• home
  • Windows 8
  • What is preventive protection dr web. Preventive home PC protection: antivirus and a sane user

What is preventive protection dr web. Preventive home PC protection: antivirus and a sane user

Sore. I decided to make such a post, so that at the household level, in simple letters, tell about the need to protect home computers from malware. And at the same time tell about the simplest ways to get rid of annoying banners that block your favorite Windows.

Prevention of disease is always better than getting rid of the disease after a thorough infection. So here - you need to install anti-virus software immediately after installing the operating system, just do not forget to update regularly anti-virus database- otherwise desired result not receive. Therefore, preventive protection and a sober mind of the user is a means of reducing the risk of contracting an infection called a “computer virus”.

Part 1. Multi-colored condoms: choosing antivirus software.

Diversity antivirus programs quite large, but in fact, when we need to give examples, we remember the most promoted brands.

DrWeb;
- Kaspersky Anti-Virus;
- NOD32;
- Symantec (Norton) Antivirus
- Avast! etc.

As for me, the choice trademark a matter of individual preference, we are more interested in another component ...

So, options for using antivirus software on the this moment several (I repeat, we are talking only about home PCs):

Option 1: Install fancy paid antivirus and start an aimless search for the keys to it. You can search on the Internet, from friends or steal a license from work. The option is controversial, but knowing the cravings Russian man to a freebie- very popular.

Option 2: Buy antivirus for money and renew it annually. DrWeb, Kaspersky and similar developers offer solutions for household needs at a fairly reasonable price - an annual license will cost about 1000 rubles.

Option 3: Use the services of an Internet provider. Large companies those distributing the Internet and having their own file-sharing network offer their subscribers the installation and updating of antiviruses as additional service. For example, the SPARK company offers its users one of five antiviruses at a price of 45 to 90 rubles per month. Read more.

Option 4: Install free version of antivirus software. Immediately, for example, “avast!” there is free version for non-commercial use « Free Antivirus". I have been using this program for a year now.

Option X: Do not install antivirus. I would not like to consider such an option, but unfortunately practice shows that there is a certain handful of users who ignore any means of computer contraception. Happy people living in blissful ignorance. Well, to hell with them - this article is not for them.

2. Homo sapiens - a reasonable person: turn "ON" your mind.

Some "users" naively believe that a computer is such a thing that can think and do everything for them. Let's disappoint them. A computer can only help or automate some routine process and without normal human brains Every PC is a pile of useless hardware.

Why am I doing all this? In relation to our topic, I will say the following - without due attention to the security of the PC on the part of the user, all sorts of viral trouble.

Let me give you some tips on how to reduce the risk of malware infection by poking around in the global network:

BUT: When surfing the Internet, do not succumb to provocations from virus authors who offer you:

- … update your browser. The authenticity of a window with such an offer is checked only visually (more often these are clumsy, with low-quality page logos). You can also update any browser manually through the program settings or by downloading a new version directly from the developer's website.

- … update add-ons. In practice, I met with the fact that computers became infected after the user poked supposedly updates on a pop-up window Flash player. Again, the Flash player can be updated from the site Adobe.

B: Try somehow train your browser not to load pages you don't need. For popular browsers there are enough plugins that are specifically designed for this. For example, for FireFox there is a wonderful learnable NoScript plugin.

C. If you are using Internet Explorer - stop using it. People try hard, write quality software for you, and you use IE. It's not good how it works.

3. ... so you got leprosy: remove porn banners and Windows blockers.

The first time I ran into a problem get rid of blocking Windows in December 2009. AT new year holidays there was not a day that some acquaintance did not call and ask to get rid of the blocker banner. Banners usually asked to send an SMS message to the number indicated on the screen, and in return they promised to send an unlock code. Over the year, the situation has changed a little and now the lion's share of banners asks to replenish the account of a specific phone through the terminal.

You can try to cope with this ailment in the following ways:

We paste the resulting code into the banner input field and in most cases this method works.

After removing the blocker, you need to clean the computer from infection - this can help free curing utility from DrWeb - CureIT!. You can download from here.

B. Use for treatment boot from "LiveCD", that is, boot from external device not from your local drive. Again on the example of DrWeb. They have in free utilities such a thing as "Dr.Web LiveCD", and recently "Dr.Web LiveUSB". To run them you need set the BIOS CD / DVD drive or USB-HDD as bootable respectively. After that, it remains to run the scan hard drives attacked by winlocker. Details of installation and treatment.

C. Connect the infected computer to the network and execute hard disks from another PC. Not bad either, but...
- necessary administrator rights;
- must be administrative balls are open(C$, D$, etc.).

