AVG Anti-Virus 2015 is one of the most popular free anti-virus packages. Despite its free of charge, this software has all the necessary functions for the early detection of threats and removal or treatment of already infected objects.
Main Features Of AVG Anti-Virus 2015
To begin, it is worth noting that the program is very functional and does not load the system resources of the computer (by the way, unlike many paid programs such direction). The package itself consists of several modules. This includes anti-virus scanner, monitor, scanner, email and module database update via the Internet.
Installing the program does not cause difficulties. After the end of the installation process, the program is integrated into the operating system environment, and when you first start the computer checks for the content of viruses, Trojans, worms, malware, spyware and spam. In the future, the application works in the background, minimized constantly being in the System Tray.
Generally scan can be set on a schedule or on demand. Updating antivirus databases and program releases happens automatically. The only thing that update the antivirus will be asked to choose from.
The concept of the program is quite interesting. It can generate virus vault, where, in fact, made all the necessary operations to viruses or infected objects. It is worth noting also that the application works correctly with very different firewalls, even third-party (supported by work with Zone Alarm Pro, Kerio Personal and firewall built into Windows XP).
Among the innovations of the last release is worth noting improvement of the anti-spam (support IPv6), improved detection of various types of rootkits, in particular Alureon, heuristic optimization and verification of registry, change the method of threat detection, optimization of frames, as well as support for exceptions to Anti-Rootkit.
Sahil Shah is B.E passed out. He loves to do write and do experiments with online tools, software, and games. When he is not doing anything, he will be sleeping for sure. Eating, being online in the night is what he usually does.
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.