-
Avast:
Sauber -
Avira:
Sauber -
Bitdefender:
Sauber -
Kaspersky:
Sauber -
NOD32:
Sauber
Detalierte Berichte
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet10 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet6 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\dir OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet5 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet8 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet7 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet9 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet16 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet12 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet11 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet14 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet13 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet15 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet18 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet17 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_0 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet26 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_8 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_4 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_6 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_5 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_7 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module121 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_9 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\ThisWorkbook OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\_VBA_PROJECT OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\PROJECTwm OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>Workbook OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_1_CompObj OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_5_SummaryInformation OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_5_DocumentSummaryInformation OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls OK
DC-5-25.zip|>Note About Excel Macros.txt OK
DC-5-25.zip OK
#
# Number of scanned files: 44
# Number of scanned folders: 0
# Number of infected files: 0
# Total size of scanned files: 19543045
# Virus database: 130502-1, 05/02/13
# Total scan time: 0:0:4
Copyright (c) 1992 - 2012 AVG Technologies
Program version 2013.0.3349, engine 2013.0.3204
Virus Database: Version 3204/6494 2013-07-15
------------------------------------------------------------
Test started: 16.7.2013 13:51:18
Duration of test: 1 second(s)
------------------------------------------------------------
Objects scanned : 3
Found infections : 0
Found rootkit : 0
Found high severity : 0
Found med severity : 0
Found info severity : 0
Fixed rootkit : 0
Fixed high severity : 0
Fixed med severity : 0
Fixed info severity : 0
------------------------------------------------------------
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.12.78
VDF Version: 7.11.90.186
Scan start time: 7/16/2013 4:51:17 PM
Command line: g:\scancl.exe --nombr --showall --verboselog /a /z /s --log=d:\scanner\output.tmp d:\scanner\downloads\142954\DC-5-25.zip
configuration file: g:\scancl.conf
d:\scanner\downloads\142954\DC-5-25.zip
Date: 16.07.2013 Time: 16:51:01 Size: 1523842
Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 3
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
// BDC scan report
//
// Time: Aug 26 06:32:23 o+00
// Command line: /arc /list /nohed /log=d:\scanner\output.tmp DC-5-25.zip
// Core: AVCORE v2.1 Windows/x86_64 11.0.1.6 (Mar 26, 2013)
// Engines: scan: 14, unpack: 10, archive: 50, mail: 8
// Total signatures: 9212798
//
DC-5-25.zip ok
DC-5-25.zip=>DC-5-25 Ver 4.16.xls ok
DC-5-25.zip=>Note About Excel Macros.txt ok
Results:
Folders :0
Files :3
Packed :0
Archives :1
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "DC-5-25.zip" Enable = Yes Recursive = No
; ------------------
2013-07-16 16:51:18 DC-5-25.zip archive ZIP
2013-07-16 16:51:18 Scan_Objects$35680 running 50%
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls archive Embedded
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module1 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module3 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module121 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module2 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls ok
2013-07-16 16:51:18 DC-5-25.zip//Note About Excel Macros.txt ok
2013-07-16 16:51:18 DC-5-25.zip ok
2013-07-16 16:51:18 Scan_Objects$35680 completed
; --- Statistics ---
; Time Start: 2013-07-16 16:51:18
; Time Finish: 2013-07-16 16:51:18
; Completion: 100%
; Processed objects: 7
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 2
; Packed: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 6.0.316.0, (C) 1992-2013 ESET, spol. s r.o.
Module loader, version 1042 (20130123), build 1050
Module perseus, version 1401 (20130712), build 1532
Module scanner, version 8573 (20130716), build 14413
Module archiver, version 1172 (20130624), build 1140
Module advheur, version 1142 (20130712), build 1107
Module cleaner, version 1073 (20130617), build 1085
Command line: --base-dir=d:\av\eset /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=d:\scanner\output.tmp DC-5-25.zip
Scan started at: 07/16/13 16:51:06
name="DC-5-25.zip", threat="is OK", action="", info=""
name="DC-5-25.zip - ZIP - DC-5-25 Ver 4.16.xls", threat="is OK", action="", info=""
name="DC-5-25.zip - ZIP - Note About Excel Macros.txt", threat="is OK", action="", info=""
Scan completed at: 07/16/13 16:51:06
Scan time: 0 sec (0:00:00)
Total: files - 1, objects 2
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Sicherheits Anweisungen
1. Installieren Sie einen Antivirus Programm
Damit Sie Ihren Rechner von Malware beschützen, wir empfehlen Ihnen immer einen Antivirus Programm installiert zu haben, vor allem wenn Sie herunterladen oder neue Programme vom Internet installieren. Mindestens einmal am Tag lassen Sie den Programm sich zu aktualisieren. Das wird Ihren Antivirus Programm ermöglichen aktualisiert zu bleiben von allen Badware Drohungen und wird besser Ihren Daten schützen.
Wenn Sie keinen Antivirus Programm haben, können Sie sich einz aus unseren Empfehlungen auswählen: Avast Free, AVG Free, Avira Free, Bitdefender, Kaspersky (50% Discount), NOD32.
2. Suchen Sie sich einen sicheren Webbrowser aus
Ein wichtiger Aspekt, den Sie beachten sollten, ist, welchen Webbrowser Sie verwenden. Die meisten Browser nutzen den Internet Explorer und richten ihn so aus, dass Sie eine Alternative bevorzugen. Die derzeit sichersten Webbrowser sind Mozilla Firefox und Google Chrome. Abgesehen davon, dass sie kostenlos sind, sind sie beide schnell, haben Pop-Up-Blocking, Tabbed Browsing, mit Privatsphäre und Sicherheitsfunktionen. Probieren Sie es aus: Herunterladen Mozilla Firefox or Herunterladen Google Chrome.
3. Erfahren Sie mehr über die Sicherung Ihres PCs
Diese Artikel sollen dir weiterhelfen (Englisch):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Besorgen Sie den HTML Kode für diesen Bericht
Graphik Link
Text Link
- Beispiel:Doctors Calls for a Year with Excel Antivirus-Bericht von Download3k.com.
- HTML:
- Forum Kode: