In one aspect, the antivirus module 180 also includes an updating module 280 and a scheng module 290。 The updating module 280 is designed for automatic updating of the informational database。 For this, the updating module 280 is connected to an external updating service (for example, the security service 195) via the Internet 190 and interacts with it to obtain the necessary information。 Since the present aspects work in a virtual environment, the connection to the Internet 190 occurs through the hypervisor 130。
The scheng module 290 is designed to schedule the performance of the antivirus check by the ysis module 270 in the event of receiving more than one task to perform an antivirus check from the control module 160 or in the event of performing the antivirus check by different antivirus check methods。 Moreover, since the antivirus module 180 may interact at the same time with more than one VM 150, the scheng module 290 makes it possible to prioritize the antivirus checking tasks from several VMs 150 and forms a check queue。
The antivirus check methods of the checking module 250 and the ysis module 270 may be any contemporary and known approaches to performing a checking of objects for the presence of harmful code. By harmful code (or harmful software) is meant actions which are designed to obtain unauthorized, access to the resources of a computer (the host machine 110 or any given VM 150) or information being kept in a computer. Such methods may also be various checking approaches, such as checking of applications with the aid of previously assigned monitoring rules. Examples of the approaches are:
本文来自电脑杂谈,转载请注明本文网址:
http://www.pc-fly.com/a/jisuanjixue/article-50822-8.html
继续看好杨洋