Pin Me

Best Sites that Identify Suspicious Files

written by: Indu Priya•edited by: Lamar Stonecypher•updated: 11/12/2008

Suspicious files have become a bother to so many computer applications. Most executives are overwhelmed by the malware that hits their computers and crashing their programs. However there are a couple of websites with capacities to detect and identify these malware applications.

  • slide 1 of 6


    So, is there any web organization or company that rates the best sites for identifying suspicious files? Sometimes we get files, maybe sent as emails, from other computers in the network or other sources, but the antivirus installed in our system identifies them as viruses. This is in spite of your being sure that the file is legitimate and not a virus. Any file being possibly identified as a virus is usually posed as a threat according to the installed antivirus security system.

    The most essential approach to this kind of problem is having a couple of these websites as a back-up tool against these programs. Experts and those who have been seeking this kind of help have found and examined some sites that help to identify suspicious files over the net. These sites let you to scan the suspicious files online and both contain and quarantine any problem files discovered.

  • slide 2 of 6


    They offer a service that analyzes any suspicious files and facilitate a very quick detention of viruses, worms, and Trojans, and all kinds of malware detected by antivirus engines. According to the site it has a free and independent identification service, uses multiple antivirus engines, has real-time automatic updates of virus signatures, gives a detailed results from each antivirus engine, and has real time global statistics. Virus Total is one of the winners of an award as one of the 100 best products of 2007 in the security website category. The site service is developed by Hispasec Sistemas which is an independent information technology security laboratory. The Laboratory uses various command line versions of antivirus engines, which are updated regularly with official signature files published by their respective developers. They use antivirus engines such as AVG, Avira, FileAdvisor, Norman Antivirus, Bit Defender, Sophos, Symantec, Kaspersky Labs, and many others. It is good to note that you can never be a 100% sure of an effective way of detecting viruses. Although the detection rate using this site is assured because it uses multiple antivirus engines, the results can never be 100% free of suspicious new files or viruses.

  • slide 3 of 6


    Their website is This is an online malware scanner. Like the rest of them, this scanner is not a hundred per cent secure. They update the virus definitions hourly. Unfortunately for this site they limit the size of files you can scan to only 10 Mb.This site only offers a very simple file scanning, so by all means don't over rely on it. Yes, it will identify the suspicious file but may not be able to clean it. You should always have updated antivirus software installed on your personal computer to be on the safe side.

  • slide 4 of 6


    This is another online scanner that one can try. Their website link is http// They claim to offer a fully advanced automated threat analysis. Their system is designed to analyze and report on the computer viruses behavior. It also analyzes the behavior of worms, Trojans, ad ware, spy ware and other various security threats. It only take a few moments to generate a full scan report with full technical details that only compares to what is on the antivirus industry standards. It is possible to generate up to a thousand fully detailed threat descriptions per server in a single day using their scanner and it takes less than four minutes. The scanning service can point to virtually unlimited amounts of threat analysis servers, making it possible to process varied threat samples quickly.

  • slide 5 of 6


    The site is free for use. The site full address is It is easy to submit suspicious files for scanning. This site was designed by anti-malware and security professionals, and it shows. The only user requirement is that you must fill all the fields in their upload form. You should not also upload any logs or zipped files unless you are requested to do so. This is because, according to them, zipped files interfere with the automatic analysis of the uploaded content.

  • slide 6 of 6


    Suspicious files have raped the security of our computer systems, often crashing our operating systems and programs. Many computers ands networks have had to be formatted to clear all programs and files before leaving the computer clean. However, loss of files and important data has been the subsequent result.

    The best approach is to have these malware files checked by a reputable website and be confirmed either as good file or a virus or destructive file so as to keep our systems safe.