WholeProductDynamicTest–2010www.
av-comparatives.
org-1-WholeProductDynamicTestAugust-November2010Language:EnglishDecember2010Lastrevision:10thDecember2010www.
av-comparatives.
orgWholeProductDynamicTest–2010www.
av-comparatives.
org-2-ContentIntroduction3TestProcedure.
4PreparationforTestSeries4Lab-Setup.
4HardwareandSoftware.
4Settings.
5PreparationforEveryTestingDay.
5TestingCycleforeachmaliciousURL5Sourceoftestcases6TestSet.
6Comments.
6Testedproducts7TestCases.
7DiagrammaticOverview.
8Results9SummaryResults.
10Whole-ProductFalseAlarmTest.
11FalseAlarmsondomains(whilebrowsing)11FalseAlarmsonfiles(whiledownloading/installing)12Certificationlevelsreachedinthistest13CopyrightandDisclaimer.
14WholeProductDynamicTest–2010www.
av-comparatives.
org-3-IntroductionThethreatposedbymalicioussoftwareisgrowingdaybyday.
Notonlyisthenumberofmalwarepro-gramsincreasing,alsotheverynatureofthethreatsischangingrapidly.
Thewayinwhichharmfulcodegetsontocomputersischangingfromsimplefile-basedmethodstodistributionviatheInternet.
Mal-wareisincreasinglyinfectingPCsthroughe.
g.
usersdeceivedinvisitinginfectedwebpages,installingrogue/malicioussoftwareoropenemailswithmaliciousattachments.
Thescopeofprotectionofferedbyantivirusprogramsisextendedbytheinclusionofe.
g.
URL-blockers,contentfiltering,anti-phishingmeasuresanduser-friendlybehavior-blockers.
Ifthesefeaturesareper-fectlycoordinatedwiththesignature-basedandheuristicdetection,theprotectionprovidedagainstthreatsincreases.
Inspiteofthesenewtechnologies,itremainsveryimportantthatthesignature-basedandheuristicdetectionabilitiesofantivirusprogramscontinuetobetested.
Itispreciselybecauseofthenewthreatsthatsignature/heuristicdetectionmethodsarebecomingevermoreimportanttoo.
Thegrowingfre-quencyofzero-dayattacksmeansthatthereisanincreasingriskofmalwareinfection.
Ifthisisnotin-terceptedby"conventional"or"non-conventional"methods,thecomputerwillbeinfected,anditisonlybyusinganon-demandscanwithsignatureandheuristic-baseddetectionthatthemalwarecanbefound,andhopefullyremoved.
Theadditionalprotectiontechnologiesalsooffernomeansofcheckingexistingdatastoresforalready-infectedfiles,whichcanbefoundonthefileserversofmanycompanies.
Thosenewsecuritylayersshouldbeunderstoodasanadditiontogooddetectionrates,notasreplace-ment.
Inthistestallfeaturesoftheproductcontributeprotection,notonlyonepart(likesignatures/heuristicfilescanning).
Sotheabilityofprotectionshouldbehigherthanintestingonlypartsoftheproduct.
Wewouldrecommendthatallpartsofaproductwouldbehighindetection,notonlysinglecomponents(e.
g.
URLblockingprotectsonlywhilebrowsingtheweb,butnotagainstmalwareintroducedbyothermeansoralreadypresentonthesystem).
TheWhole-Product-DynamictestisaprojectofAV-ComparativesandtheUniversityofInnsbruck,facultyofComputerScienceandQualityEngineering.
ItispartiallysupportedbytheAustrianGovernment.
Somedetailsaboutthetestprocesscannotbedisclosed,asitcouldbeeasilymisusedbyvendorstogamethetestsystems.
WholeProductDynamicTest–2010www.
av-comparatives.
org-4-TestProcedureTestinghundredsofURL'sadaywithdozensofantivirusprogramsmakesatotalofthousandsURLtestsandonlyahighdegreeofautomationmakesthispossible.
ThisautomationhasbeendevelopedjointlywiththeInstituteofComputerScienceoftheUniversityofInnsbruckandAV-Comparatives.
Overtheyearwehadtointroduceseveralchangesintheautomatedsystemstocircumventandalsopre-ventsomeAVvendorstryingto"game"thesystem,aswellasupdate/rewriteourtoolsdueunannouncedchangesinthesecurityproductswhichmadeithardertocreateautomatedsystems.
Duethat,thestartofourwhole-product-dynamicteststartedwithsomedelay.
Wekindlyaskvendorstoinformusinad-vanceincaseofproductchangeswhichcanaffectautomatedtestingsystems.
PreparationforTestSeriesEveryantivirusprogramtobetestedisinstalledonitsowntestcomputer(pleasenotethattheterm"antivirusprogram"asusedheremayalsomeanafullInternetSecuritySuite).
Allcomputersarecon-nectedtotheInternet,eachwithitsownexternalIPaddress.
Thesystemisfrozen,withtheoperatingsystemandantivirusprograminstalled.
Lab-SetupTheentiretestisperformedonrealworkstations.
Wedonotuseanykindofvirtualization.
Eachwork-stationhasitsowninternetconnectionwithitsownexternalIP.
Wehavespecialagreementswithsev-eralproviders(failoverclusteringandnotblockinganytraffic)toensureastableinternetconnection.
Thetestsareperformedusingaliveinternetconnection.
Wetookthenecessaryprecautions(withspecialconfiguredfirewalls,etc.
)nottoharmothers(i.
e.
nottocauseoutbreaks).
HardwareandSoftwareForthistestweusedidenticalworkstations,anIBMBladecenterandnetworkattachedstorage(NAS).
VendorTypeCPURAMHardDiskWorkstationsFujitsuE3521E85+IntelCore2Duo4GB80GBBladeCenterIBMEChassis---BladesIBMLS20AMDDualOpteron8GB76GBNASQNAPTS-859U-RPAtomDualCore1GB16TBRaid6ThetestsareperformedunderWindowsXPSP3withnofurtherupdates.
Furtherinstalled(vulnerable)softwareincludes:VendorProductVersionVendorProductVersionAdobeFlashPlayerActiveX10.
1MicrosoftInternetExplorer7AdobeFlashPlayerPlug-In10MicrosoftOfficeProfessional2003AdobeAcrobatReader8.
0Microsoft.
NETFramework3.
5SunJava6.
0.
140WholeProductDynamicTest–2010www.
av-comparatives.
org-5-SettingsWeuseeverysecuritysuitewithitsdefault(out-of-the-box)settings.
Ifuserinteractionsarerequired,wewillchoosethedefaultoption.
Ourwhole-productdynamictestaimstosimulatereal-worldconditionsasexperiencedeverydaybyusers.
Therefore,ifthereisnopredefinedaction,wewillalwaysusethesameactionwhereweconsiderthewarning/messagetobeveryclearanddefinitive.
Ifthemessageleavesituptotheuser,wewillmarkitassuchandifthemessageisveryvague,misleadingorevensuggestingtrustinge.
g.
themaliciousfile/URL/behavior,wewillconsideritasamiss,astheordinaryuserwould.
Weconsideraprotectionifthesystemisnotcompromised.
Thismeansthatthemalwareisnotrunning(orisremoved/terminated)andtherearenosignificant/malicioussystemchanges.
Anout-bound-firewallalertaboutarunningmalwareprocess,whichaskswhethertoblocktrafficformtheusers'workstationtotheinternetistoolittle,toolateandnotconsideredasprotectionbyus.
PreparationforeveryTestingDayEverymorning,anyavailableantivirussoftwareupdatesaredownloadedandinstalled,andanewbaseimageismadeforthatday.
Thisensuresthateveninthecasetheantiviruswouldnotfinishabiggerupdateduringtheday,itwouldatleastusetheupdatesofthemorning,likeitwouldhappentotheuserinthereal-world.
TestingCycleforeachmaliciousURLFirstofall,thereisresearching.
Withourowncrawlerwearesearchingthewebconstantlyformalicioussites.
Wearenotfocusingonzero-daymalware/exploits(althoughitispossiblethattheyarealsopre-sentintheURLpool);wearelookingformaliciouswebsitesthatarecurrentlyoutthereandbeingathreattotheordinaryusers.
BeforebrowsingtoeachnewmaliciousURL/test-caseweupdatethepro-grams/signatures.
Newmajorproductversionsareinstalledonceamonth,that'swhyineachmonthlyreportweonlygivetheproductmainversionnumber.
Ourtest-softwarestartsmonitoringthePC,sothatanychangesmadebythemalwarewillberecorded.
Furthermore,thedetectionalgorithmscheckwhethertheantivirusprogramdetectsthemalware.
Aftereachtestcasethemachineisrevertedtoitscleanstate.
ProtectionSecurityproductsshouldprotecttheuser'sPC.
Itisnotveryimportantatwhichstagetheprotectiontakesplace.
Thiscaneitherbewhilebrowsingtothewebsite(e.
g.
protectionthroughURLBlocker),whileanexploittriestorunorwhilethefileisbeingdownloaded/createdorwhilethemalwareisexe-cuted(eitherbytheexploitorbytheuser).
Afterthemalwareisexecuted(ifnotblockedbefore),wewaitseveralminutesformaliciousactionsandalsotogivee.
g.
behavior-blockerstimetoreactandrem-edyactionsperformedbythemalware.
Ifthemalwareisnotdetectedandthesystemisindeedin-fected/compromised,theprocessgoesto"MalwareNotDetected".
Ifauserinteractionisrequiredanditisuptotheusertodecideifsomethingismalicious,andinthecaseoftheworstuserdecisionthesys-temgetscompromised,weratethisas"user-dependent".
Duethat,theyellowbarsintheresultsgraphcanbeinterpretedeitherasprotectedornotprotected(it'suptotheuser).
WholeProductDynamicTest–2010www.
av-comparatives.
org-6-Duethedynamicnatureofthetesttomimicreal-worldconditionsandduethewayseveraldifferenttechnologieswork(likecloudscanners,reputationservices,etc.
),itisamatteroffactthatsuchtestscannotberepeatedorreplicatedlikee.
g.
staticdetectionratetests.
Anyway,wearetryingtologasmuchasreasonablypossibletoproveourfindingsandresults.
Vendorsareinvitedtoprovideusefullogsinsidetheirproductswhichcanprovidethemwiththeadditionalproof/datatheywant.
Vendorsweregivenonetotwoweekstimeaftereachtestingmonthtodisputeourconclusionaboutthecompromisedcases,sothatwecouldrecheckifthereweremaybesomeproblemsintheautomationorwithouranaly-sisoftheresults.
Inthecaseofcloudproducts,wewillonlyconsidertheresultsthattheproductshadatthetimeoftest-ing;sometimesthecloudservicesprovidedbythesecurityvendorsaredownduetofaultsormainte-nancebythevendors,butthisisoftennotdisclosed/communicatedtotheusersbythevendors.
Thisisalsoareasonwhyproductsrelyingtoomuchoncloudservicescanberisky,asinsuchcasesthesecurityprovidedbytheproductscandecreasesignificantly.
Cloudsignatures/detection/reputationshouldbeimplementedintheproductstoincreasetheotherprotectionfeatures(likelocalreal-timescandetectionandheuristics,behavior-blockers,etc.
)andnotreplacethemcompletely,ase.
g.
offlinecloudservicesmeanthePC'smaybeexposedtohigherrisks.
SourceoftestcasesWeuseourowncrawlingsystemtosearchcontinuouslyformalicioussitesandextractmaliciousURLs(includingspammedmaliciouslinks).
WealsoresearchmanuallyformaliciousURLs.
Ifourin-housecrawlerdoesnotfindenoughvalidmaliciousURLsononeday,wehavecontractedsomeexternalre-searcherstoprovideadditionalmaliciousURLsexclusivelytoAV-Comparatives.
AlthoughwehaveaccesstoURLssharedbetweenvendorsandotherpublicsources,werefrainfromusingtheseforthetests.
TestSetWearenotfocusingonzerodayexploits/malware,butoncurrentandrelevantmalwarethatiscurrentlyoutthereandproblematictousers.
Wearetryingtoincludeabout30-50%URLspointingdirectlytomalware.
Forexample,iftheuseristrickedbysocial-engineeringtofollowlinksinspammailsorweb-sitesoriftheuseristrickedintoinstallingsomeTrojanorotherroguesoftware.
Therest/biggerpartwereexploits/drivebydownloads.
Thoseseemtobeusuallywellcoveredbysecurityproducts.
Inthiskindoftesting,itisveryimportanttouseenoughtestcases.
Ifaninsufficientnumberofsam-plesareusedincomparativetests,differencesinresultsmaynotindicateactualdifferencesamongthetestedproducts1.
CommentsMostoperatingsystemsalreadyincludeownfirewalls,automaticupdatesandmayevenprompttheuserbeforedownloadingorexecutingfilesiftheyreallywanttodothat,warningthatdownloading/executingfilescanbedangerous.
Mailclientsandwebmailsincludespamfilterstoo.
Furthermore,mostbrowsersincludePop-Upblockers,Phishing/URL-Filtersandthepossibilitytoremovecookies.
1Readmoreinthefollowingpaper:http://www.
av-comparatives.
org/images/stories/test/statistics/somestats.
pdfWholeProductDynamicTest–2010www.
av-comparatives.
org-7-Thosearejustsomeofthebuild-inprotections,butdespiteallofthem,systemscangetinfectedany-way.
Thereasonforthisisinmostcasesistheordinaryuser,whomaygettrickedbysocialengineeringintovisitingmaliciouswebsitesorinstallingmalicioussoftware.
Usersexpectasecurityproductnottoaskthemiftheyreallywanttoexecuteafileetc.
butexpectthatthesecurityproductwillprotectthesysteminanycasewithoutthemhavingtothinkaboutit,andde-spitewhattheydo(i.
e.
executingunknownfiles/malware).
Wetrytokeepinmindtheinterestsoftheusersanddelivergoodandeasy-to-readtestreports.
Wearecontinuouslyworkingonimprovingfurtherourautomatedsystemstodeliverabetteroverviewaboutproductcapabilities.
TestedproductsThefollowingproductstakepartintheofficialWhole-Product-Dynamicmaintest-series2.
Wemaytestalsootherproductswhicharenotpartofthemaintest-series,butonlyseparatelyandforalimitedtime-period.
InthistypeoftestweusuallyincludedInternetSecuritySuites,althoughalsootherproductversionswouldfit,becausewhatistestedisthe"protection"providedbythevariousproductsagainstasetofreal-worldthreats.
Mainproductversionsusedforthemonthlytest-runs:VendorProductVersionAugustVersionSeptemberVersionOctoberVersionNovemberAvastInternetSecurity5.
05.
05.
05.
0AVGInternetSecurity9.
09.
010.
010.
0AviraPremiumSecuritySuite10101010BitDefenderInternetSecurity2010201120112011ESETSmartSecurity4.
24.
24.
24.
2F-SecureInternetSecurity2010201120112011GDataInternetSecurity2011201120112011KasperskyInternetSecurity2011201120112011KingsoftInternetSecurityPlus2010201020112011NormanSecuritySuitePro8.
08.
08.
08.
0PandaInternetSecurity2011201120112011PCToolsInternetSecurity2010201120112011SymantecNortonInternetSecurity2011201120112011TrendMicroTitaniumInternetSecurity20103201120112011TestCasesTestperiodTest-cases10thto26thAugust20103047thto25thSeptember20107027thto21stOctober20104548thto23rdNovember2010508TOTAL19682McAfeewasnotincludedduetomiscommunicationregardingtheirparticipation.
3TrendMicroInternetSecurity2010.
WholeProductDynamicTest–2010www.
av-comparatives.
org-8-DiagrammaticOverview44AsofAugust2010.
Furtherenhancements,changesoradditionsmayhavebeenimplementedsincethen.
WholeProductDynamicTest–2010www.
av-comparatives.
org-9-ResultsBelowyouseeanoverviewofthepastsingletestingmonths.
Percentagescanbeseenontheinteractivegraphonourwebsite5.
August2010–304testcasesSeptember2010–702testcasesOctober2010–454testcasesNovember2010–508testcasesWedonotgiveinthisreportexactnumbersforthesinglemonthsonpurpose,toavoidthatlittlediffer-encesof1-2casesaremisusedtostatethatoneproductisbetterthantheotheronagivenmonthandtest-setsize.
Wegivethetotalnumbersinthesummary,wherethesizeofthetest-setisbiggerandmoresignificantdifferencesmaybeobserved.
5http://www.
av-comparatives.
org/comparativesreviews/dynamic-testsWholeProductDynamicTest–2010www.
av-comparatives.
org-10-SummaryResults(August-November)6Testperiod:August–November2010(1968Testcases)BlockedUserdependentCompromisedPROTECTIONRATE[Blocked%+(Userdependent%)/2]7Cluster8F-Secure1946-2298,9%1Symantec1936191398,9%1AVIRA1943-2598,7%1Kaspersky1925192498,3%1GDATA192224497,7%2AVG191015797,1%2Panda1903-6596,7%2Avast1898-7096,4%2ESET188787396,1%2TrendMicro1888-8095,9%2PCTools1886-8295,8%2BitDefender1874-9495,2%2Norman1771-19790,0%3Kingsoft1620-34882,3%4Thegraphbelowshowstheaboveprotectionrateoverallsamples,includingtheminimumandmaximumprotectionratesforthesinglemonths.
6Fordetailedresultsofeachmonth,pleasehavealookatthegraphicaloverviewonourwebsite.
7Userdependentcasesweregivenahalfcredit.
Example:ifaprogramgets80%blocked-ratebyitself,plusanother20%user-dependent,wegivecreditforhalftheuser-dependentone,soitgets90%altogether.
8HierarchicalClusteringMethod:definingfourclustersusingaveragelinkagebetweengroups(Euclidiandistance)ontheprotectionrate.
WholeProductDynamicTest–2010www.
av-comparatives.
org-11-Whole-ProductFalseAlarmTestThefalsealarmtestintheWhole-Product-Dynamictestconsistsoftwoparts:a)FalseAlarmsondomains(whilebrowsing)b)FalseAlarmsonfiles(whiledownloading/installing)Itisnecessarytotestbothscenariosbecausetestingonlyoneofthetwoabovecasescouldpenalizeproductswhichfocusmainlyononetypeofprotectionmethod,eithere.
g.
URL/reputation-filteringore.
g.
on-access/behavior/reputation-basedfileprotection.
a)FalseAlarmsondomains(whilebrowsing)ForthisFalseAlarmtestweuseddomainslistedintheGoogleTop10009siteslistofAugust2010.
WetestedagainstthoseTop-Level-Domainstwice,inSeptemberandinOctober.
Non-maliciousdomainswhichwereblockedatanytime(eitherSeptemberorOctober)werecountedasFPs(astheyshouldneverhavebeenblocked).
Allbelowwebsitesareamongthemostpopularwebsitesontheweb(rankedonAlexa10betweenplace~300and~3000worldwide)11.
Thedomainsbelowhavebeenreportedtotherespectivevendorsforreviewandarenownolongerblocked.
Wedonotdisplaythedomainsaswedonotknowifinfuturetheymaybestillclean(andwealsowanttoavoidmakingpublicityforthosedomains).
Byblockingthewholedomainslikeinthecasesbelow,thesecurityproductsarecausingpotentialfinan-cialdamage(besidethedamageonwebsitereputation)tothedomainowners,includinglossofe.
g.
adsrevenue.
Duethat,westronglyrecommendvendorstoblockwholedomainsonlyinthecasewherethedomain'ssolepurposeistocarry/delivermaliciouscode,andtootherwiseblockjustthemaliciouspages(aslongastheyareindeedmalicious).
Fromthetestedvendors,thefollowingvendorshadFPsonthetesteddomainsduringthetestingperiod:F-Secure1FPhttp://www.
w#b#ra#l#r.
comGDATA1FPhttp://www.
b#n#e#s#.
comPanda1FPhttp://www.
i#o#n#o#d#n#i#i#e#.
comPCTOOLS4FPshttp://www.
5#.
comhttp://www.
2#4#.
comhttp://www.
d#o#e.
comhttp://www.
p#a#s#s#i.
comSymantec1FPhttp://www.
w#z#t#.
plTrendMicro4FPshttp://www.
b#n#e#s#.
comhttp://www.
i#o#n#o#d#n#i#i#e#.
comhttp://www.
n#w#o#n#o#d#l#.
comhttp://www.
p#a#s#s#i.
com9http://www.
google.
com/adplanner/static/top100010http://www.
alexa.
com11Currently(December2010,http://www.
domaintools.
com/internet-statistics)about125milliondomainsareac-tiveandabout100000newTop-Level-Domainsappeareachday,whichisfarmorethannewuniquemalwareappeareachday.
WholeProductDynamicTest–2010www.
av-comparatives.
org-12-Somefewmorewebsiteswereblockedbyvariousproducts,butnotcountedasFPsherethistime.
Thosecasesweremainlywebsitesordownloadportalscurrentlystillhosting/promotingalsosomeadwareorunlicensedsoftwareetc.
Manyproductscontinuetoblockwebsitesevenwhentheyarenolongermali-ciousandhavealreadybeencleanedupforsometime.
Thishappensalsowithpopularwebsites,butofcourseevenmorewithlesspopular/prevalentwebsites,withtheriskofturningthesecurityproductsintoawebcensoringtoolwhichgoestoofarinblockingwebsites(basedonwhatthesecurityvendorconsidersbeingariskorpotentiallyunwantedcontentfortheuser).
Itwouldbemuchbetteriftheproductwereonlytoblocktheaccesstothemaliciouspart/fileinsteadofawholewebsite/domainwhichisnotmaliciousbyitself(e.
g.
notcontaininganydrive-by/exploitsetc.
),unlesstheuserwantsanden-ablese.
g.
aparentalcontrolsettingorsimilar.
ProductswhichtendtoblockURLsbasede.
g.
onreputa-tionmaybemorepronetothisandscorealsohigherinprotectiontests,astheyblockmanyunpopularandstrangelookingwebsites.
AfurtheroptionforfutureFPtestingcouldbetousesuchURLswhicharediscardedascleanordownduringmalwaretesting.
AtthemomenttheAVindustryisdiscussingaboutwhat/whenandunderwhichcircumstancesablockedwebsitewhichisnotornolongermaliciousbyitselfcanbeconsideredasa"falsealarm",asopinionsarevaryingevenamongvendors.
Wewilllookattheoutcomeofthatdiscussionandconsideritifthismakessensealsofromauserperspective.
b)FalseAlarmsonfiles(whiledownloading/installing)ForthisFalseAlarmtestweusedsoftwarelistedasTop100Freewaredownloadsin2010ofapopularGermandownloadportal12.
Wemaychangetheuseddownloadportalsandcleansitesourceseverytime(andmaybealsonolongerdisclosewhichportals/listswereused),inordertoavoidthatvendorsfocusonwhitelisting/trainingmainlyagainstthosesites/lists/sources.
Wetestedonlywith100applications,asthistestwasdonemanuallyinordertoinstalltheprogramscompletelyandalsousethemafterwardstoseeiftheygetblocked.
WemayautomatealsothistypeofFPtestinginordertogetbiggertest-setsinfuture.
Noneoftheproductshadafalsealarmonthoseverypopularapplications.
Thereweresomefirewallalerts,butaswedonotconsiderfirewallalerts(forprogramstryingtoaccesstheinternet)asprotectioninthedynamictests,wearealsonotconsideringthemasFPs.
ItwouldbesurprisingtoencounterFPsonverypopularsoftwareinthecaseofwell-knownandinternationallyusedAV's,especiallyasthetestisdoneatonepointintimeandFPsonverypopularsoftwarearenoticedandfixedwithinfewhours.
Probablyitwouldmakemoresensetotestagainstlower-prevalencesoftware.
WeobservedaccidentallyalsosomeFPsonlesspopularsoftware/websites,buthavenotincludedthemthistimeasvendorsdonotseethemasabigissue.
Ifyouthinkdifferent,pleaseletthem(notus,asweknowalready!
)knowwhatyouasauserthinkaboutFPsthathappentoyouonlesspopularfilesandwebsites.
AswedonotyethavemuchexperienceaboutFPratesinWhole-Product-Dynamictesting,wearenotconsideringtheFPsintheawardsthistime,butwemaygivelowerawardstoproductswhichwillhaveFPs(ormanyuserinteractions)infutureWhole-Product-DynamicTests.
12http://www.
pcwelt.
deWholeProductDynamicTest–2010www.
av-comparatives.
org-13-CertificationlevelsreachedinthistestWeprovidea3-level-ranking-system(STANDARD,ADVANCEDandADVANCED+).
Overviewsoflevelsreachedinpreviousmaintestscanbefoundonourwebsite13.
Theawardsaredecidedandgivenbythetestersbasedontheobservedtestresults(afterconsultingstatisticalmodels).
ThefollowingcertificationlevelsarefortheresultsreachedintheWhole-Product-DynamicTest:CERTIFICATIONLEVELSPRODUCTSF-SecureSymantecAVIRAKasperskyGDATAAVGPandaAvastESETPCToolsTrendMicroBitDefenderNormanKingsoft13http://www.
av-comparatives.
org/comparativesreviews/main-tests/summary-reportsWholeProductDynamicTest–2010www.
av-comparatives.
org-14-CopyrightandDisclaimerThispublicationisCopyright2010byAV-Comparativese.
V.
.
Anyuseoftheresults,etc.
inwholeorinpart,isONLYpermittedaftertheexplicitwrittenagreementofthemanagementboardofAV-Comparativese.
V.
,priortoanypublication.
AV-Comparativese.
V.
anditstesterscannotbeheldliableforanydamageorlosswhichmightoccurasresultof,orinconnectionwith,theuseoftheinformationprovidedinthispaper.
Wetakeeverypossiblecaretoensurethecorrectnessofthebasicdata,butaliabilityforthecorrectnessofthetestresultscannotbetakenbyanyrepresentativeofAV-Comparativese.
V.
Wedonotgiveanyguaranteeofthecorrectness,completeness,orsuitabilityforaspecificpurposeofanyoftheinformation/contentprovidedatanygiventime.
Nooneelseinvolvedincreating,produc-ingordeliveringtestresultsshallbeliableforanyindirect,specialorconsequentialdamage,orlossofprofits,arisingoutof,orrelatedto,theuseorinabilitytouse,theservicesprovidedbythewebsite,testdocumentsoranyrelateddata.
AV-Comparativese.
V.
isaregisteredAustrianNon-Profit-Organization.
FormoreinformationaboutAV-Comparativesandthetestingmethodologiespleasevisitourwebsite.
AV-Comparativese.
V.
(December2010)WholeProductDynamicTest–2010www.
av-comparatives.
org-15-Advertisement
Virmach商家我们是不是比较熟悉?速度一般,但是人家价格低,而且机房是比较多的。早年的时候有帮助一个有做外贸也许需要多个机房且便宜服务商的时候接触到这个商家,有曾经帮助够买过上百台这样的低价机器。这里需要提醒的,便宜但是速度一般,尤其是中文业务速度确实不快,如果是外贸业务,那肯定是没有问题。这几天,我们有看到Virmach推出了夏季优惠促销,VPS首年8折,最低年付仅7.2美元,多机房可选,如...
beervm是一家国人商家,主要提供国内KVM VPS,有河南移动、广州移动等。现在预售湖南长沙联通vds,性价比高。湖南长沙vps(长沙vds),1GB内存/7GB SSD空间/10TB流量/1Gbps端口/独立IP/KVM,350元/月,有需要的可以关注一下。Beervm长沙联通vps套餐:长沙联通1G青春版(预售)长沙联通3G标准版(预售)长沙联通3G(预售)vCPU:1vCPU:2vCPU...
易探云香港vps主机价格多少钱?香港vps主机租用费用大体上是由配置决定的,我们选择香港vps主机租用最大的优势是免备案vps。但是,每家服务商的机房、配置、定价也不同。我们以最基础配置为标准,综合比对各大香港vps主机供应商的价格,即可选到高性能、价格适中的香港vps主机。通常1核CPU、1G内存、2Mbps独享带宽,价格在30元-120元/月。不过,易探云香港vps主机推出四个机房的优惠活动,...
av百科为你推荐
软银收购arm如果华为麒麟得不到ARMv9构架升级,性能势必会落后别人,该怎么办?2014年万圣节是几月几日2014年鬼节是几月份?燃气热水器和电热水器哪个好燃气热水器和电热水器的区别是什么,哪个比较好?少儿英语哪个好少儿英语哪种的好?浮动利率和固定利率哪个好房贷利率是固定的还是浮动的好?ps软件哪个好PS软件用哪种比较好?急用!炒股软件哪个好最好的炒股软件是哪个?炒股软件哪个好炒股软件真的那么好用吗?炒股软件哪个好请问有什么好用的免费股票软件?炒股软件哪个好什么炒股软件比较好用?
域名服务 gitcafe 好看的桌面背景图片 韩国网名大全 骨干网络 京东商城0元抢购 qingyun 789电视网 169邮箱 昆明蜗牛家 smtp虚拟服务器 视频服务器是什么 电信网络测速器 免费网络空间 空间申请 江苏徐州移动 广州主机托管 北京主机托管 百度新闻源申请 带宽测速 更多