Friday, December 1, 2006

McAfee 8.50i修正发布了,貌似不错


Benefits:

  • Get maximum protection
  • Gain maximum protection for your PCs and servers with combined anti-virus, firewall, and intrusion prevention technology
  • Block multiple types of threats
  • Defend your systems against viruses, buffer overflows, and blended attacks
  • Minimize damage
  • Limit the harm done to your PCs and servers with advanced outbreak functionality
  • Stop threats that write to memory
  • Block threats that do not write to disk with in-memory scanning
  • Prevent rootkit infestation
  • Stop rootkits and hidden files from installing
  • Single console
  • Control and manage VirusScan from a single console with ePolicy Orchestrator and get detailed enterprise-level reporting
  • Hacker-proof protection
  • Stop worrying about disruptions; malware or hackers cannot disable VirusScan Enterprise

    Features:

  • Cover all the bases
  • Block a broad range of viruses and malicious code—even those hidden in compressed files; find new, unknown viruses with advanced heuristics and generic detection
  • Defend against threats that target Microsoft
  • Protect against exploits targeted at Microsoft® applications and services—especially for Microsoft® Windows® OS services, Microsoft Word, Microsoft® Excel®, Internet Explorer, Microsoft® Outlook® and SQL server
  • Curb outbreak damage
  • Limit outbreak damage, even before DAT files are issued; close ports, monitor applications and email engines, block files and directories, and trace and block infection sources
  • Scans memory for malicious code
  • Detect threats that write to memory rather than disk, such as CodeRed and SQLSlammer
  • Protect email programs
  • Detect and scour viruses in Microsoft Outlook and Lotus® Notes®—including HTML text and attachments
  • Keep script-type threats at bay
  • Prevent threats that exploit JavaScript™ or Visual Basic from executing
  • Optimize updating for remote systems
  • Tailor field updates to physical locations and connection speeds: resume updating after a broken connection is re-established
  • Lock down files
  • Keep VirusScan Enterprise files from being altered with enhanced access protection rules
  • Advanced rootkit detection
  • Scan system memory for installed rootkits, hidden processes, and other concealed malicious code

No comments:

Post a Comment