Clear Your Junk With Avast! Pro Antivirus
Key Features
STREAMING, REAL-TIME VIRUS DATABASE UPDATES
Now you get each virus signature sent to you in real-time via a connection to the AVAST Virus Lab cloud, rather than needing to wait for a traditional database update. Your database will be continuously updated with the latest definitions.
FILE REPUTATION SYSTEM
FileRep lets you know whether a file is safe before you open it determined in part by how many people have the file and how new the file is. The technology is also used internally, to help the scanning engine make more intelligent decisions.
1.New Protective Features
- AUTOSANDBOX: Suspicious programs are now automatically placed inside the avast Sandbox. When the program finishes, a comprehensive report is generated and, based on the program’s behavior, you are given a recommendation on how to treat it in the future.
- BROWSER SANDBOXING: Enabled by a single click of the mouse, it allows you to completely isolate the browser from the rest of the system- even if the browser gets hijacked, your system stays clean.
- WEBREP: WebRep browser plugins provide greater protection against phishing sites, including heuristics detection of new phishing sites. It can also detect fake | planted SSL certificates, preventing man-in-the-middle attacks against https sites.
- SAFEZONE: Available only in Pro Antivirus and Internet Security, our SafeZone, your ultimate clean and secure window for financial transactions, now auto-prompts you move to the SafeZone from your regular browser.
2.Greater Usability
- AVAST MANAGEMENT PORTAL: Your web-based AVAST Account portal is your personal directory for all your avast! related data. It allows you to track all your avast! installations, complete with their health data, status information, and useful statistics. And it’s multiplatform, allowing you to manage you avast! installations on both Windows and Mac computers, as well as Android devices.
- REMOTE ASSISTANCE: Our new Remote Assistance tool lets you initiate remote support from any ‘geek’ among your friends or family who agrees to help. Initiated by you, it routes through AVAST’s servers, bypasses firewalls, and can be terminated by you at any time. You will never have to ask for help over the phone again.
- CUSTOMIZABLE INSTALLATION: Your avast! software can now be installed in Compatibility Mode, meaning that it will run perfectly along with your other antivirus software to act as a second line of defense. And even if you install avast! in normal mode, you are given the possibility to install just the components you really need.
3.Core Technologies
- ANTIVIRUS AND ANTI-SPYWARE ENGINE: Innovative scanning engine protects against viruses, spyware, and other malicious agents.
- REAL-TIME ANTI-ROOTKIT PROTECTION: Prevents stealth malware (‘rootkits’) that, when loaded by the computer’s OS, are invisible to ordinary scanners.
- AVAST! COMMUNITY IQ: Our technology uses a global network of sensors to provide us with data taken (anonymously) from the actual web-browsing experiences of an opt-in group of avast! users. This info is then used to protect all avast users with the most up-to-date information on viruses and infected websites.
4.Hi-Tech Features
- BOOT-TIME SCANNER: Scans your computer for infections before the OS can start to activate any viruses beneath it (now applies to Windows 7 and Windows Vista).
- SILENT|GAMING MODE: Automatically detects full-screen applications and disables pop-ups and other notifications without compromising security.
- GREEN COMPUTING: Leaves a minimal “footprint” due to its efficient and effective technology. avast! Real-time Shields – a team of 24/7 guards
- FILE SYSTEM SHIELD: Real-time scanning of opened | executed files.
- MAIL SHIELD: Scans all incoming | outgoing email for malware (a special plug-in is used for MS Outlook).
- WEB SHIELD: Scans all visited web pages, downloaded files, and java scripts. Thanks to the intelligent stream scanning feature, the Web Shield doesn’t slow your web browsing.
- P2P SHIELD | IM SHIELD: Checks files downloaded via P2P programs and while using IM or “chat” programs.
- NETWORK SHIELD: Protects against network-based viruses with two main components: a URL blocker for malicious URLs, and a lightweight intrusion-detection system.
- SCRIPT SHIELD: Detects malicious scripts hidden in web pages and prevents them from hijacking and potentially damaging your computer.
- BEHAVIOR SHIELD: Stops ‘zero-day’ threats and unknown malware before virus definitions have been obtained.
- Additional features: 64-BIT SUPPORT Supports the 64-bit architecture platforms of Windows 7 and Windows Vista.
- HEURISTICS ENGINE: Proactively finds malware undetectable with normal definitions and virus signatures.
- CODE EMULATOR: Uses dynamic translation (a method much faster than traditional emulation) for both generic unpacking and within the heuristics engine.
- COMMAND-LINE SCANNER: Runs a scan directly from the command line.
- AVAST! SANDBOX: Provides an extra layer of security for you to run your PC and its applications in a virtual environment – where any attacks are thus targeted (instead of your real PC)
System Requirements:
- Processor Pentium 3, 128 MB RAM
- 396 MB of free hard disk space
- Microsoft Windows 2000/XP/Vista/7 (32/64 bit)