b2科目四模拟试题多少题驾考考爆了怎么补救
b2科目四模拟试题多少题 驾考考爆了怎么补救

kaspersky lab zao_kaspersky os下载_kaspersky密码(19)

电脑杂谈  发布时间:2017-06-03 06:09:36  来源:网络整理

Depending on the identified type, the antivirus agent 170 at step 330 determines the need to perform an antivirus check for the given object, since not all types of objects might be harmful ones. examples of types of objects that need to be checked are the following ones: executable files, text files (documents) and files having a “pdf” (portable document format) extension. An example of a type of object not needing to be checked is video files, for example, of DVX format or I format. In this case, if the type of object, and in a particular instance also the file format, is that of an object type not needing to be checked, then the working with this file and event is completed in step 340, if the need for a check was determined, the information about the object, its type, and the identified event is sent to the control module 160.

In step 350 the control module 160 determines the methods of antivirus check that are needed to perform the task of the antivirus check。 The antivirus check methods are determined on the basis of information provided by the antivirus agent 170。 For example, if the information includes a number of different files, it is advisable to perform their checking at least by the method of comparing against a database of signatures of harmful files and a database of signatures of clean files。 Such databases may be part of the general database 260。

Other methods of checking might also be a check by a data cache inlcuding information on the results of previously verified files, and a request to an external ysis module, such as an external server, such as a security service 195, to which one connects via the lnternet 190。 In the event that the information includes data on a particular application (executable file), two methods may be designated for the given application: the method of emulation and/or the method of ysis based on ysis of events performed by the application during its execution。 Furthermore, it is possible to designate all available methods of antivirus checking regardless of what information was received。


本文来自电脑杂谈,转载请注明本文网址:
http://www.pc-fly.com/a/jisuanjixue/article-50822-19.html

相关阅读
    发表评论  请自觉遵守互联网相关的政策法规,严禁发布、暴力、反动的言论

    • 胡加洪
      胡加洪

      十年以后

    • 范朝
      范朝

      这也是后来的战列舰大战通常采取的战法

    每日福利
    热点图片
    拼命载入中...