WholeProductDynamicTest–2010www.
av-comparatives.
org-1-WholeProductDynamicTestAugust-November2010Language:EnglishDecember2010Lastrevision:10thDecember2010www.
av-comparatives.
orgWholeProductDynamicTest–2010www.
av-comparatives.
org-2-ContentIntroduction3TestProcedure.
4PreparationforTestSeries4Lab-Setup.
4HardwareandSoftware.
4Settings.
5PreparationforEveryTestingDay.
5TestingCycleforeachmaliciousURL5Sourceoftestcases6TestSet.
6Comments.
6Testedproducts7TestCases.
7DiagrammaticOverview.
8Results9SummaryResults.
10Whole-ProductFalseAlarmTest.
11FalseAlarmsondomains(whilebrowsing)11FalseAlarmsonfiles(whiledownloading/installing)12Certificationlevelsreachedinthistest13CopyrightandDisclaimer.
14WholeProductDynamicTest–2010www.
av-comparatives.
org-3-IntroductionThethreatposedbymalicioussoftwareisgrowingdaybyday.
Notonlyisthenumberofmalwarepro-gramsincreasing,alsotheverynatureofthethreatsischangingrapidly.
Thewayinwhichharmfulcodegetsontocomputersischangingfromsimplefile-basedmethodstodistributionviatheInternet.
Mal-wareisincreasinglyinfectingPCsthroughe.
g.
usersdeceivedinvisitinginfectedwebpages,installingrogue/malicioussoftwareoropenemailswithmaliciousattachments.
Thescopeofprotectionofferedbyantivirusprogramsisextendedbytheinclusionofe.
g.
URL-blockers,contentfiltering,anti-phishingmeasuresanduser-friendlybehavior-blockers.
Ifthesefeaturesareper-fectlycoordinatedwiththesignature-basedandheuristicdetection,theprotectionprovidedagainstthreatsincreases.
Inspiteofthesenewtechnologies,itremainsveryimportantthatthesignature-basedandheuristicdetectionabilitiesofantivirusprogramscontinuetobetested.
Itispreciselybecauseofthenewthreatsthatsignature/heuristicdetectionmethodsarebecomingevermoreimportanttoo.
Thegrowingfre-quencyofzero-dayattacksmeansthatthereisanincreasingriskofmalwareinfection.
Ifthisisnotin-terceptedby"conventional"or"non-conventional"methods,thecomputerwillbeinfected,anditisonlybyusinganon-demandscanwithsignatureandheuristic-baseddetectionthatthemalwarecanbefound,andhopefullyremoved.
Theadditionalprotectiontechnologiesalsooffernomeansofcheckingexistingdatastoresforalready-infectedfiles,whichcanbefoundonthefileserversofmanycompanies.
Thosenewsecuritylayersshouldbeunderstoodasanadditiontogooddetectionrates,notasreplace-ment.
Inthistestallfeaturesoftheproductcontributeprotection,notonlyonepart(likesignatures/heuristicfilescanning).
Sotheabilityofprotectionshouldbehigherthanintestingonlypartsoftheproduct.
Wewouldrecommendthatallpartsofaproductwouldbehighindetection,notonlysinglecomponents(e.
g.
URLblockingprotectsonlywhilebrowsingtheweb,butnotagainstmalwareintroducedbyothermeansoralreadypresentonthesystem).
TheWhole-Product-DynamictestisaprojectofAV-ComparativesandtheUniversityofInnsbruck,facultyofComputerScienceandQualityEngineering.
ItispartiallysupportedbytheAustrianGovernment.
Somedetailsaboutthetestprocesscannotbedisclosed,asitcouldbeeasilymisusedbyvendorstogamethetestsystems.
WholeProductDynamicTest–2010www.
av-comparatives.
org-4-TestProcedureTestinghundredsofURL'sadaywithdozensofantivirusprogramsmakesatotalofthousandsURLtestsandonlyahighdegreeofautomationmakesthispossible.
ThisautomationhasbeendevelopedjointlywiththeInstituteofComputerScienceoftheUniversityofInnsbruckandAV-Comparatives.
Overtheyearwehadtointroduceseveralchangesintheautomatedsystemstocircumventandalsopre-ventsomeAVvendorstryingto"game"thesystem,aswellasupdate/rewriteourtoolsdueunannouncedchangesinthesecurityproductswhichmadeithardertocreateautomatedsystems.
Duethat,thestartofourwhole-product-dynamicteststartedwithsomedelay.
Wekindlyaskvendorstoinformusinad-vanceincaseofproductchangeswhichcanaffectautomatedtestingsystems.
PreparationforTestSeriesEveryantivirusprogramtobetestedisinstalledonitsowntestcomputer(pleasenotethattheterm"antivirusprogram"asusedheremayalsomeanafullInternetSecuritySuite).
Allcomputersarecon-nectedtotheInternet,eachwithitsownexternalIPaddress.
Thesystemisfrozen,withtheoperatingsystemandantivirusprograminstalled.
Lab-SetupTheentiretestisperformedonrealworkstations.
Wedonotuseanykindofvirtualization.
Eachwork-stationhasitsowninternetconnectionwithitsownexternalIP.
Wehavespecialagreementswithsev-eralproviders(failoverclusteringandnotblockinganytraffic)toensureastableinternetconnection.
Thetestsareperformedusingaliveinternetconnection.
Wetookthenecessaryprecautions(withspecialconfiguredfirewalls,etc.
)nottoharmothers(i.
e.
nottocauseoutbreaks).
HardwareandSoftwareForthistestweusedidenticalworkstations,anIBMBladecenterandnetworkattachedstorage(NAS).
VendorTypeCPURAMHardDiskWorkstationsFujitsuE3521E85+IntelCore2Duo4GB80GBBladeCenterIBMEChassis---BladesIBMLS20AMDDualOpteron8GB76GBNASQNAPTS-859U-RPAtomDualCore1GB16TBRaid6ThetestsareperformedunderWindowsXPSP3withnofurtherupdates.
Furtherinstalled(vulnerable)softwareincludes:VendorProductVersionVendorProductVersionAdobeFlashPlayerActiveX10.
1MicrosoftInternetExplorer7AdobeFlashPlayerPlug-In10MicrosoftOfficeProfessional2003AdobeAcrobatReader8.
0Microsoft.
NETFramework3.
5SunJava6.
0.
140WholeProductDynamicTest–2010www.
av-comparatives.
org-5-SettingsWeuseeverysecuritysuitewithitsdefault(out-of-the-box)settings.
Ifuserinteractionsarerequired,wewillchoosethedefaultoption.
Ourwhole-productdynamictestaimstosimulatereal-worldconditionsasexperiencedeverydaybyusers.
Therefore,ifthereisnopredefinedaction,wewillalwaysusethesameactionwhereweconsiderthewarning/messagetobeveryclearanddefinitive.
Ifthemessageleavesituptotheuser,wewillmarkitassuchandifthemessageisveryvague,misleadingorevensuggestingtrustinge.
g.
themaliciousfile/URL/behavior,wewillconsideritasamiss,astheordinaryuserwould.
Weconsideraprotectionifthesystemisnotcompromised.
Thismeansthatthemalwareisnotrunning(orisremoved/terminated)andtherearenosignificant/malicioussystemchanges.
Anout-bound-firewallalertaboutarunningmalwareprocess,whichaskswhethertoblocktrafficformtheusers'workstationtotheinternetistoolittle,toolateandnotconsideredasprotectionbyus.
PreparationforeveryTestingDayEverymorning,anyavailableantivirussoftwareupdatesaredownloadedandinstalled,andanewbaseimageismadeforthatday.
Thisensuresthateveninthecasetheantiviruswouldnotfinishabiggerupdateduringtheday,itwouldatleastusetheupdatesofthemorning,likeitwouldhappentotheuserinthereal-world.
TestingCycleforeachmaliciousURLFirstofall,thereisresearching.
Withourowncrawlerwearesearchingthewebconstantlyformalicioussites.
Wearenotfocusingonzero-daymalware/exploits(althoughitispossiblethattheyarealsopre-sentintheURLpool);wearelookingformaliciouswebsitesthatarecurrentlyoutthereandbeingathreattotheordinaryusers.
BeforebrowsingtoeachnewmaliciousURL/test-caseweupdatethepro-grams/signatures.
Newmajorproductversionsareinstalledonceamonth,that'swhyineachmonthlyreportweonlygivetheproductmainversionnumber.
Ourtest-softwarestartsmonitoringthePC,sothatanychangesmadebythemalwarewillberecorded.
