AVG Internet Security 9.0 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation AVG Internet Security 9.0. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel AVG Internet Security 9.0 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation AVG Internet Security 9.0 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation AVG Internet Security 9.0 devrait contenir:
- informations sur les caractéristiques techniques du dispositif AVG Internet Security 9.0
- nom du fabricant et année de fabrication AVG Internet Security 9.0
- instructions d'utilisation, de réglage et d’entretien de l'équipement AVG Internet Security 9.0
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage AVG Internet Security 9.0 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles AVG Internet Security 9.0 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service AVG en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées AVG Internet Security 9.0, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif AVG Internet Security 9.0, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation AVG Internet Security 9.0. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 Doc um e n t r e v is i o n 90 .31 (1 5. 11 . 2 01 0) C o p y r ight A V G T e c hno log ie s C Z , s .r.o . A ll r ights r e s e r v e d. A ll o ther tra d e ma r k s a r e the pr o pe rty o f their r e [...]

  • Page 2

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 Con t e n t s .. . . .. . . . .. . . .. . . .. . . .. . . .. . . .. . . . .. . . .. . . .. . . .. . . .. . . .. . . . .. . . .. . . .. . . .. . . .. . . .. . . . .. . . .. . . .. . . .. . . .. . . .. . . [...]

  • Page 3

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. 27 6.5 Ei c ar T e st .. . .[...]

  • Page 4

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. 50 8.7.2 F ire w al l P r of[...]

  • Page 5

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. 78 9.1.10 F ac eboo k .. . .[...]

  • Page 6

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. 12 8 10 .11 . 4 A nt i -S pa[...]

  • Page 7

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. . .. 19 0 12 .4.1 CMD S c an P a [...]

  • Page 8

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 1 . In t r od u cti on T hi s u se r m a nu al pr ovid e s c om pr e hensi ve doc um ent at i o n f or AVG 9 I ntern e t Sec ur i ty . C ongr atul a ti ons on y our pu r c hase of AVG 9 I n te r net S e c[...]

  • Page 9

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 2 . A V G I n sta l l a t i on R e qui reme n t s 2 . 1. Op er ati o n S y stem s Su p p or t ed AVG 9 I nter net S e c ur ity i s i nt e nded t o pr ot e c t w or k s t at i ons w i t h t h e f ol l ow i[...]

  • Page 10

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 3 . A V G I n sta l l a t i on Opti on s AVG c a n be i nst al led e i t her f r om t he i nst a l lat i on f i l e av a i l a bl e on y our i nst al l at i o n CD , o r yo u c an dow nl oa d t he l at [...]

  • Page 11

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 4 . A V G Dow n l oa d Man a ger AVG D ow nl oa d M a nager is a s i m pl e t ool t hat help s you s e l ec t t he pr oper i nst al l a t i o n f i l e f or t he t r ial v e r si on o f y our AV G pr od[...]

  • Page 12

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 4 . 2. Co n n ec t i v i ty Ch ec k I n t he nex t s t ep c a l l e d C onnec ti v ity c he c k , AVG D ow nl oa d M a nage r w i l l a t t e m pt t o es t abl i s h a n In t er net c onnec t i on s o t[...]

  • Page 13

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 · I f yo u a r e usi ng a Pr ox y c onnec t i on t o t he I nt e r net , c l i c k t he Pr ox y but t on t o spe c i f y yo ur P r ox y S e t ti ngs . · I f t h e c hec k has bee n s uc c e ss f ul , [...]

  • Page 14

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 spe c i f y t h e m m anual l y . Pl ea s e f i l l in t h e foll ow i ng dat a: · S e rv er - ent er a v ali d pr o x y s er v er nam e or IP a ddr e ss · P or t - pr ov i de t he r es pec t i v e po[...]

  • Page 15

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 5 . A V G I n sta l l a t i on P r ocess T o i nst al l AVG 9 I n te r net S ec ur i ty o n y our c om put e r , y ou nee d t o ge t t he l at e st i n s t al lat i on f i l e . Y ou c an use t h e in s[...]

  • Page 16

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 5 . 2. Li c en se Agr eem en t T he Li c e nse A gr e e m ent d i al og pr o vid e s t he f ul l w or di ng of t he AVG l i c e nse agr ee m ent . Pleas e read i t c ar e f ul l y a nd c onfir m t h at [...]

  • Page 17

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 5 . 4. Sel ec t In st al l ati on T ype T he S e lec t I n s ta l l at i on T y pe di a l og of f e r s t he c hoi c e of t w o i nst al l at i o n opt i ons: st andard and c ust om in st all at i on. F[...]

  • Page 18

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 Pr es s t h e N e x t but t on t o c ont i nue t he i nst all at i on pr oc e ss . I f i n t he pr e v i ous st e p y ou hav e s elec t ed t he st a nd ard i nst al l a t i o n, yo u w i l l b e r edi r[...]

  • Page 19

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 I f yo u w a nt t o c hang e t h i s l oc at i on, use t h e B r ow s e b ut t on t o di s pl ay t h e d r i v e st r uc t u r e, and se l ec t t he r es pec t i v e f ol der. Pr es s t h e N e x t but [...]

  • Page 20

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 be i nst al l ed as w ell . I f yo ur pur c hase d l ic ense i nc l udes t he A n ti - S pam , i t w i l l i n s t al led aut om at i c a l l y a s w e l l . · Rem ote A dmin i s tr at i on - if y ou p[...]

  • Page 21

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 5 . 9. AV G Sec u r i ty To ol b ar I n t he A V G S e c ur ity T oolb a r di a l og, de c i de w het her yo u w a nt t o i nst al l t h e A V G S e c ur ity T oolbar . If y ou do not c hange t h e de f[...]

  • Page 22

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 2 T he C lose dow n ope n a ppl i c a tion s di alog a ppear s du r i n g t h e i nst a l lat i on pr o c e ss onl y i n c as e t her e a r e s om e o t h er c l ashi ng pr ogr a m s r un ni ng o n y our [...]

  • Page 23

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 3 5 . 12 . Sc h ed u l e r e g u l ar sc an s an d u p d ates I n t he S c hedul e r e gul a r s c ans and update s di al og se t up t he i nt er v al f or new updat e f i l e s ac c e ss i bi l i t y c h[...]

  • Page 24

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 4 t h os e o f a c om put e r in a dom ain ( c o mpa ny net w or k , e t c . ). B a se d on t h e sel e c t ed c om put e r usage t ype t h e Fi rew all de f aul t r ul e s w il l be def i ned w i t h a d[...]

  • Page 25

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 5 Se l e c t t he c onn ec t i on t y pe t hat be st des c ri bes yo ur c om pu t er c o nn ec t i o n t o t he I nt e r net . Confir m y o ur se l ec t i o n by pr e s si ng t he N e x t but t o n a nd p[...]

  • Page 26

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 6 6 . A ft e r Inst al la t i on 6 . 1. Sc an o p ti mi zati o n T he sc anni ng o pt im i zat i on f u nc t i onal i t y s ea r c hes t h e W i ndow s a nd P r o gra m f i l e s f ol der s w here i t de [...]

  • Page 27

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 7 · f r om A V G S e c u r i ty T ool bar v i a o pt i on Laun c h A V G 6 . 4. Sc an n i n g of t h e w h ol e c omp u t er T her e i s a pot ent i a l r i sk t h at a c om put e r vir us has b ee n t r[...]

  • Page 28

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 8 6 . 6. AV G D efau l t Con fi g u rati o n T he def a ul t c onf i gu r at i on ( i.e. how t h e appl ic at i on i s s e t up r i gh t a f t er in st al l at i on ) o f AVG 9 I nter net S e c ur ity i s[...]

  • Page 29

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 9 7 . A V G U ser Int e rface AVG 9 I nter net S e c ur ity open w i t h t h e m a i n w i nd ow : T he m a i n w i ndow i s di v i ded i nt o se v eral s e c t i ons: · S y ste m M e nu (t op sy s t em [...]

  • Page 30

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 0 i n di c at e s t he AV G c ur r ent st at us - de t ai ls > > 7 . 1. Sy stem M en u T he S y ste m me nu i s t he s t andar d nav i gat i on use d in al l Wi nd ow s appl i c at i ons. I t is l o[...]

  • Page 31

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 1 · Res i de nt S hi e ld - ope ns t h e def aul t pa ge of t he Re sident S hi eld c om ponent · U pdate Manage r - ope ns t h e d ef aul t pa ge of t he U pdate M ana ger c om ponent 7 . 1.3. H i stor[...]

  • Page 32

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 2 f r om t he I nt e r net ; y our c om put er i s c onnec t ed t o a net wor k w i t h no a c c e ss t o t h e In t er net , et c . ). In t he new l y opened w i ndow s elec t t he f ol der w her e yo u [...]

  • Page 33

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 3 depi c t ed i n t hi s se c t i on, and t hei r m ea ni ng: T he gr e e n i c o n i ndi c a t es t h at y our A VG i s f ul ly f un c t i onal . Y our c o m put er is c om pl et ely pr ot ec t e d, up t[...]

  • Page 34

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 4 7 . 3. Qu i c k L i n ks Qui c k l in k s (i n t he l ef t s ec t i o n of t he A VG User In t er f ac e ) all ow y ou t o i m m edi at e l y ac c e ss t he m o st i m port a nt a nd m ost f r e qu e nt[...]

  • Page 35

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 5 · A n ti - S pam c hec k s a l l in c om i ng e - m a i l m es sa ges and m a r k s un w ant ed e - m ail s as SPA M - det a i ls > > · F i r e w a l l c o nt rol s how y our c om put e r ex c h[...]

  • Page 36

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 6 7 . 5. Stat i sti c s T he S t at i stic s se c t i on i s l oc at ed i n t he l ef t bot t om pa r t of t he AV G User I nt er fa c e . I t of f e r s a l i st of i nfo r m a t i on r egardi ng t he pr[...]

  • Page 37

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 7 · Open A V G U s e r I n te r f ace - c l i c k t o o pen t he AV G User I nt er fa c e · S c a ns - c l ic k t o ope n t he c o nt e x t m enu o f pr e def in ed s c a ns ( S c a n W hol e Com pu t e[...]

  • Page 38

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 8 8 . A V G Compone n t s 8 . 1. An ti - V i r u s 8 . 1.1. An t i - V i r u s Pr i n c i p l es T he ant i v i r us sof t wa r e's sc anni ng e ngi ne s c ans al l f i l es and f il e ac t i v i t y[...]

  • Page 39

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 9 8 . 1.2. An t i - V i r u s In terf ac e T he A n ti - V i ru s c om pone nt 's i nt er f ac e pr ov i des s om e bas i c i nfo r m a t i on on t h e c om ponent ' s f un c t i onal i t y, in [...]

  • Page 40

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 0 Cur r ent l y , t h e m os t c om m on s our c e of i nfe c t i on is w ebsit e s w it h pot ent i all y danger ous c ont ent . Ot h er m et hods of t r ansm i ss i o n, suc h as v i a e - m a i l o r t[...]

  • Page 41

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 1 T her e i s ju st one o per at i ng but t on av ail abl e w it hi n t hi s c om ponent ' s i nt e r fa c e ( B ac k ) - pr e s s t he but t on t o r e t ur n t o t he de f aul t AV G use r i nt e r[...]

  • Page 42

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 2 c om ponent ' s f un c t i onal i t y, in f or m a t i o n on i t s c ur r e nt s t at us ( A nt i-S pam c om ponent is ac t i v e . ) , a nd t he f ol l ow i ng st at i st i c s : · Da ta ba se r[...]

  • Page 43

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 3 8 . 4.2. An t i - R o otki t In ter fac e T he A n ti - Rootk i t u se r i nt er f ac e pr o vid es a b r i e f de sc r i pt i on of t he c o m ponent ' s f un c t i onal i t y , in f or m s on t h[...]

  • Page 44

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 4 · S e a rc h for r oo tk its - s i nc e t he r oot k it s c a n is not a n im pl ic i t par t of t he S c a n of the w hol e c om pu te r , yo u c an r un t he r oot k i t s c a n di r e c t l y f r om[...]

  • Page 45

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 5 · Ba c k - pr es s t hi s but t on t o ret u r n t o t he def a ul t AVG use r i nt e r f ac e ( c om ponent s ov e r v i ew ). 8 . 6. Sy stem T oo l s S y ste m T ools r ef e r t o t ool s of f e r i [...]

  • Page 46

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 6 T he P r oc e s s e s di alog c ont a i ns a l i st of pr oc es se s ( i .e . runn i ng appl i c at i ons ) t hat a r e c ur r e nt ly ac t i v e on yo ur c o m put er . T he li st i s di v i ded i nt o[...]

  • Page 47

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 7 8 . 6.2. N etw or k Co n n ec t i o n s T he N et w ork C onnec ti ons di al og c ont ai ns a li st of c ur rent l y ac t i v e c onnec t i ons. T he l i s t i s di vi ded i nt o t he f ol l o w i n g c[...]

  • Page 48

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 8 C ontr ol buttons T he c ont r o l but t o ns av ail abl e ar e: · T e r min at e C onnec ti on - c l os es one or m or e c onnec t i ons se l ec t ed i n t he l i st · T e r min at e P r o c e s s - [...]

  • Page 49

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 9 W e stron gl y s ug ge st n ot to delete any appl i c ations f r om th e l i s t, un l es s y ou are abs olu te l y sur e th at they r e pres ent a r e al t hr e a t! 8 . 6.4. B ro w ser Exten s i on s [...]

  • Page 50

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 0 8 . 6.5. LS P V i e w er T he LS P V i ew e r di a l og s how s a l i s t of Lay ered S er v i c e Pr ov i der s ( LSP). A Lay e red S ervic e P r ov id e r (LSP) is a s y st em dr i v e r l in k e d i [...]

  • Page 51

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 1 t h e i nt ru der ac c e s s t o t he c o m put er . F i r ew all i s c onf i gur ed t o all ow or deny i nt er nal /ex t er nal c om m un i c at i on (bot h w ay s , in or out ) t hr o ug h de f i ned [...]

  • Page 52

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 2 c ov e r ed by t h e respe c t i ve pr of i l e s . In shor t , a F i r ew a l l pr o f i l e i s a spe c i f i c c onf i gu r at i on o f F i r e w a l l c o m ponent , a nd y ou c an use a num ber of [...]

  • Page 53

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 3 pr o f i l e . Y ou c an as sig n pr of il es t o all l oc a l net wo r k i nt e r f ac es or areas and s pec i f y fur t her se t t i ngs i n t he A r e a s a nd A dapte r s P r of i l e s di alog, whe[...]

  • Page 54

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 4 pr o f i l e s - t wo pr o f i les a r e a va i l a bl e a t a l l t i m e s ( t he def a ul t pro f i l e s n am ed A l low al l and B l oc k a l l ), ot her p r of i l es w er e added m anual ly by pr[...]

  • Page 55

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 5 8 . 8. E -mai l Sc an n e r On e o f t h e m o st c o m m on sour c e s o f vir use s a nd t r o j ans i s vi a e - m a i l . P hi shi ng and spam m ak e e - m ai l an ev e n gr ea t er so ur c e of ri [...]

  • Page 56

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 6 8 . 8.2. E -mai l Sc an n er I n t er f ac e I n t he E- ma i l S c a nn er c om ponent ' s di a l og yo u c an f i nd a br i ef t ex t de sc r i bi ng t he c om ponent ' s f un c t i onal i t[...]

  • Page 57

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 7 yo ur a c c oun t shoul d be s c a nn ed f o r vi r use s . B y def a ul t , t h i s i t em i s of f . · Displ ay notif ic at i on ic on w hi le E- m a i l i s bein g sc anned - c hec k t h e i t em t [...]

  • Page 58

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 8 8 . 8.3. E -mai l Sc an n er D et ec ti on I n t he E- ma i l S c a nn er de te c ti on di a l o g ( ac c e ss i bl e v i a s ys t em m e nu opt i on H ist or y / E-ma i l S c anner det e c t i on ) yo [...]

  • Page 59

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 9 · Refr e s h li s t - updat es t h e l i st of de t ec t e d t hr e at s · Ba c k - s wit c hes y ou bac k t o t he pr ev i ousl y di spl ay e d di a l og 8 . 9. I D Pr o tec ti o n A V G I de nti ty [...]

  • Page 60

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 0 Ba sic com ponent co nf ig ur a tion I n t he bot t om part of t he di a l og yo u w i l l f i nd t he I denti ty P rotec ti on se ttin gs sec t i o n w her e y ou c a n e di t s om e e l em ent ar y f [...]

  • Page 61

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 1 C ontr ol buttons T he c ont r o l but t o ns av ail abl e wit hi n t he I denti ty P r ote c ti on i nt er f ac e a r e a s f o l l o ws : · S a v e c h a nges - pr es s t hi s but t on t o sa v e a n[...]

  • Page 62

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 2 r enew y our li c e nse . T he li c e nse r enew a l c an be pe r f or m e d onl in e on AVG w ebs i t e . · N u m ber of s e a ts - how m a ny w or k s t at i ons on whi c h yo u a r e e nt it l e d t[...]

  • Page 63

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 3 bl o c k ed by A V G A c ti v e S ur f- S hi e l d onc e y ou t r y t o v i sit i t . N ote : A V G Li nk S c a nn er is not i nt e nded f or s er v e r pl at f or m s! 8 . 11 .2. L i n k Sc an n er I n[...]

  • Page 64

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 4 S e a rc h t o f e ed t he dat abas e c ol l e c t i ng i nfo r m a t i on on m a l i c i ous ac t i v i t y o n t he w eb. 8 . 11 .3. A V G Sear c h -Sh i el d When se arc h i ng I nt er n e t w i t h [...]

  • Page 65

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 5 Ve r i Si gn Sea l B es i des t h e a bov e li st e d A V G S e arc h S hi e ld v erd i c t i c ons, y ou c an also se e t h e V e r i S ign ic on i n y our br ow s er . H ow e v er, t h i s i c o n di [...]

  • Page 66

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 6 8 . 12 .1. On l i n e Sh i el d Pr i n c i p l e s Onl in e S hi e ld i s a t ype o f a r e al t i m e r es i de nt prot e c t i on; i t s c a ns t he c ont ent of visi t e d we b pages (a nd pos si bl [...]

  • Page 67

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 7 o Onl in e S hi e ld - t hi s opt i on c onfir m s t hat t he Onl i n e S hi e l d shoul d per f or m sc anni ng of t he w w w page s c ont ent . Provi ded t hi s opt i on i s on ( by de f aul t ), y ou[...]

  • Page 68

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 8 Ø Max imum f i l e size to b e s c a nn e d - i f i n c lu ded f i l e s ar e pr e se nt i n t h e d i spl ay ed pa ge y ou c an also sc an t hei r c ont ent e v en bef o r e t hese ar e downl oade d t[...]

  • Page 69

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 9 C ontr ol buttons T he c ont r o l but t o ns av ail abl e wit hi n t he Onl in e S hi e ld i nt e r f ac e ar e as f oll ow s : · S a v e c h a nges - pr es s t hi s but t on t o sa v e a nd appl y a [...]

  • Page 70

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 0 via sy st e m m e nu History / Onl i ne S h i e l d f in di ng s . F or e ac h det e c t ed o bj e c t t he f ol l ow i ng i nform at i on is pr ov id ed: · I n f e c tion - de sc r i pt i on ( pos s i[...]

  • Page 71

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 1 i nterf a c e ( c om ponent s ov ervi ew ). 8 . 13 . Resi d e n t Sh i e l d 8 . 13 .1. Re si d en t S h i el d Pr i n c i p l es T he Res i de nt S hi e l d c o m ponent gi v es y our c om put e r c on[...]

  • Page 72

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 2 · T hr e a ts de te c t ed and bloc k e d - num ber of de t ec t e d in f ec t i o ns t h at w e r e pr e v ent ed f r om bei ng r un /ope ned ( i f ne ede d, t hi s va l ue c a n be re se t ; e. g. f [...]

  • Page 73

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 3 · C a nc e l - pr es s t hi s but t on t o r et ur n t o t he de f aul t A V G use r i nterf a c e (c o m ponent s ov e r view) 8 . 13 .3. Re si d en t S h i el d D et ec ti on Res i de nt S hi e ld sc[...]

  • Page 74

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 4 · G o to fi le - t hi s opt i o n r e di r e c t s y ou t o t h e ex ac t loc at i on o f t h e suspi c i ous obj ec t ( opens ne w W i ndow s Ex pl or e r w i nd ow ) · I gn or e - w e s t r i c t l [...]

  • Page 75

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 5 · P r oc e s s - w hat a c t i on wa s p erform ed t o c al l out t he pot ent i all y danger ous obj ec t so t hat i t c oul d be d et e c t ed I n t he bot t om part of t he di a l og, under t he li [...]

  • Page 76

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 6 8 . 14 .2. Up date M an ager In t er fac e T he U pdate Manage r ' s i nt er fa c e di spl ay s in f or m a t i o n a bout t he c o m pone nt 's f un c t i onal i t y and it s c ur r e nt s t [...]

  • Page 77

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 7 o A t a spe c if ic ti m e - def i ne t he ex ac t da y t i m e t he updat e shoul d be laun c hed B y de f aul t , t he up dat e is se t f or ev e r y 4 hou r s. I t i s hi ghl y r e c om m ended t o k[...]

  • Page 78

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 8 9 . A V G S e curi ty Tool bar A V G S e c ur i ty T ool bar is a new t ool w hi c h w ork s t oget her w i t h t he A V G L i nk S c anner c om ponent . A V G S e c ur ity T oolb a r c a n be used t o [...]

  • Page 79

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 9 · He l p - pr ovides opt i ons t o open t he hel p f il e, c ont ac t AVG t ec hn i c al s upp or t , se nd y our produ c t r el at ed f e e dbac k , or v i ew t he det ail s of t he c ur r ent v e r s[...]

  • Page 80

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 0 9 . 1.4. AV G N ew s D i rec t l y f rom w i t h i n t he A V G S e c ur i ty T ool bar , t hi s but t o n ope ns an ov ervi ew of t he l at es t H e adli ne n e w s r elat ed t o A VG , bot h new s f r[...]

  • Page 81

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 1 o Button na me - y ou have t he opt i o n t o c hange t he but t on nam e as i t w il l be di spl ay ed w i t hi n A V G S ecu ri ty T oolbar o S how me s sa ge s - c hange t he des i r e d nu m be r of[...]

  • Page 82

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 2 · - c li c k t hi s but t o n t o c l ose t he c ur rent ly opened new s ov ervi ew 9 . 1.6. AV G I n fo T he but t on pr ov i des l i nk s t o i m port a nt s ec ur it y i nform at i on rel a t ed t o[...]

  • Page 83

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 3 9 . 1.7. D el ete h i st o r y U si ng t hi s bu t t on y ou c an delet e t he hi st ory of y our br ow s er j ust l ik e v i a t he A V G l ogo - > De l e te hi s to r y opt i o n. 9 . 1.8. E -mai l[...]

  • Page 84

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 4 · Res e t S et ti ngs - Qu i c k l y rem ov e s t he a bove e nt e r ed e - m ai l addr e s s de t ai l s . · C hec k f o r new e- ma i l s e v e r y .. . mi nu te s - D e f i n e t h e t i m e i nt e[...]

  • Page 85

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 5 · F ahr e nh eit / C e lsi us c o nve rter - i n t he upper ri ght - hand c o r ne r o f t he i nf o panel yo u c an c hose be t we en t he F ahr enhei t a nd Celsi us sc a l e s . B a se d on yo ur s [...]

  • Page 86

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 6 T he F ac e book c onn ec t i o n has bee n a c t i va t ed. T he Fac e book but t o n w i t h i n A V G S e c ur ity T oolbar u now of f e r s t he st andar d F ac e book m enu opt i ons: 9 . 1.11 . V [...]

  • Page 87

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 7 w hi c h c o m bi nes s om e t h i ng y ou k now ( suc h as yo ur use r nam e and pas sw or d ) w it h so m e t hi ng uni que t h at onl y y ou c a n ge ner at e i nst ant aneousl y be f or e l o ggi ng[...]

  • Page 88

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 8 A V G S e c ur i ty T ool bar V e ri S i gn but t on t o v i e w y our VI P c r ede nt ial . V I P c r e de nti a l i s a uni que i dent ifi e r c onsist i ng of 12 alp hanu m e r i c c har a c t e r s [...]

  • Page 89

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 9 9 . 2. AV G Sec u r i ty To ol b ar Opti on s Al l A V G S e c ur i ty T ool bar param e t er s c onf i gur at i o n i s a c c e ss i bl e di rec t l y w i t hi n t he A V G S e c ur i ty T ool bar pane[...]

  • Page 90

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 0 D el et e se arc h hi s t or y, D elet e br o w se r hi s t or y , D el et e dow nl oa d hi st ory, o r D el et e c oo k ies di r e c t l y f r om t h e AVG Se c ur it y T oo l ba r pa nel · E- ma i l [...]

  • Page 91

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 1 9 . 2.3. T ab S ec u r i ty T he S e c ur ity t ab i s di vid ed in t o t w o s ec t i o ns, A V G Br o w s e r S e c ur ity and Ra ti ngs , w her e y ou c a n m ar k s pec i f i c c he c k - box e s t [...]

  • Page 92

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 2 un l es s y ou hav e a r e a l r e as on to c hange i t. 9 . 2.4. T ab VI P T hi s t a b a l l o w s y ou t o se t t h e V e ri S i gn I denti ty P rotec ti on par am et ers. F i r st dec i de w het h e[...]

  • Page 93

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 3 I n t he bot t om s ec t i o n of t he pane l y ou c a n s e e a nd ac t i v a t e t he Don' t rem i nd me again i n t hi s W e b site opt i on - if m ark ed, t h e nex t t i m e y ou ent er t he s[...]

  • Page 94

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 4 9 . 2.5. T ab A d v an c ed Op ti o n s On t h e A dva nc e d Opti ons t ab f i r st se l ec t w hat s ea r c h e ngi ne y ou w ant t o use as def a ul t . Y ou hav e t he c hoi c e of A VG S e c ure S [...]

  • Page 95

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 5 1 0 . AV G A dv an ce d S et t i n gs T he adv anc e d c onf i gu r at i on di al og of AVG 9 I nte r net S e c ur ity opens i n a new w i ndow nam e d A dv anc e d A V G S e tti ngs . T he win dow i s [...]

  • Page 96

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 6 appl i c at i on t o a not h er l angu age y ou hav e t o r es t ar t t he user i nt e r f ac e ; f ol l ow t hese st eps : · Se l e c t t he des i r ed l angu age of t he appl i c at i on and c onf i [...]

  • Page 97

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 7 o Displ ay Re s i dent S h i eld relate d tr a y noti f i c a tion s - dec i de w het her i n f orm at i on r e gar di ng f il e sa vin g, c opyin g, and openi ng pr oc e ss e s s hou l d be di spl ay e[...]

  • Page 98

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 8 T hen, se l ec t t h e respe c t i ve e ve nt f r om t he l ist a nd br ow se ( Brow s e ) y our di sk f or an appr opr iat e so un d y ou w ant t o a ss i gn t o t hi s e v ent . T o li s t en t o t he[...]

  • Page 99

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 9 1 0.3. Ig n or e F au l ty Con d i t i o n s I n t he I gn or e f aul ty c om ponents c ondi t i ons di a l og yo u c an t i c k t hose c o m ponent s t h at y ou do not want t o ge t in f or m e d abou[...]

  • Page 100

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 0 m ig ht appear . F or t hi s s i t u at i on, w i t hi n t he abov e di al og yo u c an se l ec t c om ponent s t h at m ay be in an err or st a t e ( or s w i t c hed of f ) a nd y ou do not w i sh t[...]

  • Page 101

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 1 · A l w a y s pr o mpt ( on by def a ul t ) - w hen a t hr e at i s de t ec t e d, y ou w i ll be a sk ed w het h er i t shoul d be m ov e d t o quar ant i ne t o m ak e s ur e no appl i c at i ons y[...]

  • Page 102

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 2 T he A l low e d l i st pr o vid es t he f ol l ow i ng i nform at i on on e ac h a ppl i c a t i on: · Lev e l - gr aphi c al i dent i f i c a t i o n of t he respec t i v e pr oc e ss s ev e r it y[...]

  • Page 103

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 3 o F i l e - t ype t h e f ul l pat h t o t he f i l e ( a ppl i c a t i o n ) t hat yo u w ant t o m a r k as an ex c e pt i on o C hec k s um - di spl ay s t h e un i que 'si gn at ur e ' o[...]

  • Page 104

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 4 1 0.5. V i r u s V au l t T he V i r us V aul t main te nanc e di al og al l ow s y ou t o def in e s ev e r al par am et e r s r egard i ng t he adm i ni st r at i o n of obj e c t s s t or ed i n t [...]

  • Page 105

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 5 . If y ou w i sh t o k ee p suc h a pr ogr am on yo ur c o m put er , y ou c a n de f i ne i t a s a pot ent i all y un w ant ed progr am e x c ept i on: T he P ote nti all y U nw a nted P r ogr am s [...]

  • Page 106

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 6 t h e ex c ept i on' s par am et e r s · Rem ov e - de l et es t he se l ec t ed i t em f r om t he l i st of e x c e pt ion s · A dd e x c e pti on - open an edi t i ng di a l og where y ou c [...]

  • Page 107

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 7 1 0.7.1. S etti n g s I n t he A n ti- S pam basic se tti ngs di a l og yo u c an c hec k / un c hec k t he T ur n on A n ti - S pa m pr o te c t i on c hec k box t o a l l o w /f or bi d t he ant i -[...]

  • Page 108

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 8 · V alu e 50 - 5 9 - Ve r y aggr es si v e c onf i gur at i o n. N o n- spam e- m ail m es sa ges are as l i k ely t o be c augh t as r ea l s pam m es sa ges . T hi s t hr e shol d rang e i s not r [...]

  • Page 109

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 9 T her e a r e t he f ol l ow i ng opt i o ns t o c hoos e f rom : · A s pe c if ic e- ma i l c li e nt - i f y ou use one o f t he l ist ed e- m a i l c l ient s ( MS Ou t l oo k , Out l ook Ex pr es[...]

  • Page 110

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 0 I n t hi s di a l og, pl ea se s el e c t t h e f ol der w i t h t h e m e ss age s y ou w ant t o use f or t r ai ni ng. Pr es s t h e A dd f ol der but t o n t o l oc at e t he f old e r wi t h t he[...]

  • Page 111

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 1 N ote : In c a se of Mic r oso f t Of f i c e Ou t l o ok , y ou w i l l be pr om pt ed t o s elec t t h e MS Off i c e Out l ook pr of i l e f irs t . I n t he F old e r s c onta i n dr op- dow n m e[...]

  • Page 112

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 2 I n t hi s di a l og, y ou c a n s et f i l t er i ng of t he e- m a i l m e ss age s. I f yo u a r e s ur e t h at t he se l ec t ed f ol der c ont a i ns onl y m es sa ges y ou w a nt t o use f or t[...]

  • Page 113

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 3 1 0.7.2. Per fo r m an c e T he Engi ne perf orma nc e se tt i ng s di a l og ( l i nk ed t o v i a t he P erf o r ma nc e i t em of t he l ef t navig at i on ) of f e r s t he A n ti- S pam c om pone[...]

  • Page 114

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 4 onl y be d one by ex pert us ers! 1 0.7.3. RBL T he RBL i t em open an edi t i ng di a l og c all e d Re a l ti m e Bl ac k hol e Li s ts : I n t hi s di a l og yo u c an sw i t c h o n/of f t h e Qu [...]

  • Page 115

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 5 N o personal da ta i s se nt to th e se rv er! 1 0.7.4. W h i tel i st T he W hi te li s t i t em opens a di alog nam ed A ppr o v e d e - m a i l s ende r s l ist wi t h a gl obal l i s t of appr ov [...]

  • Page 116

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 6 by pr es sin g t hi s but t on. A l l rec ord s w il l be s av ed t o a pl a i n t ex t f il e . · I mpor t - if y ou a l r ea dy hav e a t ex t f il e o f em a i l a ddr e ss es /dom ai n nam e s pr[...]

  • Page 117

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 7 · Edi t - pr es s t hi s but t on t o open a di alog, w her e y ou c a n m anual ly ent er a li st of a ddr e ss es ( y ou c a n a l s o use c opy a nd pas t e ). In se r t one it e m ( se nder , dom[...]

  • Page 118

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 8 1 0.8. O n l i n e S h i el d T he Onl in e S hi e ld di al og all ow s yo u t o a c t i va t e/de ac t i v at e t h e e nt i r e Onl i ne S hi e ld c om ponent v i a t he Enable O nl in e S hi e l d [...]

  • Page 119

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 9 1 0.8.1. W eb Pr o tec t i o n I n t he W e b P rotecti on di a l og yo u c an edi t t h e c om ponent ' s c onf i gu r at i on regar di ng t h e sc a n of t he w e bsi t e c ont e nt . T he edi [...]

  • Page 120

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 0 har m l es s w hen a c qui r ed f rom t he m a nu f ac t ur er di r ec t l y , bu t c a n be m isused f or m al i c i ous pur pos es l at er. T hi s i s a n addi t i onal m ea sur e t hat i n c reas e[...]

  • Page 121

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 1 1 0.8.2. In stan t Messag i n g I n t he I n s ta nt Mes s a gi n g S hi e l d dial og y ou c a n e di t t he Onl in e S hi e l d c om ponent s se t t i ngs r ef e r r i ng t o in st ant m e ss agi ng[...]

  • Page 122

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 2 1 0.9. L i n k Sc an n er T he Li nk S c a nn er s e ttin gs di alog all ow s yo u t o s w i t c h on/of f t he e l em ent ar y f e a t u r es of t he Li nk S c a nn e r : · Enabl e A V G S e a r c h[...]

  • Page 123

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 3 1 0.10 . S c an s T he adv anc e d s c an se t t i ngs i s di vid ed i nt o f o ur c a t egori es r ef e r r i ng t o spe c i f i c s c a n t ypes a s de f i ned by t he sof t w are v endor : · S c a[...]

  • Page 124

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 4 Sca n s e ttin gs T he S c a n s e ttin gs sec t i on of f e r s a l i s t of s c a nn i ng par am et e r s t hat c an be opt i onal l y sw i t c hed on/of f : · A u tom a ti c a ll y hea l/r e m ov [...]

  • Page 125

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 5 i n s t anc e s om e pl a i n t ex t f il es , or s om e o t h e r non-ex e c ut abl e f i l es ), i nc l udi ng m e di a f i l es ( v i deo, audi o f i l e s - i f yo u l e av e t hi s box un c hec k[...]

  • Page 126

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 6 T he l i s t of par am e t er s i s i de nt ic al t o t h os e a v ai l abl e f o r t he S c a n o f the w h ole c o mputer . H o w ev e r , t he def a ul t se t t i ngs di f fe r ( f or i nst anc e ,[...]

  • Page 127

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 7 Al l pa r am et ers se t up i n t hi s c onf i gu r at i on di al og appl y on l y t o t he a r e as s elec t ed f or sc anni ng w i t h t he S c a n of s pe c if ic f i l e s or f ol de r s ! N ote :[...]

  • Page 128

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 8 1 0.10 .4. Rem ovab l e Devi c e Sc an T he edi t i ng i nt er f ac e f or Rem ov a ble de v i c e sc an i s also v ery sim i l a r t o t he S c a n W hol e Co mpute r edi t i ng di alog: T he Rem ov [...]

  • Page 129

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 9 · Pr ogr am upd at e sc hedul e · Ant i - Spa m updat e s c hedul e 1 0.11 .1. Sc h edu l e d Sc an Pa r a m et ers of t he sc hedul e d s c a n c an be e di t ed ( or a new sc hedul e se t up ) on [...]

  • Page 130

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 0 Ex am pl e: I t i s not a ppr opr i at e t o c al l t h e s c an by t he nam e o f "N e w sc an" or "M y sc an" sin c e t h e se nam es do not r e f e r t o w hat t he s c a n ac t[...]

  • Page 131

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 1 On t h e How to s c a n t a b y ou w i l l f i nd a l ist o f sc anni ng param e t er s t hat c a n be opt i onall y sw i t c hed on/of f . B y def a ul t , m os t pa r a m et ers ar e sw i t c hed on[...]

  • Page 132

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 2 m a r k t o de t ec t e x t ended pac k a ge of spyw are : pr ogr a m s t hat a r e pe r fe c t l y ok and harm l e s s w hen ac qui r ed f r om t h e m a nu f ac t u r er di r e c t l y , b ut c an b[...]

  • Page 133

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 3 Wi t h i n t he S c a n pr oc es s pr i or i ty s e c t i on y ou c a n f ur t h er s pec ify t he des i red sc anni ng spe ed depe ndent o n s ys t em r es our c e usage. B y def a ul t , t hi s opt [...]

  • Page 134

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 4 On t h e Wha t to sc a n t ab y o u c a n de f i ne w het h er y ou w ant t o s c hedul e s c anni ng o f t h e whol e c om pu t er or sc anni ng o f spe c ifi c f il es or f old ers . If y ou se l ec[...]

  • Page 135

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 5 1 0.11 .2. V i ru s D atabase U p d ate Sc h edu l e On t h e S c hedul e se ttin gs t a b y ou c a n f ir st c hec k /un c hec k t he E nabl e thi s ta sk i t em t o si m pl y dea c t i va t e t he s[...]

  • Page 136

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 6 T hi s sec t i on all ow s yo u t o de f i ne un der w hi c h c o ndi t i o ns t h e v i r us dat abas e updat e shoul d/s houl d not b e l aunc hed i f t he c om put e r i s i n l ow pow e r m ode or[...]

  • Page 137

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 7 as t h e need a r ises . I n t h e t e x t f i eld c a l l e d N am e ( de ac t i v at e d f o r all def a ul t sc hedul e s ) t her e i s t he nam e a ss i gned t o t hi s v er y sc hedul e by t he p[...]

  • Page 138

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 8 1 0.11 .4. An ti -Spa m Up d ate Sc h edu l e On t h e S c hedul e se ttin gs t a b y ou c a n f ir st c hec k /un c hec k t he E nabl e thi s ta sk i t em t o si m pl y dea c t i va t e t he s c hedu[...]

  • Page 139

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 9 Adv anc e d s c hedul e opti ons T hi s sec t i on all ow s yo u t o de f i ne un der w hi c h c o ndi t i o ns t h e A nti - S pam upd at e shoul d/s houl d not b e l aunc hed i f t he c om put e r i[...]

  • Page 140

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 0 T he E- ma i l S cann er di alog i s di v i de d i n t o t hr e e s ec t i o ns: · E- ma i l scann i ng - i n t hi s se c t i on, y ou c a n s e t t hes e bas i c s f or i nc om i ng and/ or out g oi[...]

  • Page 141

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 1 Sc a nn e r de t ec t i on di al og: o Report pa s sw or d pr ote c t ed ar c h i v e s – a r c hi v e s ( ZI P, R AR et c . ) t hat ar e pr ot e c t e d by pas sw ord are not pos sib l e t o s c a [...]

  • Page 142

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 2 1 0.12 .1. Certi fi c at i o n I n t he C e rti fi c a ti on di a l o g y o u c a n s pec i f y ex a c t l y w hat t ex t t he c e r t i f ic at i o n not e shoul d c ont a i n, and i n w hat lang uag[...]

  • Page 143

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 3 1 0.12 .2. Mai l Fi l teri n g T he A ttac hme nt f il t e r di a l og a l l ow s y ou t o se t up par am e t er s f o r e - m ail m es sa ges at t ac hm e nt s c a nn i ng . B y de f aul t , t he Rem[...]

  • Page 144

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 4 1 0.12 .3. L og s an d Resu l ts T he di a l og opened v i a t he Logs a nd Res ul ts n av i gat i on i t em all ow s yo u t o s pec ify par am et e r s f or e - m a i l s c anni ng r es ul t s m a i [...]

  • Page 145

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 5 I n t hi s di a l og (opened v i a S erv e r s / POP 3 ) yo u c an se t up a new E - mail S c anner se r ve r usi ng t he POP3 pr ot oc o l f or i nc om i ng m ai l : · P OP 3 S e rv er N a m e - i n[...]

  • Page 146

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 6 l ogi n nam e . o F i x e d host - I n t hi s c a se , t h e pr ogr am w i l l a l w a ys use t h e se r ve r spe c i f i ed her e. P l e a se spe c i f y t he addr e s s or nam e o f yo ur m ai l se [...]

  • Page 147

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 7 I n t hi s di a l og (opened v i a S erv e r s / S MT P ) y ou c a n s e t up a new E- ma il S c a nn e r se r ve r usi ng t he SMT P pr ot oc ol f or out goi ng m ail : · S MT P S e rve r N a me - i[...]

  • Page 148

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 8 st andar d por t f or SM T P c o m m un i c a t i on i s 25. · A dd i tion al se ttin gs - spe c i f i es m o r e de t ai l e d par am et e r s: o Loc a l por t - s pec ifi e s t he por t o n w hi c [...]

  • Page 149

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 9 1 0.13 . Re si d en t S h i el d T he Res i de nt S hi e ld c o m ponent pe r f or m s l i ve pr ot ec t i on of f i l es and f o l der s a gai nst vir use s, spy w are and o t h er m al w are. I n t [...]

  • Page 150

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 0 · Report e nhanc e d se t of P o te nti a ll y U nw a nted P r ogr a ms - m ark t o det ec t ex t ended pac k age of s pyw are : pr ogr a m s t hat a r e pe r f ec t l y o k a nd har m less w hen a c[...]

  • Page 151

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 1 1 0.13 .1. Advan c ed Set ti n g s I n t he F i l e s sc a nn ed b y th e Res id e nt S hi e ld di a l og i t i s po ss i bl e t o c onf i gu r e w hi c h f i l e s wil l be s c a nn ed ( by spe c ifi[...]

  • Page 152

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 2 1 0.13 .2. D i rec tor y Exl u des T he Res i de nt S hi e ld - D i r e c t or y Ex c lu de s di alog of f e r s t he pos si bi l it y of de f i n i ng f ol der s t hat shoul d be e x c l uded f rom t[...]

  • Page 153

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 3 1 0.13 .3. Ex c l u ded Fi l es T he Res i de nt S hi e ld - E x c l ud e d f i l e s di al og behav e s ju st l i k e t h e previ ousl y des c r i bed Res id e nt S hi e ld - D i r e c t or y Ex c l [...]

  • Page 154

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 4 1 0.14 . Cac h e Server T he C a c h e S erve r i s a pr oc e ss des i gned t o s pee d up any sc an ( on-dem a nd s c a n, sc hedul e d w hol e c om put e r s c a n, R es i dent S h i eld sc an ). I [...]

  • Page 155

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 5 1 0.15 . A n t i - Roo tki t I n t hi s di a l og yo u c an edi t t he A nti - Rootk it c om ponent ' s c onf i gur at i on: Edi t i ng of all f un c t i ons of t he A nti - Rootk it c om ponent [...]

  • Page 156

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 6 1 0.16 . Up date T he U pdate nav i ga t i on i t em opens a new di a l og w her e y ou c a n s pec ify general par am et e r s r ega r din g t he AVG updat e : W he n to u pdate f il e s I n t hi s s[...]

  • Page 157

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 7 · Res ta r t i m me diate l y - t he c om pu t er w i l l be r e st ar t ed aut om a t i c all y i m m edi at e l y a f t er t he up dat e pr oc es s h as f i n i shed, and y our appr ova l w i ll no[...]

  • Page 158

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 8 1 0.16 .1. Pr o xy T he pr o x y s er v er i s a st and- alon e s e r v e r or a s ervi c e r un ni ng on a P C t h at guar a nt ees sa f er c onn ec t i on t o t he I nt e r net . Ac c or di ng t o t[...]

  • Page 159

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 9 · S e rv er – spe c i f y t h e se r ve r ’ s IP a ddr e s s or t he nam e of t he s erver · P or t – s pec i f y t he num ber of t he por t t hat enabl es I nt e r net ac c e ss ( by def a ul[...]

  • Page 160

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 0 1 0.16 .2. D i al -u p Al l pa r am et ers opt i onall y def i ned i n t he U pdate s e tti ngs - D i a l - U p c o nn ec tion di a l og r ef e r t o t he di al - up c onnec t i on t o t he I nt er ne[...]

  • Page 161

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 1 1 0.16 .3. URL T he U RL di a l o g of f e r s a l ist o f I nt e r net a ddr e ss e s f rom w hi c h t he upd at e f i l e s c a n be dow nl oa ded. T he l i st and i t s i t em s c a n be m o di f i[...]

  • Page 162

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 2 1 0.16 .4. Man ag e T he Manage di a l o g of f e r s t w o opt i o ns ac c e ss i bl e v i a t w o but t ons: · De lete tem por ary up dat e f il e s - pr es s t h i s but t on t o del e t e all r e[...]

  • Page 163

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 3 1 0.17 . Re mote Admi n i str ati o n T he Rem ote A dmin i s tr at i on s e t t in gs r ef e r t o c onnec t i ng t he AVG c l ient s t at i o n t o t h e r e m ot e adm i ni st r at i on s y st em .[...]

  • Page 164

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 4 and c an be use d t o suc c es sf u l ly c o nn ec t t o D a t aCent er . N ote : F or a de t ai l ed des c r ip t i o n on r e m ot e a dmi ni s t r at i o n pl ea se c onsul t t he A VG N e t wo r k[...]

  • Page 165

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 5 1 1 . F i r e w al l Se t t i n gs T he F i r e w a l l c o nfi gur at i on opens in a new w i nd ow w her e i n se v eral d i al ogs c an se t up ve r y adv anc e d pa r am et ers of t he c om ponent[...]

  • Page 166

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 6 1 1.2. S ec u r i t y I n t he S ec ur ity se ttin gs d i al og y ou c an def in e ge ner al r u l es of Fi rew all 's behav i or r egard l es s t he s elec t ed pr of i l e : · P ermi t se tti [...]

  • Page 167

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 7 1 1.3. A r eas an d A d ap ters Pr of i l es I n t he A dapte r s and netw o r k ar e as se ttin gs di al ogs y ou c a n e di t s et t i ng r el at e d t o as sig ni ng o f def i ned pr o f i l e s t [...]

  • Page 168

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 8 1 1.4. L og s T he Logs di a l og al l ow s y ou t o r ev i ew t he l i st of a l l l ogged Fi rew a ll a c t i ons and e v ent s w i t h a det a i led de sc r i pt ion of rel e v ant pa r a m et ers [...]

  • Page 169

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 9 · He l p - ope ns t h e d i al og r el at e d he l p f il es . · Refr e s h li s t - a l l logg e d pa r a m et ers c a n be ar r anged ac c ord i ng t o t he se l ec t ed at t r ib ut e : c hr onol[...]

  • Page 170

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 0 net wo r k t r a f f i c · Dupl i c a te pr of i l e - c r e a t es a n id ent i c al c opy o f t he se l ec t ed pr o f i l e ; l at e r y ou c a n e di t a nd r enam e t he c opy t o c r ea t e a n[...]

  • Page 171

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 1 1 1.5.1. Pr of i l e I n fo r mat i on T he P r of i l e i nf ormat i on di alog i s t he f i r st di al og of a sec t i on w her e y ou c a n e di t c onf i gu r at i on o f ea c h pr o f i l e i n s[...]

  • Page 172

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 2 r es pec t i v e it e m w het her y ou w a nt t o hav e F i r e w a l l i nform at i on m e ss age s di spl ay ed ev e n w hi le a f ul l - s c reen appl i c at i on i s r un ni ng o n y our c om put [...]

  • Page 173

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 3 C ontr ol buttons · A dd netw or k - opens t he N e tw ork pr operti es d i al og w i nd ow w her e y o u c a n edi t pa r am et ers of t he new l y de f i ned net w or k : Wi t h i n t hi s di a l o[...]

  • Page 174

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 4 · De lete n etw ork - r em ov es t he not e of a se l ec t ed net wo r k f r om t h e l i st of net wo r k s · Mar k as sa f e - by def a ul t , a l l net w or k s are c o nsi de r ed un sa f e , a [...]

  • Page 175

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 5 T he appl i c at i ons i n t he l i st ar e t hose det e c t ed o n y our c om put e r ( and as si gned r es pec t i v e ac t i o ns ). N ote : Pl e a s e n ote th a t onl y a ppl i c a tion a l r e a[...]

  • Page 176

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 6 I n t hi s di a l og, y ou c a n de f i ne se t t i ngs f or t he r e s pec t i v e a ppl ic at i o n i n de t ai l . P age ac ti ons · Ba c k to th e l i st bu t t on w i l l di spl ay t he ov ervi [...]

  • Page 177

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 7 · A l low f or s a f e wil l onl y a l low t he appl i c at i on t o c om m un i c at e ov er net w or k s def i ned as Saf e (t r ust w ort hy) . · Bloc k wi l l f o r bi d t he c om m un i c a t i[...]

  • Page 178

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 8 and pr ot oc ol s t hat m i ght nee d t o c om m un i c at e ov er t he net wo r k . T he c har t c onsist s of t he f ol l ow i ng c o l um ns: · Log ru l e ac ti on - t h i s box enabl es y ou t o [...]

  • Page 179

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 9 W arn i ng : P l e a se m i nd t h at det a i l r ul e s et t i ngs a r e adv anc e d, pr i m ar i l y in t ended f o r net wo r k a dmin i st r at or s w ho nee d f ul l c o nt r o l o v er F i r e w[...]

  • Page 180

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 0 1 2 . AV G S ca n n i n g Sc a nn i ng i s a c ru c i al part of AVG 9 I n te r net S e cur i ty f unc t i o nal it y . Y o u c an r un on- dem and t e st s o r sc hedul e t hem t o r un per i odi c a[...]

  • Page 181

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 1 · S c a n hi sto r y - di spl ay s t he Sc an r es ul t s o ve r v i e w di al og w i t h t h e ent i r e hi s t or y of sc anni ng · V i e w V ir us V aul t - ope ns a new w i ndow w i t h t he Vi [...]

  • Page 182

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 2 Sca n c onf i gu r a ti on editi ng Y ou hav e t h e opt i on of e di t i ng t he pr e def i ned def a ul t se t t i ngs of t he S can of t he w hol e c o mputer . Press t h e C hange sc an se tt i ng[...]

  • Page 183

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 3 · S c a nn i ng param e te r s - i n t he l i s t of s c anni ng pa r am et ers yo u c an sw i t c h o n/ of f s pec i f ic par am et e r s as nee ded. B y de f aul t , m o st of t he param e t er s [...]

  • Page 184

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 4 ar e r a t her s uspi c i ous and shoul d be sc a nn ed at a l l t i m e s. · S c a n pr oc e ss p r i ori ty - y ou c a n use t he sl i der t o c hange t he sc anni ng pr o c e ss pr i o r it y . B [...]

  • Page 185

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 5 aut om a t i c al l y ge ner at ed pat h ( se e sc r ee nshot ). T o ex c l ude t h e ent i r e f o l der f r om sc anni ng use t he " !" param e t er . F i nal ly, t o laun c h t h e s c a [...]

  • Page 186

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 6 · S c a nn i ng param e te r s - i n t he l i s t of s c anni ng pa r am et ers yo u c an sw i t c h o n/of f spe c ifi c param e t er s a s neede d ( f or de t ai led desc r i pt i on of t h i s s e[...]

  • Page 187

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 7 dow n e ve n i f i t i s c ur r ent l y l oc k e d ( F orc e shu tdow n i f c omputer is l oc k e d ). o De fi ne f il e ty pes f or s c anni ng - f ur t her yo u s hou l d de c id e w het her y ou w [...]

  • Page 188

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 8 f or a l l f ur t h e r sc ans o f spe c i f i c f il es or f o l der s. A lso, t hi s c o nfig ura t i o n w i l l be used a s a t em pl at e f or a l l of y our new l y sc hedul ed s c a ns ( a l l [...]

  • Page 189

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 9 · A u tom a ti c sc an - y ou c an use t h e s l i der t o c hange t he sc anni ng pr oc e s s pr ior i t y. B y def a ul t , t he pr i o r i t y i s s et t o m edi um l ev e l ( A ut o m at i c s c [...]

  • Page 190

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 0 · R i ght - c l i c k y o ur m ouse o ve r t he obj ec t t o o pen t h e c ont ex t m enu · Se l e c t t he S c a n w i th A V G opt i o n t o hav e t he f il e s c anned w i t h AV G 1 2.4. Comman [...]

  • Page 191

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 1 C MD sc a nn i ng laun c hed f r om gr a phi c i nte r f ac e When yo u r un y our c om put e r i n Wi ndows Sa f e Mo de, t her e i s a l so a po ss i bi l i t y t o l aun c h t he c om m and li ne s[...]

  • Page 192

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 2 · /N OBREA K D o not a l low CT R L- B R EAK t o abort · /BOOT En abl e MB R /B OOT c hec k · /P ROC Sc a n a c t i ve pr oc e ss e s · /P U P R epor t " P ot ent i a l l y unwant ed pr o gr [...]

  • Page 193

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 3 Schedul e sc a ns Cl ic k t he gr a phi c a l i c on w i t hi n t he S c hedul e sc ans sec t i o n t o ope n a new S ch edul e sc a ns di a l og w her e y ou f i n d a li st of a l l c ur rent l y sc[...]

  • Page 194

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 4 Y ou c an edit / a dd s c a ns usi ng t he f ol l ow i ng c o nt r ol but t ons: · A dd s c a n sc hedul e - t he but t o n ope ns t h e S e tt i ng s f or sc hedul e d sc a n di a l og, S c hedul e [...]

  • Page 195

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 5 On t h e S c hedul e se ttin gs t a b y ou c a n f ir st c hec k /un c hec k t he E nabl e thi s ta sk i t em t o si m pl y dea c t i va t e t he s c hedul e d t est t em por ar i l y, and sw i t c h [...]

  • Page 196

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 6 1 2.5.2. H o w to Sc an On t h e How to s c a n t a b y ou w i l l f i nd a l ist o f sc anni ng param e t er s t hat c a n be opt i onall y sw i t c hed on/of f . B y def a ul t , m os t pa r a m et [...]

  • Page 197

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 7 · S c a n for T r a c k in g C ook i e s - ( of f by def aul t ): t hi s pa r a m et er of t he A nti - S py w a r e c om ponent de f i nes t hat c ook i es shoul d be det ec t ed dur i ng sc anni ng[...]

  • Page 198

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 8 o De fi ne f il e ty pes f or s c anni ng - f ur t her yo u s hou l d de c id e w het her y ou w ant t o hav e s c anned: Ø A l l fi le ty pes wi t h t he poss i bi l i t y of de f i ni ng e x c ept [...]

  • Page 199

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 9 C ontr ol buttons T her e a r e t w o c o nt rol but t ons a v ai l abl e o n all t hr e e t abs of t he S e t ti ngs f or sc hedul ed sc a n di a l o g ( S ch e dul e se ttin gs , How to sc a n and W[...]

  • Page 200

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 0 des i red f ol der m a nu all y ( i f y ou e nt er m ul t i pl e pat hs, i t i s nec es sa r y t o se par a t e w i t h se m i -c olon s wi t h out e x t r a spac e ). Wi t h i n t he t r e e st r uc [...]

  • Page 201

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 1 t h es e have t he sa m e f unc t i onali t y no m at t er on w hi c h t ab y ou c ur r ent l y ar e : · S a v e - s av e s a l l c hanges y ou have perform ed on t hi s t ab o r o n a ny ot her t ab[...]

  • Page 202

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 2 - r ed i c o n w arn s t her e w a s a n in f ec t i o n det e c t ed dur in g t he s c a n and it c oul d not be r em ov e d! Eac h i c on c a n e i t h er be s oli d or c ut in hal f - t h e sol i d[...]

  • Page 203

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 3 · Res ul t s Ove rv i e w - t hi s t ab i s di spl ay ed a t a l l t i m es and provi des st at i st i c a l dat a des c ri bi ng t he sc an pr o gr e ss · I n f e c tion s - t hi s t a b is di s pl[...]

  • Page 204

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 4 I n a ddi t i o n y ou w i ll f i nd i nfo r m at i on on t he dat e and e x ac t t i m e of t he sc an l aunc h, on t h e t ot a l num ber of s c anned o bj e c t s, on t he sc anni ng dur a t i o n [...]

  • Page 205

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 5 o He a l e d - t h e in f ec t ed obj e c t w as heal e d a ut o m a t i c all y and lef t in i t s or i gi nal l oc a t i on o Move d to V i r u s V aul t - t he i nfe c t e d o bj e c t w a s m ov e[...]

  • Page 206

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 6 f i nd i ng s. U se t he C lose but t on t o c lose t hi s di al og. · Rem ov e se l e c t e d in f e c tions - use t h e but t o n t o m ov e t he s elec t ed f in di ng t o t h e V ir us V aul t ·[...]

  • Page 207

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 7 o He a l e d - t h e i nf e c t ed objec t w as healed a ut o m a t i c all y and lef t in it s or i gi nal l oc a t i on o Move d to V i r u s V aul t - t he i nfe c t e d o bj e c t w a s m ov e d t[...]

  • Page 208

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 8 f i nd i ng s. U se t he C lose but t on t o l ea ve t hi s di a l og. · Rem ov e se l e c t e d in f e c tions - use t h e but t o n t o m ov e t he s elec t ed f in di ng t o t h e V ir us V aul t [...]

  • Page 209

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 9 · C oo k ies - Cook i e s ar e pl a i n - t ex t f i l es w hi c h a r e use d by w e bsi t es t o s t or e user- spec i f i c in f or m a t i o n, w hi c h i s l at e r use d f or l oadi ng c ust om[...]

  • Page 210

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 0 · Hid den e x te nsion - F i l es w i t h hi dden ex t ensi on m a y a ppear t o be e . g. pi c t ur es , but i n f a c t t hey ar e e x e c ut abl e f i l es ( e .g. pi c t ure .jpg . ex e ). T he s[...]

  • Page 211

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 1 up t o v ery danger ous ( ) w i l l be pr ov i ded i n t hi s se c t i on; and t he i n f orm at i on on t he i n f e c t i on t y pe ( ba se d on t hei r i nfe c t i ve l ev e l - all l i s t ed obj [...]

  • Page 212

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 2 · De lete - rem ov e s t he i nfe c t ed f i l e f r om t h e V i r us V aul t c om pl et e l y a nd i r reve r sib l y · Em pty V a ul t - r em ov es all V i r us V a ul t c ont ent c om pl e t el [...]

  • Page 213

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 3 1 3 . AV G Up date s K ee pin g y ou r AVG up - to- da te i s c r uci a l to ensur e th a t a l l new l y di sc ov ered v ir use s w il l be d e te c te d as soon as p os sibl e . D u r i ng t he AVG [...]

  • Page 214

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 4 On c e y ou s t ar t t he updat e, AVG w i l l f i r st ve r i f y w het her t her e a r e new updat e f i l es av ail abl e. If s o, AVG st art s t hei r dow nl o adi ng and l a un c hes t he upd at [...]

  • Page 215

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 5 1 4 . Ev en t Hi s tory T he Ev e nt History di alog i s a c c e ss i ble f r o m t he s y st em m enu v i a t he History/ Ev e nt Histor y L og i t em . Wit hi n t hi s dial og y ou c a n f in d a su[...]

  • Page 216

    A V G 9 I n t e r n e t S e c ur i t y © 2 0 1 0 C o p y r i g h t A V G T e c h n o l o gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 6 1 5 . F AQ a n d T ech n i c a l S u ppor t Shoul d y ou hav e any pr obl em s w it h yo ur AV G , eit her busi ness or t ec hn i c al, pl e as e r ef e r t o t he FA Q s ec t i o n of A VG w ebsit e [...]