Check for antivirus, firewall, browser and security software on the system

Check for antivirus, firewall, browser and security software on the system


To check for anti-virus software, firewalls, browsers and security on the system strong enough to help you avoid dangers from outside the internet, not everyone knows how to handle the best. The following will help you to test the most effective anti-virus and Firewall software.


There are many tools to quickly check and assess the security level on a user’s computer, here are some useful tools that you can use. In addition, these tools can notify you of vulnerable software that you have installed on your computer. To check your antivirus, firewall, browser and security software on the system you read, follow the article below.

Check the “strength” of anti-virus programs

Of course, you can’t use antivirus software to test the “strength” of an antivirus program on your system – it will be a “disaster”. If you want to test the anti-virus software on the system is “strong enough”, you can use the test file EICAR.

In essence, the EICAR test file is not a virus – it is just a text file containing a harmless string of codes printed “EICAR-STANDARD-ANTIVIRUS-TEST-FILE!“, if you run the EICAR file in DOS. However, antivirus programs are designed and” trained “to identify EICAR as viruses and respond to EICAR files in the same way that these programs respond to a real virus.

You can use the EICAR file to check your real-time virus scanner and ensure that your system’s virus scanners will “catch” these new viruses, and you can also use the file. EICAR to check for other antivirus programs on the system.

For example, if you are running antivirus software on a Linux mail server and you want to verify that the software is working properly, then you can send the EICAR file via the mail server and make sure it is “captured”. and isolated.

Note: It is important to check and ensure that all of your antivirus programs are properly configured and working properly, but this cannot guarantee that these virus programs can “catch”. new viruses. There are more and more “new,” sophisticated viruses, so you should be wary of programs, software, etc. that you download.

You can download the EICAR test file from the EICAR home page. However, if you want, you can also create your own EICAR test file by opening a text editor (such as Notepad), then copying and pasting the following text into the file to save:

X5O! P% @ AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Antivirus programs will respond in the same way that it responds to a real virus.

Check your antivirus firewall firewall programs for updates and software updates on system 2

Scan the ports on the Firewall

If you use a router (router), the network address translation (NAT) feature of the router acts as a firewall, preventing other computers on the Internet from connecting to your computer. friend.

To ensure that your computer software is “protected” from the Internet – or NAT router or through a Firewall software (firewall) if your computer is connected directly to the Internet, you can use use ShieldsUP! to check the site. ShieldsUP! will perform a scan of your IP address ports, determining whether the ports are open or closed on your address. You should close ports to protect vulnerable services from the “wild west environment” on the Internet.

Check your antivirus firewall firewall programs for updates and software updates on system 3

You need to pay attention to turn on the firewall 24/24 for the computer to be best protected, if you do not know how to turn on the firewall on your computer, you can follow the articles on Taimienphi.vn

Check the web browser plug-in

Web browser plug-ins are one of the common attack vectors today – software like Java, Flash, and Adobe’s PDF reader. Make sure you have the latest versions installed, update the latest plug-in versions if you want to be “safe” when accessing the Internet.

Mozilla’s Plugin Check website is quite useful for checking web browser plug-ins. Although it is a website designed by Mozilla, the Plugin Check works on all browsers including Firefox, Chrome, Safari, Opera, and Internet Explorer.

If any of the plug-ins are outdated, it’s best to update to the latest version of the plug-in. If you already have Java installed, simply uninstall Java – or at least disable Java in your web browser plug-in. You may have heard about the flaw Java Zero-Day, hackers use this vulnerability to “exploit” a user’s computer.

Check your antivirus firewall firewall programs for updates and software updates on system 4

Scan for vulnerable software

On operating systems with central software repositories (such as Linux) or application stores (such as iOS, Android, and Windows 8 Modern environment), checking to identify all your software has been updated. updating the latest security patches is quite easy. All are handled through a single automatic update tool. Windows computers do not have this tool.

Secunia, an IT security company has developed a free application called Secunia Personal Software Inspector to support users to update the latest patches.

After the software scan Secunia PSI installed on your computer will scan and find any outdated and vulnerable programs. Although Secunia PSI cannot know all the pieces of software that have been created by Windows, this tool will help you determine which software you should update.

check your antivirus firewall programs for security and software updates on system 5

Of course, the above tools do not include everything. And there’s no way to guarantee that the antivirus software on your system will “catch” all the viruses that have ever been created – because no antivirus program is perfect. There is also no way to guarantee that you will not fall into a social-engineering or phishing attack.

https://thuthuat.taimienphi.vn/kiem-tra-cac-chuong-trinh-diet-virus-firewall-trinh-duyet-va-phan-mem-bao-mat-tren-he-thong-24909n.aspx
However, those tools will help you examine and evaluate the level of the most important preventive measures you can use to avoid attacks.

.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *