In one particular aspect, the function of determining the need for performing antivirus checking of an object may be done by the agent 170. The agent 170 then sends information to the control module 160 only about objects for which the antivirus check needs to be performed.
Let us assume that the control module 160 has determined the need to perform an antivirus check of an identified event and, accordingly, a determined object. The control module 160 then formulates the task of performing an antivirus check. In turn, the task includes information on which antivirus check methods are needed to perform the check and by which components of the antivirus system 200. Depending on the type of object and occurring events involving that object, the control module 160 determines which methods are needed to perform the check, and how quickly.
The determination of the methods of the antivirus check takes into account at least such parameters as the type of object, the necessary time to perform the antivirus check method and the probable delay caused for the user. For example, the object is a compressed file (archive). Consequently, the control module 160 determines that this object may be checked by two methods: a request to an external server via the Internet 190 and a checking by the signature ysis method.
Another example is the situation when the object is a link to an external resource, such as the site “”. In this case, the speed of the check needs to be high (so as not to slow down the work of the user, for example). In this case, the control module 160 selects one or more of the the following methods: the methods of checking by “whitelists” and “blacklists”, the methods of checking using a data cache storing previously verified and most popular objects, and the method of checking via a request to an external security server via the Internet 190. Furthermore, the control module 160 determines the methods which is used while the user is working on the identified site, since there is a probability that new objects may appear.
本文来自电脑杂谈,转载请注明本文网址:
http://www.pc-fly.com/a/jisuanjixue/article-50822-12.html
最贵的车由马云出品
后面的报道一定是非常失望
离衰退的日子不远了