How to set up smartphones and PCs. Informational portal
  • home
  • OS
  • Norton Antivirus: antivirus description, purchase and activation of keys. Decent malware blocking results

Norton Antivirus: antivirus description, purchase and activation of keys. Decent malware blocking results

A single solution that unites the entire line of personal products from Symantec, and in the Windows version uses redesigned and improved 5 layers of protection for your computer, sensitive data and online activities, including technologies network protection such as firewall and intrusion prevention systems (IPS), file protection technologies (traditional antivirus capabilities), reputation-based protection technologies (Insight), and behavioral analysis technologies (SONAR).

Additionally, Norton Security with Backup is offered with automatic local and online backup for Windows platforms and Mac.

Norton Security and Norton Security with Backup can protect Windows / Mac OS X / Android / iOS devices - up to 5 and 10 devices, respectively.

Let's take a look at the main improvements that are already available in the new versions of Symantec's antivirus products.

New in Norton Security

New unified interface

The most obvious change is the new user interface... Offering clean and modern appearance Norton Security sets the tone for the security solution to be used on different versions operating systems Windows.

New Antivirus Engine - 80% Cloudy

New antivirus engine provides real-time detection malware, fundamentally changing the methods of traditional file protection.

Key features new engine include:

All of Symantec's intelligence — over 4,300 billion interactions — is now leveraged by Norton Security's real-time protection. Every time you access a file, Norton evaluates it using thousands of criteria to determine possible risks threats.

Powered by Norton Cloud, on-disk signatures are now 80% smaller. This is the fastest and lightest Norton ever.

Historically, new viruses are discovered when new ones anti-virus databases were updated on the client machine. This process can take from several minutes to several hours. With the new Norton Security engine, information about the latest threats instantly available through the Norton cloud infrastructure. This dramatically improves the speed at which users are protected from the latest threats.

Enhanced Intelligent Protection

Intelligent protection during system boot

The developers of Norton Security understand that the speed of your computer is important to you in order to quickly get started or get into the game. But those first few minutes after turning on your computer are critical: these are the times when your system is most vulnerable to malware attacks. New features help track changes that can lead to infection during system boot. When such changes are detected, Norton Security will automatically enter aggressive boot protection mode.

Aggressive heuristic threat detection with the new Norton Power Eraser

Over the past few years, Norton Power Eraser has evolved a set of aggressive threat detection methods using heuristics (or "rules of thumb") that detect threats that are still unknown. The new version of the scanner includes heuristic methods that allow it to identify even the most persistent without increasing the rate of false positives.

Automatically enable aggressive scanning to detect botnets

A new set of network monitoring capabilities triggers a suspicious outbound network activity(for example, a managed botnet) and will automatically prompt users to launch an aggressive scan using Norton Security technologies.

Smart data leakage protection technology

Ping command using network protocol ICMP, allows applications to check the status of a remote server. It's as if computer application says to the remote website, "Hello, are you here?" And this is called "pinging". Many firewalls do not block these useful messages. However, newer versions of malware use variants to send data to remote server using ping commands... This data may include your confidential information maybe even data credit card... Enhanced Intrusion Prevention System (IPS) in Norton Security lets regular pings pass through. But at the same time, the system will block a "non-standard" payload that can be used by a malicious application to send important information.

Improved sharing of information about malicious websites with the Norton Community Watch user community

The Norton Community Watch has been improved to better track and share information about malicious websites. This information is used to timely block phishing or fraudulent websites before attackers have a chance to trick others into unknowingly providing personal information.

Web browser protection with less plugin dependency

Web browsers allow you to add new security features and extensions. It is also possible to create extensions for the most common browsers. Unfortunately, using this approach enables attackers to deliver unwanted toolbars and redirect web traffic. To mitigate the risks, it is necessary to limit the ability of plugins and extensions in the browser. As such, Norton Security has redesigned several security features to work outside of the traditional browser plug-in architecture. This increases the scalability of browser protection, allowing you to continue using features like Norton Safe Web and Norton Web Protection without worrying about your browser version.

