-
Avast:
Propre -
Avira:
Propre -
Bitdefender:
Propre -
Kaspersky:
Propre -
NOD32:
Propre
Journaux détaillés
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet10 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet6 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\dir OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet5 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet8 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet7 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet9 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet16 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet12 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet11 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet14 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet13 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet15 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet18 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet17 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_0 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet26 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_8 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_4 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_6 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_5 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_7 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module121 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_9 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\ThisWorkbook OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\_VBA_PROJECT OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\PROJECTwm OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>Workbook OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_1_CompObj OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_5_SummaryInformation OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_5_DocumentSummaryInformation OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls OK
DC-5-25.zip|>Note About Excel Macros.txt OK
DC-5-25.zip OK
#
# Number of scanned files: 44
# Number of scanned folders: 0
# Number of infected files: 0
# Total size of scanned files: 19543045
# Virus database: 130502-1, 05/02/13
# Total scan time: 0:0:4
Copyright (c) 1992 - 2012 AVG Technologies
Program version 2013.0.3349, engine 2013.0.3204
Virus Database: Version 3204/6494 2013-07-15
------------------------------------------------------------
Test started: 16.7.2013 13:51:18
Duration of test: 1 second(s)
------------------------------------------------------------
Objects scanned : 3
Found infections : 0
Found rootkit : 0
Found high severity : 0
Found med severity : 0
Found info severity : 0
Fixed rootkit : 0
Fixed high severity : 0
Fixed med severity : 0
Fixed info severity : 0
------------------------------------------------------------
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.12.78
VDF Version: 7.11.90.186
Scan start time: 7/16/2013 4:51:17 PM
Command line: g:\scancl.exe --nombr --showall --verboselog /a /z /s --log=d:\scanner\output.tmp d:\scanner\downloads\142954\DC-5-25.zip
configuration file: g:\scancl.conf
d:\scanner\downloads\142954\DC-5-25.zip
Date: 16.07.2013 Time: 16:51:01 Size: 1523842
Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 3
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
// BDC scan report
//
// Time: Aug 26 06:32:23 o+00
// Command line: /arc /list /nohed /log=d:\scanner\output.tmp DC-5-25.zip
// Core: AVCORE v2.1 Windows/x86_64 11.0.1.6 (Mar 26, 2013)
// Engines: scan: 14, unpack: 10, archive: 50, mail: 8
// Total signatures: 9212798
//
DC-5-25.zip ok
DC-5-25.zip=>DC-5-25 Ver 4.16.xls ok
DC-5-25.zip=>Note About Excel Macros.txt ok
Results:
Folders :0
Files :3
Packed :0
Archives :1
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "DC-5-25.zip" Enable = Yes Recursive = No
; ------------------
2013-07-16 16:51:18 DC-5-25.zip archive ZIP
2013-07-16 16:51:18 Scan_Objects$35680 running 50%
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls archive Embedded
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module1 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module3 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module121 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module2 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls ok
2013-07-16 16:51:18 DC-5-25.zip//Note About Excel Macros.txt ok
2013-07-16 16:51:18 DC-5-25.zip ok
2013-07-16 16:51:18 Scan_Objects$35680 completed
; --- Statistics ---
; Time Start: 2013-07-16 16:51:18
; Time Finish: 2013-07-16 16:51:18
; Completion: 100%
; Processed objects: 7
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 2
; Packed: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 6.0.316.0, (C) 1992-2013 ESET, spol. s r.o.
Module loader, version 1042 (20130123), build 1050
Module perseus, version 1401 (20130712), build 1532
Module scanner, version 8573 (20130716), build 14413
Module archiver, version 1172 (20130624), build 1140
Module advheur, version 1142 (20130712), build 1107
Module cleaner, version 1073 (20130617), build 1085
Command line: --base-dir=d:\av\eset /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=d:\scanner\output.tmp DC-5-25.zip
Scan started at: 07/16/13 16:51:06
name="DC-5-25.zip", threat="is OK", action="", info=""
name="DC-5-25.zip - ZIP - DC-5-25 Ver 4.16.xls", threat="is OK", action="", info=""
name="DC-5-25.zip - ZIP - Note About Excel Macros.txt", threat="is OK", action="", info=""
Scan completed at: 07/16/13 16:51:06
Scan time: 0 sec (0:00:00)
Total: files - 1, objects 2
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Recommandations de sécurité Download3k
1. Installez un logiciel antivirus
Pour protéger votre ordinateur contre les programmes malveillants, nous vous conseillons d’installer un logiciel antivirus, surtout lorsque vous téléchargez et installez de nouveaux programmes du Web, et d’exécuter son programme de mise à jour de la base de données au moins une fois par jour. Ainsi, votre logiciel antivirus reste à jour des dernières menaces malveillantes et protège mieux vos données.
Si votre ordinateur n’est pas encore protégé par une solution antivirus puissante, vous pouvez examiner une de nos recommandations: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Choisissez un navigateur Web sécurisé
Un aspect important à garder à l'esprit est quel navigateur Web vous utilisez. La plupart des attaques de navigateur et des virus ciblent Internet Explorer. Il vaut donc mieux que vous envisagiez une alternative. Les navigateurs web les plus sûrs disponibles aujourd'hui sont considérés comme Mozilla Firefox et Google Chrome. En plus d'être gratuits, ils sont à la fois rapides, bloqués, avec navigation par onglets, avec des fonctions de confidentialité et de sécurité. Essayez-les: Télécharger Mozilla Firefox ou Télécharger Google Chrome.
3. En savoir plus sur la sécurisation de votre PC
Ces articles devraient vous aider davantage (Anglais):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenir le code HTML pour ce rapport
Lien de graphique
Lien texte
- Example:Doctors Calls for a Year with Excel Rapport antivirus fait par Download3k.fr.
- HTML:
- Code de forum: