{"id":4419,"date":"2020-10-30T20:16:52","date_gmt":"2020-10-30T19:16:52","guid":{"rendered":"https:\/\/webhosting.de\/antivirensoftware-die-wichtigsten-eigenschaften-und-funktionen-im-ueberblick\/"},"modified":"2020-10-30T20:16:52","modified_gmt":"2020-10-30T19:16:52","slug":"el-software-antivirus-mas-importante-propiedades-y-funciones-de-un-vistazo","status":"publish","type":"post","link":"https:\/\/webhosting.de\/es\/antivirensoftware-die-wichtigsten-eigenschaften-und-funktionen-im-ueberblick\/","title":{"rendered":"Software antivirus - las caracter\u00edsticas y funciones m\u00e1s importantes de un vistazo"},"content":{"rendered":"<p>Casi todos te usan, casi todos saben tu nombre. Pero, \u00bfqu\u00e9 es exactamente un software antivirus (AV para abreviar)? En general, debe ser clasificado como un programa antivirus. Se trata de un software que intenta detectar, bloquear y, en el mejor de los casos, eliminar los virus inform\u00e1ticos, troyanos o gusanos inform\u00e1ticos conocidos. Veamos las caracter\u00edsticas centrales de este software y su aplicaci\u00f3n:<\/p>\n<h2>Historia del software antivirus<\/h2>\n<p>Los inicios de los programas de software antivirus no se pueden comparar con los complejos sistemas de soluciones de hoy en d\u00eda. Simplemente porque a principios de los 80 no hab\u00eda programas maliciosos. La historia del ordenador est\u00e1, por supuesto, inseparablemente ligada a la historia de los virus y por lo tanto tambi\u00e9n a los programas antivirus posteriores. En esa \u00e9poca, los virus inform\u00e1ticos todav\u00eda se limitaban a la autoproducci\u00f3n y no pod\u00edan causar mucho da\u00f1o. La evoluci\u00f3n de los amenazantes virus en la tecnolog\u00eda inform\u00e1tica tiene que ver con su creciente complejidad. A finales de los a\u00f1os 80, aument\u00f3 el conocimiento de la programaci\u00f3n maliciosa en general. Esto hizo que los medios de investigaci\u00f3n sobre c\u00f3mo combatirlos fueran cada vez m\u00e1s indispensables.<\/p>\n<p>El tema se dio a conocer por primera vez a un p\u00fablico m\u00e1s amplio en 1987, cuando los virus se consideraban antes exclusivamente como un peligro para los seres vivos, pero esto cambi\u00f3 con Bernd Fix. Seg\u00fan varias fuentes, es la primera persona que ha abordado el tema de manera eficaz desde el punto de vista publicitario y que ha reconocido y eliminado un virus inform\u00e1tico. Como hacker y especialista en tecnolog\u00eda inform\u00e1tica, todav\u00eda funciona como un especialista probado en este campo hoy en d\u00eda.<\/p>\n<h2>Los primeros programas de software antivirus<\/h2>\n<p>La cuesti\u00f3n de la lucha contra los virus adquiri\u00f3 cada vez m\u00e1s importancia. En 1988, la red inform\u00e1tica Bitnet\/Earn emprendi\u00f3 la lucha contra los virus dise\u00f1ando una lista de correo para documentar la aparici\u00f3n de virus. Al principio, los virus se propagaban s\u00f3lo a trav\u00e9s de disquetes, pero con la difusi\u00f3n de Internet, los virus pudieron propagarse m\u00e1s r\u00e1pidamente y de forma m\u00e1s incontrolable.<\/p>\n<h2>Tipos de software antivirus<\/h2>\n<p>B\u00e1sicamente hay tres tipos diferentes de software antivirus:<\/p>\n<p>Esc\u00e1ner en tiempo real<br \/>\nEsc\u00e1ner manual<br \/>\nEsc\u00e1ner de virus en l\u00ednea<\/p>\n<p>El esc\u00e1ner en tiempo real tambi\u00e9n se llama esc\u00e1ner de acceso. Se caracteriza porque se ejecuta como un servicio del sistema (ejemplo: Windows) o como un demonio (Unix) en segundo plano y escanea programas, archivos o <a href=\"https:\/\/webhosting.de\/es\/wie-wichtig-ist-der-arbeitsspeicher-beim-webhosting\/\">Memoria de trabajo<\/a> escaneos. Las solicitudes se comprueban durante el proceso de lectura y escritura<\/p>\n<p>El esc\u00e1ner manual difiere en que debe ser iniciado por el usuario. Los sistemas de software t\u00edpicos incluyen Norton <a href=\"https:\/\/webhosting.de\/es\/zusaetzliche-funktionen-kindersicherung-mobiler-schutz-passworttresor-systemtuning\/\">Antivirus<\/a>. Si el programa encuentra archivos sospechosos en la computadora, hay mensajes de advertencia que muestran las \u00e1reas vulnerables de la computadora. Por regla general, el usuario puede elegir entre tres funciones diferentes en caso de un ataque de virus: Limpieza, cuarentena y eliminaci\u00f3n de los archivos maliciosos.<\/p>\n<p>El esc\u00e1ner de virus en l\u00ednea, a su vez, son programas que cargan su patr\u00f3n de antivirus en una red. La mayor\u00eda de los esc\u00e1neres en l\u00ednea se basan en el llamado, ahora obsoleto, componente de software modelo ActiveX. Tambi\u00e9n hay algunas aplicaciones basadas en la tecnolog\u00eda Java.<\/p>\n<h2>\u00bfC\u00f3mo funciona el software antivirus?<\/h2>\n<p>Los esc\u00e1neres de software que son importantes para la ejecuci\u00f3n del software antivirus funcionan con firmas y heur\u00edsticamente para detectar errores y componentes maliciosos. El escaneo basado en firmas implica la distribuci\u00f3n selectiva de peque\u00f1os fragmentos de c\u00f3digo de los virus y troyanos actuales que ya se han dado a conocer. De esta manera, los virus y los troyanos pueden ser detectados e idealmente eliminados. La b\u00fasqueda heur\u00edstica es m\u00e1s compleja. Examina los programas que ya est\u00e1n en funcionamiento e instalados en el ordenador afectado. Se detectan comportamientos sospechosos como la auto-llamada de un programa.<\/p>\n<h2>Tasa de \u00e9xito y cr\u00edtica<\/h2>\n<p>A pesar de que los programas antivirus son muy \u00fatiles y a menudo protegen al usuario de grandes da\u00f1os, no todos los programas da\u00f1inos pueden ser detectados. Expertos como el vicepresidente de Symantec, Bryan Dye, creen que estos programas tienen s\u00f3lo un 45 por ciento de posibilidades de \u00e9xito. No pueden reemplazar completamente el comportamiento prudente del usuario. Las buenas medidas para proteger su propio sistema incluyen la desfragmentaci\u00f3n regular de su computadora.<\/p>\n<p>A pesar de su utilidad, el software antivirus tambi\u00e9n est\u00e1 siendo criticado. Por ejemplo, pueden producirse errores de aplicaci\u00f3n en el momento cr\u00edtico debido a la demora en la exploraci\u00f3n de la <a href=\"https:\/\/webhosting.de\/es\/personenbezogene-daten-sozialen-netzwerken\/\">Datos<\/a>. Tambi\u00e9n el escaneo permanente de las bases de datos, especialmente si son muy grandes, puede dar problemas. A menudo hay mensajes de error.<\/p>","protected":false},"excerpt":{"rendered":"<p>Fast alle benutzen Sie, nahezu jeder kennt Ihren Namen. Doch was ist eigentlich eine Antivirensoftware (kurz AV)? : Allgemein ist sie als Antivirenprogramm zu klassifizieren. Sie ist eine Software, die versucht, bekannte Computerviren, Trojanische Pferde oder Computerw\u00fcrmer aufzusp\u00fcren, zu blockieren und im besten Fall zu l\u00f6schen. Blicken wir auf die zentralen Eigenschaften dieser Software und [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[673,788],"tags":[182,429,430,431,399],"class_list":["post-4419","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer_und_internet","category-software-computer_und_internet","tag-antivirus","tag-antivirus-software","tag-beschreibung","tag-ratgeber","tag-software"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":null,"rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":"","_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":null,"_edit_lock":null,"_oembed_e7b913c6c84084ed9702cb4feb012ddd":null,"_oembed_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_03514b67990db061d7c4672de26dc514":null,"_oembed_time_03514b67990db061d7c4672de26dc514":null,"rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4523","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"viirusetorjetarkvara-taehtsaimad-omadused-ja-funktsioonid-uelevaates","_trp_automatically_translated_slug_lv":"antivirusu-programmaturas-svarigakas-funkcijas-un-funkcijas-isuma","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"antivirus-software-the-most-important-features-and-functions-at-a-glance","_trp_automatically_translated_slug_ja":"%e3%82%a6%e3%82%a4%e3%83%ab%e3%82%b9%e5%af%be%e7%ad%96%e3%82%bd%e3%83%95%e3%83%88%e3%81%ae%e6%9c%80%e3%82%82%e9%87%8d%e8%a6%81%e3%81%aa%e7%89%b9%e6%80%a7%e3%81%a8%e6%a9%9f%e8%83%bd%e3%81%8c%e4%b8%80","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":"default","_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_time_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_59808117857ddf57e478a31d79f76e4d":null,"_oembed_time_59808117857ddf57e478a31d79f76e4d":null,"_oembed_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_81002f7ee3604f645db4ebcfd1912acf":null,"_oembed_time_81002f7ee3604f645db4ebcfd1912acf":null,"_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"1024","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":["antivirensoftware - die wichtigsten eigenschaften und funktionen im \u00dcberblick"],"_eb_reusable_block_ids":[],"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"","_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"1209","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/4419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/comments?post=4419"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/4419\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media\/1209"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media?parent=4419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/categories?post=4419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/tags?post=4419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}