answersLogoWhite

0

Malware protection searches for hidden files that are automatically downloaded or automatically executed on your computer. Regular files are not automatically downloaded and require the user to click 'Yes' or 'OK' on the alert window before the download begins.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a?

The Symantec Endpoint Protection engine that scans files, folders, and memory locations for various types of malware is a good example of an antivirus and anti-malware solution. It employs multiple detection methods, including signature-based detection, heuristics, and behavioral analysis, to identify and mitigate threats effectively. This multi-layered approach enhances security by addressing both known and unknown malware. Additionally, it provides real-time protection and regular updates to adapt to evolving threats.


What files are most susceptible to virus malware?

Malware and virus can infect all kinds of files.


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a?

Host


What represents good practice for optimizing system performance?

schedule the regular deletion of temporary files schedule the regular defragmenting the hard drive schedulle the regular running of an anti-spyware/malware program


What is the file system for unix?

Being the well known entity files are, files are also called "regular files" to distinguish them from "special files". They show up in ls -l without a specific character in the mode field:


Can someone place files unknowingly on a computer connected with vaaga?

A person can put files on your computer unknowingly. It doesn't matter if your connected to Vaaga or any other website. Files added to your computer is called virus' or malware. Make sure you have good protection for your computer.


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a -based intrusion detectionprevention software?

Host


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a -based intrusion detectionprevention software.?

Host


Are PDF Files subject to virus malware spyware etc infestation?

I don't think PDF files can be subject to malware infections, because they are read only. ---- The first answer may be incorrect according to the following link: http://blogs.eweek.com/cheap_hack/content/malware/no_anti-virus_progress_on_yesterdays_malicious_pdf.html


Can Norton remove ransom malware?

Norton antivirus software can help detect and remove some types of ransomware, but its effectiveness may vary depending on the specific strain of malware. It's important to note that prevention is key, as ransomware often encrypts files, making recovery difficult even after removal. Norton can assist in protecting against ransomware through real-time protection and regular updates but may not guarantee recovery of encrypted files. For severe cases, specialized ransomware recovery tools and professional assistance may be necessary.


How do you get rid of mirawait?

To get rid of malware, start by running a full system scan using a reputable antivirus or anti-malware program to identify and remove the malicious files. Ensure your software is up to date for the best protection. Additionally, consider using a malware removal tool specifically designed to handle complex threats. Finally, reset your browser settings and clear cache and cookies to eliminate any residual effects of the malware.


How do you deal with malware virus without anti malware?

You would need to know the exact files that the malware virus has infected and be able to delete them. This would be very difficult, time consuming, and dangerous to your operating system.