قاهر الفيروسات المجاني اصدار جديد شرح تثبيت avast! Free Antivirus 8.0.1482.45 Final

01 مارس
قاهر الفيروسات المجاني اصدار جديد شرح تثبيت avast! Free Antivirus 8.0.1482.45 Final

السلام عليكم ورحمة الله وبركاته

اسعد الله كل اوقاتكم بالخير والمسرات والعافية

avast! Free Antivirus 8.0.1482.45 Final

اصدار طازج من برنامج افاست (النسخة المجانية)
بتسجيل لمدة عام لغير الاستخدام التجاري .
للحماية القوية ضد الفيروسات والتروجونات والبرامج الخبيثة
بواجهتين بسيطة(للمبتدئين) ومتقدمة(لذوي الخبرة)

Key technologies:
• Improved Antivirus and anti-spyware engine
• New avast! Intelligent Scanner
• New Silent/Gaming Mode
• New Behavior Shield
• New avast! Sandbox
• Smart virus updates
• Real time anti-rootkit protection
• avast! Community IQ
• Behavioral Honeypots
• Green computing
• avast! iTrack
• File System / Mail Shield
• Web Shield
• IM / P2P Shield
• Network Shield
• Script Shield

البرنامج صالح لانظمة الوندوز التالية
Works on Microsoft Windows 2003, Windows XP, Vista, Windows 7, Windows 8 (32/64 bit).

105 MB
تحميل النسخة المجانية متعددة اللغات (رابط الموقع المباشر)
Download Multi Language

من هنا

رابط آخر

من هنا

avast! Free Antivirus is perfect for people who send e-mails and surf popular websites. avast! is a package of applications that aim to protect your computer from a possible virus infection or other malware threat. This is a beta to preview the next version.

If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data.

Based on the award-winning avast! antivirus engine, avast! antivirus contains all of the features you would expect in a modern antivirus program. It incorporates anti-spyware technology certified by West Coast Labs’ Checkmark process, as well as anti-rootkit and strong self-protection capabilities, but now provides even faster scanning with improved detection ability. It contains several real-time “Shields” which continuously monitor your email and internet connections and check the files on your computer whenever they are opened or closed.

avast! antivirus now also comes with a completely revamped user interface for easier scanning. avast! Pro antivirus offers a number of additional features, including a script shield and a process virtualization module, while avast! Internet Security comes with an antispam filter and built-in firewall. Once installed, avast! runs silently in the background to protect your computer against all known forms of malware. You don’t need to do anything else – just install and forget!


Core and detection:
Antivirus and anti-spyware engine
State of the art scanning engine provides reliable protection against viruses, spyware and other forms of malicious software.

Real time anti-rootkit protection:
Unique “on access” technology checks all kernel-mode drivers that the operating system is loading for signs of rootkit behavior. This enables even unknown rootkits to be detected and stopped before they can do any damage.

avast! Community IQ:
Most samples we process come from sensors deployed throughout the avast! community in the Behavior shield and anti-rootkit modules. This is a unique source of data made possible only thanks to our huge user base. Most of the collected samples are analysed by a number of automated processes and only a small fraction of the samples need to be processed manually by our virus analysts.

Code emulator:
When a suspicious executable is encountered (during both on-demand and on-access scanning), avast! is able to emulate the program’s code in an isolated environment. The code emulator is used for two purposes. First, it is used for generic unpacking. Secondly, it is used in the heuristics engine. Technically, this is done using dynamic translation, a method much faster than traditional emulation techniques.

Heuristics engine:
avast! features a new heuristics engine designed to proactively detect malware undetectable with normal definitions. The heuristics engine is able to cover both binary (executable) and script malware.

Potentially unwanted programs detection:
avast! detects potentially unwanted programs, such as remote admin tools and commercial key loggers. Custom rules can be set for dealing with these types of programs.

Boot-time scanner
Allows you to scan your computer for infections before the operating system has started and before a virus can be activated (32-bit operating systems only).

Command-line scanner:
Enables you to run a scan directly from the command line.


Wake-up for scan:

Microsoft Windows is woken from sleep or hibernation mode, performs a scheduled scan, then returns back to sleep mode.

Scheduled scanning:
Allows users to define the scan time and files to be scanned.

avast! Intelligent Scanner:
Can reduce the number of required file scans by up to 80% through a white list of proven safe applications. Files identified as safe are not rescanned unless they change.

Behavior Shield
Monitors activity on your computer using a number of sensors (file system, registry and network based) and reports/blocks any suspicious behavior.

Behavioral Honeypots
avast! sensors identify and monitor suspicious file activity on selected computers, automatically submitting files to the Virus Lab for additional analysis.

File System Shield
Real-time scanning of opened/executed files.

Mail Shield
Scans all incoming/outgoing e-mails for malware. For MS Outlook, a special plug-in is used. Other email clients are protected by a generic POP3/IMAP4/SMTP proxy. New in version 5, the proxy also supports scanning of SSL communication (,, ….)

Web Shield
Scans all visited web pages and checks all files, pages and java scripts downloaded from the internet. Thanks to the Intelligent Stream Scan feature, the Web shield doesn’t slow down your web browsing.

P2P Shield
Checks files downloaded using P2P programs. – ABC, Ares, Azureus, BearShare, Bit Torrent, BitComet, BitLord, BitPump, CZDC++, Direct Connect, eDonkey, eMule, iDC++, iMesh, Kazaa, Kceasy, LimeWire, Morpheus, Opera’s DC++, Overnet, Qtrax, Shareaza, SoulSeek, StrongDC++, uTorrent, Vuze, WinMX, Winny2, Zultrax.

IM Shield
Checks files downloaded while using instant messaging or “chat” programs. – AIM (AOL Instant Messenger), Gadu-Gadu, gaim/Pidgin, Google Talk, ICQ, IM2 Messenger, Infium, Miranda, mIRC, MSN/Windows Messenger, Odigo, PalTalk Messenger, Psi Jabber Client, QIP, QQ, SIM, Skype, Tlen, Trillian, WengoPhone, XFire, Yahoo! Messenger.

Network Shield
Provides protection against network-based viruses. The module has two main components: a URL blocker, designed to block malicious URLs (as defined by the Virus Lab), and a lightweight intrusion-detection system.

Smart virus definition updates
Incremental updating system minimizes the size of regular update files.

Fast application of updates
New format for the virus definition file speeds up application of updates into avast! 5.0 and reduces demand on CPU/memory, resulting in uninterrupted computer use.
New format for the virus definition file means faster updates and reduces demand on CPU/memory, resulting in uninterrupted computer use.

New Silent/Gaming Mode automatically detects full-screen applications and disables pop-ups and other on-screen notifications without degrading security.

Optimized for latest Intel Core i7 CPUs:
Critical sections of the avast! scanning engine code have been optimized to deliver unrivaled performance on the latest Intel chips.

CPU optimization:
Multi-threaded scanning optimization
avast! runs faster on new multi-core CPUs. A new avast! feature allows the splitting of large individual files between cores, accelerating the scanning process.

Green computing:
Reduced demands on the disk drive result in lower energy consumption.

avast! iTrack – Real-time graphic scanning reports.
Graphical user interface – Easy to navigate graphical interface.
Automatic processing – Infected files are processed automatically without requiring user instructions.

اتمنى ان يكون هذا الموضوع مفيدا
تقبلوا فائق تحياتي وشكرا لكم

أضف تعليقاً

Posted by في مارس 1, 2013 in تكنولوجيا


أضف تعليقاً

إملأ الحقول أدناه بالمعلومات المناسبة أو إضغط على إحدى الأيقونات لتسجيل الدخول: Logo

أنت تعلق بإستخدام حساب تسجيل خروج   / تغيير )

صورة تويتر

أنت تعلق بإستخدام حساب Twitter. تسجيل خروج   / تغيير )

Facebook photo

أنت تعلق بإستخدام حساب Facebook. تسجيل خروج   / تغيير )

Google+ photo

أنت تعلق بإستخدام حساب Google+. تسجيل خروج   / تغيير )

Connecting to %s

%d مدونون معجبون بهذه: