Ir para a página of
Manuais similares
-
Antivirus software
Bitdefender Antivirus 2010
253 páginas -
Antivirus software
Bitdefender Total Security 2014
223 páginas -
Antivirus software
Bitdefender Total Security 2013
200 páginas -
Antivirus software
Bitdefender Security for Exchange
243 páginas -
Antivirus software
Bitdefender Internet Security 2014
194 páginas -
Antivirus software
Bitdefender Internet Security 2010
356 páginas -
Antivirus software
Bitdefender AntiVirus Plus 2013
131 páginas -
Antivirus software
Bitdefender Internet Security 2013
171 páginas
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Bitdefender 8 Standard. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoBitdefender 8 Standard vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Bitdefender 8 Standard você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual Bitdefender 8 Standard, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual Bitdefender 8 Standard deve conte:
- dados técnicos do dispositivo Bitdefender 8 Standard
- nome do fabricante e ano de fabricação do dispositivo Bitdefender 8 Standard
- instruções de utilização, regulação e manutenção do dispositivo Bitdefender 8 Standard
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Bitdefender 8 Standard não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Bitdefender 8 Standard e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Bitdefender na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Bitdefender 8 Standard, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Bitdefender 8 Standard, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Bitdefender 8 Standard. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
BitDefender 8 Standard User Guide[...]
-
Página 2
Table of Contents Terms of agreement ............................................................................. 4 Software licensing ......................................................................................................................... 4 License and warranty .....................................................................[...]
-
Página 3
Table of contents 3 Automatic Update .........................................................................................................................20 Product registration ................................................................................................................ 20 Management console settings ........................[...]
-
Página 4
Terms of agreement Software licensing The BitDefender package is protected by the copyright law and the international treaties regarding the copyright, as well as other laws and treaties regarding the intellectual property. The copyright law, as well as other intellectual property laws, protects in many countries the software owner's rights, a[...]
-
Página 5
Terms of agreement License and warranty IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE. BY CLICKING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT[...]
-
Página 6
Terms of agreement resulting upgraded product only in accordance with the terms of this License Agreement. If BitDefender is an upgrade of a component of a package of software programs that you have licensed as a single product, BitDefender may be used and transferred only as part of that single product package and may not be separated for use on m[...]
-
Página 7
Terms of agreement GOVERNMENT RESTRICTED RIGHTS/RESTRICTED RIGHTS LEGEND. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of Commercial Computer Software-Restricted R[...]
-
Página 8
BitDefender Rescue System BitDefender 8 Standard comes with a bootable CD ( BitDefender Rescue System based on LinuxDefender ) capable to scan and disinfect all existing hard drives before your operating system starts . You should use BitDefender Rescue System any time your operating system is not working properly because of virus infections. That [...]
-
Página 9
BitDefender Rescue System Figure 1 Install the NTFS-driver Click the Install NTFS Write Drivers icon using your left mouse key. In the window that will appear, click Forward twice. This will start the NTFS Driver installation. BitDefender Rescue System requires two drivers ( ntoskrnl.exe and ntfs.sys ) in order to read the files on your hard disk. [...]
-
Página 10
BitDefender Rescue System Figure 2 The following options are available: Scan Archives - Scan inside archives. Scan Packed – Scan packed programs Scan Mail - Scan the mail database QuarDir – The default path to the quarantine folder is: /ramdisk/BitDefender/var/quarantine . If you want to change the quarantine folder click Browse[...]
-
Página 11
BitDefender Rescue System Start the scan process Click the Scan tab. Figure 3 In the Scan Dir field you must specify the path to the hard disk you want to scan. Examples: If you have one hard disk with 3 partitions, you must scan each partition separately. • /mnt/hda1 – for the first partition; • /mnt/hda2 – for the second partition; • /m[...]
-
Página 12
Product installation System requirements To ensure a proper functioning of the product, before installation, verify that the following system requirements are met: Minimum Processor : Pentium 200MHz Minimum hard disk space : 40MB Minimum RAM Memory : 64MB (128MB Recommended) Operating system : Windows 98/NT-SP6/ME/2000/XP; Internet Explorer 4.0 (+)[...]
-
Página 13
Installation Figure 4 Installation steps: 1. Click Next to continue or click Cancel if you want to quit installation. 2. Click Next to continue or click Back to return to the first step. 3. Please read the License Agreement , select I accept the terms in the License Agreement and click Next . If you do not agree with these terms click Cancel . The [...]
-
Página 14
Installation You can select the folder where you want to install the product. The default folder is C:Program FilesSoftwinBitDefender 8 . If you want t select the fo o select another folder, click Browse and in the window that will open, lder you wish BitDefender to be installed in. Click Next . 7. You onnected to the Internet to update. end of [...]
-
Página 15
Description and features Description BitDefender Standard Edition is a powerful antivirus tool with features that best meet your security needs. Ease of use and automatic updating make BitDefender Standard Edition an "install and forget" antivirus product. Main Features BitDefender 8 Standard includes 2 protection modules: Antivirus and U[...]
-
Página 16
Description and features Quarantine zone Suspicious/infected files can optionally be backed up into a safe quarantine area before being disinfected or deleted. The contents of the quarantine can be sent to BitDefender Labs, for detailed analysis. Files that proved harmless can be easily moved out of quarantine, back to their original place. Full e-[...]
-
Página 17
The Management Console General view BitDefender 8 Standard was designed with a centralized management console, which allows the configuration of the protection options for all BitDefender modules. In other words, it is enough to open the management console in order to have access to all modules: Antivirus and Update . To access the management conso[...]
-
Página 18
The management console When the console is minimized, an icon will appear in the system tray ( Figure 6 ). Figure 6 Figure 7 If you double-click this icon, the management console will open. Also, by right-clicking it, a pop menu, as in Figure 7 , containing the following options, will appear. Show – opens the management console. Close –[...]
-
Página 19
The management console General module BitDefender comes fully configured for maximum security. Essential status information about all the BitDefender modules is displayed in the General module. The General module contains 4 different sections: Status , Registration , Settings and About . Status Here you can review information regarding the product [...]
-
Página 20
The management console Automatic Update New viruses are found and identified every day. This is why it is very important to keep BitDefender up to date with the latest virus signatures. It displays the date of the last update and the number of viruses that can be detected (and therefore disinfected) from your BitDefender database. To protect your c[...]
-
Página 21
The management console Figure 11 Type in the license key in the Serial field. Click Register to finish the registration process. If you mistype the license key you will be prompted to re-enter it. If you type in a valid license key a success message box appears. In the Registration section now, you can see the expiring date of the new license key. [...]
-
Página 22
The management console The next window will appear: Figure 13 Input the password in the Password field, re-type it in the Retype password field and click OK . From now on, if you want to change the BitDefender configuration options, you will be asked to type in the password. If you forgot the passw ord you w ill have to repair the product in order [...]
-
Página 23
The management console About In this section you can find the contact information and the product details. BitDefender TM provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management for over 38 million home and corporate users in more than 100 countries. BitDefende[...]
-
Página 24
The management console Antivirus module BitDefender protects you from viruses entering your system by scanning your files, e- mail messages, downloads and all other content as it enters your system. More features From the antivirus module you have access to all BitDefender antivirus settings and features. On-access scanning and On-demand scanning V[...]
-
Página 25
The management console On access scanning In case you haven’t already opened the managem ent console, you can access it from the Windows Start menu, following the path Start → Programs → BitDefender → BitDefender 8 Standard or quicker, double click the BitDefender icon from the system tray. In the management console, click Antivirus . Figur[...]
-
Página 26
The management console Registry Control keeps an eye on the Windows Registry - this is again useful for detecting Trojan horses. It will alert you whenever a program will try to modify a registry entry in order to be executed at Windows start-up. Figure 15 You can deny this modification by clicking No or you can allow it by clicking Yes . If you wa[...]
-
Página 27
The management console Select the most important settings To select an option, just click with the mouse on the corresponding check box: Scan incoming email – all the incoming e-mail messages will be scanned by BitDefender. This is highly recommended! Scan accessed files – all the accessed files will be scanned by BitDefender. Show [...]
-
Página 28
The management console Select Scan accessed files and P2P transfers to scan the accessed files and the communications through Instant Messaging Software applications (ICQ, NetMeeting, Yahoo Messenger, MSN Messenger). Further on, select the type of the files you want to be scanned. The following options are available: Option Description Scan all[...]
-
Página 29
The management console The following options are available. Action Description Deny access and continue In case an infected file is detected, the access to this will be denied. Clean file To disinfect the infected file. Delete file Deletes the infected files immediately, without any warning. Move to quarantine The infected files are moved into quar[...]
-
Página 30
The management console On demand scanning The main objective for BitDefender is to keep your computer clean of viruses. This is first and foremost done by keeping new viruses out of your computer and by scanning your e-mail messages and any new files downloaded or copied to your system. There is a risk that a virus is already l odged in your system[...]
-
Página 31
The management console Figure 18 The section contains the following buttons: Add file(s) – opens, a browsing window, where you can select the file(s), you want to scan. Add folder(s) – same as above, but you select which folder(s) you want BitDefender to scan instead of which file(s). TIP: Use drag & drop to add files/folders to the[...]
-
Página 32
The management console 4. Select the scan options – only for advanced users Advanced users might want to take advantage of the scan-settings BitDefender offers. The scanner can be set to skip file extensions, di rectories or archives that you know to be harmless. This may greatly reduce scanni ng times and improve your computer's responsiven[...]
