Anti-Rootkit Tests

  • warning: Creating default object from empty value in /var/www/anti-malware-test.com/modules/taxonomy/taxonomy.pages.inc on line 33.
  • strict warning: Non-static method view::load() should not be called statically in /var/www/anti-malware-test.com/modules/views/views.module on line 906.
  • strict warning: Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /var/www/anti-malware-test.com/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter::options_submit() should be compatible with views_handler::options_submit($form, &$form_state) in /var/www/anti-malware-test.com/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter_term_node_tid::value_validate() should be compatible with views_handler_filter::value_validate($form, &$form_state) in /var/www/anti-malware-test.com/modules/views/modules/taxonomy/views_handler_filter_term_node_tid.inc on line 302.
  • strict warning: Declaration of views_plugin_style_default::options() should be compatible with views_object::options() in /var/www/anti-malware-test.com/modules/views/plugins/views_plugin_style_default.inc on line 24.
  • strict warning: Declaration of views_plugin_row::options_validate() should be compatible with views_plugin::options_validate(&$form, &$form_state) in /var/www/anti-malware-test.com/modules/views/plugins/views_plugin_row.inc on line 134.
  • strict warning: Declaration of views_plugin_row::options_submit() should be compatible with views_plugin::options_submit(&$form, &$form_state) in /var/www/anti-malware-test.com/modules/views/plugins/views_plugin_row.inc on line 134.
  • strict warning: Non-static method view::load() should not be called statically in /var/www/anti-malware-test.com/modules/views/views.module on line 906.
  • strict warning: Non-static method view::load() should not be called statically in /var/www/anti-malware-test.com/modules/views/views.module on line 906.
  • strict warning: Declaration of views_handler_field_comment::init() should be compatible with views_handler_field::init(&$view, $options) in /var/www/anti-malware-test.com/modules/views/modules/comment/views_handler_field_comment.inc on line 49.
  • strict warning: Declaration of views_handler_filter_node_status::operator_form() should be compatible with views_handler_filter::operator_form(&$form, &$form_state) in /var/www/anti-malware-test.com/modules/views/modules/node/views_handler_filter_node_status.inc on line 13.
  • strict warning: Non-static method view::load() should not be called statically in /var/www/anti-malware-test.com/modules/views/views.module on line 906.
  • strict warning: Declaration of views_plugin_style_tagadelic::options() should be compatible with views_object::options() in /var/www/anti-malware-test.com/modules/tagadelic_views/includes/views_plugin_style_tagadelic.inc on line 34.
The results and analysis of Anti-Rootkit Tests

This third in a row test evaluates the ability of the most popular antivirus and anti-rootkit products to detect and remove malicious programs ("in-the-wild" samples) that use rootkit technologies and actively circulate over the Internet. The test gives us a good view of how antirootkit software copes with well-known rootkits.

The aim of this test is to evaluate the ability of the most popular antivirus and anti-rootkit products to detect and remove malicious programs (‘in-the-wild’ samples) that use rootkit technologies and actively circulate over the Internet, as well as checking proactive detection capabilities to detect proof-of-concept rootkits hidden on a system.

The purpose of this test is to analyze the ability of the most popular stand-alone anti-rootkit products to detect and remove malicious programs, actively distributed over the Internet (“In The Wild” samples) in their active state, that take advantage of rootkit technology. 

Syndicate content