Dr.Web CureIt! is a program that I have been holding in high regard for several years now. The program is an on-demand scanner that I use to get a second, or third, opinion in regards to malicious software on my computer systems. While I run up to date antivirus software, I make sure to scan my system regularly with Dr.Web CureIt! and Malwarebytes Anti-Malware just to be on the safe side of things.
Dr.Web CureIt! 8 has been released recently introducing support for Microsoft's Windows 8 and Windows Server 2012 operating systems among other things. While that is interesting in itself, several of the new features introduced in this version of the virus scanner demand highlighting:
Dr. Web is a portable program that you can run right from the location you have downloaded it to. Note that the free version makes the sending of statistics to the company mandatory. The file has a random name to bypass malicious software that blocks certain known security software processes from starting up on the system.
You can now run a scan of the system or use the new "select objects for scanning" option to scan only subsystem instead. The scan itself should not take long and you are taken to the results screen regardless of whether something has been found or not.
You find several of the new options in the program settings. Here you can enable the network access block or the blocking of disk writes using low-level functions as both are not enabled by default.
The actions tab may also be interesting as you can use it to define default actions for specific types of malware and the three file statuses infected, incurable and suspicious.
The exclusions tab in the settings enables you to prevent the scanning of specific files or folders on you system, and enable the scanning of files inside archives as well.
Version 8 of Dr.Web CureIt introduces several great new features to the program that regular users of it will certainly appreciate. While you may need to configure them before they become available, they may aid in the scanning and recovery of a system after a successful malware attack on it.
Update: Note that the program may identify a modified hosts file as malicious even though it may have just been modified by the user of the system. Make sure to exclude it from the cleaning process.Advertisement
If you like our content, and would like to help, please consider making a contribution: