Guide to Online Antivirus Solutions Part 2: Trend Micro HouseCall
by James Hicks - Thursday, 2 August 2007.
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been playing with some leading online antivirus products and through the next couple of weeks I will be sharing my thoughts on them.

After Panda Software (now Panda Security) NanoScan and TotalScan, this week I am taking a look at Trend Micro's HouseCall.

Trend Micro HouseCall is an application for checking whether your computer has been infected by viruses, spyware, or other malware. HouseCall performs additional security checks to identify and fix vulnerabilities to prevent reinfection.

HouseCall Version 6.5 - http://housecall.trendmicro.com

I tested this online virus scanner on two computers, Windows XP desktop and a new Windows Vista notebook. After starting the scanning process, first you will need to install the HouseCall kernel. This is a technology that makes it possible to scan your computer for malicious and display the results in your browser. Don't worry about the additional installs, you will just need a mouse click or two.

For instance when you start the scan from a Mozilla Firefox browser you will have just one kernel option:



In a new Internet Explorer 7.0 browser running on Vista, besides this Java Kernel, you will be able to chose a "browser plugin", that in my case proved to be a bit faster way of scanning.



As you will need to install a Java applet on your system, you will need to check out the publisher authenticity and agree to trust the signed applet pushed to you through the application.



Installing the applet and assigning the trust: yes mode on the applet is the same in both Firefox and Internet Explorer, but in the case of a fresh Windows Vista installation you will need to install Java runtime.



After you have everything installed from the client's perspective, you will get an option of two different scans. The first one is rather interesting for scanning just the suspicious files.



While I checked a couple of files via the previous scanning option, I spent most of the time with the second way of scanning through complete computer scan.

Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //