

A rootkit is a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. HTTP Scanning - Analyzes and blocks websites that support various scams or credit card phishing attempts.Īnti-rootkit - This technology is used to scan for hidden malware also known as rootkits. If no malicious actions are detected, B-HAVE starts the program normally if a suspect conduct is present, B-HAVE automatically quarantines or deletes the application. A program may be deemed to be malicious if it attempts to modify certain files, read from or write to a sensitive area of the memory or create a file that is a product of a known virus. This technology is based on behavioral analysis in a virtualized environment.ī-HAVE checks for characteristics known to be associated with malware.
#Bitdefender antivirus free edition software#
The software is evaluated from a malware point of view and if it reaches a certain level, then it is topped as being a malware.ī-Have - Bitdefender introduced a new technology, B-HAVE, to reduce dependency on virus signatures through proactive detection of unknown threats. What it means is that the application running on the computer receives a score whenever they perform an action on the computer. Intrusion Detection System - This technology represents the heuristic monitoring of the applications trying to access network services or the Internet. If enough such actions are detected, the program which performed them is declared harmful. It monitors each program running on your PC, as it executes, and notes malware-like actions.

For example, the files you just downloaded from the Internet are scanned immediately.Īctive Virus Control - Active Virus Control is an innovative proactive detection technology which uses advanced heuristic methods to detect new potential threats in real time and provides a layer of protection against new threats for which signatures have not yet been released.

This means that files are scanned as they are accessed or copied. Real-time Shield - The real time shield is designed to protect access to the entire system.
