360 total requires registration what to do. Installation Process Overview

And he worries about the security of his data. Moreover, many families now have several devices on some operating systemdesktop computer, laptop, smartphones and tablets. They all need anti-virus protection. The 360 ​​Total Security program is precisely one of the solutions for protecting against malware. This is a product of the Chinese company Qihoo 360, but don’t think that Chinese means bad. This antivirus is one of the best and most reliable. In addition, it is completely free and has versions for the most different systems– for Windows, Linux, Android. Users of Apple products are also not deprived of attention.

Installing, configuring and removing 360 Total Security antivirus.

In fact, this program is a whole combine that contains several independent blocks:

  • An antivirus that protects not only from malware on your computer, but also controls the sites you visit and all downloaded files.
  • Firewall, which controls all communication channels and blocks all suspicious traffic.
  • Browser extensions for all common browser versions help prevent you from visiting dangerous sites.
  • Sandboxing allows the antivirus to run a suspicious program in a special environment and check whether it performs any strange or dangerous actions.
  • Optimizer - this block analyzes files and programs and can disable unnecessary applications or clear up a lot of disk space.

The antivirus unit itself consists of four separate engines - Avira, Bitdefender, QVMII, and the 360 ​​Cloud cloud engine. In addition, there is also a restoration engine called System Repair, which can restore the system after a devastating attack. The first two antivirus engines are disabled by default, but they can be easily enabled, thereby greatly enhancing protection.

Advantages and disadvantages

Many people are skeptical about antivirus programs that are packed with a lot of tools. After all, they are, in fact, not needed, but this makes the program much more voluminous and puts a greater load on the system. But this does not apply to 360 Total Security - it has a rather modest size, and consumes system resources much more modestly than most competitors. The presence of all modules makes this product popular among ordinary users– “housewives”, because they only need to press one button to clean or speed up their computer. Reliable protection, minimum settings, ease of use and free – this is why 360 Total Security is becoming more and more widespread, especially on home computers.

Among the shortcomings, users note the following:

  • The antivirus may not respond to the threat with default settings. It can be solved by turning on the Avira and Bitdefender engines, which are initially turned off.
  • The antivirus, on the contrary, can behave too paranoidly. For example, he may dislike the video card driver or some other driver. This is an infrequent occurrence and may depend on the specific configuration or settings of the program itself.

In general, nothing prevents you from installing this program and checking it yourself. Many people like it for its unpretentiousness and takes root for a long time.

Antivirus installation

Installing 360 Total Security is very simple, and anyone who has ever installed any program can handle it. You just need to download the file from the official website and run it. Further user intervention is minimal - the installer will only offer to select the installation folder and language. Before installing 360 Total Security, be sure to completely remove any other antivirus if it is on the system. Otherwise, they will begin to conflict and create a greater burden. System requirements 360 Total Security is quite modest - the antivirus only needs 512 MB of RAM and a 1.6 GHz processor. However, in reality he is much more modest when he works in background– it takes up only a few tens of megabytes in memory, and loads the system almost imperceptibly. For Windows, all versions from XP to 10 are supported, both 32 and 64-bit. However, when scanning the system, the load increases noticeably, although then it decreases somewhat. But a full computer scan is a troublesome task for any antivirus in principle, taking up almost all resources. Although 360 Total Security is not particularly power hungry here and can work effectively even on a weak computer.

Setting up protection

Immediately after installation, the antivirus is ready to work and will offer to perform a full scan and optimization of the system. You can simply agree and 360 Total Security will do everything automatically. You can refuse and do all this at a more convenient time. You can go to the “Antivirus” tab and connect the Avira and Bitdefender engines - they themselves are among the best, and together they provide excellent protection. But keep in mind that the load on the system and resource consumption will increase slightly. Among other settings in the “General” section, you can disable the display of system boot time - this information is of little significance to the average user. Also, by default, the program does not respond to archives that are simply stored on disk, even if they contain viruses. Therefore, in the “Antivirus” section, it is useful to enable “Scan for compressed files”. In the “Confidentiality” section, you can enable a warning when you try to use the webcam - this will protect against unauthorized surveillance through it.

How to temporarily disable 360 ​​Total Security antivirus? To do this, you can simply click on the tray icon right click mouse and in the menu that appears, drag the slider to the “Off” position. There is another way to temporarily disable 360 ​​Total Security. Open the interface by clicking on the tray icon, and then click on the icon on the left top corner with the inscription "Protection: on." A “Settings” button will appear on the right side - click on it, then at the bottom there will be an inscription “Disable protection”. You can turn it on the same way.

Before you disable 360 ​​Total Security antivirus, consider that you are leaving your system unprotected. Any malware at this time it remains uncontrollable and can cause harm. However, if you turn 360 Total Security off for a short time and then turn it back on, it will scan and still detect malware.

How to remove 360 ​​Total Security antivirus

Sometimes the question may arise how to remove 360 ​​Total Security from your computer permanently. Although this antivirus provides good protection, but the following situations may arise:

  • The antivirus reacts aggressively to some programs, considering them infected. In fact, they may be safe, but use, for example, direct access to a disk or keyboard, which is considered a dangerous sign. Uninstalling 360 Total Security and installing another antivirus may be your only option.
  • You need to install another antivirus. You cannot have several such programs at the same time, otherwise they will start a war against each other, taking up a lot of resources.

Antivirus programs are not so easy to remove - they are specially protected against this, otherwise the virus could easily cope with them. Therefore, before uninstalling Total Security 360, go to the settings, go to the “Basic” tab, and uncheck the “Enable active protection at system startup” and the “Enable self-defense” checkboxes. After this, it can be removed without problems. If you do not do this, the system will display a message that you do not have enough rights to perform this action.

  1. Go to the folder where the program is installed and run the uninstall.exe file. This is a 360 Total Security removal utility written by the developers themselves, and it will do everything right.
  2. Go to the “Control Panel”, select an antivirus from the list and click “Uninstall”. The system itself will launch the same utility, so this is the same as the first method.
  3. Use some third-party uninstaller, for example, iObit Uninstaller, Revo Uninstaller. These utilities, after uninstalling the program, also find and remove many residual files and registry entries that remain in the system.

If you use the first two methods, then after uninstalling, run CCleaner utility, which will also find and remove residual information from 360 Total Security. Overall, 360 Total Security is excellent, and free solution, providing good protection against a wide variety of threats. But in order for the antivirus to work as efficiently as possible, do not forget to update it promptly. It updates automatically, so you only need to periodically turn on the Internet on your computer.

Two software products are presented - 360 Total Security and 360 Total Security Essential. The difference between them lies in the set of auxiliary modules. Thus, 360 Total Security Essential lacks an optimization module, cleaning temporary files, checking Wi-Fi security, as well as a vulnerability correction module (Patch Up).

The remaining functions of these antiviruses are the same, namely, both include software products includes several antivirus engines - Cloud Scanner 360 (360 Cloud), Avira AntiVir, Bitdefender AntiVir, 360 QVMII AI, sandbox, module safe shopping on the Internet, anti-malware module, webcam protection and keylogger protection, system protection module. Last module includes scanning of USB media upon connection, firewall, behavioral blocking, registry protection, scanning of files when opening and saving, and some other types of runtime protection.

Comparison with competitors

Let's see how 360 Total Security compares to its competitors. Since the product is free, its competitors will also be free. However, there are a lot of antiviruses, and it would be problematic to compare the product in question with all existing antiviruses, so Avira was chosen as competitors for 360 Total Security Free Antivirus And Avast Free Antivirus.

The choice of competitors is determined by several factors. Firstly, Avira Free Antivirus is considered the best free antivirus of 2015, or so it says on their website, which includes the corresponding infographic. Secondly, 360 Total Security uses the Avira Antivir engine (although, in fact, this is only one of the engines, and in total there are three different antivirus engines supported that can work together), so it was interesting to compare 360 ​​Total Security with this antivirus. As for Avast, it showed very good performance (which is important for an antivirus - it must provide good level protection, but without spending a lot of system resources), which was shown in one of the reviews in Hacker. The table below allows you to evaluate the functions of the compared antiviruses. The table does not show the main functionality (monitor + scanner) - of course, any modern antivirus will have it, with the exception of completely stripped-down scanner products like CureIt from Dr. Web. The main functions also include protection against malware - malicious software. The fact is that some antivirus manufacturers highlight malware protection as a separate function (for example, 360 Total Security), others consider it part of the scanner (Avira and Avast), others do not mention it at all, but this does not mean that the antivirus cannot fight against this type of software.

Comparison of the functionality of some free antiviruses

Function
360 Total Security
Avira Free Antivirus
Avast Free AntiVirus
Cloud protection
+
+
-
System fix
+
- -
Sandbox
+
+
-
Safe online shopping
+
- -
Webcam protection
+
- -
Keylogger protection
+
+ (**)
+ (**)
Password manager
- - +
Removable media protection
+
+
+
Firewall
+
- -
Registry protection
+
- -
Behavioral blocking
+
- -
Fixing vulnerabilities
+
- -
Wi-Fi Security Check
+
- -
Clearing temporary files
+
- -
System optimization
+
- -
Browser protection
+
+ (*)
+
Block tracking via browser
- + (*)
Safe Browsing
- + (*)
-
Price comparison
- + (*)
-
(*) These functions are implemented as an extension for the Avira Browser Safety browser (supported by Chrome, Firefox, Opera, IE).
(**) This function not separated, but all modern antiviruses detect keyloggers as malware

Let's see what happens. The first thing that catches your eye is the fact that modern antiviruses are equipped with functionality that has nothing to do with the anti-virus scan and system protection. Thus, Avira has a price comparison function that allows you to save your money when shopping online. Antivirus 360 Total Security is equipped with a powerful set of functions for optimizing and cleaning the system. And Avast has a built-in password manager.

The most “empty” option is Avast Free Antivirus. Its “kit” includes only the antivirus itself (scanner and monitor), browser protection function and password manager. Yes, I have Avast product Internet Security. There is also protection against phishing, a firewall, and anti-spam protection, but only the 30-day version is available for free, and a one-year license will cost 900 rubles for 1 PC or 2,350 rubles for 3 years. The same can be said about Avira - if you need additional features, then you need to buy either Antivirus Pro (23.95 euros) or Internet Security Suite (30.95 euros). Most full version- Internet Security Suite, it combines all the features of Antivirus Pro plus features for system optimization and file encryption. A separate “supplement” will cost 16.95 euros (System Speedup product). Please note that 360 Total Security offers all these features completely free of charge.

Thus, completely free of charge, 360 Total Security offers cloud protection, a firewall, patch-up, system optimization and cleaning functions, as well as a number of minor pleasant “bells and whistles”.

Installation Process Overview

The installation process is so simple that any housewife can handle it. You need to download and run the installer (which, by the way, takes only 29.4 MB - this full set, for offline installation), then you can or immediately press the button Installation, or press the button Settings to select the folder to install the antivirus. No other settings (except for language selection) are offered.

Rice. 1. Installer 360 Total Security

The antivirus includes several antivirus engines, as noted earlier:

  • Avira engine - powerful engine, developed by a German company. Off by default.
  • Bitdefender engine- another supported engine developed by Romanian programmers. Disabled by default.
  • Cloud Scanner 360 Cloud- own cloud antivirus engine that uses information about checksums files. Always on, cannot be turned off separately.
  • QVM AI - own system proactive defense using cloud technologies. Allows you to protect your system from threats unknown to the antivirus. Always on and cannot be turned off separately.
Individual engines can be turned on and off in the program settings, but first these engines must be downloaded and installed. Fortunately, this process fully automated. The user only needs to go to the section Antivirus and press the button corresponding to the desired engine. The process of downloading and installing the Avira AntiVir engine is shown below. You can disable a temporarily unnecessary engine either in the program settings, or using the slider that appears when you move the mouse pointer to the engine button.


Rice. 2. Installing the Avira AntiVir engine


Rice. 3. Slider to enable/disable the antivirus engine

In practice this is very convenient. In one “bottle” the user receives several antiviruses that can be turned on/off at any convenient time.

Full system scan

In Fig. Figure 4 shows the result of a full system scan. The program found two problems - 4 threats related to system optimization, and a lot of temporary files (1.4 GB). Next, the user can click the button To correct to fix threats, and then click Double check For re-check. As you can see, the program interface is quite simple and informative.


Rice. 4. Result full check systems

A full system scan includes searching for problems related to system optimization, searching for garbage, and searching for viruses and other malware. It was not possible to check the Wi-Fi security check module, since for some reason the router model I am using is not supported by the program.

Anti-virus scan

If desired, you can carry out all these checks separately. Yes, in the section Antivirus(see Fig. 2 and 3) you can perform quick, full and selective (for example, check files on a flash drive) system scans. The rest of this review will show antivirus protection in action. As they say, “don’t switch.”

System optimization and cleaning

The system optimization module found as many as 22 points for optimization in the test freshly installed Windows 10 (Fig. 5). The module offers to disable some scheduled tasks (usually unnecessary ones like the Customer Experience Improvement Program), some unnecessary services(who needs a font buffering service?) and also optimize network connection. To fix all found problems, you must click the button Optimize.


Rice. 5. Optimization module


Rice. 6. System optimization completed

The system cleaning module allows you to remove various garbage like temporary files, browser cache files, system garbage etc. (Fig. 7).


Rice. 7. System cleaning module

After cleaning is complete, the program will offer to release additional disk space using System Backup Cleaner (Fig. 8). If automatic updating of your system is not turned off, this tool can be quite useful as it allows you to remove unused files backup copies of system updates, which take up quite a lot of space (Fig. 9).


Rice. 8. Cleaning complete


Rice. 9. Cleaning system backups

Additional tools

360 Total Security includes the following additional tools:
  • 360 Connect- if you need to remotely configure your grandmother's computer, then this tool will help you. Details in this review it is not considered, but everyone can familiarize themselves with it.
  • Instant installation- allows you to install various popular programs(ICQ, Skype, etc.)
  • Browser protection- allows you to protect your browser from unauthorized changes search engine and/or home page(Fig. 12). Unlike competitors, safe browsing and user tracking blocking functions are not provided.
  • Firewall- full-time Windows firewall is quite good and will satisfy the needs of most users. If it turns out to be not enough, then 360 Total Security offers to install (completely free) GlassWire Firewall. Actually, after launching the tool Firewall you will see a window with a button Install. After installing the firewall this button will launch it.
  • Sandbox- allows you to run dangerous programs; all changes to the system configuration made in the sandbox will not affect the real system. Very useful feature if you are unsure about the application.
  • Vulnerabilities- a useful system vulnerability scanner that allows you to check for security updates and various patches. It is also possible to install/uninstall a particular security update (patch).
  • Cleaning system backups- this tool has already been demonstrated earlier.
  • Disk compression- allows you to free up disk space through compression system files. On the test machine, the tool offered to release 4.7 GB by compression. Remember that compressing system files will likely reduce performance, so you should only resort to this measure as a last resort (when free space more important than performance).


Rice. 10. Additional tools


Rice. 11. Instant installation of programs


Rice. 12. Browser protection


Rice. 13. Sandbox


Rice. 14. Security updates


Rice. 15. Compress system files. You can free up 4.7 GB.

About antivirus performance

There are three processes “hanging” in memory, which very modestly consume both processor time and RAM. Screenshot 16 was taken on a test machine, and on a working laptop on which these lines are written, Firefox browser It takes up 530 MB of RAM, so against its background, the total memory consumption of up to 50 MB seems like a drop in the bucket.


Rice. 16. System resources

The test machine is quite weak - 3 GB random access memory and dual core mobile Intel 1000M about 1.8 GHz. The OS is 64-bit Windows 10, as it is planned to upgrade the memory to 8 GB. But even with this configuration, the presence of an antivirus does not affect system performance. There are no special brakes, and if there are any, they are invisible to the user.

Noticeable slowdown is only possible when the antivirus is running in scanner mode and scanning the computer is running. But it is unlikely that a user who suspects that his PC is infected (why else would he run a full scan?) will calmly continue working at this moment - he will wait for the system scan, and close all applications during the scan itself. Even if such a user wants to work, then after starting the scan you need to wait a little - the consumption of system resources is significantly reduced (Fig. 18).


Rice. 17. Consumption of system resources when scanning a PC at the time the scan is launched


Rice. 18. The check is in full swing. Only 35.1% of CPU time is used, HDD also not overloaded

In some reviews, the 360 ​​Total Security product is criticized for being quite demanding. system resources antivirus update mechanism. But nothing like this was noticed on the test machine. In Fig. 19 shows that the antivirus update process took only 5.5% of CPU time.


Rice. 19. Antivirus update process

Real test

It's time for the most interesting part of this review - real test. I have at my disposal a good selection of infected files (both exe and Word documents). Every file in this collection is infected; there are 142 files in total. Let's see how many viruses 360 Total Security finds. All viruses are detected by other antiviruses like Dr. Web, Kaspersky, etc. For greater fairness, additional engines will be disabled, only standard means protection.

In order not to infect the system, everything was checked like this: the archive was copied (with the password), then it was unpacked. Immediately after unpacking, the antivirus began to respond. The result of his work is shown in Fig. 20 - 92 infected files were found and eliminated. Next, the antivirus recommended running quick check, since many malware were found at once (Fig. 21).


Rice. 20. Antivirus results


Rice. 21. Run a quick scan?

Let's give the antivirus a second chance. Let's try to check the folder into which the infected files were unpacked by the scanner. The antivirus found just one more file (in total, 93 out of 142 files were recognized as dangerous).


Rice. 22. Another virus found

Now let's turn on both additional engines - Avira and Bitdefender and try again to scan the folder with viruses. Logically, there are still 49 infected files left in it. Voila. The antivirus found the remaining 49 viruses (Fig. 23).


Rice. 23. No virus went unnoticed

From this we can conclude that maximum protection is guaranteed when all available engines are enabled. Maybe this will have a slight impact on performance, but security is never enough. What you need - either fast and not very reliable - or a little slower, but safe - is up to you to decide.


Rice. 24. The “remainder” was successfully liquidated

Overview of program settings

To conclude this review, let's look at some useful settings programs. Among the main program settings, the user can enable/disable active protection at system startup, enable/disable self-defense, as well as enable/disable automatic update(Fig. 25). For security reasons, it is best to leave all these options enabled. The only option that can be turned off if you get tired of it is the display of the system boot time after it is rebooted.


Rice. 25. Basic program settings

The active protection settings themselves are stored in the section of the same name. For performance reasons, by default only the check is performed. executable files and documents, and not all files in a row. Therefore, if you copy an archive with viruses into the system (even without a password), the antivirus will not react to it. As it turned out in the section Antivirus(Fig. 27), by default the program does not respond to compressed files. If you want archives to be scanned too, enable the option Scan compressed files during a full disk scan.


Rice. 26. By default, only documents and executable files are scanned


Rice. 27. Antivirus settings

On the tab Confidentiality you can select the webcam protection mode - in strict regime the antivirus will inform you about every attempt to access it (Fig. 28).


Rice. 28. Webcam access control

conclusions

360 Total Security is not bad :), and most importantly completely free antivirus, providing many additional useful tools. Maximum protection is provided by connecting additional antivirus engines Avira and Bitdefender.

Thank you for your attention, I’m interested in your opinion in the comments.

Tags: Add tags

Good day everyone and all sorts of other differences. We are glad to see you again at the " " project [ Sonikel's Project's]. Today about 360 Total Security, Yes.

It’s been a while since we’ve had anything on the topic, or more precisely, on the topic of products that directly support it, that is, antiviruses and firewalls.

And although the author of the project has been practicing and applying his own antivirus-free methodology for years, the majority of users, which is logical, constantly use a variety of antivirus solutions, and therefore often asks (via) to write about their setup and related nuances.

Today I would like to follow your requests and write about such a solution as 360 Total Security, otherwise we really haven’t touched this topic for a long time. In particular, in the fall we will do another review of some, say, paid antivirus (fortunately, a lot has already been written about free ones) and at the same time maybe even a paid firewall (wishes can be left through the same form feedback or in the comments).

However... Let's put aside the lyrics and let's get started.

360 Total Security introductory

The first thing that actually captivates you with this joy of programming thought is its design. Why, exactly, is it needed? Beautiful design in the program that deals with security, it’s not very clear (from a logical point of view), but it’s clear from a marketing point of view; fortunately, the majority of people in the world are visual people.

The second thing that pleases us is that there really is a set of security solutions, that is, from a firewall to an antivirus, browser protection, sandbox and even an optimizer.

And although this makes the program a combine, but with all this, it manages to behave quite sanely in terms of speed (and brevity) in work, and even does not consume very many resources. With all the free and Russian support, it’s a godsend for the user’s spy.

Installation is extremely simple - download the file or, for example, and run it.

Installing the utility

At the first stage, we will have to wait until the installer is finally loaded, although, however, this process can be hidden in the background by clicking the appropriate button.

Do you want to know and be able to do more yourself?

We offer you training in the following areas: computers, programs, administration, servers, networks, website building, SEO and more. Find out the details now!

After loading, a window will pop up in which you can use the " Settings"select the installation path, as well as the language and read the agreement. If you are not very interested in all this, you can immediately click on the button" Installation".

After installation you will be able to see the button " Launch"after which, oddly enough, you will be able to see the main window of the program, which, by the way, is somewhat reminiscent of the product interface Wise which I'm already talking about.

Actually, as I said above, the use is quite simple.

Using 360 Total Security

If you don’t really want to deal with everything for a long time, then first, for example, click on the thick button " Examination"And we are waiting for the results of the check.

Then all you have to do is press the button " To correct" and view the results on the same screen, and look at more detailed nuances in the log that comes out when you click on the button " Magazine".

Tab " Antivirus" will allow you to do a more detailed virus scan, but before you begin, in general, I would recommend turning on two more scanning engines ( Bitdefender And Avira Antivir), by clicking on the corresponding squares and moving the slider to the right.

Then all that remains is to scan and deal with the results found (or not found). And, yes, - be careful! - the program eats keygens and related software. However, if you click on the green button " Trust" against the desired file, then it will remain in place.

Tab " Acceleration" is responsible for optimization parameters.

More details

It may be useful to many, if only because for an inexperienced user, recommendations in the spirit of " Can be disabled", "Need to disable" And " Keep unchanged", which is extremely clear (although the author of the article does not agree with all points 100% ).

The cleaning tab, I think, needs no introduction - it allows you to clean temporary files for the system, browsers, plugins, etc.

Well, the remaining piece is the additional functionality that I showed you at the very beginning. From this tab you can install a firewall (aka firewall), launch a sandbox, clean backups systems and all that stuff (you can even install security patches using the " button Vulnerabilities").

Setting up 360 Total Security

As for the settings, they open by clicking on the corresponding icon " Menu" in the upper right corner.

In general, there are not many settings themselves, but they are to the point. On the "tab" Basic"I would uncheck the box" Login to VK automatically".

On the tab with active protection you can install the appropriate plugin to protect your browser, select actions when a threat is detected, protect USB-carriers and.. even a webcam and chat.

I think you can figure out the rest of the settings yourself, since there’s nothing complicated there, and everything is in Russian.. Well, we’ll probably move on to the afterword.

Afterword

In a nutshell, perhaps something like this. I hope that this solution will be useful to someone and will help protect their data, and therefore themselves, from all sorts of horrors of life.

As always, if you have any questions, additions, etc., please feel free to comment on this post.

Computer security always comes first. When going online or installing programs and games, you can accidentally “pick up” a virus that can destroy important information. Considering that users often use electronic wallets, spyware can hack the account and, accordingly, the money stored in in electronic format, will move into the attacker’s pocket. Antivirus programs help you avoid unpleasant situations. Among the popular software defenders, one can highlight the Kaspersky Lab product, Dr. Web, Panda, NOD 32. It's Real good utilities, which can protect your computer from unauthorized intrusion. The only drawback: each antivirus listed above is paid. It is believed that antivirus programs that are downloaded for free do not provide adequate protection. This statement is not always true. In this article, we will look at the 360 ​​Total Security antivirus in Russian. Antivirus 360 Total Security is provided to users free of charge, but is not inferior in functionality to commercial products.

Antivirus 360 Total Security is very popular

Download and install

Some users of 360 Total Security are on torrent. It's not really the right approach, we recommend using the official website of the developer http://www.360totalsecurity.com/ru/. In this case, you can be sure that high-quality software is used and not a hacked version of the product. The application is downloaded and installed on the computer. During installation you will need to accept license agreement(Mark desired item tick). The program will create a shortcut on the desktop, but it is recommended to specify in the settings the folder where the file will be unpacked. Immediately after installation, the antivirus is ready to work.

Important! If you already have an antivirus defender installed, you need to uninstall it. Two programs cannot run on the computer, this will cause an application conflict. Please note that the built-in Windows protection turns off without user intervention.

As you can see, getting 360 Total Security for free is a no-brainer. If you decide to stop using the product, it makes sense to consider uninstalling 360 Total Security.

There are several ways to remove 360 ​​Total Security from your computer:

  1. Through the start menu, go to the “Control Panel” section and select the uninstall programs menu. Similar action can be done using the CCleaner cleaner.
  2. Delete system folder applications. After this, you will need to restart the computer, otherwise the system will not delete the file.
  3. Third party applications. For example: Revo Uninstaller PRO program.

Regardless of the removal method, additional registry cleaning will be required. Such programs are usually firmly written into the OS.

Let's launch

Having figured out how to install the free antivirus 360 Total Security, let's talk about how the program works. When you launch it for the first time, the application will offer to scan the system. We recommend performing a full scan of your computer. In this case, the following actions will be performed:

  • Scan your computer for viruses and spyware.
  • Deleting temporary files.
  • Reliable Wi-Fi connection.
  • Performance analysis.

The user can refuse a full scan and perform a selective scan. The test results will be displayed on the screen. If problems are detected, select “ detailed information” and decide whether to correct the errors found or not.

Important! The threats noted in the System Optimization section are not malware. Antivirus reports unnecessary programs in the startup section, which provide Negative influence for performance.

Function settings

WATCH THE VIDEO

Free antivirus programs from 360 Total Security are equipped with a standard set of functions. The user is offered three ways to scan a computer: full, quick and selective. You can send files to quarantine or add to the white list. The last point implies program exceptions. We'll tell you how to add 360 Total to exceptions Security file, system folder or website. To do this you need:

  • Go to the settings section and select “White List”.
  • In the directory that opens, select the application to be included in the exceptions.

Please note that it is not recommended to add sections that are responsible for system operation or that store confidential information to antivirus exceptions. These are the files that are subject to hacker attacks. When adding them to the white list, auto mode scanning will ignore marked partitions.

In addition, the program has interesting feature: engine selection. The application has two engines installed: Avira and Bitdefender. They play a secondary role in the application, although they are independent antivirus programs. By default, these tools are activated at the time of scanning, but you can switch them to active mode work. To do this, go to custom security mode and activate system protection. It is worth noting that the connection additional tools, will lead to increased CPU resource consumption. But this setup of 360 Total Security will allow you to check any application from context menu programs. To do this, click right key mouse over the suspicious file, and select scan with antivirus.

To reduce the consumption of system resources when connecting additional engines, you can disable 360 ​​Total Security while you do not go online.

Additional tools

We'll tell you how to use 360 ​​Total Security antivirus. If you go to the tools section, you will see two items: vulnerabilities and sandbox (disabled). In the first case, the analysis is carried out Windows security and holes in the defense are identified. The second section runs the application locally, preventing the installation of unwanted software.

When you go to the acceleration section, the antivirus will analyze startup, running services and processes, will check the Internet connection settings. As a result, detected defects and advice on optimizing the system’s operation will be displayed on the screen.

The cleanup section will delete temporary files and clear the cache. The system will scan the browser and application log, freeing the PC from digital garbage.

Conclusion

It’s hard to say whether 360 Total Security is a good antivirus or not. Among the free antivirus programs, you won’t be able to find analogues for sure. According to the results laboratory research the program blocked almost all potential threats. However, according to user reviews, there is a drop in system performance during scanning. If your goal is to use a budget antivirus, then 360 Total Security optimal option.

In order to remove a program, you need to go to the “Start” menu and open the “Programs and Features” category. Then find 360 Total Security in the drop-down list of programs and click the “Uninstall” button. After which the removal process will begin. In addition, the program can be uninstalled using the built-in uninstall wizard.

How often is the program updated?

On average, virus signatures are updated daily. To always use current version antivirus, it is recommended to have a stable Internet connection and, if necessary, allow network access for the program in the firewall.

Why does 360 Total Security detect viruses while other scanners do not?

IN different types Antivirus programs use different engines and methods for detecting malware. Because of this feature, scan results may vary from program to program. But despite this, regular updates software can improve its performance several times.

What antivirus protection mechanisms does 360 Total Security use?

The antivirus uses five defense mechanisms simultaneously. These include the BitDefender function and the Avira AntiVir function, the cloud protection"360", function for system recovery and function for self-learning of the QVMII AI program. All mechanisms are customizable in many ways and allow you to choose the most suitable protection mode for you.

Is it possible to recover a file deleted by an antivirus?

360 Total Security literally does not remove infected files. She places them in a special storage facility - “quarantine”. From there, files can be either permanently deleted or restored to old place. Therefore, in order to return deleted files, you just need to go into “quarantine” and perform certain manipulations.