Have you ever wondered how to test your antivirus software so as to ensure that it is working properly? Well, here is a quick and easy way to safely test your antivirus without having to deal with the real virus. The process is called EICAR test. This test is designed to work on any antivirus software and was developed by European Institute of Computer Antivirus Research.
This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer.
How to Test Your Antivirus?
Here is a step-by-step procedure to test your antivirus functionality:
Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
Rename the file from “New Text Document.TXT” to “virus-sample.com”.
Now run the antivirus scan on this “virus-sample.com” file.
If the antivirus is working properly on your computer, then it should generate a warning message and immediately delete the file upon scanning. Otherwise, you may have to re-install your antivirus.
NOTE: Most antivirus (with auto-detect feature) will pop-out a warning message in the Step-1 itself.
You can also place the “virus-sample.com” file in a ZIP or RAR file and run a scan on it so as to ensure that your antivirus can detect the test string even in the compressed archive. Any antivirus while scanning this file should respond exactly as it will do for a genuine virus/malicious code.
This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence, it is the safest method to test the proper functioning of any antivirus software.
How EICAR Antivirus Test Works?
During the development of the antivirus software, the AV programmers flag the EICAR test code/string as a verified virus. This is a standard adopted by every antivirus company so as to make the testing process simple and risk-free. Therefore, every antivirus will respond to EICAR string in the same way it does for a genuine malicious code.