CloneDisk 2.3.7 Rapport Antivirus

Rapport d'antivirus pour CloneDisk23.exe (0.67 MB)
Download3k a téléchargé et testé la version 2.3.7 de CloneDisk le 15 May 2012 en utilisant seulement les meilleurs moteurs antivirus disponibles aujourd'hui.

Nous l'avons trouvé libre de toute forme de programmes malveillants (virus, logiciels espion, de publicité, etc.). Les rapports complètes sont disponibles ci-dessous.

Nous allons tester CloneDisk à nouveau sur la prochaine version du programme, alors revenez pour les rapports mis à jour prochainement.
  • Avira:

    Propre
  • Bitdefender:

    Propre
  • Kaspersky:

    Propre
  • NOD32:

    Propre

Journaux détaillés

cliquez + pour développer le journal
Avira rapport d'analyse: Propre
Avira / Windows Version 1.9.150.0
Copyright (c) 2010 by Avira GmbH
All rights reserved.

engine set: 8.2.10.64
VDF Version: 7.11.30.46


Scan start time: 5/13/2012 8:40:33 PM
Command line: r:\scancl.exe --nombr --showall --verboselog /a /z /s --log=c:\scanner\output.tmp c:\scanner\downloads\216374\CloneDisk23.exe

configuration file: r:\scancl.conf
c:\scanner\downloads\216374\CloneDisk23.exe
Date: 13.05.2012 Time: 20:40:00 Size: 706228



Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 88
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01


















Bitdefender rapport d'analyse: Propre
//
// BDC scan report
//
// Time: Sun May 13 20:40:05 2012
// Command line: /arc /list /nohed /log=c:\scanner\output.tmp CloneDisk23.exe
// Core: AVCORE v2.1 Windows/i386 11.0.1.6 (Nov 17, 2011)
// Engines: scan: 15, unpack: 10, archive: 49, mail: 7
// Total signatures: 7059193
//

CloneDisk23.exe ok
CloneDisk23.exe=>(NSIS o) ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0000 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0001 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#STRINGS ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#STRINGS=>(REMOVED_NULLS) ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#WINDOWS ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#SYSTEM ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#IDXHDR ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#TOPICS ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#URLSTR ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>#URLTBL ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>$OBJINST ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Index.hhk ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Main window.htm ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>TOC.hhc ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup.htm ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup1.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup2.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup3.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup3.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup4.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup4.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup5.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup5.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup6.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup6.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Backup7.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Copy o10.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Copy o10.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Copy o8.jpg ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Copy or clone.htm ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Create an image file.htm ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Create8.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0002=>Examples of usage (step by step)/Main w10.gif ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0003 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0004 ok
CloneDisk23.exe=>(NSIS o)=>zlib_nsis0005 ok

Results:
Folders :0
Files :39
Packed :1
Archives :3
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
Mb/s :1
Files/second :19
Scan time :00:00:02



















Kaspersky rapport d'analyse: Propre
2012-05-13 20:40:40 Scan_Objects$355331 starting 1%
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Time limit: 180 sec.
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "CloneDisk23.exe" Enable=Yes Recursive=No
; ------------------
2012-05-13 20:40:41 Scan_Objects$355331 running 50%
2012-05-13 20:40:41 CloneDisk23.exe archive NSIS
2012-05-13 20:40:41 CloneDisk23.exe//data0001 ok
2012-05-13 20:40:41 CloneDisk23.exe//CloneDisk.exe packed PE_Patch
2012-05-13 20:40:42 CloneDisk23.exe//CloneDisk.exe//PE_Patch packed ASProtect
2012-05-13 20:40:42 CloneDisk23.exe//CloneDisk.exe//PE_Patch//ASProtect ok
2012-05-13 20:40:42 CloneDisk23.exe//CloneDisk.exe//PE_Patch ok
2012-05-13 20:40:42 CloneDisk23.exe//CloneDisk.exe ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm archive CHM
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup.htm ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup1.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup2.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup3.gif ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup3.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup4.gif ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup4.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup5.gif ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup5.jpg ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm//Examples of usage (step by step)/Backup6.gif ok
2012-05-13 20:40:42 CloneDisk23.exe//help.chm ok
2012-05-13 20:40:42 CloneDisk23.exe//License.txt ok
2012-05-13 20:40:42 CloneDisk23.exe//data0005 ok
2012-05-13 20:40:43 CloneDisk23.exe//data0006 ok
2012-05-13 20:40:43 CloneDisk23.exe ok
2012-05-13 20:40:43 Scan_Objects$355331 completed
; --- Statistics ---
; Time Start: 2012-05-13 20:40:40
; Time Finish: 2012-05-13 20:40:43
; Completion: 100%
; Processed objects: 19
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 2
; Packed: 2
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------

















