NOD32, an antivirus software, why can't I feel it when I use it? Didn't I take the initiative to stop the uninstall?

Characteristics of NOD32:

Advanced real-time detection

-ThreatSense, the heuristic virus identification engine adopted by nod 32 can defend against all malicious attacks before discovering new threats.

A sense of threat. Net online alarm system, so that NOD32 users can automatically and anonymously notify ESET researchers of the threat and provide the best solution in the shortest time.

Comprehensive protection

NOD32 of ESET company has a well-designed and highly integrated single scanning engine from the kernel design, which can detect malicious attacks such as viruses, worms, adware, spyware and rootkits at one time, and can respond to all kinds of phishing attacks of spyware with fast, advanced and real-time virus detection function.

Automatic hourly update

NOD32 automatically obtains virus definitions and program updates from the Internet every hour, and constantly upgrades the (kernel, amon, dmon, emon, imon, xmon) in NOD32 to the latest version.

Take up few resources

NOD32 achieves high performance while maintaining the lowest resource utilization. NOD32 only takes up about 30M B after installation, and it will never slow down the operation of the computer after installation.

The detection speed is amazing.

Most of the code of NOD32 is written in assembly language, which is very efficient.

Convenient management

The program components and virus database of NOD32 will be upgraded behind the scenes. If NOD32 is installed on a personal computer, users can completely ignore the virus upgrade program. If NOD32 is installed in the large-scale network environment of enterprises and organizations, users can use the powerful remote management control center to configure, install, monitor and uniformly manage thousands of NOD32 workstations and servers.

NOD32 module

Resident access monitor (AMON), network monitor (IMON), e-mail scanning module (EMON) and Microsoft Office file resident antivirus protection (DMON).

In terms of speed, NOD32 maintains a light and extremely fast reconnaissance speed. According to many tests of Virus Bulletin, the scanning speed of NOD32 is about 2 to 50 times higher than that of other market competitors. Most users who have used other antivirus products can feel its extraordinary performance. Note: To avoid unauthorized changes, the setting parameters can be protected by passwords. This function is very convenient if the computer will be used by some inexperienced users. To remove password protection, press the "No Password" button.

In terms of resource occupation, the installation of NOD 32 (version 2.7) only takes up about 7 to 8 megabytes of memory space, and it takes up about 28 megabytes of memory space after installation, which is about 3 to 5 times less than other similar products.

Although the occupied space is relatively small, the performance is not inferior; Judging from the detection rate, NOD32 ranked first in the virus announcement and won VB 100% award for 49 consecutive times. At the same time, NOD32 has not missed any ItW (In-the-Wild) computer virus for eight consecutive years-becoming the only anti-virus software with this achievement in the world.

NOD32 has won more than 60 awards, including virus bulletin VB 100%, tick mark level 1, 2, Trojan, spyware, ICSA certification, PC magazine, PCUser, IDG Information World, British Consumer Association Best Buy, mikroDatorn, WINTOTAL, Deloitte; Touch fast 50, iso 900 1, etc.

In the independent testing of AV-Comparatives, ESET NOD32 always gets the best results among all the tested brands. "ESET NOD32 is the leader of all advanced+awards and won the highest honor in the last five tests. This means that among all the products tested in the past 65,438+02 months, ESET NOD32 has the best ability to actively detect malware. "

ESET NOD32 takes up very little system resources, which will not affect the speed of the computer and will give you the feeling of upgrading your hardware. ESET NOD32 leads the world in scanning speed, reaching more than 40MB/s, so the user scanning system does not need to wait for a long time. Moreover, the unparalleled heuristic technology in the anti-virus software industry also ensures the effectiveness of discovering unknown viruses, and it is especially valuable to stimulate unknown viruses efficiently while maintaining a very low false positive rate.

Setting of NOD32:

control center

1 Click "Amon" to enter the virus monitoring settings.

2 Click "Settings".

Detection label

1 Click "Attach File Name" to set it. Additional File Name Editor dialog box

1 Select the radio button before "Scan all files"

Click OK to exit. Method label

1 Select the radio button in front of "potentially dangerous programs".

Action tag

Leave the default settings as shown.

Exclude labels and add them as needed.

As shown in the figure below, add a method to exclude the scanned directory:

1 Click the Add button.

Exclude scanned objects dialog box

1 Click the "Directory" button.

Browse folder dialog box

1 Select the folder to exclude, such as "Drivers", and then click "OK" to exit.

Exclude scanned objects dialog box

1 The folder was repaired at this time.

2 Select the radio button in front of "Permanent"

3 Select the "Directory" button.

4 Select Yes in Excluded Subdirectories to completely exclude the folder from scanning.

5 Click OK to exit.

Safety label

1 You can use the default settings, as shown in the figure. Click "OK" to exit the AMON Settings dialog box and complete the settings of virus monitoring.

DMON

control center

1 Click "DMON" to enter the office monitoring settings.

2 Click "Settings"

Set label

1 Select the radio button in front of "potentially dangerous programs".

2 Select the radio button in front of "List all files".

3 Click the "Attach File Name" button to enter the next setting.

Additional file name editor

1 Select the radio button before "Scan all files".

2 "OK" to exit.

Action tag

The processing mode of 1 remains the default and "Copy to Quarantine" is selected.

1 Click the drop-down menu to change the scan type to Compressed File.

2 Keep the default handling method and check "Copy to Quarantine".

1 Click the drop-down menu to change the scanning type to "self-extracting files".

2 Keep the default handling method and check "Copy to Quarantine".

1 Click the drop-down menu to change the scan type to Runtime Compressor.

2 Keep the default handling method and check "Copy to Quarantine".

3 Click "OK" to complete the setting of office monitoring.

Armon

control center

1 Click "EMON" to enter email protection.

2 Click "Settings".

Scanner settings box

1 Select the radio button in front of "Scan plain text email body".

2 Select the radio button in front of "Scan the message body of RTF".

1 Click "Test" to enter the "Test" dialog box.

2 Select the radio check box in front of "potentially dangerous files".

1 Click "Attach File Name"

2 Select the radio button in front of "Scan files without file names attached".

1 Click "Action" to enter the action setting dialog box.

2 Use the default processing method and check the "Quarantine" option.

Note: The scanning types are listed completely in the traditional Chinese version, but they are separated in the English version and need to be set separately.

1 Click "Log" to enter the log settings.

2 Select the radio buttons in front of "Record All Files" and "Synchronize Records".

3 Click OK to exit the mail protection settings.

Yimeng

At this time, I returned to the control center.

1 Click "IMON" to start setting up network monitoring.

2 Click "Settings". POP3 label

1 Click "Settings". See "POP3 Compatibility Settings".

1 Select "Best Performance"

Click OK to exit.

HTTP tag

1 Click the Compatibility Settings HTTP Compatibility Settings dialog box again.

1 The items related to network connection are arranged here. The default is "Better Compatibility". Changing the picture to "more efficient" can strengthen the protection of trojans.

Click OK to exit.

Note: The items listed here will be added continuously according to the networking applications you use with you, and you need to constantly supplement the settings. However, the improvement of protection efficiency will lead to the decrease of program compatibility. Once you find a problem with a program, please change it back to "Better Compatibility". At present, from my use, only the Internet download manager conflicts, which will lead to the inability to download. This is imon open/news1/safe _ technology/2008/829/08829142367ch1fj0e7hh4f1A8gab827b 54628af/.

/m 1984/blog/item/02a 9 a 9445 feab 183 B3 b 7 DC 3 1 . html