4. A couple of rhetorical questions on the topic.

Where are the directors of popular TV shows like South Park looking? After all, what a crazy-popular cartoon could be removed about banner blockers! I close my eyes and see how Cartman writes another malicious code and supplies his phone number...

Where are they looking cellular operators and IT Crime Law Enforcement Agencies? After all, such financial flows flow through SMS messages ... Or is it beneficial to someone?

That's about all I would like to say on this topic.


The antivirus must prevent infection. This is where preventive protection technologies come to the aid of traditional antivirus.

All Trojans do this:

  • Act on similar algorithms, use the same critical places in operating systems for penetration, have the same set of malicious functions.
  • They make the same mistake: act first (attack the system).

The beginning of the Trojan's activity is enough for Dr.Web to see and neutralize it.

This is possible thanks to a variety of technologies. Dr.Web preventive protection acting in advance. They "on the fly" analyze the behavior of programs and immediately stop malicious processes. By the similarity of the behavior of a suspicious program with famous models of such behavior Dr.Web can recognize and block such programs. Technology Dr.Web preventive protection do not allow penetration of the newest, most dangerous malware, developed with the expectation of non-detection by traditional signature and heuristic mechanisms - objects that have not yet been submitted for analysis in antivirus laboratory, which means they are not known. virus base Dr.Web at the time of entry into the system.

We list only some of these technologies.

Unlike traditional behavioral analyzers, which rely on hard-coded knowledge in the database, which means that the rules of behavior of legitimate programs are known to attackers, intelligent system Dr.Web Process Heuristic analyzes "on the fly" the behavior of each running program, consulting the constantly updated Dr.Web reputation cloud, and based on current knowledge of how malware behaves, draws a conclusion about its danger, after which necessary measures to neutralize the threat.

This data protection technology allows you to minimize losses from actions unknown virus- with minimal consumption of resources of the protected system.

Dr.Web Process Heuristic controls any attempts to change the system:

  • recognizes malware processes that modify user files in an undesirable way (for example, the actions of ransomware Trojans);
  • prevents malware from trying to infiltrate the processes of other applications;
  • protects critical parts of the system from modification by malware;
  • detects and terminates malicious, suspicious or untrusted scripts and processes;
  • blocks the ability of malicious programs to change the boot areas of the disk in order to make it impossible to start (for example, Trojans) on the computer;
  • prevents disabling the secure Windows mode by blocking registry changes;
  • prevents malicious programs from adding the execution of new tasks that attackers need to the logic of the operating system. Blocks a number of parameters in Windows registry, which prevents, for example, viruses from changing the normal display of the Desktop or hiding the presence of a Trojan in the system with a rootkit;
  • Prevents malware from modifying program launch rules.

Dr.Web Process Heuristic provides security almost from the moment the operating system boots up - it starts protecting even before the traditional signature antivirus is loaded!

  • Prevents downloads of new or unknown drivers without the knowledge of the user.
  • Blocks malware from auto-running, as well as certain applications, such as anti-antiviruses, preventing them from registering in the registry for later launch.
  • Blocks registry branches that are responsible for drivers virtual devices, what is he doing impossible installation new virtual device.
  • Blocks communications between spyware components and the server that controls it.
  • Prevents malware from breaking normal work system services, for example, interfere with the regular creation backups files.

Dr.Web Process Heuristic works right out of the box, but the user always has the opportunity to customize the control rules based on their own needs!

Technology Dr. Web ShellGuard, which is part of Dr.Web Script Heuristic, closes the path to the computer for exploits - malicious objects that try to use vulnerabilities, including those not yet known to anyone except virus writers (the so-called "zero-day" vulnerabilities), in order to gain control over attacked applications or operating system generally.

The developers have completely redesigned the interface, which has become much more convenient thanks to thoughtful sections for management and monitoring. Opening the Dr.Web Control Center security space is still carried out from the Windows tray.

Dr.Web Security Space v.10 features

  • Improved interface
  • Preventive protection
  • Data Loss Protection
  • Parental control
  • Blocking access to computer hardware
  • Single site exclusion configuration center
  • Mini-agent to manage protection options

Version 10 has expanded the capabilities of several protection tools at once, and among them is the “Mini-Agent”, from which you can manage several components at once. In the "Preventive protection" section, it is convenient to configure the reaction of the anti-virus to events in the system or the impact of various processes from the outside.

For example, you can allow the installation of drivers and at the same time prohibit low level access to disk. There are 18 parameters available in the "Custom" mode. If you doubt your PC knowledge, top menu you can choose a ready-made preset: "Optimal", "Medium" or "Paranoid".

AT new version improved tool for creating backup copies of important data and saving them in a protected area hard drive. You can enable this option in the "Tools | Data Loss Protection. This precaution will help protect yourself from the actions of ransomware trojans.

Even in version 10, you should pay attention to the updated "Parental Control". You can turn it on or off in the mini-agent menu with one click. If a component is temporarily disabled, its last settings activated automatically the next time you turn it on. Settings can be made for different accounts.

It is convenient that the administrator has the ability to block access to equipment, such as a printer or USB ports, or even encroach on the sacred - to prohibit data transfer over the network. All this can be done in the "Devices" section.

To scan your PC for viruses, Dr.Web Security Space also provides separate program Dr. Web Scanner. In particular, it allows you to limit the use of computer resources by the antivirus. There is an option to cancel scanning when running on laptop battery to save battery.

Modern interface

In version 10 - uniform style icons, convenient large buttons menus, as well as thoughtful control sections.

Data Loss Protection

Protected by Dr.Web backup storage will help protect against ransomware trojans.


Fresh data from the cloud

The Dr.Web Cloud service provides up-to-date information about threats.

System requirements

Operating system: Windows 8/7/Vista/XP (Windows XP - 32-bit systems only). There are versions for Mac OS X and Linux
RAM: 512 MB
Disk space: about 400 MB ( temporary files when installing the product will require extra bed on the system drive). Additional for installing a firewall about 7 MB
Retail price: from 1290 rubles
Website: drweb.ru

Almost every day there are news about new methods of identification and authentication or simply recognition based on biometric technologies, just open search engine and click on the first links. From the last: in the USA, they developed fingerprint authentication technology. I do not argue that it is interesting, besides, according to the developers, the technology is inexpensive. However, the declared accuracy of 95% will obviously not please security experts. By the way, numerous commentators on the news share doubts about the accuracy. Such technologies have the right to life, but so far they require significant refinement in terms of accuracy.

I propose to look at what is generally happening with the market for biometric solutions for recognizing anything and everything. Thus, according to Tractica, at the end of 2016, global revenue from hardware and software biometric solutions amounted to $2.4 billion, and by 2025 these figures will increase to $15.1 billion, that is, the average annual growth rate, CAGR, will be more than 20 %. According to J'son & Partners Consulting, in the next 5-7 years, identification technologies by iris, voice and vein pattern will become leaders in the world market, and finger technologies that are leading now will fade into the background. I propose to reflect on why everything will turn out the way it does.

Division into mass and specialized

First of all, it is important to separate technologies that will enter the mass market with almost 100% accuracy and will be widely used, for example, in the service sector. And technologies that only large financial, industrial and defense enterprises can afford, where the cost of an identification error is very high.

If we talk about the mass market, then in the next few years, voice and face identification technologies will be used more and more actively. Video analytics or machine vision technologies are already widely and successfully implemented in the commercial sector to recognize employees, in retail to identify visitors and create personalized offers. Voice identification, I believe, will be widely used in contact centers. So far, implementation cases concern more banks, but in the coming years, technologies will penetrate into other business areas.

Iris and palm vein identification technologies are still many times more expensive when compared with fingerprint analysis systems, for example. Therefore, it is still not worth waiting for these technologies to enter the mass market. At the same time, at closed facilities or in areas with limited access e.g. in banks, industrial enterprises and even more so at objects with high secrecy, the most progressive technologies that no one skimps on. But do they provide 100% security and which technology is the future?

grand unification

The answer is actually simple and logical: the future belongs to multi-factor identification and authentication systems. Those who wish to argue with this can turn to probability theory: if a person passes 2-3 various systems biometric identification, the error probability is actually zeroed.

At the same time, security at the state level is also increased due to more available systems. For example, machine vision systems are being actively implemented in transport system large cities, unite with bases law enforcement to search for the missing or identify potentially dangerous from the "black list". There are many applications of such technologies. In addition, in the next couple of years, software should become much smarter, thanks to the development machine learning on the base neural networks, which will multiply the number of scenarios for using technologies.

Applications based on neural networks, many of us are already actively using in Everyday life: Prizma, Snapchat, Shazam. Of course, the examples are more from the field of entertainment, but they illustrate well how quickly technology develops. In general, all over the world there is no shortage of new methods of identification and authentication, and the demand for a particular technology is a matter of its maturity. In many areas "on horseback" today - an integrated approach to solving problems, and recognition of users / employees is no exception.

For the mass market, smartphones have already become such a complex biometric tool. AT modern models, in addition to fingerprint sensors, they also use face identification (though as long as they have different level reliability). According to Juniper Research forecasts, by 2022 the number of such gadgets in the world will reach 760 million pieces. I believe that the widespread penetration of such devices will lead to the fact that in the consumer and commercial sphere, as well as in the public sector, complex identification will also occur more and more often.

Top Related Articles