Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
AVG Internet Security 2013 manuale d’uso - BKManuals

AVG Internet Security 2013 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso AVG Internet Security 2013. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica AVG Internet Security 2013 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso AVG Internet Security 2013 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso AVG Internet Security 2013 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo AVG Internet Security 2013
- nome del fabbricante e anno di fabbricazione AVG Internet Security 2013
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature AVG Internet Security 2013
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio AVG Internet Security 2013 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti AVG Internet Security 2013 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio AVG in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche AVG Internet Security 2013, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo AVG Internet Security 2013, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso AVG Internet Security 2013. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 Doc um e n t r e v is i o n 2 013 .10 (30 .11 .20 12 ) C o p y r ight A V G Te c hno lo gie s C Z , s.r .o . A ll rights re se r v e d. A ll o ther tra d e m a rk s a r e the pr o pe rty of their r e s pe[...]

  • Pagina 2

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 Con t e n t s .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . [...]

  • Pagina 3

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . . 37 6.6 PC A nal y ze r .[...]

  • Pagina 4

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . . 119 11 . 4 S c a n Sc he[...]

  • Pagina 5

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 1 . I n t ro duct i on T his us er manu al pr ov i de s c ompr eh ens iv e user do c umentation f or AVG I nte rne t S e c uri ty 20 13 . A V G I nte r ne t S e curity 20 13 pro v ide s m ulti ple lay er [...]

  • Pagina 6

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 2 . AV G Inst al la t i on Requ i reme n t s 2 . 1 . Op erati on S ys tem s Su p po rted A V G I nte r ne t S e curity 20 13 i s int en ded t o pr ot ec t w orks tati on s with t he f ollow i ng ope ra t [...]

  • Pagina 7

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 3 . AV G Inst al la t i on Pr ocess T o ins t all A V G I n t e rne t S e curity 201 3 on y our c omputer , y ou ne ed t o ge t t he lates t ins t allati on f il e. T o mak e s ur e y ou ar e ins t alling[...]

  • Pagina 8

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 3 . 2 . W el c ome: Li c en s e Agr eeme n t T he W elcome to A VG I ns ta l l er dialog pr ov ide s t hen t he f ull wor ding of t he A V G l ic ense ag re ement: Pl ea s e rea d t he enti r e t ex t c a[...]

  • Pagina 9

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 3 . 3 . Ac ti v ate y ou r l i c en s e I n t he A c tiva te Y our Li cens e dialo g y ou ar e i nv it ed t o en t er y our l ic ense nu mber int o t he pr ov i de d t ext fie l d: W he re to f i nd the l[...]

  • Pagina 10

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 C anc el - c lic k t o exi t t he s e t up pr oces s i mm ed i ately ; AVG I nte rne t S e curity 20 13 will not be ins t alled ! B ac k - c l ic k t o go on e s t ep back t o t he pr ev iou s s et up d[...]

  • Pagina 11

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 Sets , k ee ps and prote ct s A VG S ec u re S ea rch as your def ault s earc h provider - k ee p c h ec k ed t o c on f irm y ou wa nt t o us e t he A V G S ecure S ear c h en gine t hat c los ely c oo[...]

  • Pagina 12

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 c an be ins t alled . If t he def au lt s e t t i ng s do no t s uit y ou, y ou c an re mov e/add s p ec ific c o m po ne nts . H owev er, you can on l y s elect from compo nent s that are i nclu ded i [...]

  • Pagina 13

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 dia log win do w i nto an i c on v is ible on t he s y st em bar . T he dialog ap pea rs aga i n once t he i nst allat ion is c ompleted . C anc el - T his bu t t on s h ould only be us ed if y o u wa n[...]

  • Pagina 14

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 4 . Afte r I n sta l l a t i on 4 . 1 . Pr od u c t r egi strati o n H av ing f inis hed t he AVG I nte rne t S e c uri ty 20 13 i nst allat ion, plea s e reg i s t er y o u pr odu c t online on t he A [...]

  • Pagina 15

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 I f AVG fa i l s to i de nt i fy the E I C A R te s t fil e a s a vi rus , you s ho ul d che ck the progra m conf i g ura t i on a ga i n! 4 . 5 . AV G d efa u l t c on fi gu rati on T he def a ult c on[...]

  • Pagina 16

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 5 . AV G Us e r In te rface A V G I nte r ne t S e curity 20 13 ope ns with t he main wind ow : T he m ain win dow is div ided into s ev er al s ec t ions : U pper l i ne navigat i o n c onsis ts of f o[...]

  • Pagina 17

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 allow s quic k ac c es s t o s cann ing an d upd at ing within AVG I nte rne t S e c uri ty 20 13 . Details > > 5 . 1 . U pp er L i n e N avi g ati o n T he Upper l i ne navigation c o ns is ts of[...]

  • Pagina 18

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 o C op y t o c lipb o ar d - Use t his l ink t o c opy t he l ic ense nu mber , and past e it wh ere nee ded . T his w ay y o u c an be s ur e t he li c en s e numbe r is enter ed c o rr ec t ly . o R e[...]

  • Pagina 19

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 c od e us ed in t he pro duct : Li ce ns e A gre em ent - T he t ab of f er s t he f ull wo rd i ng of t he lic e ns e ag ree m en t betwe en y ou an d A V G T ec hno logies: 5 . 1 .4. Opti on s T he m [...]

  • Pagina 20

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 Scan fi l e.. . - A ll ow s y o u t o ru n an on -d emand t es t on a s in gle s peci f ic file. Clic k t his option t o ope n a ne w wind ow with t he t ree s tru c tur e of y our dis k . S elec t t he[...]

  • Pagina 21

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 AV G pr od uc t ). R egis ter now / M y A cc oun t - Co nne c ts t o t he re gis t ra t ion pa ge of t he A V G w eb s it e (h t t p: / / w w w . av g. c om/ ). P lease f il l in y ou r re gis t ration [...]

  • Pagina 22

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 2 N ote : AV G I ntern et S ecur it y 20 13 s tat us i nfor m ati on c a n als o b e ob t ained at an y t im e f rom t he s yst em t ray ic on . 5 . 3 . Co m p on en ts Ov er vi ew I ns ta l l ed com pone[...]

  • Pagina 23

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 3 5 . 4 . M y App s I n t he M y A pps are a (the line of gr een b loc k s und er t he c ompon ents s e t ) y o u c an f i nd an ov er v iew of ad dit iona l A V G app lic a t i on s t hat ar e either alr[...]

  • Pagina 24

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 4 5 . 6 . Sys tem Tr ay Ic on T he A VG Sys te m T ray I con (on yo ur W ind ow s t as k b a r, righ t -h an d b ott om c or ne r of y ou r monitor) indic ates t he c u rr en t s t atus of y our AVG I nte[...]

  • Pagina 25

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 5 A ct i on s a cc e s s i bl e f rom AVG S ys te m Tra y I con A V G S ys te m Tray I con c an als o be us ed as a qu ic k li nk t o acc e s s t he us er i nter f ac e of AVG I nte rne t Se curity 20 13 [...]

  • Pagina 26

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 6 A V G ga dge t controls I f nee de d, t he A VG gad get allow s y ou t o lau nc h a s can or an upd ate imm ed iately ; als o pr ov ides a qu ic k li nk c on ne c t ing y ou t o t he m ajor s oc ial net[...]

  • Pagina 27

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 7 s olv e t he pro blem. T hat is wh ere A VG A d vis or c omes in: I t will dis play a no t i f ic a t i on i n t he s y s tem t ra y inf or m ing y ou wh at t he pro blem mi gh t be, and s u gge s t ing[...]

  • Pagina 28

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 8 6 . AV G C omp on e n t s 6 . 1 . Co m p u ter T he Comp ute r c ompon ent c o v er s t wo main s e c u rit y s erv ic es : A ntiV i rus and A nt i -R ootk i t : A nti Vi rus c o ns is ts of a s cann in[...]

  • Pagina 29

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 9 (AntiV irus or A nti-R oo t k it ) : En abled / D i s abled - T he butt on may re mind y o u of a t ra f f ic li gh t , both in app ea ran c e and in f unct iona lit y . S ingle c li c k t o s witc h be[...]

  • Pagina 30

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 0 prote ction! D i a log controls T o s witc h betwe en both s ec t ion s of t he dialo g, y ou c an s i mply c l ic k an y wh ere i n t he re s p ec t iv e s erv ic e pan el. T he pan el t hen gets highl[...]

  • Pagina 31

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 1 pa rt of t h dialo g. - Use t he gre en ar ro w in t he up pe r lef t s ec t ion of t he dialog t o get ba c k t o t he main us er i nter f ac e w it h t he c o m po nen t s ' ov er v i ew . 6 . 3 [...]

  • Pagina 32

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 2 En abled / D i s abled - T he butt on may re mind y o u of a t ra f f ic li gh t , both in app ea ran c e and in f unct iona lit y . S ingle c li c k t o s witc h be t w ee n t wo pos it ions. T he gr e[...]

  • Pagina 33

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 3 ad dre s ses t o y o ur W h i t elis t (n ev er m ar k as s pam) an d B lac k l is t (a lw ay s mark as s pam) . D i a log controls T o s witc h betwe en both s ec t ion s of t he dialo g, y ou c an s i[...]

  • Pagina 34

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 4 20 13 ac t iv it ies pe rf orme d on y our c o m pu t er within a s peci f ied per iod of t im e an d i n t otal. D et ai l s - Clic k t he bu t t on , and a br ief de s c ription of t he high l igh t e[...]

  • Pagina 35

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 5 A va i l a bl e Fi re w a l l m ode s Fire w all allow s y o u t o def ine s p ec ific s e c u rit y ru les ba s ed on w he t he r y ou r c omputer i s loc ated i n a domain , is a s t and alo ne c ompu[...]

  • Pagina 36

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 6 D i a log controls T he dialog pro v ide s an ov er v i ew of ba s ic inf or mati on on t he Fi re wa ll c o m po nen t s t atus : Fi rew all M ode - Prov ide s inf or mat ion on t he c u rr en t ly s e[...]

  • Pagina 37

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 7 6 . 6 . PC An al y zer T he P C A nalyz er c ompon ent is ab le t o s c an y o ur c omputer f or s ys tem pr oble ms , an d giv e y ou a t ran s par ent ov er v i ew of w ha t might be agg ra v at ing y[...]

  • Pagina 38

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 8 C anc el - pre s s t his butt on t o s t op t he ru nn ing an aly s is , or t o re t urn t o t he def au l t AV G main dia log ( c ompo ne nt s ov er v i ew ) once t he ana l y s i s is c ompleted[...]

  • Pagina 39

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 9 7 . AV G S e cu rit y Tool bar A V G S ec u rity Tool b ar is a t oo l t hat c los ely c oop er at es wit h t he LinkS c ann er S ur f -Shield s er v ic e , and gu ar ds y ou r max im um s ec ur i t y w[...]

  • Pagina 40

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 0 D o Not Track - t he DN T s e rv ic e he lps y ou iden t i f y we bsi t es t hat are c ollec t ing data ab out y our online act i v it i es, and giv es y ou t he c hoic e t o allow or dis allow it . De [...]

  • Pagina 41

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 1 8 . AV G D o Not Tr a ck A V G Do Not Track help s y ou i de nt if y we bs it es t hat ar e c ollec t ing da t a abo ut y our online ac t iv it ies . T he A VG D o Not Track t ha t is a pa rt a A V G S [...]

  • Pagina 42

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 2 c ollec t da t a ab ou t y o ur online ac t iv it y wh i le y o u ar e logg ed- in. E x amples of S oc ial bu t t ons i ncl ud e: Facebo ok S oc ial P lugin s , T w it t er B ut t on , Goog l e + 1. A d[...]

  • Pagina 43

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 3 8 . 3 . B l oc ki n g trac ki n g p ro c es ses W ith t he l is t s of all Ad Ne t wo rks / S oc ial B utt ons / W eb A naly t ic s y ou hav e no w t he option t o c on t ro l w hic h s er v ic es s hou[...]

  • Pagina 44

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 4 B l ock the foll owi ng - I n t his s e c tion y ou c an s e e a box wit h a l is t of k now n data c ollec t ion s er v ic e s t ha t c a n be c las s i f ied as A d Ne t wor k s . B y def ault, Do N o[...]

  • Pagina 45

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 5 9 . AV G A dv a n ce d S et t i n gs T he adv a nc ed c o nf igur at ion dialo g of AVG I n t e rne t S e curity 201 3 ope ns in a new win do w named A dva nced A V G S et ting s . T he win do w is div [...]

  • Pagina 46

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 6 C on fir m y our s elec t ion by pr es s ing t he A pply bu t t on (r i gh t -ha nd b ott om c or ne r of t he dialog ) Press t he OK butt on c onf irm A new dialog pop s -u p inf or ming y o u t ha t i[...]

  • Pagina 47

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 7 o U pdat e notifi ca ti ons (o n, b y de f ault ) - de c ide wh ether inf or mat ion re gar ding t he A V G I nte rne t Se curity 20 13 upd ate pr oc ess laun c h, pro gre s s, and fin aliz a t i on s h[...]

  • Pagina 48

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 8 t rying t o c on ne c t t o a ne t w or k , Firew all block s t he att empt an d dis plays a notificat ion. T his i s usef ul t o k e ep y ou inf or med, t her ef or e w e re c ommend t o alwa y s k eep[...]

  • Pagina 49

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 9 9 . 2 . Sou n d s W ithin t he S ound s dialog y ou c an s peci f y whe t her y ou wa nt t o be i nf o rmed abo ut s pecific AVG I nte rne t Se curity 20 13 ac t ions by a s oun d no t i f ic a t i on :[...]

  • Pagina 50

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 0 I n m os t c as es, i t is not nec es s ary t o dis ab le AVG I nte rne t S e c uri ty 20 13 be fo re ins t alling ne w s of t wa re or dr iv er s , not ev en if t he i nst aller or s o ftwa re wizard s[...]

  • Pagina 51

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 1 9 . 4 . Co m p u ter Pr otec t i on 9 . 4 .1. A n ti Vi r u s A nti Vi rus t oge t her wit h Re s i d ent S hi el d pr ot ect y o ur c omputer c o nt inuo us ly f rom all k n ow n t y pes of v iru s e s[...]

  • Pagina 52

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 2 A s k m e before rem oving threa ts ( on b y default ) - c he c k t o en s u re t hat t he R es ide nt S hield will no t pe rf or m an y ac t ion au t omatic a l ly ; ins t ead i t w ill dis pla y a dia[...]

  • Pagina 53

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 3 I n t he Fi l es s ca n ned by the R es i dent S hi eld dia log it is poss ib le t o c onf i gu re wh i c h files will be s c ann ed ( b y s pe c if i c ex t ensions ): Mar k t he re s p ec t iv e c hec[...]

  • Pagina 54

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 4 Scan appl i cat i ons and S can dri vers ena ble y o u t o s pec if y i n detail wh at s hou l d be inc lude d in anti-r oo t k it s c ann i ng . T hese s e t t i ng s ar e int en ded f or ad v an c e d[...]

  • Pagina 55

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 5 9 . 4 .3. Cac h e S er ver T he Ca che S erve r S et tings dialog ref ers t o t he c a c h e s er v er pr oc es s de s igne d t o s pe ed up all t y p es of A V G I nte rne t S e curity 201 3 s c a ns :[...]

  • Pagina 56

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 6 9 . 5 .1. Emai l Sc an n e r T he E m ai l Scanner dialo g is div ided into t hr ee s ec t ions : E m a il s ca nning I n t his s e c tion, y ou c a n s et t hese ba s ic s f or i ncoming and / or outgo[...]

  • Pagina 57

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 7 R eport P ote nti all y Unwa nte d P rograms and S pywa re thre ats ( o n b y de f au l t ) - c heck t o ac t iv ate s c ann i ng fo r s p y w ar e as w ell as f or v iru s e s . S py w ar e r ep re s e[...]

  • Pagina 58

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 8 By def ault , t he c e rt if ic a t i on t ext c o ns is ts of jus t a bas ic inf or mat ion t ha t s t ates No vir us f oun d in t his mes s age . Ho w ev er , t his inf or mat ion c an be ex t en ded [...]

  • Pagina 59

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 9 T he A t ta chm ent fil ter dialo g allow s y ou t o s et up par ameters f or email mes s age att ac hmen t s cann ing . By de fa ult , t he Re m o ve att ac hm ents op t ion is s w it c h ed of f . I f[...]

  • Pagina 60

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 0 I n t his dialog y ou c an s et up a ne w E mail S c ann er s erv e r usi ng t he P OP 3 pro t oc ol f or i ncomi ng m ail: P OP 3 S erv er Na m e - i n t his f i eld y ou c an s peci f y t he name of n[...]

  • Pagina 61

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 1 Type of l ogi n - de f ines t he m ethod f or deter mining t he mail s e rv er us ed f or inc oming mail: o A utom at i c - login w ill be c a rrie d ou t au t omatic ally , ac c or ding t o y ou r emai[...]

  • Pagina 62

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 2 SM TP S erve r Na m e - i n t his f i eld y ou c an s peci f y t he name of ne wly add ed s erv e rs ( to ad d a S M TP s er ve r, c li c k t he righ t m ou s e b utt on ov er t he S M TP it em of t he [...]

  • Pagina 63

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 3 I n t his dialog y ou c an s et up a ne w E mail S c ann er s erv e r usi ng t he IMAP pr otoc ol fo r outgoin g m ail: I M A P Serve r Na m e - i n t his f i eld y ou c an s pec if y t he name of ne w [...]

  • Pagina 64

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 4 Type of l ogi n - de f ines t he m ethod f or deter mining t he mail s e rv er us ed f or ou t go i ng m ail: o A utom at i c - login w ill be c a rrie d ou t au t omatic ally , ac c or ding t o y ou r [...]

  • Pagina 65

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 5 I n t he A nt i -Sp am s et tings dialog y o u c an c heck /un c heck t he Tu rn on A n ti-Spam p rote ct i on c heck b ox t o allow / pr ohibit t he anti-s pa m s c ann ing of email c ommunic ation. T [...]

  • Pagina 66

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 6 T he E ngi ne perf orm ance s et tin gs dialo g ( link ed t o v ia t he P erf orm ance it em of t he l eft na v i ga t ion ) of f er s t he A nt i -Spam c o m po ne nt per f orma nc e s et t ing s : Mov[...]

  • Pagina 67

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 7 T he W hi t eli s t i t em ope ns a dialo g named A pprove d em ail s enders l i s t wit h a globa l lis t of ap pro v ed s e nde r email add re s ses an d domain na m es w ho s e m es s ag es will nev [...]

  • Pagina 68

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 8 T he Black l i s t it em ope ns a dialog with a glob al li s t of block ed s e nde r email add re s ses an d domain names w ho s e m es s ag es w i ll alwa y s be m ar k ed as s pam. I n t he editi ng i[...]

  • Pagina 69

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 9 res pect i ve option di rec tly i n the us er i nter fa ce. W e s tr ongl y rec om mend not changin g any s et tin gs unl es s you are full y f ami l i ar with t he adva nce d s et ti ngs for S pam ca t[...]

  • Pagina 70

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 0 9 . 6 .1. On l i n e S h i el d T he Onl i ne Sh i eld dialog of f ers t he f ollowin g op t ions: En able Onli n e S hi eld ( on , b y de f ault ) - A c t iv ate/dea c t iv ate t he entire Onl i ne S h[...]

  • Pagina 71

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 1 I n t he W eb P rote ct i on dia log y ou c an edit t he c ompon ent's c o nf igur at ion re gar ding t he s c an of t he w eb s it e c on t en t . T he editi ng i nter f ac e allow s y ou t o c on[...]

  • Pagina 72

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 2 ab s o l utely s ure . Re member t hou gh t hat t his met ho d is rather t im e- c ons uming . o M axim um part s i z e o f a fil e to be s ca nn ed - i f inc lude d f il es are pre s e nt in t he dis p[...]

  • Pagina 73

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 3 A l way s prom pt ( on b y default ) - w hen a t hr ea t is detec t ed , y ou will be as k ed wh ether it s h ould be mov ed t o qua ran t i ne t o mak e s u re no ap plic a t i on s y ou wa nt t o run [...]

  • Pagina 74

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 4 Sca n s e tt i ngs T he S can s et ti ngs s ec t ion of f er s a l is t of s c a nning par ameters t hat c an be optiona l ly s wit c hed on/of f : H ea l / rem ove virus i nfec tio n without as k ing m[...]

  • Pagina 75

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 5 c an no t ge t i nfec t ed w i ll not b e s c ann ed , f or ins t ance s ome plain t ex t f il es, or s ome other no n- ex ecut ab l e f il es ), i ncl ud i ng m ed ia f iles ( v ideo , aud io f i les -[...]

  • Pagina 76

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 6 Al l par ameters s et up in t his c o nf igur at ion dialo g app l y only t o t he ar eas s e l ect ed f or s c a nning with S c an of s pe c ific files or f olde rs ! N ote : For a de s cription of s p[...]

  • Pagina 77

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 7 T he li s t of pa ra m eter s is iden t i c al t o t hose av ailab le f or t he S c an of t he wh ole c omputer . Ho we v er , t he de f ault s ett i ng s dif f er ( for ins t an c e, W ho l e Co m pu t[...]

  • Pagina 78

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 8 9 . 8 .4. Re movab l e d ev i c e sc an T he editi ng i nter f ac e f or Re m ov abl e device s can is als o v er y s imilar t o t he W ho le Co m pu t er s c a n ed i t ing dia log: T he Re m ov abl e [...]

  • Pagina 79

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 9 N ext , t he t ex t f i eld c alled Na m e ( d eact i v at ed f or all default s c h edu les ) s t at es t he name as s igne d t o t his v ery s c hed ule by t he pr og ram v en dor . F or new ly add ed[...]

  • Pagina 80

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 0 ic on : A new A V G s y s tem t ra y ic on t hen app ea rs ( in f ull c olor w it h a f las h light ) inf or mi ng a s c hed uled s c a n is ru nnin g. Righ t -c lic k on t he ru nning s c a n A V G i c[...]

  • Pagina 81

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 1 t ha t i ncrea s e s y our c omputer s ec ur i t y ev en m or e, ho wev e r it m ay bloc k lega l pr ogr ams , and is t he ref ore s w it c h ed of f by de f ault. Scan for Trac k i ng Cook i es ( o f f[...]

  • Pagina 82

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 2 Se t a ddi t i ona l s ca n re ports C lic k t he S et addi tion al s ca n report s . . . l ink t o ope n a s t and alon e dia log win do w c a l led S ca n report s wh ere y ou c an t ic k s ev era l i[...]

  • Pagina 83

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 3 dia log t he dis played t re e s t ruct ure ac t iv ates an d y ou c an s peci f y t he f older s t o be s c ann ed. 9 . 9 .2. D e f i n i t i on s Up d at e Sc h edu l e I f reall y n ec es s ary , y o[...]

  • Pagina 84

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 4 imm ed iately af t er t he I ntern et c onn ec t ion is re s t or ed. Onc e t he s c hed uled upd at e i s laun c h ed at t he t i me y o u ha v e s peci f ied, y o u w ill be i nf or med of t his f ac [...]

  • Pagina 85

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 5 C he c k t he Run t he up dat e aga i n as s oo n as the I nterne t connect i on i s ava i l able op t i on t o m ake s ur e t ha t if t he I nt er net c onn ect i on is i nter rup t ed and t he upd at [...]

  • Pagina 86

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 6 T his s e c tion allow s y ou t o de f ine und er w hic h c o nditi on s t he A nti-Spam up date s hou ld/ s hou l d not be laun c h ed if t he c omputer is i n low po w er m od e or s w it c h ed of f [...]

  • Pagina 87

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 7 R es ta rt i m m edi at el y - t he c omputer will be re s t ar t ed automat ic ally i mm ed i ately af t er t he upd at e pr oc es s ha s f i nis he d, an d y our app ro v al will not be re quir ed C o[...]

  • Pagina 88

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 8 9 . 1 0 .1. Pro xy T he pr oxy s erv e r is a s tan d- alone s e rv er or a s erv ic e run ning on a P C t hat gu ar antees s af er c onn ec t ion t o t he I ntern et . A c c or ding t o t he s p ec ifi[...]

  • Pagina 89

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 9 A utoma tic configura t i on I f y o u s elect automat ic c onf igu ra t i on ( mar k t he A ut o op t i on t o ac t iv ate t he respect i v e dia log s ec t ion ) t hen ple as e s elec t w he re t he p[...]

  • Pagina 90

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 0 9 . 1 0 .3. Man ag e T he Updat e m anagement dialo g of f ers t wo op t i on s ac c es s ible v ia t w o butt on s : D elet e te m porary update fil es - pr es s t his butt on t o delete all red und an[...]

  • Pagina 91

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 1 T he c har t i n t he dialo g dis play s a l is t of ex c ep t ions, i f an y hav e be en alre ad y de f ined . E ach it em ha s a c he c k box ne x t t o i t . I f t he c hec k bo x is marked, t hen t [...]

  • Pagina 92

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 2 9 . 1 2 . V i r u s V au l t T he V i rus V ault m ainte nance dialog allows y ou t o de fin e s ev er al par amet er s reg ard i ng t he adminis t ra t i on of ob j ect s s t ore d in t he V irus V aul[...]

  • Pagina 93

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 3 9 . 1 3 . A V G S el f Pr otec t i on T he A VG Sel f P rotec tion en ables AVG I nte rne t S e curity 20 13 t o pr ot ect i t s ow n pr oc es s es , f il es, reg is try k ey s an d driv er s f ro m be [...]

  • Pagina 94

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 4 W ithin t he dialog , t he f ollowin g s et t ing op t ions ar e av ailable : I 'd l i k e to hel p A V G i m prove the i r product s by part i cipating i n the A VG P roduct I m provement P rogram[...]

  • Pagina 95

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 5 Mos t com m on thre a ts N ow ada y s, t her e are fa r m or e t hr eats out t her e t han plain v iru s es . A utho rs of malic iou s c o des an d da ng ero us w eb s ites ar e v er y inno v at iv e, a[...]

  • Pagina 96

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 6 9 . 1 5 . Ig n or e err or statu s I n t he I gnore error s t at us dialog y o u c an t ic k t hose c ompo ne nts t hat y ou do not wa nt t o get inf or med ab ou t : By def ault , no c o m po ne nt is [...]

  • Pagina 97

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 7 un i qu e att ribu t es of t he ne t w or k (speci f ic ally t he M A C add re s s) , and w ill no t dis play t he no t i f ic a t i on nex t t ime. Eac h ne t wor k t hat y ou c onn ect t o will be aut[...]

  • Pagina 98

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 8 1 0 . Firew a l l S e t t i ngs T he Fi r ew all c onf igu ra t i on ope ns i n a ne w wind ow wh er e i n s ev er al dialog s y ou c an s e t up adv a nced pa rameter s f or t he c ompo ne nt. Fi r ew [...]

  • Pagina 99

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 9 Fire w all allow s y o u t o def ine s p ec ific s e c u rit y ru les ba s ed on w he t he r y ou r c omputer i s loc ated i n a domain , is a s t and alo ne c ompu t er , or ev en a no t eb ook . Eac h[...]

  • Pagina 100

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 0 1 0.2. A p pl i c ati on s T he A ppli cat i on dia log lis ts all app lic a t i on s t hat ha v e t ried t o c o m munic ate ov er t he netwo rk s o f ar , and i c ons f or t he as s i gn ed ac t ion[...]

  • Pagina 101

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 1 m odi fy the s ett i ngs ! C ontrol butt ons T he li s t c an be edited us ing t he f ollow i ng c o nt ro l bu t t ons : A dd - op en s an empty dialog f or de fin ing ne w ap plic ati on rule s . Ed[...]

  • Pagina 102

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 2 1 0.4. A d v an c ed sett i n gs A ny editin g withi n the A dvance d s ett i ngs di al og i s i nte nded f or E X P E R I E NC E D U S E R S ONLY! T he A dv anc ed s ett i ngs dialog allow s y ou t o[...]

  • Pagina 103

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 3 1 0.5. D efi n e d n et w or ks A ny editin g withi n the D ef i ned net work s d i alog i s i ntende d for E X P E RI E NC E D USE R S ON LY ! T he De fi ned netw ork s dialog of f er s a lis t of al[...]

  • Pagina 104

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 4 Ed i t net work - op ens t he Ne tw ork propert i es dialog wind ow ( see ab o ve ) w he re y ou c an edit t he pa rameter s of an alre ad y def i ne d ne t w or k ( the dialo g i s iden t i c al w i [...]

  • Pagina 105

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 5 A ction - T his c olumn dis plays an ic on f or t he as s igne d ac t ion: o Al low c o m munic ation f or all netwo rk s o Bl ock c omm un i c ati on T o ed i t s ett i ng s of an y it em in t he lis[...]

  • Pagina 106

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 6 re s pec t iv e log ac t ion , user name , P I D, t ra ff i c dire c t i on , pr ot ocol t y pe, numb er s of t he remote and l ocal po rt s , an d inf or mat ion on t he l ocal and remo t e I P ad dr[...]

  • Pagina 107

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 7 C ontrol butt ons R ef res h l i s t - all logg ed par ameters c a n be arr ang ed ac c or din g t o t he s e l ect ed at t rib ut e: c hr ono logically ( d ates ) or alpha betic a l ly ( othe r c olu[...]

  • Pagina 108

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 8 1 1 . A V G S ca n n i n g By def ault , A V G I nte r ne t S e curity 201 3 doe s not ru n an y s c a ns , as af ter t he init ial on e (that y ou w i ll b e inv it ed t o lau nch ), y ou s hou ld be[...]

  • Pagina 109

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 9 I n t he S can Options dialog , y o u c an s ee t hr ee m ain s c a n c onf i gu ration s ec t ions : o M anage s chedul es s cans - Clic k t his opti on t o op en a ne w dialo g with an ov er v i ew [...]

  • Pagina 110

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 0 Sca n configu ra ti on e ditin g You c a n ed i t t he W hole compu t er s can c onf igu ra t ion i n t he S ca n whol e com pute r - S ett i ngs dialog (t he dia log is ac c es s ib le via t he S et [...]

  • Pagina 111

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 1 t he s cann ing f or s py wa re as w ell as f or v iru s es . S py w ar e re pre s ents a que s tiona ble malwa re c atego ry: ev en t ho ug h it us ua lly re pre s e nt s a s e c u rit y ris k , s o [...]

  • Pagina 112

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 2 o C om puter s hutdown op t i ons - deci de whe t her t he c omputer s h ould be s hut do wn au t omat ic ally on c e t he run ning s c ann ing pr oc es s is ov er . Ha v ing c onf irmed t his option [...]

  • Pagina 113

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 3 t he opti on of hav ing a s pecific fo lder s cann ed wh ile all it s s u b f olde rs ar e ex c l ud ed f rom t his s can; t o do t hat w rite a mi nu s s i gn " - " in f ro nt of t he autom[...]

  • Pagina 114

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 4 H ea l / rem ove virus i nfec tio n without as k ing m e (o n b y de f ault) : I f a v irus i s iden t i f ied dur ing s c ann i ng i t c an be he ale d automati c ally i f a c u re is av ailable . I [...]

  • Pagina 115

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 5 o C om puter s hutdown op t i ons - deci de whe t her t he c omputer s h ould be s hut do wn au t omat ic ally on c e t he run ning s c ann ing pr oc es s is ov er . Ha v ing c onf irmed t his option [...]

  • Pagina 116

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 6 W a rni ng : The s e s can s e t t i ng s ar e iden t i c al t o t he pa ra m eter s f or a new ly defi ne d s c an - as desc rib e d in t he AV G S c ann i ng / S c a n s c hed uling/ Ho w t o S c an[...]

  • Pagina 117

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 7 av g s ca nx f or 32 bits OS av g s ca na f or 64 bits OS Synta x of the com m a nd T he s y n t ax of t he c ommand f ollow s : av g s ca nx / para m et er . . . e.g. avgs canx / com p f or s c ann i[...]

  • Pagina 118

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 8 / EX T Sc a n t he s e ex t ensi on s / f or ex ample E X T = E X E , DL L/ / N OEX T D o not s c a n t he s e ex t ensi on s / f or ex ample NOEX T =JPG/ / ARC Sc a n ar c h i v es / C LEA N C lean a[...]

  • Pagina 119

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 9 / H I DD E N R ep ort f i les w it h hidde n ext ens ion s / I NFECT A BLE ON LY Sc a n f i les w i t h inf ec t able ex t ensi on s on ly / T HOR OU GH S CAN Enab le t hor oug h s c a nning / C LOU D[...]

  • Pagina 120

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 0 Lo c a t i on On ea c h t ab y o u c an s im ply s witc h t he " t raf fic l ight" bu t t on t o dea c tiv ate t he s c h edu led t es t t empo ra rily , an d s witc h i t on aga in as t he [...]

  • Pagina 121

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 1 C ontrols i n the di a lo g Save - S av es all c h ang es y ou hav e pe rf ormed on t his t ab or on any ot he r t ab on t his dialog , and s witc h es ba c k t o t he S c he du led s c ans ov e rv ie[...]

  • Pagina 122

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 2 R eport enhance d s et of P o te ntial l y Unwa n t ed P rograms ( off b y de f au l t ): mark t o de t ec t ex t en de d pa c kage s of s py w ar e: pr ogr ams t hat ar e per f ec t ly ok an d ha rml[...]

  • Pagina 123

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 3 C om puter s hutdown op t i ons - deci de whe t her t he c omputer s h ould be s hut do wn automati c ally on c e t he ru nn ing s c ann ing pr oc es s is ov er . Ha v ing c o nf irmed t his op t ion [...]

  • Pagina 124

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 4 C lic k t he S et addi tion al s ca n report s . . . l ink t o ope n a s t and alon e dia log win do w c a l led S ca n report s wh ere y ou c an t ic k s ev era l i t ems t o def ine w ha t s can f i[...]

  • Pagina 125

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 5 o C : P r og ra m Files o in 64- b it v er s i on C : P r og ra m Files (x 86 ) M y Documents folder o f or W in X P : C: Do c uments and S ett ings Def ault Us er M y Do c u m en t s o f [...]

  • Pagina 126

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 6 1 1.5. S c an Resu l ts T he S can res ul ts ove rvi ew dialo g pr ov ide s a l is t of re s ult s of all s o fa r per f or m ed s cans . T he c har t pro v ide s t he fo ll ow ing i nf ormation on ea[...]

  • Pagina 127

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 7 D i a log controls Vi ew det ai l s - Clic k t he bu t t on t o s ee detailed inf or m ation abo ut a s e l ect ed s c a n (h i gh l igh t ed in t he c ha rt ab ov e) . D elet e res u l ts - Clic k t [...]

  • Pagina 128

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 8 1 2 . V i rus V a u l t Vi rus V aul t is a s a f e env iro nment f or t he mana gemen t of s us pect / inf ec t ed ob jec t s detect ed dur i ng A V G t est s . On c e an i nf e c t ed ob jec t is de[...]

  • Pagina 129

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 9 C ontrol butt ons T he f ollowin g c ontro l butt ons ar e ac c es s ible f ro m t he V i rus Vaul t int er f ace: R es tore - re m ov es t he inf ec t ed f il e back t o i t s or i gina l l ocat ion [...]

  • Pagina 130

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 0 1 3 . Hi st or y T he His tory s ec t ion inc lude s inf or mati on on all pas t ev e nts (suc h as upd at es, s cans, detec t ions, et c . ) and re por t s abo ut t hese ev e nts . T his s e c tion i[...]

  • Pagina 131

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 1 - re d ic on wa rns t her e w as an i nf ec t ion detec t ed du ring t he s c an and i t c ou ld not be re m ov e d! Eac h ic on c an eit he r be s olid or c ut in half - t he s olid ic ons s tan ds f[...]

  • Pagina 132

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 2 W ithin t his wa rn i ng dialog y o u will f ind i nf o rmation on t he ob j ect t hat wa s detec t ed and ass ig ne d as inf ec t ed ( N ame ) , and s o m e desc ripti v e fa c t s on t he re c o gni[...]

  • Pagina 133

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 3 For each de t ect ed obje c t t he f ollow ing inf or m ati on i s pr ov i de d: D et ect i on n ame - de s c ription ( p os s ib ly ev en name ) of t he de t ec t ed obje c t and i t s loc ati on R e[...]

  • Pagina 134

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 4 1 3.3. Emai l Pr otec ti on d et ec ti on T he E m ai l P rote ction dete ct i on dialog i s ac c es s ible v ia t he Options / His tory / E m ail P rotec tio n det ect i on menu i t em i n t he up pe[...]

  • Pagina 135

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 5 1 3.4. On l i n e S h i e l d fi n d i n g s Onli n e S hi eld s c ans t he c ontent of v is ited we b pag es and poss ib le files inc lude d in t he m ev en be f or e t hese ar e dis pla y ed in y ou[...]

  • Pagina 136

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 6 For each de t ect ed obje c t t he f ollow ing inf or m ati on i s pr ov i de d: D et ect i on n ame - de s c ription ( p os s ib ly ev en name ) of t he de t ec t ed obje c t, and i t s s our c e ( w[...]

  • Pagina 137

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 7 1 3.5. Even t h i stor y l og T he E vent hi s tory l og dialog i s ac c es s ible v ia t he Options / His tory / E ve n t hi s tory l o g menu i t em i n t he up per l ine na v igation of t he AVG I [...]

  • Pagina 138

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 8 1 3.6. Fi r ew al l l og T he Log s dia log allow s y o u t o rev iew t he lis t of all logg ed Firew all ac t ions and ev ents with a detailed de s cription of re lev an t pa rameter s dis played on [...]

  • Pagina 139

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 9 C ontrol butt ons R ef res h l i s t - all logg ed par ameters c a n be arr ang ed ac c or din g t o t he s e l ect ed at t rib ut e: c hr ono logically ( d ates ) or alpha betic a l ly ( othe r c olu[...]

  • Pagina 140

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 0 1 4 . A V G Up dat e s N o s ec ur it y s o f t wa re c an gu ar antee t ru e pr ot ect i on f ro m v ario us t y pe s of t hr eats unless i t is reg ular l y upd at ed ! Vi ru s wr it ers ar e alwa y[...]

  • Pagina 141

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 1 1 4.3. Up da te l ev el s A V G I nte r ne t S e curity 20 13 of f ers t wo up date lev els t o s elec t f rom: D ef i ni ti ons updat e c o nt ain s c han ge s neces s ary f or re liable an t iv i ru[...]

  • Pagina 142

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 2 1 5 . FAQ an d T e chn ical S uppo r t Shou ld y o u ha v e an y s ales or t ec hn ic al t ro ub l e with y our AVG I nte rne t S e curity 201 3 app l ic at ion, t he re ar e s ev er al wa y s t o ob [...]

  • Pagina 143

    A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 3 on remov ing v iru s e s , s py wa re, an d adv ic e on how t o s tay pr ot ect ed. D i s cus s i on f orum : Y ou c an als o us e t he A V G users dis c u s sion f or um at htt p:/ / f or ums . av g.[...]