Guide to Online Antivirus Solutions Part 2: Trend Micro HouseCall
by James Hicks - Thursday, 2 August 2007.
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been playing with some leading online antivirus products and through the next couple of weeks I will be sharing my thoughts on them.

After Panda Software (now Panda Security) NanoScan and TotalScan, this week I am taking a look at Trend Micro's HouseCall.

Trend Micro HouseCall is an application for checking whether your computer has been infected by viruses, spyware, or other malware. HouseCall performs additional security checks to identify and fix vulnerabilities to prevent reinfection.

HouseCall Version 6.5 - http://housecall.trendmicro.com

I tested this online virus scanner on two computers, Windows XP desktop and a new Windows Vista notebook. After starting the scanning process, first you will need to install the HouseCall kernel. This is a technology that makes it possible to scan your computer for malicious and display the results in your browser. Don't worry about the additional installs, you will just need a mouse click or two.

For instance when you start the scan from a Mozilla Firefox browser you will have just one kernel option:



In a new Internet Explorer 7.0 browser running on Vista, besides this Java Kernel, you will be able to chose a "browser plugin", that in my case proved to be a bit faster way of scanning.



As you will need to install a Java applet on your system, you will need to check out the publisher authenticity and agree to trust the signed applet pushed to you through the application.



Installing the applet and assigning the trust: yes mode on the applet is the same in both Firefox and Internet Explorer, but in the case of a fresh Windows Vista installation you will need to install Java runtime.



After you have everything installed from the client's perspective, you will get an option of two different scans. The first one is rather interesting for scanning just the suspicious files.



While I checked a couple of files via the previous scanning option, I spent most of the time with the second way of scanning through complete computer scan.

Spotlight

eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Dec 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //