TG Soft Cyber Security Specialist - Vir.IT eXplorer: AntiVirus, AntiSpyware, AntiMalware, AntiRansomware and Crypto-Malware protection
Detects viruses and malwareIdentifies polymorphic viruses thanks to DEEP SCANMacro Virus AnalyzerINTRUSION DETECTION TechnologyVirus/malware removal toolsInstallation on Active Directory16/32/64 bit Real-Time ProtectionVir.IT Scan MailVir.IT Console Client/ServerVir.IT WebFilter ProtectionAutomatic Live-UpdateVir.IT Personal FirewallItalian Tech SupportAntiMalware Reserch Center

Submit suspicious file
fb rss linkedin twitter


Vir.IT eXplorer PRO pass the test VB100 2019-06



EICAR Membro SERIT - SEcurity Research in ITaly


Virus: are software or part of a software that can infect other software, archive, system area (MBR, Boot Sector) or executable files, adding at the end of the file a copy of itself.

Malware: generic word to define informatics parasite like: Virus, Adware, Backdoor, BHO, Dialer, HTML, LSP, Spyware, Trojan and Worm.

Adware: can fall in the malware category, its primary goal is to display advertising messages, usually through annoying Pop-up window

Backdoor: programs that allows a remote administration of the system and network. These programs can't replicate on their own. The usual behavior of this software involves: open ports on the infected computer. Thanks to this, an attacker can gain a complete access the remote machine and navigate through the internal network. Backdoor can have many functionality like: send and receive files, delete archives, execute payload or push virus inside the compromised computer.

BHO: software module (dynamic library .DLL) loaded automatically from Internet Explorer. These module after been loaded can check which web site the user has surfed, install toolbars and change the home page of the browser.

Dialer: software that can modify internet connection changing the phone number contacted normally by the computer. This type of infections are particularly danger for people still using analogic modem or ISDN connections. For who is using ADSL connections the only danger is represented by a temporary disconnection of the line.

Fraudtool: normally known as Scareware, this rogue-antivirus introduce themselves as AntiVirus. After installing the fake AV, they play the user making he/she believe that they are infected by different virus. As a result the scareware tries to convince the end user to buy the full version of the program in order to completely remove all detected infections.

Hijacker: programs generally loaded by Active-X module. After infecting the computer, they start changing the default browser parameters, trying to reduce the level of protection set in the browser.

HTML: inside HTML pages can be found scripts, the effects of their execution can be multiple (redirect the user to another web page instead to the genuine one required by the user, download files without user permission and many other actions).

Keylogger: software with one goal: listen and store all the keystrokes used by the user. All the words written through a keyboard are intercepted and memorized by the keylogger.

LSP: (Layer Service Provider) are library that attach theme self to the WinSock TCP/IP functions. Can intercept and analyze Internet traffic.

Rootkit: software created to gain a complete control of the infected computer without requiring a user interaction. Rootkit are usually used to hide backdoor presence.

Spyware: general name used to define software with Spay functionality.

Trojan: software that hides their presence playing the user, making believe him/her to be a genuine software. Usually Trojan can't replicate on their own. The main goal of a Trojan is generally execute its payload.

Worm: are autonomous programs that has the capability to replicated on their own, infecting other computer through the network or by sending theme self as an attached element via email.

Legal & Eula | Privacy | Uninstall

TG Soft S.r.l. - via Pitagora 11/B, 35030 Rubàno (PD), ITALY - C.F. e P.IVA 03296130283