_node_status::operator_form() should be compatible with views_handler_filter::operator_form(&$form, &$form_state) in /var/www/anti-malware-test.com/modules/views/modules/node/views_handler_filter_node_status.inc on line 13.
  • strict warning: Non-static method view::load() should not be called statically in /var/www/anti-malware-test.com/modules/views/views.module on line 906.
  • strict warning: Declaration of views_plugin_style_tagadelic::options() should be compatible with views_object::options() in /var/www/anti-malware-test.com/modules/tagadelic_views/includes/views_plugin_style_tagadelic.inc on line 34.
This test determines which antivirus programs provide their users with the most effective protection from virus modifications created by virus writers who use various compression utilities (packers). A virus that is known to an antivirus program but is compressed using a different packer becomes undetectable to the solution if it does not support the packer used by the virus writer. One of the objectives of this test was also to attract the attention of the Internet community to the serious problem posed by the use of packers and other means of protection used by virus writers.

Malware-writers often use packers (or couple of packers) to impede detection of their "creations" for anti-virus engines. This fact forces antivirus developers to provide operational packers support to make av-engines more powerful for recognizing known malwares under new variants of packers. So, our test will show which AV companies attend to packers support and which not.

Syndicate content