NOD32 rapport d'analyse: Propre

ECLS Command-line scanner, version 4.2.71.2, (C) 1992-2010 ESET, spol. s r.o.
Module loader, version 1040 (20120313), build 1048
Module perseus, version 1355 (20120430), build 1474
Module scanner, version 7140 (20120515), build 11364
Module archiver, version 1145 (20120416), build 1108
Module advheur, version 1121 (20111208), build 1081

Command line: --base-dir=c:\Program Files\ESET\ESET NOD32 Antivirus /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=c:\scanner\output.tmp CloneDisk23.exe

Scan started at: 05/13/12 20:40:16
name="CloneDisk23.exe", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - Entries.bin", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - Strings.txt", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - Script.nsi", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - CloneDisk.exe", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/NameList", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/Transform/List", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/SpanInfo", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/ControlData", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/Content", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - ::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/ResetTable", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#STRINGS", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#WINDOWS", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#SYSTEM", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#IDXHDR", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#TOPICS", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#URLSTR", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /#URLTBL", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /$OBJINST", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Index.hhk", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Main window.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /TOC.hhc", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup1.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup2.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup3.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup3.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup4.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup4.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup5.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup5.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup6.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup6.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Backup7.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Copy o10.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Copy o10.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Copy o8.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Copy or clone.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Create an image file.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Create8.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w10.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w11.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w12.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w13.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w14.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w15.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w16.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w17.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w18.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w19.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w20.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w21.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w22.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w23.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w24.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w25.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w26.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w27.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w28.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w29.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w3.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w30.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w32.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w33.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w4.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w5.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w6.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main w9.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Main window.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Repair.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Repair11.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Repair9.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Restor6.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Restor7.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Restor9.gif", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Restore.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/Thumbs.db", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Examples of usage (step by step)/View image file of CD or DVD.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/About 1.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/About CloneDisk.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/Contact information.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/License agreement.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Introduction/Thumbs.db", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/How to order CloneDisk.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist1.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist2.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist3.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist4.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Regist5.jpg", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Register.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Order and Register/Thumbs.db", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Support and Upgrade/FAQ.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Support and Upgrade/Support.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - help.chm - CHM - /Support and Upgrade/Upgrade.htm", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - License.txt", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - uninstall.exe", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - uninstall.exe - NSIS - Entries.bin", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - uninstall.exe - NSIS - Strings.txt", threat="is OK", action="", info=""
name="CloneDisk23.exe - NSIS - uninstall.exe - NSIS - Script.nsi", threat="is OK", action="", info=""

Scan completed at: 05/13/12 20:40:17
Scan time: 1 sec (0:00:01)
Total: files - 1, objects 97
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0


















Recommandations de sécurité Download3k

1. Installez un logiciel antivirus

Pour protéger votre ordinateur contre les programmes malveillants, nous vous conseillons d’installer un logiciel antivirus, surtout lorsque vous téléchargez et installez de nouveaux programmes du Web, et d’exécuter son programme de mise à jour de la base de données au moins une fois par jour. Ainsi, votre logiciel antivirus reste à jour des dernières menaces malveillantes et protège mieux vos données.

Si votre ordinateur n’est pas encore protégé par une solution antivirus puissante, vous pouvez examiner une de nos recommandations: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.

2. Choisissez un navigateur Web sécurisé

Un aspect important à garder à l'esprit est quel navigateur Web vous utilisez. La plupart des attaques de navigateur et des virus ciblent Internet Explorer. Il vaut donc mieux que vous envisagiez une alternative. Les navigateurs web les plus sûrs disponibles aujourd'hui sont considérés comme Mozilla Firefox et Google Chrome. En plus d'être gratuits, ils sont à la fois rapides, bloqués, avec navigation par onglets, avec des fonctions de confidentialité et de sécurité. Essayez-les: Télécharger Mozilla Firefox ou Télécharger Google Chrome.

3. En savoir plus sur la sécurisation de votre PC

Ces articles devraient vous aider davantage (Anglais):

Obtenir le code HTML pour ce rapport

Copiez le code de l’espace de texte ci-dessous et collez-le dans votre page HTML.

Lien de graphique

CloneDisk rapport antivirus sur download3k.fr
CloneDisk rapport antivirus sur download3k.fr
CloneDisk rapport antivirus sur download3k.fr

Lien texte

Évaluation
0/5 (0 votes)
Votre note