-
Avira:
Propre -
Bitdefender:
Propre -
Kaspersky:
Propre -
NOD32:
Propre
Journaux détaillés
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.10.68
VDF Version: 7.11.31.12
Scan start time: 5/25/2012 10:09:43 PM
Command line: r:\scancl.exe --nombr --showall --verboselog /a /z /s --log=c:\scanner\output.tmp c:\scanner\downloads\280716\msaccess-to-mysql.exe
configuration file: r:\scancl.conf
c:\scanner\downloads\280716\msaccess-to-mysql.exe
Date: 25.05.2012 Time: 22:09:14 Size: 2269048
Statistics :
Directories............... : 0
Files..................... : 1
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
// BDC scan report
//
// Time: Fri May 25 22:09:18 2012
// Command line: /arc /list /nohed /log=c:\scanner\output.tmp msaccess-to-mysql.exe
// Core: AVCORE v2.1 Windows/i386 11.0.1.6 (Nov 17, 2011)
// Engines: scan: 15, unpack: 10, archive: 49, mail: 7
// Total signatures: 7059193
//
msaccess-to-mysql.exe ok
msaccess-to-mysql.exe=>(Dropped 0) ok
msaccess-to-mysql.exe=>(Dropped 1) ok
msaccess-to-mysql.exe=>(Dropped 2) ok
msaccess-to-mysql.exe=>(Dropped 3) ok
msaccess-to-mysql.exe=>(Dropped 4) ok
msaccess-to-mysql.exe=>(Dropped 5) ok
msaccess-to-mysql.exe=>(Dropped 6) ok
msaccess-to-mysql.exe=>(Dropped 6)=>#SYSTEM ok
msaccess-to-mysql.exe=>(Dropped 6)=>Untitled.hhc ok
msaccess-to-mysql.exe=>(Dropped 6)=>CHM.hhk ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/About.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Database Conversion Process.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Disclaimer.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Documentation Feedback.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Getting Started.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Installation Instructions.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Legal Information.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Licensce Agreement.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Minimum System Requirements.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Software Activation Process.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Step 1.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Step 2.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Step 3.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Technical Support.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/Trademarks.htm ok
msaccess-to-mysql.exe=>(Dropped 6)=>html pages/welcome.html ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/bar-l.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/bar-m.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/bar-r.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/line.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/starting.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/memory.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/processor.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/os.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/8.JPG ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/1.jpg ok
msaccess-to-mysql.exe=>(Dropped 6)=>images/5.jpg ok
Results:
Folders :0
Files :38
Packed :1
Archives :1
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
Mb/s :1
Files/second :19
Scan time :00:00:02
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Time limit: 180 sec.
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "msaccess-to-mysql.exe" Enable=Yes Recursive=No
; ------------------
2012-05-25 22:09:44 Scan_Objects$381716 running 50%
2012-05-25 22:09:44 msaccess-to-mysql.exe ok
2012-05-25 22:09:44 Scan_Objects$381716 completed
; --- Statistics ---
; Time Start: 2012-05-25 22:09:44
; Time Finish: 2012-05-25 22:09:44
; Completion: 100%
; Processed objects: 1
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 0
; Packed: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 4.2.71.2, (C) 1992-2010 ESET, spol. s r.o.
Module loader, version 1040 (20120313), build 1048
Module perseus, version 1357 (20120510), build 1476
Module scanner, version 7173 (20120527), build 11434
Module archiver, version 1145 (20120416), build 1108
Module advheur, version 1121 (20111208), build 1081
Command line: --base-dir=c:\Program Files\ESET\ESET NOD32 Antivirus /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=c:\scanner\output.tmp msaccess-to-mysql.exe
Scan started at: 05/25/12 22:09:27
name="msaccess-to-mysql.exe", threat="is OK", action="", info=""
Scan completed at: 05/25/12 22:09:27
Scan time: 0 sec (0:00:00)
Total: files - 1, objects 1
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Recommandations de sécurité Download3k
1. Installez un logiciel antivirus
Pour protéger votre ordinateur contre les programmes malveillants, nous vous conseillons d’installer un logiciel antivirus, surtout lorsque vous téléchargez et installez de nouveaux programmes du Web, et d’exécuter son programme de mise à jour de la base de données au moins une fois par jour. Ainsi, votre logiciel antivirus reste à jour des dernières menaces malveillantes et protège mieux vos données.
Si votre ordinateur n’est pas encore protégé par une solution antivirus puissante, vous pouvez examiner une de nos recommandations: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Choisissez un navigateur Web sécurisé
Un aspect important à garder à l'esprit est quel navigateur Web vous utilisez. La plupart des attaques de navigateur et des virus ciblent Internet Explorer. Il vaut donc mieux que vous envisagiez une alternative. Les navigateurs web les plus sûrs disponibles aujourd'hui sont considérés comme Mozilla Firefox et Google Chrome. En plus d'être gratuits, ils sont à la fois rapides, bloqués, avec navigation par onglets, avec des fonctions de confidentialité et de sécurité. Essayez-les: Télécharger Mozilla Firefox ou Télécharger Google Chrome.
3. En savoir plus sur la sécurisation de votre PC
Ces articles devraient vous aider davantage (Anglais):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenir le code HTML pour ce rapport
Lien de graphique
Lien texte
- Example:MS Access Db Converter Rapport antivirus fait par Download3k.fr.
- HTML:
- Code de forum: