Home
Downloads
»
Dvd
Games
Software
»
Office
Parent Category
»
Child Category 1
»
Sub Child Category 1
Sub Child Category 2
Sub Child Category 3
Child Category 2
Child Category 3
Child Category 4
Featured
Health
»
Childcare
Doctors
Menu
– Home
– Downloads »
–– Dvd
–– Games
–– Software »
––– Office
– Parent Category »
–– Child Category 1 »
––– Sub Child Category 1
––– Sub Child Category 2
––– Sub Child Category 3
–– Child Category 2
–– Child Category 3
–– Child Category 4
– Featured
– Health »
–– Childcare
–– Doctors
Malaysian Developer
My experience on my daily works... helping others ease each other
CodeProject
Home
Navigation
– Home
Wednesday, January 2, 2013
Home
»
Information Security
,
Malware
» Anti Virus Performance - Comparative Result for 2011
Anti Virus Performance - Comparative Result for 2011
January 02, 2013
No comments:
(click the picture for clearer view)
As published at
FB Cybersafe Malaysia
and as published in
AV Comparatives Report 2011
Share:
Email This
BlogThis!
Share to X
Share to Facebook
Related Posts:
The Anatomy of An Anonymous Attack
Virus infects worm by mistake
DDOS related by Dave Dittrich
Carberp Malware a Dangerous New Threat to Financial Information
Comparative Analysis on 7 Commercial Anti-Virus
← Newer Post
Older Post →
Home
0 comments:
Post a Comment
About Me
Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography
View my complete profile
Popular
Tags
Blog Archives
AI Audit and the Importance of Having Competent Auditor
"However, efforts to meet AI audit service demands, and by extension, any use of audits by public regulators, face three important chal...
Setting up Laravel with Homestead on Mac
First - Don't trust your VirtualBox Second - Focus on your Terminal only Then follow the instruction here: https://www.danwalker.com...
Ionic 4 + React + Capacitor: Publishing Your Apps
Since I don't have Apple Store Developer Account yet, I can only publish on Android, of which at Google Play Store . Head up if you are...
Labels
2025
AGI
AI
AI Ethics
AI Governance and Ethics
Algorithm
Analytics
Android
Angular
API
Apple
Application Development
Architecture
Artificial Intelligence
Artificial Intelligent
Assessment
Audit
Big Data
Binary
Blockchain
Buffer Overflow
C Programs
Certification
Code Project
Codility
Community Group
Comparison
Competition
Conference
Content Writer
Critics
Cryptography and Encryption
Dart
Data
Data Analysis
Data Analytics
Data Integration
Data Sciences
Data Visualization
Database
Design
Digital Transformation
ebook
Education
Embedded
Emerging Technologies
Engineering
Enterprise Architect
ETL
Flex
Flutter
Formal Methods
Forum
Framework
Free/OSS
Generative AI
GIS
GitHub
Google Play
Hackers
Homestead
Information Security
ionic
Ionic Framework
IoT
IP
IR4.0
IT Gadget
IT Jokes
IT News
Java
Javascript
JDK
Jenv
Journal
Kecerdasan Buatan
Kepintaran Buatan
Knowledge Sharing
Laravel
Leadership
Linux
Mac
Machine Learning
Malware
Management
Market Research
Melayu
Microsoft
Mobile Apps
Mobile Development
Mobile World
MySQL
Network
Newsletter
Open Source
Patch and Update
Pentaho
Personal Opinion
PHP
Prediction
Privacy and Trust
Program Analysis
Programming
Project Management
Publications
PWA
Qualitative Review
Quantum
Quiz/Test
R language
R Studio
React
REST
Review/Preview
Robot
Robotics
Sample Code
Sciences
Scripting Language
Security Forum/Conference
Silverlight
Smart Manufacturing
Social
Software Development
Software Security
Solution Architect
SQL Injection
Static Analysis
Symposium
System
System Validation
System Verifications
Systems Architect
Tableau
Talk/Lecture
Technology
Thought Leaders
Tips and Trick
Tool
Training
Typescript
Visualization
Vulnerability
Web Browser
Web-based application
White Paper
Windows Windows 11 Microsoft Experience Technology
Blog Archive
►
2025
(10)
►
March
(4)
►
February
(3)
►
January
(3)
►
2024
(3)
►
December
(1)
►
November
(1)
►
June
(1)
►
2023
(2)
►
November
(1)
►
February
(1)
►
2021
(1)
►
July
(1)
►
2020
(23)
►
December
(1)
►
June
(2)
►
May
(2)
►
April
(5)
►
February
(2)
►
January
(11)
►
2019
(11)
►
December
(4)
►
November
(3)
►
September
(3)
►
July
(1)
►
2018
(10)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(2)
►
August
(1)
►
February
(4)
►
2017
(12)
►
December
(3)
►
October
(1)
►
September
(1)
►
July
(3)
►
May
(1)
►
March
(1)
►
February
(2)
►
2016
(12)
►
December
(1)
►
November
(3)
►
September
(1)
►
June
(2)
►
May
(1)
►
April
(3)
►
January
(1)
►
2015
(19)
►
December
(3)
►
November
(4)
►
September
(2)
►
August
(2)
►
July
(1)
►
June
(2)
►
May
(1)
►
March
(1)
►
February
(1)
►
January
(2)
►
2014
(20)
►
December
(2)
►
November
(1)
►
October
(1)
►
September
(4)
►
August
(3)
►
July
(1)
►
April
(1)
►
February
(2)
►
January
(5)
▼
2013
(34)
►
December
(2)
►
November
(2)
►
October
(3)
►
September
(4)
►
August
(3)
►
July
(1)
►
June
(2)
►
May
(3)
►
April
(4)
►
March
(2)
►
February
(1)
▼
January
(7)
Buffer Overflows on the top of the list again (in ...
Fly high with an API by Code Academy
Java 7: 0-day Actively Exploited In The Wild
10 Steps to Smartphone Security for Android
Zero-day vulnerability in Symantec PGP Whole Disk ...
Anti Virus Performance - Comparative Result for 2011
Hacking - Educational link ... or Knowledge for cr...
►
2012
(109)
►
December
(6)
►
November
(3)
►
October
(2)
►
September
(5)
►
August
(2)
►
July
(4)
►
June
(5)
►
May
(4)
►
April
(5)
►
March
(12)
►
February
(13)
►
January
(48)
►
2011
(110)
►
December
(38)
►
November
(7)
►
October
(8)
►
September
(13)
►
August
(2)
►
July
(4)
►
June
(2)
►
May
(14)
►
April
(17)
►
March
(1)
►
February
(4)
►
2010
(34)
►
December
(6)
►
November
(25)
►
October
(3)
►
2009
(1)
►
May
(1)
►
2008
(3)
►
December
(2)
►
July
(1)
Blogger templates
0 comments:
Post a Comment