In this test we analyzed the ability of popular antivirus programs to treat active malware by statement on October 2012 -- when a malicious program has been executed and installed on a computer and may be using various methods to prevent detection and removal by antivirus solutions.
Submitted by Ilya Shabanov on Tue, 02/16/2010 - 12:54
Nowadays maliciousprograms increasinglyuse differentrootkittechnology tohideitself inacompromised system. This fact forces anti-virus software to evolve the detection methods of hidden objects.The purpose ofthis test isto show the ability of modern anti-virus software to neutralize rootkit-based malware.
Submitted by Ilya Shabanov on Sat, 10/25/2008 - 14:39
This is not the first time the Anti-Malware Test Lab has tested antivirus products for their ability to combat malicious programs, when they have already penetrated into operating system, started their activity and hid their presence. Will antivirus solutions be able to detect and remove the malicious program without disrupting the system’s operation? This test will show how popular antivirus products cope with this difficult task.
Submitted by Ilya Shabanov on Tue, 09/25/2007 - 08:21
In this test, we analyzed the ability of popular antivirus programs to treat active infections -- that is, when a malicious program has been executed and installed on a computer and may be using various methods to prevent detection and removal by antivirus solutions.
Submitted by Ilya Shabanov on Tue, 02/20/2007 - 19:54
In this test we analyzed the ability of popular antivirus programs to treat active malware -- when a malicious program has been executed and installed on a computer and may be using various methods to prevent detection and removal by antivirus solutions.
Comparative testing of 21 popular firewalls to check the quality of protection from attacks, coming from inside the system. In the test we checked the protection on 64 specially developed utilities, checking the protection of processes from quitting, protection from standard outbound attacks, protection from non-standard leaks and protection from non-standard techniques of penetration inside the kernel-mode.