Furthermore,thedetectionalgorithmscheckwhethertheantivirusprogramdetectsthemalware.
Aftereachtestcasethemachineisrevertedtoitscleanstate.
ProtectionSecurityproductsshouldprotecttheuser'sPC.
Itisnotveryimportantatwhichstagetheprotectiontakesplace.
Thiscaneitherbewhilebrowsingtothewebsite(e.
g.
protectionthroughURLBlocker),whileanexploittriestorunorwhilethefileisbeingdownloaded/createdorwhilethemalwareisexe-cuted(eitherbytheexploitorbytheuser).
Afterthemalwareisexecuted(ifnotblockedbefore),wewaitseveralminutesformaliciousactionsandalsotogivee.
g.
behavior-blockerstimetoreactandrem-edyactionsperformedbythemalware.
Ifthemalwareisnotdetectedandthesystemisindeedin-fected/compromised,theprocessgoesto"MalwareNotDetected".
Ifauserinteractionisrequiredanditisuptotheusertodecideifsomethingismalicious,andinthecaseoftheworstuserdecisionthesys-temgetscompromised,weratethisas"user-dependent".
Duethat,theyellowbarsintheresultsgraphcanbeinterpretedeitherasprotectedornotprotected(it'suptotheuser).
WholeProductDynamicTest–2010www.
av-comparatives.
org-6-Duethedynamicnatureofthetesttomimicreal-worldconditionsandduethewayseveraldifferenttechnologieswork(likecloudscanners,reputationservices,etc.
),itisamatteroffactthatsuchtestscannotberepeatedorreplicatedlikee.
g.
staticdetectionratetests.
Anyway,wearetryingtologasmuchasreasonablypossibletoproveourfindingsandresults.
Vendorsareinvitedtoprovideusefullogsinsidetheirproductswhichcanprovidethemwiththeadditionalproof/datatheywant.
Vendorsweregivenonetotwoweekstimeaftereachtestingmonthtodisputeourconclusionaboutthecompromisedcases,sothatwecouldrecheckifthereweremaybesomeproblemsintheautomationorwithouranaly-sisoftheresults.
Inthecaseofcloudproducts,wewillonlyconsidertheresultsthattheproductshadatthetimeoftest-ing;sometimesthecloudservicesprovidedbythesecurityvendorsaredownduetofaultsormainte-nancebythevendors,butthisisoftennotdisclosed/communicatedtotheusersbythevendors.
Thisisalsoareasonwhyproductsrelyingtoomuchoncloudservicescanberisky,asinsuchcasesthesecurityprovidedbytheproductscandecreasesignificantly.
Cloudsignatures/detection/reputationshouldbeimplementedintheproductstoincreasetheotherprotectionfeatures(likelocalreal-timescandetectionandheuristics,behavior-blockers,etc.
)andnotreplacethemcompletely,ase.
g.
offlinecloudservicesmeanthePC'smaybeexposedtohigherrisks.
SourceoftestcasesWeuseourowncrawlingsystemtosearchcontinuouslyformalicioussitesandextractmaliciousURLs(includingspammedmaliciouslinks).
WealsoresearchmanuallyformaliciousURLs.
Ifourin-housecrawlerdoesnotfindenoughvalidmaliciousURLsononeday,wehavecontractedsomeexternalre-searcherstoprovideadditionalmaliciousURLsexclusivelytoAV-Comparatives.
AlthoughwehaveaccesstoURLssharedbetweenvendorsandotherpublicsources,werefrainfromusingtheseforthetests.
TestSetWearenotfocusingonzerodayexploits/malware,butoncurrentandrelevantmalwarethatiscurrentlyoutthereandproblematictousers.
Wearetryingtoincludeabout30-50%URLspointingdirectlytomalware.
Forexample,iftheuseristrickedbysocial-engineeringtofollowlinksinspammailsorweb-sitesoriftheuseristrickedintoinstallingsomeTrojanorotherroguesoftware.
Therest/biggerpartwereexploits/drivebydownloads.
Thoseseemtobeusuallywellcoveredbysecurityproducts.
Inthiskindoftesting,itisveryimportanttouseenoughtestcases.
Ifaninsufficientnumberofsam-plesareusedincomparativetests,differencesinresultsmaynotindicateactualdifferencesamongthetestedproducts1.
CommentsMostoperatingsystemsalreadyincludeownfirewalls,automaticupdatesandmayevenprompttheuserbeforedownloadingorexecutingfilesiftheyreallywanttodothat,warningthatdownloading/executingfilescanbedangerous.
Mailclientsandwebmailsincludespamfilterstoo.
Furthermore,mostbrowsersincludePop-Upblockers,Phishing/URL-Filtersandthepossibilitytoremovecookies.
1Readmoreinthefollowingpaper:http://www.
av-comparatives.
org/images/stories/test/statistics/somestats.
pdfWholeProductDynamicTest–2010www.
av-comparatives.
org-7-Thosearejustsomeofthebuild-inprotections,butdespiteallofthem,systemscangetinfectedany-way.
Thereasonforthisisinmostcasesistheordinaryuser,whomaygettrickedbysocialengineeringintovisitingmaliciouswebsitesorinstallingmalicioussoftware.
Usersexpectasecurityproductnottoaskthemiftheyreallywanttoexecuteafileetc.
butexpectthatthesecurityproductwillprotectthesysteminanycasewithoutthemhavingtothinkaboutit,andde-spitewhattheydo(i.
e.
executingunknownfiles/malware).
Wetrytokeepinmindtheinterestsoftheusersanddelivergoodandeasy-to-readtestreports.
Wearecontinuouslyworkingonimprovingfurtherourautomatedsystemstodeliverabetteroverviewaboutproductcapabilities.
TestedproductsThefollowingproductstakepartintheofficialWhole-Product-Dynamicmaintest-series2.
Wemaytestalsootherproductswhicharenotpartofthemaintest-series,butonlyseparatelyandforalimitedtime-period.
InthistypeoftestweusuallyincludedInternetSecuritySuites,althoughalsootherproductversionswouldfit,becausewhatistestedisthe"protection"providedbythevariousproductsagainstasetofreal-worldthreats.
Mainproductversionsusedforthemonthlytest-runs:VendorProductVersionAugustVersionSeptemberVersionOctoberVersionNovemberAvastInternetSecurity5.
05.
05.
05.
0AVGInternetSecurity9.
09.
010.
010.
0AviraPremiumSecuritySuite10101010BitDefenderInternetSecurity2010201120112011ESETSmartSecurity4.
24.
24.
24.
2F-SecureInternetSecurity2010201120112011GDataInternetSecurity2011201120112011KasperskyInternetSecurity2011201120112011KingsoftInternetSecurityPlus2010201020112011NormanSecuritySuitePro8.
08.
08.
08.
0PandaInternetSecurity2011201120112011PCToolsInternetSecurity2010201120112011SymantecNortonInternetSecurity2011201120112011TrendMicroTitaniumInternetSecurity20103201120112011TestCasesTestperiodTest-cases10thto26thAugust20103047thto25thSeptember20107027thto21stOctober20104548thto23rdNovember2010508TOTAL19682McAfeewasnotincludedduetomiscommunicationregardingtheirparticipation.
3TrendMicroInternetSecurity2010.
WholeProductDynamicTest–2010www.
av-comparatives.
org-8-DiagrammaticOverview44AsofAugust2010.
Furtherenhancements,changesoradditionsmayhavebeenimplementedsincethen.
WholeProductDynamicTest–2010www.
av-comparatives.
org-9-ResultsBelowyouseeanoverviewofthepastsingletestingmonths.
Percentagescanbeseenontheinteractivegraphonourwebsite5.
August2010–304testcasesSeptember2010–702testcasesOctober2010–454testcasesNovember2010–508testcasesWedonotgiveinthisreportexactnumbersforthesinglemonthsonpurpose,toavoidthatlittlediffer-encesof1-2casesaremisusedtostatethatoneproductisbetterthantheotheronagivenmonthandtest-setsize.
Wegivethetotalnumbersinthesummary,wherethesizeofthetest-setisbiggerandmoresignificantdifferencesmaybeobserved.
5http://www.
av-comparatives.
org/comparativesreviews/dynamic-testsWholeProductDynamicTest–2010www.
av-comparatives.
org-10-SummaryResults(August-November)6Testperiod:August–November2010(1968Testcases)BlockedUserdependentCompromisedPROTECTIONRATE[Blocked%+(Userdependent%)/2]7Cluster8F-Secure1946-2298,9%1Symantec1936191398,9%1AVIRA1943-2598,7%1Kaspersky1925192498,3%1GDATA192224497,7%2AVG191015797,1%2Panda1903-6596,7%2Avast1898-7096,4%2ESET188787396,1%2TrendMicro1888-8095,9%2PCTools1886-8295,8%2BitDefender1874-9495,2%2Norman1771-19790,0%3Kingsoft1620-34882,3%4Thegraphbelowshowstheaboveprotectionrateoverallsamples,includingtheminimumandmaximumprotectionratesforthesinglemonths.
6Fordetailedresultsofeachmonth,pleasehavealookatthegraphicaloverviewonourwebsite.
7Userdependentcasesweregivenahalfcredit.
Example:ifaprogramgets80%blocked-ratebyitself,plusanother20%user-dependent,wegivecreditforhalftheuser-dependentone,soitgets90%altogether.
8HierarchicalClusteringMethod:definingfourclustersusingaveragelinkagebetweengroups(Euclidiandistance)ontheprotectionrate.
WholeProductDynamicTest–2010www.
av-comparatives.
org-11-Whole-ProductFalseAlarmTestThefalsealarmtestintheWhole-Product-Dynamictestconsistsoftwoparts:a)FalseAlarmsondomains(whilebrowsing)b)FalseAlarmsonfiles(whiledownloading/installing)Itisnecessarytotestbothscenariosbecausetestingonlyoneofthetwoabovecasescouldpenalizeproductswhichfocusmainlyononetypeofprotectionmethod,eithere.
g.
URL/reputation-filteringore.
g.
on-access/behavior/reputation-basedfileprotection.
a)FalseAlarmsondomains(whilebrowsing)ForthisFalseAlarmtestweuseddomainslistedintheGoogleTop10009siteslistofAugust2010.
WetestedagainstthoseTop-Level-Domainstwice,inSeptemberandinOctober.
Non-maliciousdomainswhichwereblockedatanytime(eitherSeptemberorOctober)werecountedasFPs(astheyshouldneverhavebeenblocked).
Allbelowwebsitesareamongthemostpopularwebsitesontheweb(rankedonAlexa10betweenplace~300and~3000worldwide)11.
Thedomainsbelowhavebeenreportedtotherespectivevendorsforreviewandarenownolongerblocked.
Wedonotdisplaythedomainsaswedonotknowifinfuturetheymaybestillclean(andwealsowanttoavoidmakingpublicityforthosedomains).
Byblockingthewholedomainslikeinthecasesbelow,thesecurityproductsarecausingpotentialfinan-cialdamage(besidethedamageonwebsitereputation)tothedomainowners,includinglossofe.
g.
adsrevenue.
Duethat,westronglyrecommendvendorstoblockwholedomainsonlyinthecasewherethedomain'ssolepurposeistocarry/delivermaliciouscode,andtootherwiseblockjustthemaliciouspages(aslongastheyareindeedmalicious).
Fromthetestedvendors,thefollowingvendorshadFPsonthetesteddomainsduringthetestingperiod:F-Secure1FPhttp://www.
w#b#ra#l#r.
comGDATA1FPhttp://www.
b#n#e#s#.
comPanda1FPhttp://www.
i#o#n#o#d#n#i#i#e#.
comPCTOOLS4FPshttp://www.
5#.
comhttp://www.
2#4#.
comhttp://www.
d#o#e.
comhttp://www.
p#a#s#s#i.
comSymantec1FPhttp://www.
w#z#t#.
plTrendMicro4FPshttp://www.
b#n#e#s#.
comhttp://www.
i#o#n#o#d#n#i#i#e#.
comhttp://www.
n#w#o#n#o#d#l#.
comhttp://www.
p#a#s#s#i.
com9http://www.
google.
com/adplanner/static/top100010http://www.
alexa.
com11Currently(December2010,http://www.
domaintools.
com/internet-statistics)about125milliondomainsareac-tiveandabout100000newTop-Level-Domainsappeareachday,whichisfarmorethannewuniquemalwareappeareachday.
WholeProductDynamicTest–2010www.
av-comparatives.
org-12-Somefewmorewebsiteswereblockedbyvariousproducts,butnotcountedasFPsherethistime.
