Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.

Lv 31,722 points

Anonymous

Favorite Answers4%
Answers619

McAfee is my favorite antivirus/security suite. I am focused on security. Lately I have been preparing to publish suggestions for companies. I am asking a pulse of questions lately. I am currently developing feedback and suggestions for tech companies. Please award best answers!

  • What is a peer-to-peer network?

    I already reviewed some other similar questions, but want more details and explanation. I need to know this to launch my project. What is a peer-to-peer network and why is it vulnerable to viruses?

    7 AnswersComputer Networking6 years ago
  • Which antivirus scanning technology detects suspicious file and application attributes?

    I once thought the antivirus scanning technology that detects suspicious attributes, e.g. rootkit technology, was definitions. However, I was wrong. Definitions is simply a synonym for signatures. Which antivirus scanning technology detects suspicious file and application attributes? (Would I be the first to invent an antivirus scanner that detects suspicious attributes?)

    3 AnswersSecurity6 years ago
  • How does today's firewall technology block intrusions?

    I know how today's antivirus scanners detect malware, but how do today's firewall block intrusions? Are firewall technologies somehow related to scanning technologies?

    1 AnswerSecurity6 years ago
  • What is the difference between antivirus signatures and antivirus definitions?

    I knew antivirus signatures are hashes into databases, often MD5 or SHA1 hashes, that detect known malware by identifying matches. However, I also recently thought definitions are a scanner that detects suspicious attributes, e.g. rootkit technology. Recently I asked a question on Yahoo Answers to confirm the meaning of definitions, and an answerer replied that definitions are signatures. What is the difference between antivirus signatures and antivirus definitions? I would never want to use multiple words with the same meaning.

    2 AnswersSecurity6 years ago
  • Attachment image

    Why is McAfee attempting to connect to a Malicious Website?

    Yesterday I was browsing and checking out Google Images and Malwarebytes Anti-Malware notified me that it had blocked a malicious website. After I closed the notification, the same Malicious Website Blocked notification reappeared, and the second time, my McAfee LiveSafe security software attempted to connect to the same malicious website Google Chromium initially attempted to connect. I am sure my McAfee LiveSafe is the legitimate version. The exact process path of the specific McAfee LiveSafe executable attempting to connect to the malicious website was "C:\Program Files\Common Files\mcafee\platform\McSvcHost\McSvHost.exe" Plus, McAfee SiteAdvisor rates this website Safe.

    2 AnswersSecurity6 years ago
  • Does Microsoft plan to completely eliminate offline based Office suites and completely convert Office to the Cloud?

    The Cloud has its disadvantages to offline, and I am concerned that Microsoft may be completely eliminating offline based Office suites and completely convert their Office suites to Cloud based. If Microsoft will be completely converting Office to a Cloud based suite, I want to send Microsoft some feedback asking for an offline version of Office to be kept. Does Microsoft plan to completely eliminate offline based Office and completely convert Office to a Cloud based suite?

    1 AnswerSoftware6 years ago
  • Would installing Chromium automatically remove Google Chrome?

    I just downloaded Chromium, and I thought that Chromium might possibly automatically remove Google Chrome. I will not execute Chromium setup until I know (if...) that Chromium will not replace Chrome. Would installing Chromium automatically remove Google Chrome? (Chromium is the very latest, beta version of Chrome, correct?)

    2 AnswersGoogle6 years ago
  • Does McAfee really use Windows XP or Windows 2000?

    After browsing McAfee's website at www.mcafee.com, I found many hints that McAfee could still be using Windows 2000 or Windows XP. Does McAfee really still use Windows 2000 or Windows XP, or is my conclusion incorrect? I know Windows 2000 and Windows XP are insecure and poor operating systems nowadays, and I was preparing to suggest to McAfee that they upgrade their computers to a newer version of Windows for security purposes, but I would like to confirm they really are using Windows 2000 or Windows XP before I continue preparing my suggestion.

    1 AnswerSoftware6 years ago
  • What is a good anti-spam algorithm, technology, or design?

    Lately I am developing many new security technologies (as well as set up a Yahoo Group and Google+ community to share security technology ideas), and designing an anti-spam technology is more difficult than designing scanning and firewall technologies. What is a good anti-spam algorithm, technology, or design (all details are welcome)?

    2 AnswersSecurity6 years ago
  • Why is Malwarebytes Anti-Malware a 32-bit program?

    After I installed the latest version of Malwarebytes Anti-Malware from www.malwarebytes.org, I check Windows Task Manager and Malwarebytes Anti-Malware is running 32-bit (without a setting to change 32-bit to 64-bit). I know 64-bit programs and computers are faster and higher performance than 32-bit programs and computers.

    3 AnswersSoftware6 years ago
  • Do Google Chromebooks need security software?

    Do Google Chromebooks need security software as an essential part of Chromebook security? If Chromebooks need security software, where can I find Chromebook security software? In addition, is it true that Chromebooks are based on the inferior Ubuntu Linux? (I am asking from a Windows 8.1 computer.)

    3 AnswersSecurity6 years ago
  • How do antivirus companies detect new malware samples to add to their databases?

    How do antivirus companies detect new, unknown malware samples to add to their databases? Why can't antivirus companies use this system as their antivirus malware detection product without the extra layer of publishing signatures?

    2 AnswersSecurity6 years ago
  • What is the difference between the word "attributes" and the word "characteristics"?

    I am conducting security research and would like to know the detailed difference and definition of the words "attributes" and "characteristics." What is the difference between these two words, and what is the detailed definition of these two words?

    3 AnswersWords & Wordplay6 years ago
  • What determines a file's MD5 property?

    Antivirus signatures use MD5 (and SHA1, SHA256...) file properties to determine known (and only known) malware. What actually determines a file's MD5 property, and does the MD5 property relate to actions, attributes, or another property other than actions or attributes (please specify the other)?

    2 AnswersSecurity6 years ago
  • How exactly do calculators calculate an equation?

    I know that calculators use a formula to calculate equations, but cannot find somewhere that further explains the formula calculators use. Descriptions and/or links would be helpful.

    2 AnswersMathematics6 years ago
  • Do antivirus definitions detect suspicious attributes, or is 'definitions' simply a synonym for 'signatures'?

    I once heard elsewhere on Yahoo Answers that definitions detect suspicious application attributes, such as the usage of rootkit technology. However, many other sources indicate that 'definitions' is simply a synonym for 'signatures.' This conflict of information between multiple sources has confused me, and I would like a confirmation of which opinion/source is correct. If neither opinions/sources are correct, please specify the correct answer anyway.

    1 AnswerSecurity6 years ago
  • Would the same program remain higher quality when downloaded from the internet rather than installed from a CD or DVD?

    Somewhere and only once on Yahoo Answers, an answerer mentioned that 'a program is higher quality when downloaded from the internet rather than installed from a CD or DVD.' An example of the previous sentence would be that 'downloading McAfee from mcafee.com would provide a higher quality product than purchasing a McAfee cardboard box at the store.' Is this answer correct, or is the answer either incorrect or a troll?

    2 AnswersSoftware6 years ago
  • Can Avast Remote Assistance only bypass Avast Firewall, or can it also bypass competitor firewalls like McAfee Firewall?

    When I was browsing Yahoo Answers and Yahoo Search recently I discovered the Avast Remote Assistance feature in Avast Antivirus, and Avast Remote Assistance is claimed to "bypass firewalls." I do not know whether Avast Remote Assistance only bypasses Avast Firewall or bypasses all firewalls (e.g. McAfee Firewall). If Avast Remote Assistance can bypass non-Avast firewalls, today's firewall technology is equally as weak to cybercriminals and hackers, which means I would need to design a new firewall technology.

    2 AnswersSecurity6 years ago
  • Can some of the most sophisticated malware manage to bypass quarantining?

    Quarantine is supposedly a safe place where suspicious and detected objects are unable to harm your computer (viruses) or your identity (spyware). Hackers can manage to extract quarantined files, and some malware may also manage to extract quarantined files. With the steady increase of cybercrime it seems to me that some of the most sophisticated, quarantined malware may manage to either cause harm while quarantined or extract itself from quarantine. Is it true that some of the most sophisticated malware can manage to bypass quarantining?

    4 AnswersSecurity6 years ago
  • What is the difference between registry data, a registry value, and a registry key?

    I am publishing a chart in Microsoft PowerPoint registries and malware and would like to know the definition and difference between registry data, a registry value, and a registry key before I continue with my chart. I would also like to know what and how exactly the registry is used.

    1 AnswerProgramming & Design6 years ago