answersLogoWhite

0

Malware protection searches for hidden files that are automatically downloaded or automatically executed on your computer. Regular files are not automatically downloaded and require the user to click 'Yes' or 'OK' on the alert window before the download begins.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a?

The Symantec Endpoint Protection engine that scans files, folders, and memory locations for various types of malware is a good example of an antivirus and anti-malware solution. It employs multiple detection methods, including signature-based detection, heuristics, and behavioral analysis, to identify and mitigate threats effectively. This multi-layered approach enhances security by addressing both known and unknown malware. Additionally, it provides real-time protection and regular updates to adapt to evolving threats.


What files are most susceptible to virus malware?

Malware and virus can infect all kinds of files.


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a?

Host


What represents good practice for optimizing system performance?

schedule the regular deletion of temporary files schedule the regular defragmenting the hard drive schedulle the regular running of an anti-spyware/malware program


What is the file system for unix?

Being the well known entity files are, files are also called "regular files" to distinguish them from "special files". They show up in ls -l without a specific character in the mode field:


Can someone place files unknowingly on a computer connected with vaaga?

A person can put files on your computer unknowingly. It doesn't matter if your connected to Vaaga or any other website. Files added to your computer is called virus' or malware. Make sure you have good protection for your computer.


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a -based intrusion detectionprevention software?

Host


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a -based intrusion detectionprevention software.?

Host


Are PDF Files subject to virus malware spyware etc infestation?

I don't think PDF files can be subject to malware infections, because they are read only. ---- The first answer may be incorrect according to the following link: http://blogs.eweek.com/cheap_hack/content/malware/no_anti-virus_progress_on_yesterdays_malicious_pdf.html


How do you get rid of mirawait?

To get rid of malware, start by running a full system scan using a reputable antivirus or anti-malware program to identify and remove the malicious files. Ensure your software is up to date for the best protection. Additionally, consider using a malware removal tool specifically designed to handle complex threats. Finally, reset your browser settings and clear cache and cookies to eliminate any residual effects of the malware.


How do you deal with malware virus without anti malware?

Dealing with malware without using anti-malware tools can be tricky but not impossible. Start by disconnecting from the internet to stop further damage, then boot your system in safe mode. Manually remove suspicious programs or browser extensions and clear temporary files. Use built-in tools like Windows Defender Offline Scan or macOS Recovery utilities. Finally, update your system and backup important data before reconnecting.


When troubleshooting corrupted work files that appear to be infected what would you want to look for?

malware