McAfee AVDCDE-AA-AA User Guide - Page 162

Why use the VirusScan application?, The VShield scanner - moment

Page 162 highlights

Using the VirusScan application Why use the VirusScan application? Maintaining a secure computing environment means scanning for viruses regularly. Depending on the degree to which you swap floppy disks with other users, share files over your local area network, or interact with other computers via the Internet, scanning "regularly" could mean scanning as little as once a month, or as often as several times a day. Other good habits to cultivate include scanning right before you back up your data, scanning before you install new or upgraded software, particularly software you download from other computers, and scanning when you start or shut down your computer each day. Use the VShield scanner to scan your computer's memory and maintain a constant level of vigilance between scanning operations. Under most circumstances, this should protect your system's integrity. But good anti-virus security measures incorporate complete, regular system scans because: • Background scanning checks files as they execute. The VShield scanner looks for virus code as executable files run or when you read a floppy disk, but the VirusScan application can check for code signatures in files stored on your hard disk. If you rarely run an infected file, the VShield scanner might not detect the virus until it deploys its payload. The VirusScan application, however, can detect a virus as it lies in wait for an opportunity to run. • Viruses are sneaky. Accidentally leaving a floppy disk in your drive as you start your computer could load a virus into memory before the VShield scanner, particularly if you do not have the scanner configured to scan floppy disks. Once in memory, a virus can infect nearly any program, including the VShield scanner. • The VShield scanner requires time and resources. Scanning for viruses as you run, copy or save files can delay, though very slightly, software launch times and other tasks. Depending on your situation, this could be time you might rather devote to important system operations. Although the impact is very slight, you might be tempted to disable the VShield scanner if you need every bit of available power for demanding tasks. In that case, performing regular scan operations during idle periods can guard your system against infection without compromising performance. • Good security is redundant security. In the networked, web-centric world in which most computer users operate today, it takes only a moment to download a virus from a source you might not even realize you visited. If a software conflict has disabled background scanning for that moment, or if you have not configured background scanning to watch a vulnerable entry point, you could end up with a virus. Regular scan operations can often catch infections before they spread or do any harm. 162 McAfee VirusScan Anti-Virus Software

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344

Using the VirusScan application
162
McAfee VirusScan Anti-Virus Software
Why use the VirusScan application?
Maintaining a secure computing environment means scanning for viruses
regularly. Depending on the degree to which you swap floppy disks with
other users, share files over your local area network, or interact with other
computers via the Internet, scanning
regularly
could mean scanning as little
as once a month, or as often as several times a day. Other good habits to
cultivate include scanning right before you back up your data, scanning before
you install new or upgraded software, particularly software you download
from other computers, and scanning when you start or shut down your
computer each day.
Use the VShield scanner to scan your computer's memory and maintain a
constant level of vigilance between scanning operations. Under most
circumstances, this should protect your system's integrity. But good anti-virus
security measures incorporate complete, regular system scans because:
Background scanning checks files as they execute
. The VShield scanner
looks for virus code as executable files run or when you read a floppy disk,
but the VirusScan application can check for code signatures in files stored
on your hard disk. If you rarely run an infected file, the VShield scanner
might not detect the virus until it deploys its payload. The VirusScan
application, however, can detect a virus as it lies in wait for an opportunity
to run.
Viruses are sneaky
. Accidentally leaving a floppy disk in your drive as you
start your computer could load a virus into memory before the VShield
scanner, particularly if you do not have the scanner configured to scan
floppy disks. Once in memory, a virus can infect nearly any program,
including the VShield scanner.
The VShield scanner requires time and resources
. Scanning for viruses as
you run, copy or save files can delay, though very slightly, software launch
times and other tasks. Depending on your situation, this could be time you
might rather devote to important system operations. Although the impact
is very slight, you might be tempted to disable the VShield scanner if you
need every bit of available power for demanding tasks. In that case,
performing regular scan operations during idle periods can guard your
system against infection without compromising performance.
Good security is redundant security
. In the networked, web-centric world
in which most computer users operate today, it takes only a moment to
download a virus from a source you might not even realize you visited. If
a software conflict has disabled background scanning for that moment, or
if you have not configured background scanning to watch a vulnerable
entry point, you could end up with a virus. Regular scan operations can
often catch infections before they spread or do any harm.