Norman PROMO PAKKET ANTIVIRUS ALLEEN VISTA, 32 BIT, 2 PCS, 25 PAK NVCV25-BUN Manual Do Utilizador
Códigos do produto
NVCV25-BUN
Other functions
z
31
Copyright © 1990-2005 Norman
The Command line scanner
In addition to the GUI based On-demand and On-access
scanners, NVC offers a command line version of the scanner.
NVC’s command line scanner has the same basic functionality as
the menu-driven scanners.
The command line scanner is not dependent on any other
modules. It can be run from batch files.
From the DOS prompt, go to the folder where the command line
scanner is located and type:
scanners, NVC offers a command line version of the scanner.
NVC’s command line scanner has the same basic functionality as
the menu-driven scanners.
The command line scanner is not dependent on any other
modules. It can be run from batch files.
From the DOS prompt, go to the folder where the command line
scanner is located and type:
nvcc /?
for a list of available commands. The default location is
...\nvc\bin.
Please refer to the Reference Guide for a complete list of
command line option, how to run task files from the command
line, and other available features.
...\nvc\bin.
Please refer to the Reference Guide for a complete list of
command line option, how to run task files from the command
line, and other available features.
What is a sandbox?
Sandbox is the term that best describes the technique that is used
to check if a file is infected by an unknown virus. The name is
not randomly picked, because the method allows untrusted,
possible viral code to play around on the computer – not in the
real computer, but in a simulated and restricted area within the
computer. The sandbox is equipped with everything a virus
expects to find in a real computer. This is a playground where it
is safe to let a virus replicate, but where every step is carefully
monitored and logged. The virus is exposing itself in the
sandbox, and because its actions have been recorded, the cure for
this new perpetrator can be generated automatically.
Today, a new e-mail worm can infect ten thousands of
workstations in a matter of seconds. Norman’s sandbox
functionality can prove to be a valuable tool for trapping new
destructive code.
to check if a file is infected by an unknown virus. The name is
not randomly picked, because the method allows untrusted,
possible viral code to play around on the computer – not in the
real computer, but in a simulated and restricted area within the
computer. The sandbox is equipped with everything a virus
expects to find in a real computer. This is a playground where it
is safe to let a virus replicate, but where every step is carefully
monitored and logged. The virus is exposing itself in the
sandbox, and because its actions have been recorded, the cure for
this new perpetrator can be generated automatically.
Today, a new e-mail worm can infect ten thousands of
workstations in a matter of seconds. Norman’s sandbox
functionality can prove to be a valuable tool for trapping new
destructive code.