Kingsoft Antivirus 2012, Free Antivirus Powered by Cloud Security System.
Publisher: |
Kingsoft Security |
|
Downloads: |
1 |
Software Type: |
Freeware, 0.00 |
File Size: |
11.67M |
OS: |
Windows All |
Update Date: |
30 July, 2012 |
Kingsoft Antivirus 2012 is a completely free antivirus solution for detecting, cleaning trojan virus, and protect your computer. It can be a standalone product, and can also work along with other AV. What's included in Kingsoft Antivirus 2012? Virus Scan Full Scan -- Completely can all files stored on computer hard disk Quick Scan -- Scan system file folders and other sensitive areas, to block threats from viruses Custom Scan -- Scan location in your needs USB Drive Scan -- Block threats which spread through USB devices Real-Time Defenses 1. Boundary Defense -- An efficient computer security defense solution from Kingsoft, which requires less computer resources than other antivirus. 1.1 Web Defense -- Protecting browser security while users surfing online, block malicious URL injection, and defense computer privacy security 1.2 IM Defense -- Protecting users’ computer security while chatting with IM software, like MSN, ICQ, AOL etc 1.3 Video Defense -- Protect users' computer security while watching online videos 1.4 Download Shield -- Block suspicious files away from being downloaded to computer 1.5 USB Defense -- Block viruses which spread through removable USB drives. 2, System Defense • Innovative “K+” computer security defense technique • Active Cloud Security Defense Based on the two advanced computer security techniques, KAV 2012 can efficiently protect your computer security against prevalent viruses, Trojan, and other malware. In additionally, KAV 2012 takes heuristic security system and multi-point inherited virus detection system, to prevent computer security. 3, Internet Explorer Firewall Block suspicious tamper behavior from malware, viruses to your browser homepage and, protect you away from malicious hijack and phishing. Anti-hacker Check system vulnerabilities which can be exploits by hackers and provide corresponding solutions. It also blocks malicious scan, remote control and other hacking activities.
|