Antivirus Scanner (by picture

Antivirus Scanner (by

(0 reviews)

cPanel Conference Exhibitor
Download URL
Partner Program
License Type


The primary function of the antivirus program is to scan everything that is a part of your site (theme files, module files, downloaded files, etc.). The antivirus scans a specified folder server by using a unique search algorithm.

Antivirus scanners work by searching files, sectors, and system memory for both known and new (unknown to the scanner) viruses. So-called “masks” are used to search for known viruses. The mask of a virus is a constant sequence of code that is specific to that virus.

Main Functions

The antivirus program uses in-depth analysis of each file on your server to maintain its security and the security of your clients. The program lets you identify the presence of a malicious program at any time. The antivirus improves server performance and restricts malicious processes from slowing down the CPU. Since viruses often transmit a lot of data, the antivirus helps reduce the burden on the server’s network by preventing this extra load. It will also protect your company’s reputation.

At the core of the antivirus is its heuristic analysis function. This technology utilizes probabilistic algorithms that detect suspicious objects. In the process of heuristic analysis, the structure of the file is checked for virus-like patterns. The latest heuristic analysis technology checks the contents of a file for known virus signatures and their combinations. This helps identify hybrids and new versions of previously known viruses without any additional updates of the antivirus database.

As with any probabilistic algorithm, false positives are unavoidable. To solve this problem, files that are manually verified and selected by antivirus experts are added to a whitelist.


The scanner identifies and fights the following threats:


  • MySQL and JavaScript injections

Using MySQL and Javascript injections, one can easily embed malicious code and gain access to a database. The antivirus program uses its database of injections to block all malicious requests made to the site. The scanner can detect embedded files (from another site) on the server, and it can also show Google indexing results.

  • Website Defacements

This is an attack that changes the appearance of your website or webpage. Hackers infiltrate the web server and replace the hosted website with one of their own.

  • Hidden iFrames

iFrames are designed to embed external content, and attackers frequently use them. The Hidden iFrames detector catches all iFrames that can be installed by hackers.

  • PHP Mailers

PHP Mailers are one of the methods used to send spam. Through the use of a state of the art database, the antivirus program identifies all types of malicious PHP Mailers and blocks all requests aimed at such files.

  • Social Engineering Attacks

A Social Engineering Attack is orchestrated by manipulating users with the goal of obtaining their private information. Hackers often use this kind of attack since it is much easier to exploit one's gullibility rather than hacking their systems.

  • Phishing Page Detection

Phishing websites imitate real sites to steal information and money. The antivirus program identifies these phishing websites and blocks them.

  • Redirects

Through the use of web scripts, malicious redirects can exploit vulnerabilities on a user’s computer and install malicious software. These types of viruses are difficult to identify because they do not contain much code.

  • Website Backdoors

Backdoors are used by attackers to gain unauthorized access and remote control of a website. Even after updating the site, changing its passwords, and implementing other fixes after a hacking, backdoors may still be present. If they are left unattended, backdoors can allow another attack to occur. The antivirus program locates and eliminates all backdoors.

  • Website Anomalies

Anomalies are a warning sign of potentially malicious activity. To prevent an attack, you must take action when anomalies are present in the login process. The antivirus program monitors the site for anomalies and notifies you when one is found.

  • Drive-by-downloads

Drive-by downloads are malicious attacks that occur when a user visits a hacked site or an attempt to open an infected HTML-message through email.

  • IP Cloaking

Cloaking is one of the many methods of sending spam. The antivirus program checks for the presence of cloaking.

  • Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) involves embedding malicious code that runs on the user side, replaces the webpage with another, and transfers the stolen data to hackers.

  • .htaccess

The .htaccess file opens many opportunities for hackers. The file can be used to hide malicious software, redirect search engines to the hacker’s site, and much more (hidden backdoors, embedded content, downloading files from external sites, etc.).

Siteguarding Ltd. Is a global company specializing in cybersecurity with more than eight years of experience working with websites. We offer the simplest and most effective means for consumers all over the world to protect their data and identity. We have experienced security experts who learn the ins and outs of new technology every single day. Our strategic goal is to develop the highest caliber of security tools that will become an insurmountable obstacle for all current and future computer threats.

User Reviews (0)

There is no review present!

Submit Application Listing Advanced Search

Browse Categories

cPanel Mailing List

Be the first to know about software releases and important cPanel news.

Subscribe Today