Reworked protection against attacks using social engineering

Social engineering attacks build on the natural human tendency to trust others when information is presented in a certain way, rather than relying solely on technological means to steal data. V new version Most of Norton Security's security technologies, including Safe Web, Scam Insight, Download Insight, and Anti-Phishing, have been enhanced to better exchange information among themselves. This exchange allows for certain attributes of websites (for example, the age of the site, its popularity, the volume of malicious downloads and the history of collection of personal data) to determine the online resources that are currently using social engineering methods for fraudulent attacks.

The next generation of SONAR technology

The redesigned SONAR engine detects as yet unknown threats based on the behavior of such threats in real time. SONAR is now even more effective against virus attacks that use the injection of trusted applications into processes and applications that deliver malicious files to the system.

Productivity increase

Performance optimized for latest updates Windows 8.x
Saving energy when running on battery power
Less impact on web browser speed
Best-in-class real-time performance

Try new versions

You can download the final versions of Norton Security and Norton Security with Backup in Russian right now on our website (free trial versions for 30 days).

Found a typo? Press Ctrl + Enter

Norton Antivirus is complex solution for security and privacy when using Windows or macOS computers and mobile iOS devices and Android. The service scans the system for viruses, spyware and malware, and also prevents their penetration through the Internet. Identity Safe component protects personal information while working on the network and includes an encrypted password store with the ability to generate and autocomplete them.

Norton products are designed for individuals and families. The choice of version depends on the type and number of connected devices. To track and remediate threats in one personal computer you can use Security Standard. The Deluxe tariff allows you to connect up to 5 various devices and centrally manage their security status through the web console. Family version Premier not only provides protection for up to 10 PCs, tablets and smartphones, but also includes a parental control tool and cloud storage from 25 gigabytes for backup. Mobile Security is offered separately, which allows you to create a copy of the contact list and determine the location on a map or using a "siren". For the Android platform, detection of threats hidden in applications and visited sites, a "black" list of calls and messages, blocking and destruction of data in case of loss are also available.

Full or custom scans of the system can be performed both regularly and on demand. Online security is ensured by checking the content of e-mail in the mail client and assessing the reputation of the downloaded files. Safe Web browser add-on allows you to identify safe sites when searching and prevents attempts. Application behavior analysis identifies unknown threats in real time. Automatic updates are provided for full and uninterrupted operation virus databases and self-protection of the antivirus from third-party interference.

Key features

  • Built-in password manager
  • Parental control
  • Cloud storage for backup
  • Technical support by phone, including in Russian
  • Not free version
  • Virus Protection Promise - a money-back guarantee in the event of a virus penetration and impossibility to remove it
  • Discounts for the first year of use and for a one-time payment of several years

It is difficult for an ordinary user to choose antivirus software, because today in the Russian and world markets there are many options with their own technologies and protection modules. Each company tries to cover as wide a range of countries as possible so that people can use its product. To choose the most the best option, you need to be guided by official statistics from third-party analytical companies, which constantly analyze the performance of each product, and build a general table on the basis of which you can already see the highest quality products. One of these software tools is an antivirus not only possible in boxed versions, but also with separate activation keys. It works with all types and versions of OS, including Windows 8.

The program includes many tools designed for different areas and degrees of computer protection. This and automatic systems Internet security, where each site is checked through a common database, and blocked if it turns out to be malicious. There are also modules for scanning important areas on the computer. The system has a special algorithm that can determine the type and bitness of the operating system, and based on this information, determine the most important areas for monitoring. Pulse updates are carried out several times a day, while the antivirus works in background without loading the computer, and without using all the power of the processor and RAM. For comfortable work you only need to activate it to receive signature updates.

Description of Norton Antivirus

Norton antivirus algorithms help you detect and eliminate all types of threats in a timely manner thanks to new technologies. First, it is Insight technology, which can be used to obtain information about a safe and a malicious file. Moreover, it is 100% reliable, because it is verified from more than 180 million users around the world. On the Internet, the system provides comprehensive monitoring of most files, therefore, after downloading certain information on the computer, the protection module immediately detects whether the file is malicious or not. Do you often work on the Internet? Do you have to visit a lot of sites? Built-in website crawling tools will provide maximum protection computer, because all pages in the search results and in address bar will be checked by the system for the presence in the common database. However, in order to use this technology, you need.

All over the world, Norton accepts files from users, notifying them with detailed reports. Moreover, the system provides a special tool in which each person can rate the scale. Next, the anti-virus software developers carry out a final scan of resources or files, and add information to the general database. Thus, most of the information stored on the Internet is already in a common database, where you can find white and black lists. One of the common problems in 2014 is phishing sites. Their essence is to steal confidential information from social networks or bank details, and use them to translate Money to dummy accounts. Viruses often get on computers that emulate real bank pages, but their address is different. The user enters logins and passwords, and at this time all information is sent to the attackers' server, where they process it, use it on real sites, and request a code in response. As a result, they even receive the codes that are sent to mobile phones. All this happens almost instantly, and in 1-2 minutes hackers manage to transfer all the money to other accounts, and then withdraw it into real currency. To prevent a similar situation from happening to you, be sure to buy and install anti-virus software on your computer. If you use several computers, then you need to bet on everything!

With this antivirus, you will not feel any additional stress. All checks will be carried out in the background when the computer is practically not used. The system monitors processes, the workload of the PC, so you can carefully choose the time to check important areas or update databases. When installing the program for the first time, the update process may take 10-40 minutes, but next time it will be much faster. New technology Identify Safe automatically saves and substitutes data on sites. Now you will not only be protected from Trojans and viruses, but also significantly save time. The information is securely encrypted, strong algorithm. No sniffers and keyloggers will be able to track keystrokes on your PC. Not so long ago, Windows 8 was released, for which many different malicious threats have already been written. Special modules will check all installed applications and programs in the eighth version, and fix those that do not work correctly. Moreover, you can use it both on XP and on any other OS version.

Norton provides free support for their clients. If you have any problems with the software, you cannot configure some parameters or the antivirus does not work at all, does not activate, you can contact the specialists. On the official website you can see the days and hours of this service. We, in turn, also help customers if they cannot activate the license or have problems installing the program.

Buying keys for Norton Antivirus

On our website you can. Below, under the article, you can view the full list of Norton products and choose for yourself suitable option... Next to the name of the product there is information about the number of computers on which it can be installed, as well as the operating time of the keys. The price is displayed in the right column. To purchase a key, click on the selected product. You will be taken to a page with a description of the program. There you can also download the distribution kit to install the software on your computer. Download only from trusted sources, because most of the distributed files are programs with already embedded viruses and Trojans, and they cannot be detected in the system in any way. To purchase, click the "Pay" button, and select from the list of proposed payment options the desired system... As soon as the transaction is completed, to your mailing address the code will come. Mailbox you enter when paying. Be sure to only use the one you have access to.

Activating Norton Antivirus keys

Have you bought it? Great, now download the program. We provide links to download from the ftp server of our project. Additionally, we throw off links to official sites so that the user himself can choose where to download the distributions from. Only "clean" installers are used without modifications and viruses, tablets. Run the setup file and install it on your computer. Please select local disk to install, and follow the on-board wizard prompts. Once the process is complete, a shortcut will appear on the desktop. Run it and type license key sent to you by e-mail... One key can be activated only on 1 computer. If the code is activated for several copies at once, we indicate this information in description. After activation, restart your computer and update the databases. The first update will take 5 to 30 minutes, depending on your internet speed.

Conclusion

Any computer system is susceptible to hacking and infection, and no matter what tools are created by developers, there will always be a new type of viruses that will penetrate through holes and bugs in programs, browsers, and network connections. To minimize the chances of infecting your PC, try to always use antivirus software. And Norton Antivirus is a great option for both beginners and advanced users. You can customize all modules for yourself, build a schedule according to which the system will check all files on your computer and update the databases. Very clear and user-friendly interface, Russian language support, many settings, modules for protection, built-in help system and installation wizard. You get all this together with the license! If you have any problems when activating the product, be sure to contact the specialists of our service. We will help you at any working time, we will try to answer your questions as quickly and fully as possible. Didn't the key fit? Blocked? Not a problem, because we provide a guarantee for all products!

Before buying, you can read the reviews of users who have already contacted us more than once. Our site contains a large catalog of products, ranging from conventional productivity programs to modern operating systems... An additional guarantee is long term the work of our service and a personal passport in a system such as Webmoney with high level BL. If you didn’t find the keys for certain programs, write to us, and we will definitely add them to the catalog and let you know! Follow the service news and tell your friends where you purchased the keys!

In May 1989, the American company Symantec released the first antivirus package for Macintosh computers(SAM), and in March 1990, the second version of this antivirus was released. In the same year, Peter Norton Computing was acquired, which developed a variety of DOS applications, including the famous Norton Utilities suite. Symantec continued to release these products under the already well-known name Norton, adding the title "from Symantec".

In 1991, the number and variety of emerging viruses and the numerous cases of their infecting computers became a serious problem, which is why the first antivirus package, Norton AntiVirus 1.0 (NAV), was released for PC-compatible computers. Produced in parallel antivirus program for Macintosh computers (SAM) was renamed Norton AntiVirus (NAV) for Macintosh in 1998.

In 2000 came out New ProductNorton Internet Security 2000. This antivirus package was developed with assistance from McAfee. The built-in firewall used the AtGuard firewall from WRQ Inc., which was acquired by Symantec. In this version, packet-level filtering of network traffic was applied.

New versions of Norton Internet Security came out every year. In 2004, a product activation procedure appeared. Dubbed the AntiSpyware Edition, Norton Internet Security 2005 had spam protection installed by default. Previously, antispam protection came as a separate utility.

In 2006, another Norton version Internet Security, which introduced a new user interface. End of support for this version Windows product 98. The built-in firewall has been tested by PC Magazine and has shown excellent results.

The next version, Norton Internet Security 2007, was released in the new year. The anti-phishing function has been integrated with Internet Explorer. PC Magazine tests showed high results... The 2008 version adds support for Windows Vista x64. Phishing protection now works with Mozilla browser... PC Magazine tests showed that Norton blocks 94% of phishing sites, compared to 83% shown by Internet Explorer and 77% by Firefox 2.

In the 2009 version, much attention was paid to reducing the installation time of the software package, speeding up the system startup, reducing the amount of occupied random access memoryweaknesses antivirus software Norton. AV-Comparatives' test results gave Norton 3 stars in security, detecting nearly 99% of viruses. True, the heuristic test showed a result of only 35%.

The next versions, 2010, 2011, 2012, in addition to improvements in the interface, received improvements in scanning files, more stable work and a number of other improvements.

The latest current versions were released in 2013 and are designed to work on computers with Windows systems and Mac, and on mobile devices with Android OS. Norton antivirus solutions are among the leaders in the anti-malware software market, occupying a leading position in the global market, and second only to products among Russian users.

Early computer viruses under MS-DOS OS were simple sections code compiled into executable file COM. Back then, back in 1990 year Norton Antivirus stood up to protect computing devices by destroying malicious files. Norton AntiVirus (2014) continues to perform the same tasks, only the threats are now much more complex.

Symantec, like many other vendors, has stopped categorizing product versions by year. The review will use (2014) solely to distinguish new program from previous editions of the product.

On the main screen of the antivirus there are large, optimized for touch devices buttons quick call scan or check for updates. The info panel shows the CPU utilization by the antivirus and other running processes. Norton AntiVirus was designed to strike a balance between protection efficiency and performance. Therefore, most users do not need detailed program settings, you can leave all the default parameters.

New technology

Symantec has included innovative technology to recover critical system files... Sometimes malware damages critical system components... Sending a system file to quarantine can lead to a critical crash of Windows and a complete inoperability of the system. The best solution could replace the infected file with a clean one original file but licensing issues prevent these operations from being performed directly.

When a potentially dangerous system file is detected, the antivirus queries the large Norton Insight feedback database and then launches cloud comparison the infected file and the original. The cloud service then sends a file that contains only the different piece of code. In fact, the file is a set of instructions for modifying the infected file to return it to its original state. After checking the clean file, the cleanup is complete.

Very often, reviews mention problems with aggressive tactics of deleting important system files. The new intelligent technology should reduce the risk of such situations to a minimum.

Installation

The Norton AntiVirus installer checks for potential problems and resolves them if possible. An unauthorized proxy server was installed on one of the systems, and Norton offered to remove it. Following these steps resolved connection issues that might otherwise have occurred after installing the product.

When the system did not boot or ransomware blocked access to system shell The Norton Bootable Recovery Tool offered two options. You can run Norton Power Eraser, an aggressive, specialized cleaning utility, or perform an advanced system restore. On one of the systems with active ransomware, Norton Bootable Recovery Tool reliably removed the threat, and the OS successfully booted, and the installation of the antivirus continued.

On the other hand, the new technology failed to prevent a critical failure on two test systems. On one system automatic protection found several malicious files, and requested a reboot to complete the cleanup. After reboot, there were logon and logoff loops. account... On one of the systems, updating, activation and contacting technical support through the built-in client were blocked. By advice technical support Norton Power Eraser was launched, followed by Norton Bootable Recovery Tool, but the problem was not resolved.

It took many hours of interaction with technical support specialists to solve problems, including sessions remote access for diagnostics and recovery. Both systems were eventually rebuilt, but it took a lot of time and effort. Norton Antivirus gets only 2 points for installing.

Independent laboratory test results

Symantec says its product resists malware at the most different levels... Norton Insight's extensive database blocks downloads of threats from known malicious sites, and closely monitors downloads from suspicious resources. The database allows you to define a wide range of reliable and dangerous files and assign a reputation unknown files... A malicious program can be blocked from launching only based on an assessment of its reputation. Norton AntiVirus also has an intrusion prevention system that you rarely see in a standalone antivirus product. When tested with the IMPACT toolkit, the antivirus blocked all 30+ exploits on network layer... Many exploits have been identified by name.

When using a multi-tiered approach, test results cannot reflect the real effectiveness of protection, so you should not rely on the scores gained. Symantec only accepts independent testing real use the entire product that reflect the interests of consumers. In this case, all proactive technologies are used as part of the product, and not individual components as in static tests.

Symantec does not accept on-demand test results conducted by AV-Comparatives. Norton does not participate in the tests of the Austrian laboratory. Unfortunately, we will not see the results of the product in the dynamic antivirus test of AV-Comparatives either.

ICSA Labs and West Coast Labs Certified Norton Technology Criteria viral detection and cleaning up malware. West Coast Labs has awarded the product several additional certifications. Symantec misses many Virus Bulletin tests, but Norton has received the VB100 award three times in four recent tests.

AV-Test checks antivirus products according to three criteria: protection against malicious attacks, impact on system resources and usability. Norton scored 6 points (maximum) for usability in the last two tests. For the effectiveness of protection, the product received 5.5 and 6 points, respectively. Norton's average score in the last two tests is -15.8 out of a possible 18. That's a very good result, but Bitdefender did even better at 17.

The question remains open: why can't Symantec developers configure the product to pass testing? different methods... Many vendors make special efforts only to get the maximum score in tests. Symantec states that they do not want to encourage flawed testing practices in this way.

Good malware cleaning

Norton did an excellent job cleaning infected systems, although it did not earn the highest scores. The antivirus detected 86 percent of the malware samples and received a score of 6.3. Only two programs performed better with the same set of samples. The fancy Jumpshot utility scored 6.5 points and Bitdefender Antivirus Plus scored 6.6 points.

When tested with the previous malware suite, Norton was at the top of the rankings with 6.6 points. Comodo Internet Security Complete 2013 and Webroot SecureAnywhere Antivirus also scored 6.6 points. The best result among all paid and free products then was at Malwarebytes Anti-Malware 1.70 - 7.1 points.

Decent malware blocking results

As mentioned earlier, Symantec takes a layered approach to protect your computer from threats. One of the first lines of defense is to defend against malicious links. When attempting to download a new set of malware samples, Norton blocked all but one malware threat. The Insight function performed 100% on this simple test. Norton supports scanning files sent by email or instant messaging clients.

Detecting samples already on the computer is a test that Symantec considers questionable, to put it mildly. Vendor representatives believe that the feature of real everyday attacks is omitted in this case. However, Norton blocked 72 percent of the malware samples immediately after opening the threat directory.

Those malicious programs that were not removed were launched. Norton detected 86 percent of threats and scored 8.5 for blocking. The antivirus allowed 2 malicious programs to pass, and therefore showed an average result. Bitdefender and several other products scored 9 points, while Ad-Aware Free Antivirus + scored 9.4 points.

When tested with the old suite of threats, Webroot scored an excellent 9.9 points. Norton's performance was about the same. The product detected 84 percent of malware and received 8.4 points for blocking.

Impressive additional features

Norton has an intrusion prevention system that has performed well in testing. The system blocked more than 30 exploits at the network level, many of them identified by name. Norton AntiVirus includes powerful protection from phishing. Many vendors include this function only in complex, full-featured solutions. In anti-phishing tests in PC Magazine, Norton is used as a reference protection, because it does an excellent job of detecting new attacks. Only a handful of products have performed better in recent tests. Bitdefender Antivirus Free(2014) ended up scoring one point more and McAfee AntiVirus Plus 2013 up 4 points. Only complex anti-virus solutions could show the result even better.

Norton Antivirus has a complete Identity Safe password manager. This free feature installed automatically when installing the antivirus. If you use Norton on multiple computers, you can sync online with your Norton account.

The Network map function displays the security report of your home wireless network with a list of connected devices. When the user activates the remote monitoring function, you can view the status of all installed Norton products from one computer and request detailed information about those found for Lately threats. Unfortunately, remote launch scanning and changing settings are not available.

Using wireless networks with limited or paid traffic, you can configure the data consumption limit for each network: no limits, economy mode and no traffic. It is very comfortable!

When you click on the "Performance" button, a graph of resource consumption is displayed. Here you can also check the status of background tasks. Norton Insight analyzes all applications on your computer and reports on stability, resource consumption, and prevalence.

When subscribing to the Norton Backup function, the user gets the opportunity to send files to the cloud storage with one click from the main antivirus window. Another link in the window leads to the Norton Zone file-sharing service. You can scan the QR code with your Android or iOS device to download Norton Mobile Security. Another link allows you to monitor multiple installed Norton antiviruses online.

Still a winner

Symantec did not tune Norton for static testing by independent labs, and we can only accept their position. The PC Magazine Portal Editor uses Norton to protect their computer. Norton Antivirus (2014) remains Editors' Choice in the standalone antivirus category.

Webroot SecureAnywhere Antivirus also did not perform well in tests due to specific detection methods. If you need protection backed by excellent test scores, look towards Bitdefender Antivirus plus(2014). All three products are Editors' Choice in the standalone antivirus category.

Norton Antivirus 2014 Review:

Dignity

New technology recovers damaged critical files;
- When installing the antivirus, potential problems are corrected;
- Very effective blocking malicious links, exploits and phishing attacks;
- Nice results cleaning malware;
- Remote monitoring devices on your home network using a network map.

Flaws

Despite the recovery technology damaged files, the antivirus crashed on two test systems. Problem resolution required technical support intervention;
- Average result of blocking malware;

Overall score

Symantec pays Special attention counteracting malware at every level of protection. Norton AntiVirus (2014) allows you not only to block everyday threats, but also to perform a wide range of other tasks. The vendor's concept affected the distribution of test results. Nevertheless, the product is very effective, even the editor of the PC Magazine portal uses it as a stationary protection.

Top related articles