<s>
Norton	B-Application
AntiBot	I-Application
,	O
developed	O
by	O
Symantec	O
,	O
monitored	O
applications	O
for	O
damaging	O
behavior	O
.	O
</s>
<s>
AntiBot	B-Application
was	O
designed	O
to	O
be	O
used	O
in	O
conjunction	O
with	O
other	O
antivirus	B-Application
software	I-Application
.	O
</s>
<s>
Unlike	O
traditional	O
antivirus	B-Application
products	O
,	O
AntiBot	B-Application
does	O
not	O
use	O
signatures	O
;	O
there	O
is	O
a	O
delay	O
between	O
when	O
a	O
vendor	O
discovers	O
a	O
virus	O
and	O
distributes	O
the	O
signature	O
.	O
</s>
<s>
Instead	O
,	O
AntiBot	B-Application
attempts	O
to	O
identify	O
a	O
virus	O
through	O
its	O
actions	O
;	O
viruses	O
are	O
malicious	O
by	O
nature	O
.	O
</s>
<s>
However	O
,	O
AntiBot	B-Application
was	O
not	O
intended	O
to	O
replace	O
an	O
antivirus	B-Application
product	O
.	O
</s>
<s>
The	O
product	O
has	O
been	O
discontinued	O
after	O
AVG	O
acquired	O
Sana	O
Security	O
in	O
January	O
2009	O
,	O
developing	O
a	O
standalone	O
program	O
similar	O
to	O
AntiBot	B-Application
called	O
AVG	O
Identity	O
protection	O
,	O
which	O
was	O
also	O
discontinued	O
and	O
integrated	O
in	O
AVG	O
Internet	O
Security	O
2011	O
.	O
</s>
<s>
Ed	O
Kim	O
,	O
director	O
of	O
product	O
management	O
at	O
Symantec	O
,	O
highlighted	O
the	O
rise	O
of	O
botnets	B-Architecture
.	O
</s>
<s>
A	O
botnet	B-Architecture
is	O
a	O
collection	O
of	O
compromised	O
computers	O
,	O
known	O
as	O
bots	O
,	O
which	O
hackers	O
usually	O
control	O
for	O
malicious	O
purposes	O
.	O
</s>
<s>
Two	O
main	O
uses	O
of	O
botnets	B-Architecture
include	O
identity	O
theft	O
and	O
e-mail	O
spam	O
.	O
</s>
<s>
On	O
7	O
June	O
2007	O
,	O
Symantec	O
released	O
a	O
beta	O
version	O
of	O
Norton	B-Application
AntiBot	I-Application
.	O
</s>
<s>
AntiBot	B-Application
was	O
designed	O
to	O
supplement	O
a	O
user	O
's	O
existing	O
antivirus	B-Application
software	I-Application
.	O
</s>
<s>
Unlike	O
traditional	O
antivirus	B-Application
software	I-Application
,	O
AntiBot	B-Application
does	O
not	O
use	O
signatures	O
to	O
identify	O
malware	O
.	O
</s>
<s>
AntiBot	B-Application
can	O
also	O
supplement	O
SONAR	O
technology	O
by	O
Symantec	O
,	O
found	O
in	O
Norton	O
AntiVirus	B-Application
2007	O
,	O
Norton	O
Internet	O
Security	O
2007	O
,	O
and	O
Norton	B-Application
360	I-Application
.	O
</s>
<s>
Similar	O
to	O
AntiBot	B-Application
,	O
SONAR	O
monitors	O
for	O
malicious	O
behavior	O
.	O
</s>
<s>
However	O
,	O
SONAR	O
does	O
not	O
run	O
continuously	O
in	O
the	O
background	O
;	O
only	O
during	O
a	O
virus	B-Application
scan	I-Application
in	O
those	O
specific	O
products	O
.	O
</s>
<s>
AntiBot	B-Application
was	O
made	O
available	O
to	O
the	O
general	O
public	O
on	O
17	O
July	O
2007	O
.	O
</s>
<s>
Symantec	O
confirmed	O
ceasing	O
sales	O
and	O
distribution	O
of	O
Norton	B-Application
AntiBot	I-Application
in	O
early	O
2009	O
.	O
</s>
<s>
PC	O
Magazine	O
noted	O
AntiBot	B-Application
's	O
above	O
average	O
ability	O
to	O
identify	O
malicious	O
programs	O
based	O
on	O
behavior	O
and	O
the	O
fact	O
it	O
did	O
not	O
mistakenly	O
mark	O
a	O
legitimate	O
program	O
as	O
malicious	O
during	O
testing	O
.	O
</s>
<s>
However	O
,	O
on	O
some	O
infected	O
systems	O
AntiBot	B-Application
failed	O
to	O
install	O
or	O
caused	O
blue	O
screens	O
because	O
it	O
failed	O
to	O
completely	O
remove	O
a	O
virus	O
.	O
</s>
<s>
A	O
technical	O
limitation	O
is	O
that	O
AntiBot	B-Application
cannot	O
detect	O
inactive	O
malware	O
since	O
there	O
is	O
no	O
behavior	O
for	O
the	O
software	O
to	O
monitor	O
.	O
</s>
