PCSL Greater China Region False Positive Test (2011 January)

Total Page:16

File Type:pdf, Size:1020Kb

PCSL Greater China Region False Positive Test (2011 January) PC Security Labs PCSL Greater China Region False Positive Test (2011 January) PC Security Labs www.pcsecuritylabs.net Menu Menu 1. Test introduction and highlights 2. Test set and award criteria 3. Participating vendors and products 4. Detailed test results 5. Monthly award logo 6. Disclaimer We Understand China www.pcsecuritylabs.net PC Security Labs 1. TEST INTRODUCTION AND HIGHLIGHTS A "false positive" is when antivirus software reports a clean file or a non-malicious activity as malicious. False positives can cause system crashes and other severe problems that may directly lead to serious economic losses. Please note that the false positive test does not tell you anything about the effectiveness of protection that any participating product may provide. For this new test: A. Our set of popular software has been updated. B. For the first time, the test bed also covers popular software fromTaiwan, especially banking and securities software. C. We chose 30 types of commonly used applications, in order to check whether security software blocks the installation of normal applications besides the normal static scan of our clean file database. D. We will quote the data from this test and use it in the coming China region malware comparatives test and the total protection test. 2. TEST SET AND AWARD CRITERIA The sample set covers recent newly added software and popular software in the Greater China region (Mainland China, Hong Kong, Macau and Taiwan). The following clean files were reported by security software during this test: 3 We Understand China www.pcsecuritylabs.net PC Security Labs 义ⳝ义㛮 ৃҹᬒҹϟֵᙃ www.pcsecuritylabs.net 㔥ഔ៪㗙 PC Security Labs False alarms in the static false positive test 䴭ᗕ䇃᡹᭛ӊ߫㸼˖ MD5 Hash File Name 0f38d469e473c2c1953a60b31839a6d4 BIXUEQINGTIAN 349ad2d4f5d6f6e6c666e816e995cbc0 360 Security Guard 7.3.0.2003 9e65ad3aa7674bfe854a94b6a27a17ca 360 Security Guard 7.3.0.2003 09a58fecd1138e6bb5bc22be0a609953 Arctic Fox Desktop Wizard V4.1 d6054fe17044e6eed44e0dbfe808a2a2 Housekeeper Edition for Textile and Shoe Businesses v8.16 526d3af37815854b45c3968e0a1087f0 China Telecom Tianyi Live 1.16 2be0902045ec835e8b2d1b7dbcb540a3 XINFEIFEI 29c72195850835532fa188b605b884b5 FlashGet 3.7 f7c2b3c3b7cfd2a0c24bc62449b36e19 ICBC Corporate Net-Pass V1.2.3.1 ebb634d5de705e31751cbbc1b0eb9f64 ICBC Personal Net-Pass ef39c8f91d595f51514f3e5564625ddb Changjiang Securities Golden Online Smart Trader 8.1 552f404a418073a4fdbe0d05ed04378d Straight Flush Trend Pioneer Supreme Edition V7.60.32 6d64483024226ec3e68a8ca63256848e Agricultural Bank of China Internet Banking - World Finance 59d8a1274b711d1626dd23011afb68b4 Kingdee KIS Prof. Ed. V10.0SP1 9843f3c120b327f67ad082d0d0ab1688 Kingsoft Quick Games World 2010.10.29.932 d71ca20fc633bb8e856ec8e707df5869 Leawo Total Video Converter 11ca0eac890eb6338a31cfaa97db95c6 Kugou Player 42d4999c4848911e6d6bfad4a886e993 Mymir 653b3c557330035491672db5645d3efd Qilu Securities Straight Flush Online Trading System˄4.60.19.2 Ed.˅ b6cbad8c6f9679cd3329dce77f542cd6 Dongxing Securities Prof. Ed.˄4.60.14 Ed.˅ 9e47c1abe702fd2597cb15ab4fd71f55 Guosen Securities Golden Sunshine Online Trading System V6.08 80eef40b16ff7458c9ba9850f128f86f Feidian ITV 1.7 ee7c93f27c2f874a82dabfb4f3f4e802 Esunny Trading 8.0 17ff23fa353ed6b9f24ba61bbb2fe478 Bawang 2.2 External Version dcdad352187b6e283bd559f75524a8af Agricultural Bank of China Internet Banking - World Finance 0efc2cd726bc566415a74b4e3d2d1867 XIANTU e69a8d71cec13827cccbe5fb201bb070 FOD Online 8b9664c8a1e123921f6673c6e08784e2 Guodu Securities VIP Management Platform 3a34bdb68614160e8be63c114fd42c75 WebPlayer9 1ae330727911ffd5f89e7ddd63ed99c6 Chuancai Securities Great Wisdom 77477bb73cbe07eac9f1cd439531b628 Haitong Online Trading Client 24ea4ddd8909bc38367d891dd0c50b84 XUNYOU 0e2bd6871b1defef98c81452ac292792 XUNYOU 53c0c912d35613da4539593f547a1ecb XUNYOU 677a5528d2783e640e459fcfd7346e3e XY Online II c393ef8f7f5bf8c5cf7b8001e6a2cdff Kingdee KIS Prof. V10.0 c031b5d4b40caa9e4cbb6c280d8f82de Chuancai Securities Great Wisdom 70cb9583b40efbe50baee699d48ac88d Photostudio Electronic Album Maker ࡼᗕ䇃᡹᭛ӊ߫㸼˖ 4 We Understand China 义ⳝ义㛮 ৃҹᬒҹϟֵᙃ www.pcsecuritylabs.net㔥ഔ៪㗙 PCSecurityLabs BitComet Test Ed. 20110111 CITIC B2C PayGate CNTV-CBox ITvClient -2.0.0.1 Opera11.01-11.1.1164.0 PPS Video Official Edition 2.7.0.1208 PPTV ITv -2.7.0.0031 QQ Tornado3.0-3.0.672.402 QQ Browser 5-5.0.6648.400 www.pcsecuritylabs.net PC Security Labs WinRAR4.00beta3 Chinese Edition 义ⳝ义㛮 ৃҹᬒҹϟֵᙃ www.pcsecuritylabs.net㔥ഔ៪㗙 PCSecurityLabs LeTV -4.8.0.1 Renren Desktop2.3 Maxthon Browser 33 Mega Securities Wonderful-3.1.6.0 Dynamic alarms in the staticEverbright false Bank positive Sunbeam Webshieldtest Driver Huanan Futures F1 Order-0.53.0.0 BitComet Test Ed. 20110111 Land Bank of Taiwan Security Control Addon-1.0.0.0 CITIC B2C PayGate Guotai Futures -8.2010.430.1 CNTV-CBox ITvClient -2.0.0.1 GF SecuritiesVIP Fast Trading EditionV6.01 Opera11.01-11.1.1164.0 China Merchants Securities Wealth Edition V9.02 PPS Video Official Edition 2.7.0.1208 Sogou High Speed Browser-2.2.0.1713 PPTV ITv -2.7.0.0031 Youdao Dictionary 4.0-4.0.22.5570 QQ Tornado3.0-3.0.672.402 SinoPac Securities Get rich quick worker -1.0.0.1 QQ Browser 5-5.0.6648.400 MEITU XIUXIU 2.5.7-2.5.7.1000 WinRAR4.00beta3 Chinese Edition Stock Market Tycoon -3.1.6.0 LeTV -4.8.0.1 Tencent QQ2011-1.60.2012.192 Renren Desktop2.3 Wandoujia Phone Wizard 1.8-1.8.121.565 Maxthon Browser 33 Xunlei7-7.1.4.2112 Mega Securities Wonderful-3.1.6.0 Changjiang Securities Golden Online Smart Trader 8.3 Everbright Bank Sunbeam Webshield Driver ALI Wangwang 2010 Ed.SP1-1.0.0.1 Huanan Futures F1 Order-0.53.0.0 Ludashi -2.76.11.103 Land Bank of Taiwan Security Control Addon-1.0.0.0 Remarks:Guotai Futures -8.2010.430.1 GF SecuritiesVIP Fast Trading EditionV6.01 SChinatatic Merchants False Positive Securities TestWealth Edition V9.02 Sogou High Speed Browser-2.2.0.1713 PCSLYoudao scans Dictionary our 4.0-4.0.22.5570 extensive base of clean files with each tested product. DSinoPacynamic Securities False GetPositive rich quick Test worker -1.0.0.1 MEITU XIUXIU 2.5.7-2.5.7.1000 PCSLStock Market installs Tycoon 30 -3.1.6.0types of commonly used applications after the tested software is installed Tencent QQ2011-1.60.2012.192 andWandoujia checks Phone whether Wizard the1.8-1.8.121.565 security software blocks the installation of normal applications. Xunlei7-7.1.4.2112 Changjiang Securities Golden Online Smart Trader 8.3 ALI Wangwang 2010 Ed.SP1-1.0.0.1 2. AWARD CRITERIA Ludashi -2.76.11.103 All awards are valid for a period of 6 months, until the next PCSL false positive test. Five star award: Four star award: Three star award: Total false positives ≤2 Total false positives: 3-4 Total false positives: 5-6 5 We Understand China www.pcsecuritylabs.net PC Security Labs 义ⳝ义㛮 PAR ৃҹᬒҹϟֵᙃTICIP www.pcsecuritylabs.netATING VENDORS㔥ഔ៪㗙 PCSecurity ANDLabs.3 PRODUCTS 3. খ⌟ॖଚঞ䗕⌟ѻક Vendor Product Antiy Antiy GHOSTBUSTER 7 ArcaBit ArcaBit System Protection AVAST Avast! Free Antivirus 5.1 AVG AVG Internet Security 2011 AVIRA AVIRA Antivir Premium Security Suite 10.0 BitDefender BitDefender Total Security 2011 COMODO COMODO Internet Security Coranti Coranti 2010 Dr.WEB Dr.WEB ANTI-VIRUS 6.0 Emsisoft Emsisoft Anti Malware 5.0 ESET ESET Smart Security 4 Filseclab Twister Anti-TrojanVirus V7 F-Secure F-Secure Internet Security 2011 G DATA G DATA Internet Security 2011 IKARUS IKARUS Virus Utilities Jiangmin KV Antivirus 2011 Kaspersky Kaspersky Internet Security 2011 Kingsoft Kingsoft Internet Security 2011 McAfee McAfee Total Security Micro World eScan Internet Security Suite Microsoft Microsoft Security Essentials NETGATE Spy Emergency Panda Panda Internet Security 2011 Qihoo 360 Antivirus 2.0 Quick Heal Quick Heal AntiVirus 2010 Rising Rising Antivirus 2011 SOPHOS SOPHOS Anti-Virus 9.5 Sunbelt VIPRE Antivirus Symantec Norton Internet Security Trend Micro Trend Micro Titanium Internet Security TrustPort TrustPort PC Security 2010 VBA32 Vba32 Anti-virus Zillya Zillya! Antivirus Signatures updated: January 20th, 2011 ⊼˖ᕙ⌟䕃ӊ⮙↦ᑧޏ㒧ᯊ䯈Ў 2011 ᑈ 1 ᳜ 20 ᮹ 6 We Understand China www.pcsecuritylabs.net PC Security Labs 4. DETAILED TEST RESULTS 7 We Understand China www.pcsecuritylabs.net PC Security Labs 8 We Understand China www.pcsecuritylabs.net PC Security Labs 9 We Understand China www.pcsecuritylabs.net PC Security Labs 10 We Understand China www.pcsecuritylabs.net PC Security Labs 11 We Understand China www.pcsecuritylabs.net PC Security Labs 12 We Understand China 义ⳝ义㛮 ৃҹᬒҹϟֵᙃ www.pcsecuritylabs.net㔥ഔ៪㗙 PCSecurityLabs www.pcsecuritylabs.net PC Security Labs Vendor StaticFPs DynamicFPs TotalFPs BitDefender 0 0 0 MicroWorld 0 0 0 F-Secure 0 1 1 Jiangmin 2 0 2 KingSoft 2 0 2 Microsoft 2 0 2 NETGATE 3 0 3 Qihoo 2 2 4 Rising 2 2 4 Trend Micro 4 0 4 AVG 5 0 5 Dr.Web 4 1 5 ESET 5 0 5 G DATA 5 0 5 Panda 4 1 5 TrustPort 5 0 5 Zillya 4 1 5 ArcaBit 5 1 6 AVAST 7 0 7 Kaspersky 5 2 7 Filseclab 8 0 8 IKARUS 7 1 8 QuickHeal 8 0 8 SOPHOS 7 1 8 Symantec 8 0 8 Antiy 9 0* 9 Emsisoft 4 6 10 McAfee 12 0 12 Sunbelt 11 1 12 VBA32 11 4 15 COMODO 13 5 18 Avira 21 0 21 Coranti 18 3 21 Antiy GHOSTBUSTER 7 is a pure scanner. 13 We Understand China www.pcsecuritylabs.net PC Security Labs AWARDS义ⳝ义㛮 ৃҹᬒҹϟֵᙃ www.pcsecuritylabs.net 㔥ഔ៪㗙 PC Security Labs .5 5. 䅸䆕 ● Domestic VenDor ( Headquarter inside Greater China Region ) 5 ᯳䅸䆕 ᡍ⊼ [D2]: Logoˈ3ˈ4 ᯳г ϔḋ BitDefender 义ⳝ义㛮 ৃҹᬒҹϟֵᙃ www.pcsecuritylabs.net 㔥ഔ៪㗙 PC Security Labs MicroWorld F-Secure 5. 䅸䆕 Jiangmin KingSoft 5 ᯳䅸䆕 Microsoft ᡍ⊼ [D2]: Logoˈ3ˈ4 ᯳г ϔḋ BitDefender
Recommended publications
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Security Survey 2014
    Security Survey 2014 www.av-comparatives.org IT Security Survey 2014 Language: English Last Revision: 28th February 2014 www.av-comparatives.org - 1 - Security Survey 2014 www.av-comparatives.org Overview Use of the Internet by home and business users continues to grow in all parts of the world. How users access the Internet is changing, though. There has been increased usage of smartphones by users to access the Internet. The tablet market has taken off as well. This has resulted in a drop in desktop and laptop sales. With respect to attacks by cyber criminals, this means that their focus has evolved. This is our fourth1 annual survey of computer users worldwide. Its focus is which security products (free and paid) are employed by users, OS usage, and browser usage. We also asked respondents to rank what they are looking for in their security solution. Survey methodology Report results are based on an Internet survey run by AV-Comparatives between 17th December 2013 and 17th January 2014. A total of 5,845 computer users from around the world anonymously answered the questions on the subject of computers and security. Key Results Among respondents, the three most important aspects of a security protection product were (1) Low impact on system performance (2) Good detection rate (3) Good malware removal and cleaning capabilities. These were the only criteria with over 60% response rate. Europe, North America and Central/South America were similar in terms of which products they used, with Avast topping the list. The share of Android as the mobile OS increased from 51% to 70%, while Symbian dropped from 21% to 5%.
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • Page 1 of 375 6/16/2021 File:///C:/Users/Rtroche
    Page 1 of 375 :: Access Flex Bear High Yield ProFund :: Schedule of Portfolio Investments :: April 30, 2021 (unaudited) Repurchase Agreements(a) (27.5%) Principal Amount Value Repurchase Agreements with various counterparties, 0.00%, dated 4/30/21, due 5/3/21, total to be received $129,000. $ 129,000 $ 129,000 TOTAL REPURCHASE AGREEMENTS (Cost $129,000) 129,000 TOTAL INVESTMENT SECURITIES 129,000 (Cost $129,000) - 27.5% Net other assets (liabilities) - 72.5% 340,579 NET ASSETS - (100.0%) $ 469,579 (a) The ProFund invests in Repurchase Agreements jointly with other funds in the Trust. See "Repurchase Agreements" in the Appendix to view the details of each individual agreement and counterparty as well as a description of the securities subject to repurchase. Futures Contracts Sold Number Value and Unrealized of Expiration Appreciation/ Contracts Date Notional Amount (Depreciation) 5-Year U.S. Treasury Note Futures Contracts 3 7/1/21 $ (371,977) $ 2,973 Centrally Cleared Swap Agreements Credit Default Swap Agreements - Buy Protection (1) Implied Credit Spread at Notional Premiums Unrealized Underlying Payment Fixed Deal Maturity April 30, Amount Paid Appreciation/ Variation Instrument Frequency Pay Rate Date 2021(2) (3) Value (Received) (Depreciation) Margin CDX North America High Yield Index Swap Agreement; Series 36 Daily 5 .00% 6/20/26 2.89% $ 450,000 $ (44,254) $ (38,009) $ (6,245) $ 689 (1) When a credit event occurs as defined under the terms of the swap agreement, the Fund as a buyer of credit protection will either (i) receive from the seller of protection an amount equal to the par value of the defaulted reference entity and deliver the reference entity or (ii) receive a net amount equal to the par value of the defaulted reference entity less its recovery value.
    [Show full text]
  • Aluria Security Center Avira Antivir Personaledition Classic 7
    Aluria Security Center Avira AntiVir PersonalEdition Classic 7 - 8 Avira AntiVir Personal Free Antivirus ArcaVir Antivir/Internet Security 09.03.3201.9 x64 Ashampoo FireWall Ashampoo FireWall PRO 1.14 ALWIL Software Avast 4.0 Grisoft AVG 7.x Grisoft AVG 6.x Grisoft AVG 8.x Grisoft AVG 8.x x64 Avira Premium Security Suite 2006 Avira WebProtector 2.02 Avira AntiVir Personal - Free Antivirus 8.02 Avira AntiVir PersonalEdition Premium 7.06 AntiVir Windows Workstation 7.06.00.507 Kaspersky AntiViral Toolkit Pro BitDefender Free Edition BitDefender Internet Security BullGuard BullGuard AntiVirus BullGuard AntiVirus x64 CA eTrust AntiVirus 7 CA eTrust AntiVirus 7.1.0192 eTrust AntiVirus 7.1.194 CA eTrust AntiVirus 7.1 CA eTrust Suite Personal 2008 CA Licensing 1.57.1 CA Personal Firewall 9.1.0.26 CA Personal Firewall 2008 CA eTrust InoculateIT 6.0 ClamWin Antivirus ClamWin Antivirus x64 Comodo AntiSpam 2.6 Comodo AntiSpam 2.6 x64 COMODO AntiVirus 1.1 Comodo BOClean 4.25 COMODO Firewall Pro 1.0 - 3.x Comodo Internet Security 3.8.64739.471 Comodo Internet Security 3.8.64739.471 x64 Comodo Safe Surf 1.0.0.7 Comodo Safe Surf 1.0.0.7 x64 DrVirus 3.0 DrWeb for Windows 4.30 DrWeb Antivirus for Windows 4.30 Dr.Web AntiVirus 5 Dr.Web AntiVirus 5.0.0 EarthLink Protection Center PeoplePC Internet Security 1.5 PeoplePC Internet Security Pack / EarthLink Protection Center ESET NOD32 file on-access scanner ESET Smart Security 3.0 eTrust EZ Firewall 6.1.7.0 eTrust Personal Firewall 5.5.114 CA eTrust PestPatrol Anti-Spyware Corporate Edition CA eTrust PestPatrol
    [Show full text]
  • Heuristic / Behavioural Protection Test 2013
    Anti‐Virus Comparative ‐ Retrospective test – March 2013 www.av‐comparatives.org Anti-Virus Comparative Retrospective/Proactive test Heuristic and behavioural protection against new/unknown malicious software Language: English March 2013 Last revision: 16th August 2013 www.av-comparatives.org ‐ 1 ‐ Anti‐Virus Comparative ‐ Retrospective test – March 2013 www.av‐comparatives.org Contents 1. Introduction 3 2. Description 3 3. False-alarm test 5 4. Test Results 5 5. Summary results 6 6. Awards reached in this test 7 7. Copyright and disclaimer 8 ‐ 2 ‐ Anti‐Virus Comparative ‐ Retrospective test – March 2013 www.av‐comparatives.org 1. Introduction This test report is the second part of the March 2013 test1. The report is delivered several months later due to the large amount of work required, deeper analysis, preparation and dynamic execution of the retrospective test-set. This type of test is performed only once a year and includes a behavioural protection element, where any malware samples are executed, and the results observed. Although it is a lot of work, we usually receive good feedback from various vendors, as this type of test allows them to find bugs and areas for improvement in the behavioural routines (as this test evaluates specifically the proactive heuristic and behavioural protection components). The products used the same updates and signatures that they had on the 28th February 2013. This test shows the proactive protection capabilities that the products had at that time. We used 1,109 new, unique and very prevalent malware samples that appeared for the first time shortly after the freezing date. The size of the test-set has also been reduced to a smaller set containing only one unique sam- ple per variant, in order to enable vendors to peer-review our results in a timely manner.
    [Show full text]
  • Rethinking Security
    RETHINKING SECURITY Fighting Known, Unknown and Advanced Threats kaspersky.com/business “Merchants, he said, are either not running REAL DANGERS antivirus on the servers managing point- of-sale devices or they’re not being updated AND THE REPORTED regularly. The end result in Home Depot’s DEMISE OF ANTIVIRUS case could be the largest retail data breach in U.S. history, dwarfing even Target.” 1 Regardless of its size or industry, your business is in real danger of becoming a victim of ~ Pat Belcher of Invincea cybercrime. This fact is indisputable. Open a newspaper, log onto the Internet, watch TV news or listen to President Obama’s recent State of the Union address and you’ll hear about another widespread breach. You are not paranoid when you think that your financial data, corporate intelligence and reputation are at risk. They are and it’s getting worse. Somewhat more controversial, though, are opinions about the best methods to defend against these perils. The same news sources that deliver frightening stories about costly data breaches question whether or not anti-malware or antivirus (AV) is dead, as reported in these articles from PC World, The Wall Street Journal and Fortune magazine. Reports about the death by irrelevancy of anti-malware technology miss the point. Smart cybersecurity today must include advanced anti-malware at its core. It takes multiple layers of cutting edge technology to form the most effective line of cyberdefense. This eBook explores the features that make AV a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.
    [Show full text]
  • Release Notes
    ESAP 1.6.1 Support has been added for the following products in ESAP1.6.1: Antivirus Products [Antiy Labs] Antiy Ghostbusters 6.x [Comodo Group] COMODO Internet Security 4.x [Kingsoft Corp.] Internet Security 2010.x [SOFTWIN] BitDefender Free Edition 2009 12.x [Sunbelt Software] VIPRE Enterprise 4.x [Sunbelt Software] VIPRE Enterprise Premium 4.x [Symantec Corp.] Norton AntiVirus 18.x [Symantec Corp.] Symantec Endpoint Protection Agent 5.x Antispyware Products [Symantec Corp.] Norton AntiVirus [AntiSpyware] 18.x Firewall Products [Check Point, Inc] ZoneAlarm Firewall 9.x [Comodo Group] COMODO Internet Security 4.x [Sunbelt Software] VIPRE Enterprise Premium 4.x [Symantec Corp.] Norton Internet Security 18.x [Symantec Corp.] Symantec Protection Agent 5.1 5.x Issues Fixed in ESAP1.6.1: OPSWAT : 1. Custom install of Symantec Endpoint Protection 11.x not getting detected (499991) Shavlik: No Shavlik fixes are included. Issues on Upgrading to ESAP1.6.1: OPSWAT: 1. Upgrade from ESAP1.5.2 or older fails if a firewall policy is configured where “Require Specific Products” is checked and McAfee Desktop Firewall (8.0) is selected. The upgrade doesn’t fail if McAfee Desktop Firewall (8.0.x) is selected. To successfully upgrade to ESAP 1.5.3 or greater, unselect McAfee Desktop Firewall (8.0) and select McAfee Desktop Firewall (8.0.x). This doesn’t result in any loss of functionality. Shavlik: 1. The following note applies only to the patch assessment functionality. When upgrading ESAP from a 1.5.1 or older release to the current release, the services on the SA or IC device needs to be restarted for the binaries on the endpoint to be automatically upgraded.
    [Show full text]
  • Data Politics;Worlds, Subjects, Rights;
    DATA POLITICS Data has become a social and political issue because of its capacity to reconfigure relationships between states, subjects, and citizens. This book explores how data has acquired such an important capacity and examines how critical interventions in its uses in both theory and practice are possible. Data and politics are now inseparable: data is not only shaping our social relations, preferences, and life chances but our very democracies. Expert inter- national contributors consider political questions about data and the ways it provokes subjects to govern themselves by making rights claims. Concerned with the things (infrastructures of servers, devices, and cables) and language (code, programming, and algorithms) that make up cyberspace, this book demonstrates that without understanding these conditions of possibility it is impossible to intervene in or to shape data politics. Aimed at academics and postgraduate students interested in political aspects of data, this volume will also be of interest to experts in the fields of internet studies, international studies, Big Data, digital social sciences, and humanities. Didier Bigo is Professor of War Studies at King’s College London and Research Professor at Sciences-Po, CERI Paris. Engin Isin is Professor in International Politics at Queen Mary University of London, UK and University of London Institute in Paris (ULIP). Evelyn Ruppert is Professor of Sociology at Goldsmiths, University of London. Routledge Studies in International Political Sociology Series Editors: Tugba Basaran, University of Kent, UK, Didier Bigo, King’s College London, UK, Emmanuel-Pierre Guittet, University of Manchester, UK, Jef Huysmans, Queen Mary, University of London, UK Routledge Studies in International Political Sociology aims to provide a forum for out- standing empirical and theoretical research engaging with the interplays between the international, the political and the social.
    [Show full text]
  • Comparison with Avast! Internet Security 6.0
    Comparison with avast! Internet Security 6.0 WHAT’S NEW IN AVAST! INTERNET PRODUCT NAME avast! Internet Norton Internet McAfee Internet Kaspersky Internet Eset Smart Security 6.0 Security 2011 Security 2011 Security 2011 Security 4 SECURITY VERsiON 6.0? Number of program languages 35 27 31 17 30 new avast! SafeZoneTM Size of the installation package 73 MB 133 MB 141 MB 98,9 MB 47,7 MB Opens a new (clean) virtual desktop so that other applications don’t see what’s happening – Program size after installation 310 MB 1 307 MB 271 MB 404 MB 230 MB perfect for banking or secure ordering/shopping 1-year price up to 3 PCs $ 69.99 $ 69.99 $ 79.99 $ 79.95 $89.99 – and leaves no traces once it’s closed. TM On-Demand Scanning Test, AV-Comparatives.org - Aug 2010 improved avast! Sandbox Provides an extra layer of security for you to Detection 99.3% 2 98.7% 99.4% 98.3% 98.6% run your PC and its applications in a virtual Scanning speed [MB/s) 17.2 13.3 12.3 9.8 9.6 environment. Number of False Positives few few many many few new avast! AutoSandboxTM (virtualization) Prompts users to run suspicious items in the 3 GENERAL FEATURES virtual Sandbox environment. TM Antivirus and anti-spyware engine Signature-/Heuristic-based a a a a a new avast! WebRep Provides website reliability and reputation Behavior-based a a a a a ratings according to community-provided Real-time anti-rootkit protection On-demand detection a a a a a feedback.
    [Show full text]
  • Tencent Cloud Comunication Solutions for China
    Tencent Cloud Comunication Solutions for China 28.10.2020 © 2020 Tencent Cloud, LLC. All rights reserved. AGENDA • Tencent: “A Chinese Digital Dragon” • The Chinese opportunity • Who is Tencent? • Globalization strategy • Public Cloud • Cloud Communication Solutions • Tencent VooV Meeting • WeChat Work • Tencent Cloud Conference & Exhibition © 2020 Tencent Cloud, LLC. All rights reserved. - Tencent, “A Chinese Digital Dragon” 4 Founded in 1998 and headquartered in Tencent by the numbers: Shenzhen, Tencent is one of the largest • 550+ billion USD market capitalization** technology companies in the world and a global leader in messaging, social media, gaming, • 1.203+ billion monthly active Weixin/WeChat mobile payment, music streaming, digital users* literature, video and other digital content services. • 112 million video subscriptions* • #1 Mobile Payment in China by monthly active users and daily active users* • 62,000+ employees* *As of March 2020 **As of June 10, 2020 © 2020 Tencent Cloud, LLC. All rights reserved. Tencent - User Centric 360-Degree Ecosystem 6 TEG PCG IEG WXG CSIG CDG Technical Platform & Content Interactive Weixin (WeChat) Cloud & Smart Industries Corporate & Engineering Group Group Entertainment Group Group Group Development Group Tencent QQ Tencent Games WeChat Tencent Cloud Tencent Fintech Big Data Tencent YouTu QQ zone Tencent Tencent Tencent e-Sports Marketing WeChat Pay Transit QR Code AI Lab Tencent App Store Solution Tencent Maps WeiShi Timi Studio Tencent Security WeChat Work Platform Smart Retail Tencent News Lightspeed & Mr. Translator Tencent Quantum Studio QQ Mail Data Center QQ Browser Tencent Mobile Manager Tencent Animation Tencent PC Manager Aurora Studio WeRead Tencent Pictures Tencent Miying Next Studio Auto intelligence Penguin Pictures Mini Program Tencent HealthCare Tencent Video MOREFUN Official Tencent Autonomous Studio Account Driving Kuai Bao Tencent Classroom © 2020 Tencent Cloud, LLC.
    [Show full text]
  • Live Video Broadcasting Playing Method
    Playing Method Product Introduction Live Video Broadcasting Playing Method Product Introduction ©2013-2018 Tencent Cloud. All rights reserved. Page 1 of 53 Playing Method Product Introduction Copyright Notice ©2013-2018 Tencent Cloud. All rights reserved. Copyright in this document is exclusively owned by Tencent Cloud. You must not reproduce, modify, copy or distribute in any way, in whole or in part, the contents of this document without Tencent Cloud's the prior written consent. Trademark Notice All trademarks associated with Tencent Cloud and its services are owned by Tencent Cloud Computing (Beijing) Company Limited and its affiliated companies. Trademarks of third parties referred to in this document are owned by their respective proprietors. Service Statement This document is intended to provide users with general information about Tencent Cloud's products and services only and does not form part of Tencent Cloud's terms and conditions. Tencent Cloud's products or services are subject to change. Specific products and services and the standards applicable to them are exclusively provided for in Tencent Cloud's applicable terms and conditions. ©2013-2018 Tencent Cloud. All rights reserved. Page 2 of 53 Playing Method Product Introduction Contents Playing Method Mobile Play Web Play Web Player TcPlayer Web Player TcPlayer FAQ Web LVB Player 1.0 Web LVB Player 1.0 Problem solving Web VOD Player 1.0 Web VOD Player 1.0 Problem solving ©2013-2018 Tencent Cloud. All rights reserved. Page 3 of 53 Playing Method Product Introduction Playing Method Mobile Play Last updated:2018-06-27 11:08:50 Quick integration You can quickly integrate LVB playback feature into your existing App by following the steps below: Step 1: Activate LVB service Step 2: Download RTMP SDK package Step 3: Complete interfacing process by referring to relevant documents (iOS & Android) Complete solution Mobile LVB is a collection of mobile LVB solutions.
    [Show full text]