"Leakage kill" returned? Jinshan four main reasons why experts say – l

The so-called " Leak killed "Means the virus has been Internet Appear, but for the time being can not be anti-virus Software Detected. Recently, anti-virus experts Kingsoft Duba Li Tiejun That "In essence, the root causes leakage kill traditional security software can not adapt to virus production, dissemination of comprehensive Internet-based, traditional virus identification methods can not adapt to the rapid growth of the virus." The reason, mainly in the following four points:

1, the virus driven by the interests of black chain
Many cases have already confirmed that the structure of the Internet virus, Trojan horse black industry, just released by public security organs damaged by computer viruses Network Security Cases, the illegal income is tens of millions of RMB. Attracts great interest of practitioners and anti-virus vendors to fight a protracted war. This year also occurred with digital signatures for the Trojan virus, which is more obvious commercial manufacture of the behavior of spreading computer viruses.

Trojan virus propagation from the analysis, is clearly in the "Long Tail Law." A huge number of Trojan viruses infected only a limited number of machines, so Trojan antivirus vendors can be captured to reduce the opportunity to extend the life cycle of the Trojan virus, in order to long-term potential.

2, virus, trojan antivirus software on the case against the increased
The mainstream security software that can detect the virus, do not have the basic conditions for commercial profit. Trojan virus producers, disseminators of the release of a new virus or virus transformation of old before the mainstream will be a variety of security software for the latest version of the virus, Trojan horse to avoid killing treatment to ensure the new version of the virus is not detected by the latest security software. They can pay the price of the "service" costs, in order and the "client" (Virus Trojan buyers) to keep long-term Cooperation Relations.

3, the traditional virus identification method to determine the "leakage kill" phenomenon must exist

Traditional virus identification method is only checking the computer virus file (usually called black paper), while the number of files set to the virus or the identification of all the virus is in the daily rate of increase of thousands of black paper increasing, no antivirus vendor can complete collection of all viruses.

4, traditional security software update cycle is too long
Traditional security software updates as a unit is usually an hour, the client must download the latest virus database to the latest virus defense, and new virus signatures will be distributed to tens of millions of end users need to consume considerable time. And a certain kind of virus, trojan update the price is much smaller. For example, the release of backdoors that hackers only need a command to allow clients instant later, required bandwidth is much smaller than anti-virus software.

Mitigate or resolve the risks of leakage to kill can be done, in recent years, countries have developed or revised laws and regulations, a serious blow to destroy the computer network Electronic Criminal acts. Security vendors are further technological innovation to meet the challenges of the Internet.

To Duba-led national security vendors are building a huge "cloud the credibility of the security system", such as Kingsoft Internet Security 2011 (www.duba.net) subvert the traditional, comprehensive security system to enable a credible cloud can be the greatest limit the problem to reduce leakage to kill. According to Kingsoft Anti-virus experts Tiejun introduction, traditional security software only check virus files (black paper), the credibility of the security system can be identified cloud viruses, and identify the user computer's normal file (white paper), those abnormal program files out of quarantine in the system. The new anti-virus, killing idea, can effectively reduce the incidence of leakage kill.

The same time, the credibility of cloud-based security systems like anti-virus software does not rely heavily on traditional security software as the client time to upgrade. Because credible cloud security system, server upgrade is in minutes, as long as the network client on the with the latest anti-virus killing capacity.

Click here for more exciting information

I am an expert from pneumatic-equipments.com, while we provides the quality product, such as Angle Seat Valve , Pneumatic Accessories manufacturer, pneumatic cylinders,and more.

Processing your request, Please wait....

Leave a Reply