GeekITDown Computer Services

  • Home
  • GeekITDown Backup Service Pricing
  • Contact GeekITDown
  • GeekITDown Reviews
  • Checkout
  • Cart
© 2025 | GeekITDown. All rights reserved.
Call Us
352-366-1316
GeekITDown Computer Services & Technology Solutions
  • Home
  • Reviews
  • Blog
  • Services
    • GeekITDown Backup Service Pricing
    • IT Business Services
  • Contact
GeekITDown Computer Services & Technology Solutions

Metascan Checks Suspicious Files With 17 Anti-virus Programs

Home / Blog / Features / Metascan Checks Suspicious Files With 17 Anti-virus Programs

Metascan Online


Safety and security have become increasingly important in today’s computing age. Malware and viruses can worm their way in from a number of different sources and cause havoc on computer systems. Hopefully, everyone reading this uses an anti-virus of some sort and routinely scans their computers for infections.

The rule of thumb is one anti-virus per system. Any more than that and the computer can become unstable. However, there are times when one anti-virus might seem insufficient. Maybe you’re more paranoid than the average user or perhaps a certain file has raised a red flag. Either way, Metascan Online can help with those concerns.

Metascan Online is an online file scanning service which scans for infections. The service allows users to choose a file located on their local machine and have it scanned using the Metascan Online multiple engine process. The multiple engines are 17 different anti-virus software applications all used to scan the same file. The engines used include popular names such as Avast, AVG, ESET, McAfee and 13 other anti-virus software programs.

The scanning process is quick, but how quick depends on file size. Maximum file size allowed for scanning is 40MB. If server load is heavy, files are placed in a queue for ordered scanning. Results show a colored ring with the number of threats detected. For example, if the file is infection free, then a solid green ring is displayed with a 0/17 threats detected message. Along with threat information are other items such as file size, type and MD5 hash value. Each engine is listed to separate the results, display the scan time and last updated definition date. We found definitions are updated to within one day.

Metascan Online should not be used in place of traditional anti-virus software, but in conjunction with it can add an increased sense of security for times when files seem iffy. Metascan Online is free to use and made available by Opswat.

Nifty Websites Collection Metascan Online

Visit Metascan Online

If you enjoyed or found this article useful, please show us some support by liking us on Facebook or by sharing us on your favorite social website. Thanks!

Make Your Website Part Of The Nifty Collection


144
Like this post

1 Comment

  1. Nifty Websites Collection [January 15-21, 2012] | GeekITDown
    Reply
    3 January 2014
    Reply

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Services

Business Tech Services

Dedicated Backup Services

Home Computer Repairs & Services

Website Design

Information

352.366.1316

GeekITDown on Google

Stay Connected

© 2026 | Website by GeekITDown

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}