Thosecasesweremainlywebsitesordownloadportalscurrentlystillhosting/promotingalsosomeadwareorunlicensedsoftwareetc.
Manyproductscontinuetoblockwebsitesevenwhentheyarenolongermali-ciousandhavealreadybeencleanedupforsometime.
Thishappensalsowithpopularwebsites,butofcourseevenmorewithlesspopular/prevalentwebsites,withtheriskofturningthesecurityproductsintoawebcensoringtoolwhichgoestoofarinblockingwebsites(basedonwhatthesecurityvendorconsidersbeingariskorpotentiallyunwantedcontentfortheuser).
Itwouldbemuchbetteriftheproductwereonlytoblocktheaccesstothemaliciouspart/fileinsteadofawholewebsite/domainwhichisnotmaliciousbyitself(e.
g.
notcontaininganydrive-by/exploitsetc.
),unlesstheuserwantsanden-ablese.
g.
aparentalcontrolsettingorsimilar.
ProductswhichtendtoblockURLsbasede.
g.
onreputa-tionmaybemorepronetothisandscorealsohigherinprotectiontests,astheyblockmanyunpopularandstrangelookingwebsites.
AfurtheroptionforfutureFPtestingcouldbetousesuchURLswhicharediscardedascleanordownduringmalwaretesting.
AtthemomenttheAVindustryisdiscussingaboutwhat/whenandunderwhichcircumstancesablockedwebsitewhichisnotornolongermaliciousbyitselfcanbeconsideredasa"falsealarm",asopinionsarevaryingevenamongvendors.
Wewilllookattheoutcomeofthatdiscussionandconsideritifthismakessensealsofromauserperspective.
b)FalseAlarmsonfiles(whiledownloading/installing)ForthisFalseAlarmtestweusedsoftwarelistedasTop100Freewaredownloadsin2010ofapopularGermandownloadportal12.
Wemaychangetheuseddownloadportalsandcleansitesourceseverytime(andmaybealsonolongerdisclosewhichportals/listswereused),inordertoavoidthatvendorsfocusonwhitelisting/trainingmainlyagainstthosesites/lists/sources.
Wetestedonlywith100applications,asthistestwasdonemanuallyinordertoinstalltheprogramscompletelyandalsousethemafterwardstoseeiftheygetblocked.
WemayautomatealsothistypeofFPtestinginordertogetbiggertest-setsinfuture.
Noneoftheproductshadafalsealarmonthoseverypopularapplications.
Thereweresomefirewallalerts,butaswedonotconsiderfirewallalerts(forprogramstryingtoaccesstheinternet)asprotectioninthedynamictests,wearealsonotconsideringthemasFPs.
ItwouldbesurprisingtoencounterFPsonverypopularsoftwareinthecaseofwell-knownandinternationallyusedAV's,especiallyasthetestisdoneatonepointintimeandFPsonverypopularsoftwarearenoticedandfixedwithinfewhours.
Probablyitwouldmakemoresensetotestagainstlower-prevalencesoftware.
WeobservedaccidentallyalsosomeFPsonlesspopularsoftware/websites,buthavenotincludedthemthistimeasvendorsdonotseethemasabigissue.
Ifyouthinkdifferent,pleaseletthem(notus,asweknowalready!
)knowwhatyouasauserthinkaboutFPsthathappentoyouonlesspopularfilesandwebsites.
AswedonotyethavemuchexperienceaboutFPratesinWhole-Product-Dynamictesting,wearenotconsideringtheFPsintheawardsthistime,butwemaygivelowerawardstoproductswhichwillhaveFPs(ormanyuserinteractions)infutureWhole-Product-DynamicTests.
12http://www.
pcwelt.
deWholeProductDynamicTest–2010www.
av-comparatives.
org-13-CertificationlevelsreachedinthistestWeprovidea3-level-ranking-system(STANDARD,ADVANCEDandADVANCED+).
Overviewsoflevelsreachedinpreviousmaintestscanbefoundonourwebsite13.
Theawardsaredecidedandgivenbythetestersbasedontheobservedtestresults(afterconsultingstatisticalmodels).
ThefollowingcertificationlevelsarefortheresultsreachedintheWhole-Product-DynamicTest:CERTIFICATIONLEVELSPRODUCTSF-SecureSymantecAVIRAKasperskyGDATAAVGPandaAvastESETPCToolsTrendMicroBitDefenderNormanKingsoft13http://www.
av-comparatives.
org/comparativesreviews/main-tests/summary-reportsWholeProductDynamicTest–2010www.
av-comparatives.
org-14-CopyrightandDisclaimerThispublicationisCopyright2010byAV-Comparativese.
V.
.
Anyuseoftheresults,etc.
inwholeorinpart,isONLYpermittedaftertheexplicitwrittenagreementofthemanagementboardofAV-Comparativese.
V.
,priortoanypublication.
AV-Comparativese.
V.
anditstesterscannotbeheldliableforanydamageorlosswhichmightoccurasresultof,orinconnectionwith,theuseoftheinformationprovidedinthispaper.
Wetakeeverypossiblecaretoensurethecorrectnessofthebasicdata,butaliabilityforthecorrectnessofthetestresultscannotbetakenbyanyrepresentativeofAV-Comparativese.
V.
Wedonotgiveanyguaranteeofthecorrectness,completeness,orsuitabilityforaspecificpurposeofanyoftheinformation/contentprovidedatanygiventime.
Nooneelseinvolvedincreating,produc-ingordeliveringtestresultsshallbeliableforanyindirect,specialorconsequentialdamage,orlossofprofits,arisingoutof,orrelatedto,theuseorinabilitytouse,theservicesprovidedbythewebsite,testdocumentsoranyrelateddata.
AV-Comparativese.
V.
isaregisteredAustrianNon-Profit-Organization.
FormoreinformationaboutAV-Comparativesandthetestingmethodologiespleasevisitourwebsite.
AV-Comparativese.
V.
(December2010)WholeProductDynamicTest–2010www.
av-comparatives.
org-15-Advertisement
菠萝云国人商家,今天分享一下菠萝云的广州移动机房的套餐,广州移动机房分为NAT套餐和VDS套餐,NAT就是只给端口,共享IP,VDS有自己的独立IP,可做站,商家给的带宽起步为200M,最高给到800M,目前有一个8折的优惠,另外VDS有一个下单立减100元的活动,有需要的朋友可以看看。菠萝云优惠套餐:广州移动NAT套餐,开放100个TCP+UDP固定端口,共享IP,8折优惠码:gzydnat-8...
10gbiz怎么样?10gbiz 美国万兆带宽供应商,主打美国直连大带宽,真实硬防。除美国外还提供线路非常优质的香港、日本等数据中心可供选择,全部机房均支持增加独立硬防。洛杉矶特色线路去程三网直连(电信、联通、移动)回程CN2 GIA优化,全天低延迟。中国大陆访问质量优秀,最多可增加至600G硬防。香港七星级网络,去程回程均为电信CN2 GIA+联通+移动,大陆访问相较其他香港GIA线路平均速度更...
tmthosting怎么样?tmthosting家本站也分享过多次,之前也是不温不火的商家,加上商家的价格略贵,之到斯巴达商家出现,这个商家才被中国用户熟知,原因就是斯巴达家的机器是三网回程AS4837线路,而且也没有多余的加价,斯巴达家断货后,有朋友发现TMTHosting竟然也在同一机房,所以大家就都入手了TMTHosting家的机器。目前,TMTHosting商家放出了夏季优惠,针对VPS推...
av百科为你推荐
免费卡巴斯基杀毒软件有什么免费杀毒软件好点啊..卡巴斯基的免费三十天我已经试了,那是不是已经不能再免费享受卡巴了??盗版win8.1升级win10盗版win10怎么升级到win10天玑1000plus和骁龙865哪个好天玑1000plus相当于骁龙多少电脑管家和360哪个好360和电脑管家哪个好啊游戏盒子哪个好lol游戏盒子哪个好行车记录仪哪个好行车记录仪哪种好用?51空间登录51咋登录 咋登录好友的51空间牡丹江教育云空间登录云空间怎么登入牡丹江教育云空间登录云端学习如何登录?群空间登录群空间无法正常登陆的问题
花生壳域名 vps虚拟服务器 免费申请网页 burstnet 韩国电信 eq2 免费个人空间申请 gspeed php空间购买 免费cdn 万网空间购买 新世界服务器 根服务器 帽子云排名 成都主机托管 博客域名 塔式服务器 建站技术 godaddy退款 windowsserverr2 更多