Hi Stephen,
Stephen Willis said:
ViRobot is the one that most of the geeks I know have latched onto.
How many do you know?
Would that be the most of 3, 7, 99 ???
It uses
the least system resources and has three separate scanning engines that run
concurrently for speed and accuracy.
Using what benchmarks for speed and accuracy? Are they measured at
the same time or separately? Can you point us to these publicly
posted data?
VB and West Coast Labs have already
certified it for 100% ITW and Level 1, 2 and Trojan, respectively.
Congratulations on the certs!
The
previous thread mentions that ICSA is the best testing facility and for some
reason was inclined to mention the cost associated with testing. It just so
happens that when you have a privately held company like ICSA, that is now
in charge of all the virus samples (Wildlist) used for testing worldwide,
you have to ask yourself if this isn't a conflict of interest at the most
basic level.
It seems you are the only person in the anti-virus industry to think
so, at least publicly. Oops, was I not to mention that you are in the
industry and work for Hauri? (Of course I did notice you did not post
from your VP of Sales and Marketing of Hauri email account! You are
still with Hauri aren't you?)
Also this statement shows a complete lack of understanding of how the
WildList works, it organization, its operations, and the failsafes put
in so that it cannot be manipulated by anyone. Oh, btw, did you
happen to know that the other testing bodies you mention both
supported and continue to support the fact that ICSA Labs is
publishing the WildList? I am sure that this misunderstanding does
not extend to the WildList reporters from Hauri [oops there I go
again, mentioning that you are US VP of Sales for Hauri].
I say this because of a conversation that I had with the VP in
charge of McAfee and when asked if he had a problem with Wildlist going into
ICSA, he said "I don't care what happens with it, because, if they don't do
exactly as I tell them to do, they won't get another penny of my money".
yadda yadda, yadda. You and I had this discussion months ago and you
could never bring forth this unnamed NAI VP even though I gave you
many names of the VP I know personally [and a couple of names a little
higher in the NAI org
].
Here's how you test your AV product. Find someone with a couple of samples
of the most popular viruses like Nimda and its variants or Funlove.4099 or
Klez.H w/Elkern, and copy them to a standalone system that you don't mind
testing with and then scan the folder you copied them to with each product
to be tested. Notice the time for scanning and more importantly, what it
was capable of doing up against repairing your data. NOT JUST DETECTING AND
DELETING (which ICSA considers adequate for cleaning)!
You obviously don't know ICSA Labs anti-virus criteria, testing
protocols, or testing standards [or at least you do not understand
them!]. It would not hurt you to acquaint yourself with them. Many
developers actually visit our labs and take a tour! or secondly you
could ask your colleagues from Seoul, I just spent a couple of days
with them at an industry technical meeting [oops!! There I go
mentioning your company stuff again!]
ViRobot is the ONLY
product that can actually clean the virus and restore the file 99% of the
time. Now, if the rest can only detect and delete, what happens when your
.dll's or other critical file is infected and as a side-effect of your AV
being limited to detect and delete, you now have an unstable or inoperable
OS. This is just one of the many reasons to get of the duff and do your own
testing and not be conditioned to believe certain limitations exist due to
major corporate marketing ploys and propaganda.
Well, if the above is what you call testing...
Oh well, I think the most of the folk on this list can make up their
minds.
Give me a call if you want to talk some more. You have the number!
BTW - notice I don't mind using identifying myself or my company!
Larry Bridwell <Speaking for myself and NOT my company!!>
____________________________________________
Content Security Programs Manager, ICSA Labs
1000 Bent Creek Blvd., Suite 200, Mechanicsburg, PA 17050
e-mail: (e-mail address removed); AIM: lbridwell17050
website:
http://www.icsalabs.com