-
Avira:
Propre -
Bitdefender:
Propre -
Kaspersky:
Propre -
NOD32:
Propre
Journaux détaillés
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.10.64
VDF Version: 7.11.30.46
Scan start time: 5/13/2012 8:40:33 PM
Command line: r:\scancl.exe --nombr --showall --verboselog /a /z /s --log=c:\scanner\output.tmp c:\scanner\downloads\216374\CloneDisk23.exe
configuration file: r:\scancl.conf
c:\scanner\downloads\216374\CloneDisk23.exe
Date: 13.05.2012 Time: 20:40:00 Size: 706228
Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 88
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
// BDC scan report
//
// Time: Sun May 13 20:40:05 2012
// Command line: /arc /list /nohed /log=c:\scanner\output.tmp CloneDisk23.exe
// Core: AVCORE v2.1 Windows/i386 11.0.1.6 (Nov 17, 2011)
// Engines: scan: 15, unpack: 10, archive: 49, mail: 7
// Total signatures: 7059193
//
CloneDisk23.exe ok
CloneDisk23.exe=>(NSIS o) ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0000 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0001 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#STRINGS ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#STRINGS=>(REMOVED_NULLS) ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#WINDOWS ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#SYSTEM ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#IDXHDR ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#TOPICS ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#URLSTR ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#URLTBL ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>$OBJINST ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Index.hhk ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Main window.htm ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>TOC.hhc ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup.htm ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup1.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup2.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup3.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup3.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup4.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup4.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup5.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup5.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup6.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup6.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup7.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Copy o10.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Copy o10.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Copy o8.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Copy or clone.htm ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Create an image file.htm ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Create8.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Main w10.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0003 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0004 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0005 ok
Results:
Folders :0
Files :39
Packed :1
Archives :3
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
Mb/s :1
Files/second :19
Scan time :00:00:02
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Time limit: 180 sec.
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "CloneDisk23.exe" Enable=Yes Recursive=No
; ------------------
2012-05-13 20:40:41 Scan_Objects$355331 running 50%
2012-05-13 20:40:41 CloneDisk23.exe archive NSIS
2012-05-13 20:40:41 CloneDisk23.exe//data0001 ok
2012-05-13 20:40:41 CloneDisk23.exe//CloneDisk.exe packed PE_Patch
2012-05-13 20:40:42 CloneDisk23.exe//CloneDisk.exe//PE_Patch packed ASProtect
2012-05-13 20:40:42 CloneDisk23.exe//CloneDisk.exe//PE_Patch//ASProtect ok
2012-05-13 20:40:42 CloneDisk23.exe//CloneDisk.exe//PE_Patch ok
2012-05-13 20:40:42 CloneDisk23.exe//CloneDisk.exe ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm archive CHM
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup.htm ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup1.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup2.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup3.gif ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup3.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup4.gif ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup4.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup5.gif ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup5.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup6.gif ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm ok
2012-05-13 20:40:42 CloneDisk23.exe//License.txt ok
2012-05-13 20:40:42 CloneDisk23.exe//data0005 ok
2012-05-13 20:40:43 CloneDisk23.exe//data0006 ok
2012-05-13 20:40:43 CloneDisk23.exe ok
2012-05-13 20:40:43 Scan_Objects$355331 completed
; --- Statistics ---
; Time Start: 2012-05-13 20:40:40
; Time Finish: 2012-05-13 20:40:43
; Completion: 100%
; Processed objects: 19
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 2
; Packed: 2
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 4.2.71.2, (C) 1992-2010 ESET, spol. s r.o.
Module loader, version 1040 (20120313), build 1048
Module perseus, version 1355 (20120430), build 1474
Module scanner, version 7140 (20120515), build 11364
Module archiver, version 1145 (20120416), build 1108
Module advheur, version 1121 (20111208), build 1081
Command line: --base-dir=c:\Program Files\ESET\ESET NOD32 Antivirus /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=c:\scanner\output.tmp CloneDisk23.exe
Scan started at: 05/13/12 20:40:16
name="CloneDisk23.exe", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - Entries.bin", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - Strings.txt", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - Script.nsi", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - CloneDisk.exe", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/NameList", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/Transform/List", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/SpanInfo", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/ControlData", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/Content", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/ResetTable", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#STRINGS", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#WINDOWS", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#SYSTEM", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#IDXHDR", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#TOPICS", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#URLSTR", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#URLTBL", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /$OBJINST", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Index.hhk", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Main window.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /TOC.hhc", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup1.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup2.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup3.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup3.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup4.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup4.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup5.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup5.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup6.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup6.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup7.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Copy o10.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Copy o10.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Copy o8.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Copy or clone.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Create an image file.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Create8.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w10.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w11.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w12.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w13.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w14.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w15.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w16.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w17.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w18.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w19.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w20.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w21.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w22.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w23.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w24.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w25.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w26.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w27.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w28.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w29.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w3.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w30.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w32.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w33.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w4.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w5.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w6.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w9.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main window.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Repair.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Repair11.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Repair9.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Restor6.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Restor7.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Restor9.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Restore.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Thumbs.db", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/View image file of CD or DVD.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/About 1.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/About CloneDisk.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/Contact information.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/License agreement.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/Thumbs.db", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/How to order CloneDisk.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist1.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist2.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist3.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist4.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist5.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Register.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Thumbs.db", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Support and Upgrade/FAQ.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Support and Upgrade/Support.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Support and Upgrade/Upgrade.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - License.txt", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - uninstall.exe", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - uninstall.exe - NSIS - Entries.bin", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - uninstall.exe - NSIS - Strings.txt", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - uninstall.exe - NSIS - Script.nsi", threat="is OK", action="", info=""
Scan completed at: 05/13/12 20:40:17
Scan time: 1 sec (0:00:01)
Total: files - 1, objects 97
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Recommandations de sécurité Download3k
1. Installez un logiciel antivirus
Pour protéger votre ordinateur contre les programmes malveillants, nous vous conseillons d’installer un logiciel antivirus, surtout lorsque vous téléchargez et installez de nouveaux programmes du Web, et d’exécuter son programme de mise à jour de la base de données au moins une fois par jour. Ainsi, votre logiciel antivirus reste à jour des dernières menaces malveillantes et protège mieux vos données.
Si votre ordinateur n’est pas encore protégé par une solution antivirus puissante, vous pouvez examiner une de nos recommandations: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Choisissez un navigateur Web sécurisé
Un aspect important à garder à l'esprit est quel navigateur Web vous utilisez. La plupart des attaques de navigateur et des virus ciblent Internet Explorer. Il vaut donc mieux que vous envisagiez une alternative. Les navigateurs web les plus sûrs disponibles aujourd'hui sont considérés comme Mozilla Firefox et Google Chrome. En plus d'être gratuits, ils sont à la fois rapides, bloqués, avec navigation par onglets, avec des fonctions de confidentialité et de sécurité. Essayez-les: Télécharger Mozilla Firefox ou Télécharger Google Chrome.
3. En savoir plus sur la sécurisation de votre PC
Ces articles devraient vous aider davantage (Anglais):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenir le code HTML pour ce rapport
Lien de graphique
Lien texte
- Example:CloneDisk Rapport antivirus fait par Download3k.fr.
- HTML:
- Code de forum: