answersLogoWhite

0

Malware protection searches for hidden files that are automatically downloaded or automatically executed on your computer. Regular files are not automatically downloaded and require the user to click 'Yes' or 'OK' on the alert window before the download begins.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What files are most susceptible to virus malware?

Malware and virus can infect all kinds of files.


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a?

Host


What represents good practice for optimizing system performance?

schedule the regular deletion of temporary files schedule the regular defragmenting the hard drive schedulle the regular running of an anti-spyware/malware program


What is the file system for unix?

Being the well known entity files are, files are also called "regular files" to distinguish them from "special files". They show up in ls -l without a specific character in the mode field:


Can someone place files unknowingly on a computer connected with vaaga?

A person can put files on your computer unknowingly. It doesn't matter if your connected to Vaaga or any other website. Files added to your computer is called virus' or malware. Make sure you have good protection for your computer.


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a -based intrusion detectionprevention software?

Host


The Symantec Endpoint Protection engine used to scan files folders and memory locations for different types of malware is a good example of a -based intrusion detectionprevention software.?

Host


What does a malware detection program look for?

A malware detection program looks for a range of indicators that suggest malicious activity. These include known malware signatures, unusual behavior patterns (like unauthorized data access or system changes), suspicious code execution, and anomalies in network traffic. Advanced tools also use heuristics and machine learning to spot new or evolving threats. Organizations that integrate behavioral analytics and real-time monitoring, similar to the capabilities used by SafeAeon’s security teams, are often more successful at detecting malware early, even if it's never been seen before.


Are PDF Files subject to virus malware spyware etc infestation?

I don't think PDF files can be subject to malware infections, because they are read only. ---- The first answer may be incorrect according to the following link: http://blogs.eweek.com/cheap_hack/content/malware/no_anti-virus_progress_on_yesterdays_malicious_pdf.html


When troubleshooting corrupted work files that appear to be infected what would you want to look for?

malware


How do you deal with malware virus without anti malware?

You would need to know the exact files that the malware virus has infected and be able to delete them. This would be very difficult, time consuming, and dangerous to your operating system.


How do you delete vbs malware?

If it is a file delete the file. Or if it is REAL MALWARE then scan your system and delete it. I myself delete harmful .vbs files off of the internet.