User Guide
Page 26
...observe a program's behavior and evaluate how closely it does so, the engine can use to predict the likelihood that a suspicious file is an as a likely virus. Many of these types of viruses use to encrypt and decrypt themselves . "Double heuristics" analysis As a further engine enhancement, McAfee...make full use of the new opportunities that web-based scripting and application hosting present. 26 McAfee VirusScan Anti-Virus Software It then runs this threat, McAfee researchers developed the PolyScan Decryption Engine, which locates and analyzes the algorithm that these agents-some...
...observe a program's behavior and evaluate how closely it does so, the engine can use to predict the likelihood that a suspicious file is an as a likely virus. Many of these types of viruses use to encrypt and decrypt themselves . "Double heuristics" analysis As a further engine enhancement, McAfee...make full use of the new opportunities that web-based scripting and application hosting present. 26 McAfee VirusScan Anti-Virus Software It then runs this threat, McAfee researchers developed the PolyScan Decryption Engine, which locates and analyzes the algorithm that these agents-some...