Best and Lightest Antivirus Software (reviewed using actual memory usage tests)

One of the most common things users do to try and keep their computer running as smooth as possible, is keep control over which programs start with Windows. Having just a few memory or processor hungry programs loading into the system tray on boot can have an adverse affect on the performance of your computer. One of the most common applications that will load with Windows and stay resident in the background while the system is on, will be your chosen antivirus software. Have you ever wondered which are the lightest antivirus packages available and which ones don’t do so well on memory usage?
It’s maybe not such a major issue for newer computers these days having an antivirus which isn’t especially memory efficient because they often come equipped with 4GB or more of RAM. But if your computer isn’t the latest and greatest, using a package which might possibly be eating hundreds of Megabytes of system memory could slow your computer down considerably at inopportune moments. To find out just how much memory gets used by running antivirus software, we’ve decided to gather together a mixture of 25 popular commercial and free antivirus packages to see how they perform.


How We Tested


As you might expect, testing an antivirus product for its memory usage is certainly not an exact science because the program is never standing still and nearly always doing something in the background. A problem with taking memory readings is there are several different numbers you can look at. The two memory readings we paid most attention to were “Working Set” and “Private Working Set” (WS Private), which do two things:
  • Working Set – This is the amount of memory used by the process PLUS the amount of memory that is shared with other processes. As such, this value isn’t truly accurate because shared memory can be double counted due to the same resource being registered in multiple processes. It does though represent the maximum amount of non virtual memory in use by the process. This is the default memory column in the Windows XP Task Manager.
  • Private Working Set – Is similar to Working Set, but excludes the shared memory. This is only the the amount of memory in use by the process itself and isn’t shared among other processes. Private Working Set is perhaps a more accurate indication of how much physical memory the process itself is using, and is also the default memory column for Task Manager in Windows Vista/7/8.
process explorer working set ws private
We decided to approach this task by gathering memory readings over a period of time. 10 readings were taken for each product at 30 second intervals, totaling 5 minutes of monitoring during idle and another 5 minutes while running a scan. The average score was then taken for each antivirus with all processes created by the application added together. All antivirus software was fully updated before testing using windows 7 32-bit, and the memory readings were taken using Sysinternals Process Explorer.
Below are the results for each antivirus package along with the average Working Set and Private Working Set scores in Kilobytes (KB) while idle and during a scan. The software is in reverse order with the heaviest Private Working Set usage for idle and scan combined listed first, going down to the lowest score and most efficient. If you want to jump straight to the list of results to see how your antivirus got on, they are at the bottom of page 2.
25. ZoneAlarm Free AntiVirus + Firewall 11.0.000.504
ZoneAlarm memory usage
Number of Processes: 4
Processes Monitored: ISWSVC.exe, vsmon.exe, zatray.exe, ForceField.exe


Idle Working Set (KB): 223,260
Idle Private Working Set (KB): 191,472


Scan Working Set (KB): 287,443
Scan Private Working Set (KB): 226,222



24. Sophos Endpoint Security and Control 10.2
sophos memory usage
Number of Processes: 7
Processes Monitored: swi_service.exe, SavService.exe, SAVAdminService.exe, ALsvc.exe, ALMon.exe, SavProgress.exe, SavMain.exe


Idle Working Set (KB): 216,482
Idle Private Working Set (KB): 192,436


Scan Working Set (KB): 467,817
Scan Private Working Set (KB): 198,452



23. Emsisoft Anti-Malware 7.0.0.21
Emsisoft Anti-Malware memory usage
Number of Processes: 3
Processes Monitored: a2guard.exe, a2service.exe, a2start.exe


Idle Working Set (KB): 131,158
Idle Private Working Set (KB): 125,337


Scan Working Set (KB): 251,945
Scan Private Working Set (KB): 240,770



22. Quick Heal AntiVirus Pro 2013
quick heal memory
Number of Processes: 8
Processes Monitored: ScSecSvc.exe, SCANWSCS.EXE, scanner.exe, SAPISSVC.EXE, QUHLPSVC.EXE, OPSSVC.EXE, ONLINENT.EXE, EMLPROXY.EXE


Idle Working Set (KB): 99,090
Idle Private Working Set (KB): 66,134


Scan Working Set (KB): 273,984
Scan Private Working Set (KB): 227,424



21. McAfee AntiVirus Plus 2013
mcafee antivirus memory usage
Number of Processes: 9
Processes Monitored: McAPExe.exe, mcinfo.exe, mcods.exe, McSACore.exe, mcshield.exe, McSvHost.exe, mcsvrcnt.exe, McUICnt.exe, mfefire.exe


Idle Working Set (KB): 142,375
Idle Private Working Set (KB): 103,518


Scan Working Set (KB): 239,500
Scan Private Working Set (KB): 184,214



20. Ad-Aware Free Antivirus + 10.5.2.4379
ad-aware antivirus memory usage
Number of Processes: 4
Processes Monitored: SBAMSvc.exe, adawarebp.exe, AdAware.exe, AdAwareService.exe


Idle Working Set (KB): 162,540
Idle Private Working Set (KB): 118,728


Scan Working Set (KB): 189,223
Scan Private Working Set (KB): 144,394



19. Bitdefender Antivirus Free Edition 1.0.14.889
bitdefender free memory usage
Number of Processes: 2
Processes Monitored: gziface.exe, gzserv.exe


Idle Working Set (KB): 115,559
Idle Private Working Set (KB): 91,742


Scan Working Set (KB): 135,836
Scan Private Working Set (KB): 115,795



18. Trend Micro Titanium Antivirus + 6.0.1215
trend micro titanium memory usage
Number of Processes: 6
Processes Monitored: uiWatchDog.exe, uiSeAgnt.exe, coreServiceShell.exe, coreFrameworkHost.exe, AMSP_LogServer.exe, WSCStatusController.exe


Idle Working Set (KB): 102,208
Idle Private Working Set (KB): 72,754


Scan Working Set (KB): 161,926
Scan Private Working Set (KB): 130,022



17. Avira Free Antivirus 13.0.0.3499
Avira Free memory usage
Number of Processes: 6
Processes Monitored: avgnt.exe, avguard.exe, avshadow.exe, avwebgrd.exe, sched.exe, avscan.exe


Idle Working Set (KB): 63,754
Idle Private Working Set (KB): 41,138


Scan Working Set (KB): 199,264
Scan Private Working Set (KB): 157,750



16. VIPRE Antivirus 2013 6.2.1.10
vipre antivirus memory usage
Number of Processes: 3
Processes Monitored: SBAMSvc.exe, SBAMTray.exe, SBPIMSvc.exe


Idle Working Set (KB): 114,098
Idle Private Working Set (KB): 91,981


Scan Working Set (KB): 134,488
Scan Private Working Set (KB): 104,936



15. NANO Antivirus Free 0.24.0.52214
nano antivirus memory usage
Number of Processes: 2
Processes Monitored: nanosvc.exe, nanoav.exe


Idle Working Set (KB): 176,141
Idle Private Working Set (KB): 53,846


Scan Working Set (KB): 287,284
Scan Private Working Set (KB): 131,201



14. ESET NOD32 Antivirus 6.0.316.0
ESET NOD32 memory usage
Number of Processes: 2
Processes Monitored: egui.exe, ekrn.exe


Idle Working Set (KB): 93,616
Idle Private Working Set (KB): 76,441


Scan Working Set (KB): 103,244
Scan Private Working Set (KB): 82,913



13. Dr.Web Anti-virus 8.0.8.04230
dr.web memory usage
Number of Processes: 6
Processes Monitored: dwarkdaemon.exe, dwengine.exe, dwnetfilter.exe, dwscanner.exe, dwservice.exe, spideragent.exe


Idle Working Set (KB): 92,006
Idle Private Working Set (KB): 66,822


Scan Working Set (KB): 117,973
Scan Private Working Set (KB): 90,430



12. Kaspersky Anti-Virus 13.0.1.4190
kaspersky memory usage
Number of Processes: 2
Processes Monitored: avp.exe, avp.exe


Idle Working Set (KB): 65,625
Idle Private Working Set (KB): 52,218


Scan Working Set (KB): 103,377
Scan Private Working Set (KB): 92,105



11. Bitdefender Antivirus Plus 2013 16.28.0.1789
Bitdefender antivirus memory usage
Number of Processes: 5
Processes Monitored: bdagent.exe, downloader.exe, updatesrv.exe, vsserv.exe, odscanui.exe


Idle Working Set (KB): 81,360
Idle Private Working Set (KB): 47,658


Scan Working Set (KB): 150,478
Scan Private Working Set (KB): 62,877



10. Microsoft Security Essentials 4.2.223.0
microsoft security essentials memory usage
Number of Processes: 3
Processes Monitored: MsMpEng.exe, msseces.exe, NisSrv.exe


Idle Working Set (KB): 70,484
Idle Private Working Set (KB): 51,750


Scan Working Set (KB): 79,103
Scan Private Working Set (KB): 57,787



9. F-Secure Anti-Virus 12.77 build 100
F-secure antivirus memory usage
Number of Processes: 7
Processes Monitored: fsgk32.exe, fshoster32.exe, FSM32.exe, FSMA32.exe, fsorsp.exe, fssm32.exe, fsblsrv.exe


Idle Working Set (KB): 62,042
Idle Private Working Set (KB): 40,246


Scan Working Set (KB): 92,386
Scan Private Working Set (KB): 66,819



8. AVG AntiVirus Free 2013.0.3272
avg memory usage
Number of Processes: 7
Processes Monitored: avgcsrvx.exe, avgemcx.exe, avgidsagent.exe, avgnsx.exe, avgrsx.exe, avgui.exe, avgwdsvc.exe


Idle Working Set (KB): 194,888
Idle Private Working Set (KB): 34,398


Scan Working Set (KB): 199,628
Scan Private Working Set (KB): 63,403



7. UnThreat AntiVirus Free 2013 6.2.37.17222
unthreat antivirus memory usage
Number of Processes: 2
Processes Monitored: utsvc.exe, UnThreat.exe


Idle Working Set (KB): 13,615
Idle Private Working Set (KB): 8,953


Scan Working Set (KB): 87,027
Scan Private Working Set (KB): 73,778



6. Immunet 3.0.8.9025 Free
Immunet memory usage
Number of Processes: 2
Processes Monitored: agent.exe, iptray.exe


Idle Working Set (KB): 40,413
Idle Private Working Set (KB): 29,304


Scan Working Set (KB): 63,475
Scan Private Working Set (KB): 45,510



5. Norton AntiVirus 20.3.1.22
Norton Antivirus memory usage
Number of Processes: 4
Processes Monitored: ccsvchst.exe, ccsvchst.exe, ccsvchst.exe, ccsvchst.exe


Idle Working Set (KB): 59,304
Idle Private Working Set (KB): 19,362


Scan Working Set (KB): 111,094
Scan Private Working Set (KB): 52,576



4. Panda Cloud Antivirus Free 2.1.1
cloud antivirus memory usage
Number of Processes: 4
Processes Monitored: PSUNMain.exe, PSUAService.exe, PSUAMain.exe, PSANHost.exe


Idle Working Set (KB): 31,714
Idle Private Working Set (KB): 20,340


Scan Working Set (KB): 76,498
Scan Private Working Set (KB): 41,172



3. Comodo Antivirus Free 6.1.275152.2801
comodo antivirus memory usage
Number of Processes: 4
Processes Monitored: cavwp.exe, cis.exe, CisTray.exe, cmdagent.exe


Idle Working Set (KB): 39,664
Idle Private Working Set (KB): 14,954


Scan Working Set (KB): 105,317
Scan Private Working Set (KB): 34,453



2. Webroot SecureAnywhere AntiVirus 2013 8.0.2.127
webroot secureanywhere memory usage
Number of Processes: 2
Processes Monitored: WRSA.exe, WRSA.exe


Idle Working Set (KB): 3,823
Idle Private Working Set (KB): 2,726


Scan Working Set (KB): 9,949
Scan Private Working Set (KB): 7,673



1. Avast! Free Antivirus 8.0.1483
Avast memory usage
Number of Processes: 2
Processes Monitored: AvastSvc.exe, AvastUI.exe


Idle Working Set (KB): 9,706
Idle Private Working Set (KB): 4,290


Scan Working Set (KB): Resets every 10 seconds
Scan Private Working Set (KB): Resets every 10 seconds



Results and Summary
The result tables are simply split into two, one for the idle memory usage and one for the usage during a virus scan, both in alphabetical order. The colors are self explanatory with green the lightest antivirus and yellow second best. At the other end, red is the heaviest and orange the next most memory hungry.
Average Memory Scores While Idle
Antivirus average memory usage while idle
Average Memory Scores During a Scan
Average memory usage during scan
Summary
  • It was quite a surprise to see a couple of antivirus packages actually using an average of nearly 200MB while sitting idle. ZoneAlarm was also very high in both scores during scanning while the Sophos Working Set score more than doubled. Do note that ZoneAlarm does include a firewall though, and doesn’t have a version without it.
  • On the positive side, Webroot SecureAnywhere proves that cloud antivirus packages can be extremely efficient in memory usage, and it was very good in both idle and scanning scores. You’ll also note that both Working Set and WS Private were very close together so it’s also not consuming shared resources from other programs.
  • Avast is the most popular free antivirus around today, and its memory usage is quite impressive. During scanning Avast kept flushing its memory every 10 seconds which kept usage at a very low level, and it should never grow above a small number of Megabytes. Idle resource usage was also very impressive. For efficient memory usage, Avast is the no.1 free antivirus by far.
  • Some small surprises were Comodo, Bitdefender Free and Avira for different reasons. While Comodo seems to have improved its memory efficiency in recent times, Avira appears to have gone in the opposite direction. What used to be possibly the lightest antivirus package you could get for free, is now quite heavy on memory usage, especially during a scan. Although Bitdefender’s memory did fluctuate a lot, on average it still consumes a lot of memory for a program with virtually no features or options.
Final Note: While these results obviously test the antivirus memory usage, they don’t take into account the features present in each application and its detection rates. Therefore you shouldn’t automatically assume lighter is better because a more memory efficient program might not have the amount of features of an antivirus using a few more Megabytes. If your current package is hungry for memory, this does give you a good idea of what the lightest antivirus packages are that you might like to look at a bit closer.

How to Fix an Android Phone or Tablet That Maybe Bricked

So you decided to root (and flash) your Android handset or tablet, and now things don’t seem to be working right. Maybe it won’t start. Perhaps the phone keeps restarting or won’t boot into Android.

It’s time to face the music.. your Android device is bricked. Or is it? In reality, Android is built with flexibility and durability in mind. That means its hard to completely break your Android device.

When fully bricked, your phone is no longer user-repairable in any shape or form. The truth is that many times new modders think that just because a phone appears to be bricked means that all hope is lost. Luckily, this isn’t true.

Fixing a device that appears to be bricked isn’t a one-fits-all approach, but we will share with you some of the general hints and tips that could be used to get your Android device working again:


What to do if Your Phone Boots Straight into Recovery

Right now your phone refuses to do anything other than boot up directly into ClockWorkMod or any other recovery software you chose to use. It’s toast right? Not exactly.

There is a chance that everything is actually fine and the ROM you used simply is designed to boot into recovery the first time after flashing. To test if that’s the case:

Step 1: Load up ClockWorkMod or whatever recovery tool you are using. Keep in mind that how you do this varies, depending on your phone’s make and model.

For most devices, it’s as simple as holding the up or down volume rocker as your phone boots.

Note: Some devices will automatically boot into the recovery tool, but others will require you to first pick recovery from a list of options.

Step 2: Once in, navigate to reboot system now. This should be the first option on the top, for those using ClockWorkMod.


Hopefully that’s it and everything will start working. If not, that means that you’ll want to re-flash the ROM all over again.

While it doesn’t hurt to try re-flashing with the exact same ROM that you used last time, odds are the problem is that the ROM you used was corrupted. If that’s the case, you’ll be better offdownloading a new/different ROM.

If you’ve gotten this far, you should already know how to put a ROM ZIP file onto your device and flash it, but as a refresher:

Step 1: Plug your SD card into your computer and drag the ROM ZIP to your SD card. When it’s finished transferring, eject the card.

Step 2: Place the SD card back in your phone or tablet, while the device is off. Now turn on your phone and boot into recovery. Using the volume keys as buttons, navigate down to Install ZIP from SD card. Select this option by using the power button.


Step 3: Let it go through the process of flashing. When done, reboot. If successful, your device will now boot into the custom ROM you installed.


What to do if Your Phone Won’t Stop Rebooting

The ROM has been flashed, you thought everything went well, but apparently your phone won’t boot into the homescreen and appears to be stuck in a reboot cycle. The problem here could actually be a very simple one.

It’s important to wipe your data and cache before flashing a ROM to your device. Luckily, if you forgot, it’s really not a big deal.

Step 1: Turn your phone off, and then reboot into Recovery. As already mentioned before, how you do this varies depending on your device, though often enough you simply need to hold down either the up or down volume rocker.

Step 2: Navigate over to Advanced. This will bring up a new menu with several options.

Step 3: The second option from the top downward is Wipe Dalvik Cache. Choose this option and follow the prompts. When finished, return to the main menu by selecting Go Back.


Step 4: Once back at the main screen, navigate down to Wipe Cache Partition. Select it now.

Step 5: Head to Wipe Data/Factory Reset. This will wipe all apps and settings, but since this is a new ROM flash this shouldn’t hurt anything.


Step 6: Finally, reboot your device by selecting reboot system now. If all went well, you should now be able to boot directly into the ROM. If not, you might want to re-flash the same ROM, or try a new one.


None of the Above Solutions Seem to Work? Your SD Card could be at Fault

While the odds of this are pretty low, sometimes the SD card itself is causing issues with things like flashing a ROM.

In this event, you might want to put your SD card into your computer and reformat it. If you have a spare SD card, you also might want to try using it instead.

Is Your Hardware Actually the Problem?


If your phone simply refuses to start or the display is being unresponsive, it’s possible that the problem has nothing to do with the root procedure or with flashing your device. Instead, it could just be bad timing that led to your power charger going bad, or perhaps your display is damaged.

Neither of these things are that likely once again, but it always helps to be thorough and consider all possible problems and solutions.

All Else Fails, Time to Restore from the Original ROM

Ran into a problem that seems to have no possible fix? If so, the solution might be to simply restore the original ROM. This will break your root, get rid of ClockWorkMod and otherwise return your phone or tablet to the same exact state in which it was purchased.

How do you go about this process? Unfortunately, it would be impossible to walk you through this step by step without knowing exactly what handset or tablet you are using. In this case, a search engine like Google or Bing could prove to be your best friend. You’ll want to use a search term like: How to restore original ROM for ( your phone model).

Conversely, you might want to head to a trusty Android community resource like the XDA Developer’s forum, where you will likely be able to find additional help or the tools needed to restore your device.

Conclusion

Never give up! Odds are, your so-called bricked phone can be unbricked without sending it in and paying top dollar for repairs.

If you really are at a dead end here, you can always try returning your phone, but remember that mentioning a phone has been rooted/flashed will void your warranty.

Anyone else out there have any other suggestions for fixing a device that – at first glance – appears to be bricked?  TechProceed.com readers and I would love to hear all about it in the comments below.

Share Files of Any Size Online via Private Torrent in uTorrent/BitTorrent

Nowadays, transferring a file from one computer to another through the internet is hardly uncommon. Cloud services like Dropbox and Google Drive have bumped the few MBs of file size limit associated with emails to a few GBs. But then, there are always caveats.

Though these services make gigabytes of file transfer possible, they come with limitations like maximum file size, upload limit and free account storage threshold. Sure we can split the file and transfer them one by one but that’s a harassment for both the uploader and the downloader.

Today I am going to show you how you can create a private torrent file in uTorrent and send gigabytes of data, without any restriction, to anyone over the internet. Seriously… No Restrictions! So let’s see how we can make this happen.

Creating Private Torrent in uTorrent

Step 1: Download and install the latest version of uTorrent on your computer. I am sure many other torrent clients might support this feature but I personally prefer uTorrent because of its ease of use. After you install uTorrent on your computer, launch it.

Step 2: You will need your global IP address for the task. If you don’t know the external IP address of your computer, open the What is my IP homepage on your browser. The page will display your IP address on the home page. Make sure you are not under any proxy settings and if you are using a firewall, add uTorrent to the whitelist.


Editor’s note: An easier way to find your IP is to type “what is my ip” on Google. Yep, that’s it. Google will show your public IP address on top of the results. 

Step 3: We will now need the port number uTorrent is using for the incoming connection. To know the port number, open uTorrent preferences from Options and click on the Connection tab. Here look for the section Port used for incoming connection under Listening Port settingsand make a note of the port number.


Step 4: When you have your external IP address and the port number, open uTorrent preferences again. Navigate to Advanced and look for the property bt.enable_tracker. The property will be false by default, toggle the value to true to enable private tracking for torrents. Restart uTorrent after making the changes.


Step 5: We will now create a torrent file. Click on File on uTorrent and select the option Create New Torrent. In Create New Torrent window, select the source folder you want to send to your friend. Always make sure you send a folder and not an archived file.


Step 6: Now add these two lines in the trackers text box.
http://External-IP:Port-Number/announce
http://localhost:Port-Number/announce

Replace the External-IP and the Port-Number with the values related to your connection. Finally check the box Start Seeding and Private torrent and click on the button Create and save as.

Step 7: uTorrent will now ask you to save the torrent file on your computer and start seeding.

That’s all, you can email the torrent file to your friends and ask them to run it on their torrent clients. All of your friends can download the file simultaneously but their download speed will depend on your upload speed.

The guide works best for users who have a static IP address. If you have a dynamic IP address, you will have to update the torrent tracker option manually each time your external IP changes. This can be done by right-clicking the torrent in uTorrent and selecting properties. Here update the tracking information. The same should be done when you switch your incoming port.



Conclusion

So that was how you can transfer GBs of files without using any file hosting service. As we are using a torrent file, all the rules followed by them apply here. The best thing about the process is that you can pause and resume the download and set file priority. The files will be transferred as long as all the devices are connected to the internet and uTorrent is running on them.

The Best Way To Send Text and Files From Browser To Android

Over the last few years, the openness of Android has enabled us to do all sorts of crazy things natively. Accessing root and playing around with the core system, something that’s frowned upon the other side of the pond.

While different services have enabled us to wirelessly send files, notes, share clipboard and even access notifications from PC, Pushbullet gives us all of that bundled in a neat little app with a fresh perspective towards sharing data between the phone and the PC.

You’ll need to download the Pushbullet app and also the corresponding extension for Google Chrome or Firefox. You’ll also need to sign up for an account, which you can do with your Google log in, which is the only way to enable the service. Once you’ve done that, Pushbullet will ask you if you want to mirror your notifications using the Chrome browser on your computer. This is an incredibly useful feature and works well in my testing. The notification mirroring is also customizable. You can disable mirroring for any app and you can also dismiss the notification right from your desktop.

How To Push Text and Files



To push anything from Chrome to Android, just click on the Pushbullet icon from the extensionbar. A neat little window will popup. In here you will find the link to the page you are currently visiting already filled in, or you can paste in something else entirely if you want. You can also add a note or a list, an address or even a file (as long as it’s less than 25MB).

Pushbullet is contextually aware, so any link that’s pushed to your phone’s notification bar opens directly in your default browser when tapped. Similarly, addresses open in Maps and files start downloading through Android’s Download Manager instantaneously.




To push anything from your Android phone to Chrome on your computer, fire up the Pushbullet app and tap the handy Pushbullet button with a + on the lower right corner. This will bring up a new menu. From here select your option, add some information, tap push and you are done!

Cool Tip: You may also try DeskNotifier to push Android notifications to your Windows desktop. That’s an interesting tool too.

The Good

History: Whether you are using the website or the Android app, Pushbullet always shows you ahistory of everything you’ve pushed through your devices. They stay here even after you’ve dismissed the notification. Pretty handy.



Push To Friend: Push to friend allows you to push data just like you do between your devices but with your friends. This can be useful to send directions or files directly to your friend without using email. But do make sure your friend isn’t a troll (I know, goes without saying).
The Really Good

Notification Mirroring : Apps like AirDriod use your IP address to connect your Android phone and PC. But because the data here passes though the Pushbullet servers, the notification mirroring is available even when your phone is using data instead of Wi-Fi. You can of course disable this feature and mirror only via Wi-Fi from settings.

Cloud Based Reminders: Sending notes and lists directly to the notifications bar is Pushbullet’s subtle feature. But once you start using it the right way, you start seeing its genius. When you push any kind of text through your browser, it stays there in your phone’s notification bar till you swipe it away. So if you have something important to do, just push it forward and it will stay there haunting you every time you pull down the notifications bar, which if you are a normal mobile user, is every 5 minutes.


The Bad

Pushbullet’s biggest feature is also its weakest. Pushbullet uses its own servers to send data and files even when all your devices are connected on the same network. While this feature gives you a good amount of flexibility, it also means that the 25MB file will take a couple of minutes to push between devices instead of a couple of seconds.
You Push?

You’ll find the word Push being used 15.6 jillion times (mathematically sound) across its services and throughout this article as well. But what we’d like to know is how you send small chucks of information from your PC to your phone and if you think Pushbullet will make your life a bit easier in this regard.