Dr.Web CureIt! is a free antivirus that scans and removes viruses without the need to be installed on the computer.
The need to install an antivirus on Windows computers is something that is known by the majority of users. Even so, there are some users that have not installed any antivirus system on the PC. This may be due the user doesn't want to have any anti-virus resident in memory and prefer to make use of other solutions. In these cases, it is advisable to analyze the computer on a frequent basis, with any anti-virus that does not require installation. The antivirus analyzed below, doesn't require installation and can be used on computers that have other antivirus installed.
Dr.Web CureIt! uses the same scanning engine that Dr.Web anti-virus software, with the difference that is not installed in memory, not self-updated, etc. Furthermore, it has the same capability of detection and removal of malicious programs (Viruses, Worms, Trojans, Spyware, Rootkits, etc.).
The use of this anti-virus is very easy. Once downloaded, we only need to run it and the program will display an interface where we can begin to analyze the Computer for viruses. The main interface consists of a big button “Start Scan”, with which we will be able to start the scan of the PC, and a link that shows the items that can be scanned: RAM, boot sectors, temporary files, Windows folder, etc.
We can configure the action that will be performed by the anti-virus once it found a threat. There are different types of threats: incurable, infected, suspicious, Adware, Dialers, Riskware, etc. The options that we have to delete the threat are: clean, move, delete and ignore. If we choose to clean, the infected file will be “cleaned up”, and we will retain the original file. This action cannot be performed on all the infected files. If we choose to move, the infected file will be moved to a quarantine folder where we can decide later what to do with it.
When a threat is detected, the virus displays a link with information related to the threat encountered. In this link we find the name given to the threat, and data about the actions that it performs, such as: changed, created or deleted files in the system, network connections that are established, and several other actions that it performs in the system. Also displays a series of generic recommendations for the elimination of viruses and trojans.
The software is free for personal use, and its professional use is prohibited, because in these cases we can purchase a license.
To use the program, we must log into an user account with admin permissions, and have connection to the Internet.