-
Página 33
The management console Option Description Use heuristic detection To use heuristic scanning of the files. The aim of heuristic scanning is to identify new viruses, based on certain patterns and algorithms, before a virus definition is found. False alarm messages can appear. When such a file is detected it is classified as suspicious. In these cases[...]
-
Página 34
The management console Action Description Rename To change the extension of the infected files. The new extension of the infected files will be .vir . By renaming the infected files, the possibility of executing and thus of spreading the infection is removed. At the same time they can be saved for further examination and analysis. Copy to quarantin[...]
-
Página 35
The management console 5. Scan for viruses With the scan options selected, all you have to do is to effectively start the system scanning. For that, just click Scan . This may take a while, depending on the size of your hard disk drive! Figure 20 While scanning, BitDefender will show you its progress and alert you if any viruses are found. Select t[...]
-
Página 36
The management console 6. Alternative scanning methods BitDefender has two alternative methods for scanning files immediately: using the contextual menu and by drag & drop feature. Contextual scanning Figure 21 Right click the file or folder you want scanned and select the Scan with BitDefender 8 option. A report file named vscan.log will be cr[...]
-
Página 37
The management console Figure 24 You can view the name of the file and the name of the virus. You can select one of the following actions on the infected file: Disinfect - to disinfect the infected file. Delete – to delete the infected file. Copy to quarantine – to copy the infected file in the quarantine zone. Move to quarantin[...]
-
Página 38
The management console Scheduled scanning Since the scanning will take some time, and works best if you have closed all other programs, it is best for you to schedule the scanning at a time when you are not using your computer and it is standing idly by. Thi s implies that the user must previously create a so-called task, job or scan event. It has [...]
-
Página 39
The management console The Scheduler's screen also contains a list where all the scan tasks can be seen, with their names, the date of the first execution, the date of the next execution and the task's type (periodically or one time only). The Scheduler includes a wizard for creating new scan tasks. This will assist you any time you need [...]
-
Página 40
The management console Figure 27 Type in the At every edit box the number of minutes / hours / days / weeks / months / years you want to repeat this process. You can click the up/down arrows of this box in order to increase / decrease the number of minutes / hours / days / weeks / months / years. Select the interval - minutes, hours, days, weeks, m[...]
-
Página 41
The management console 4. Target Path Here you have to specify the path to the objects that will be scanned, as observed in the picture. This step is necessary if you have selected to scan files in the previous step. Figure 29 This screen is actually an exploring window that lets you select the partitions and folders to be scanned. When the cursor [...]
-
Página 42
The management console If you wish to see information about all scanned files, infected or not, select the option List all scanned files . But remember, w ith this option on, the computer will slow down. Click Next . 6. Analysis Ty pe Select the scan type. Figure 31 This, as it can be observed from the picture, implies selecting one of the two scan[...]
-
Página 43
The management console We recommend you to select the first action Clean and the second action Move to quarantine . For the first action the following options are available: First Action Description Clean file To disinfect the infected files. Delete file To automatically delete, without any warning, all the infected files. Action not recommended! M[...]
-
Página 44
The management console 8. Report Info Choose how to create a scan report file. Figure 33 To create a scan report, click Create report file . At this moment all the other options for the creation of a report file will be enabled. Type the name of the report file in Report file name box. By default, its name is schedule.log . It will contain all the [...]
-
Página 45
The management console For each scheduled scan event, you can view its name, its description, the starting date, the next moment when it will be launched, the scan type (periodically or one time scan), the target, the files extensions, the analysis type and the action on the infected files. When modifying a scan event, the same steps w ill be fo ll[...]
-
Página 46
The management console Isolating the infected files BitDefender allows isolating the infected or suspicious files in a secure area, named quarantine. By isolating these files in the quarantine, the risk of getting infected disappears and, at the same time, you have the possibility to send these files for further analysis to the BitDefender lab. The[...]
-
Página 47
The management console Delete – deletes the selected file from your computer. Restore – returns the selected file to its original location. Send – sends the selected files for further analysis to the BitDefender lab. You must specify some information before you may submit these files. For that click Settings and complete the field[...]
-
Página 48
The management console Viewing the report files When launching a scan process, the user has the possibility to opt for creating a report file where he can see information about the scan process. The user may view these reports straight from the management console. In case you haven’t already opened the managem ent console, you can access it from [...]
-
Página 49
The management console Refresh – if the management console is open at the Report section and in the meantime you perform a scan of your com puter, the new report file with the scan results (if you selected the Create report file option) will be visible only after you click Refresh . Browse – opens a window in which you can select the re[...]
-
Página 50
The management console Removing a found virus Viruses are much easier to stop from entering your system, rather than removing them once they are inside your computer. This is why the virus protection should always be enabled and updated. If BitDefender does detect a resident virus it is recommended to let BitDefender try to remove it. This may fail[...]
-
Página 51
The management console Update module New viruses are found and identified every day. This is why it is very important to keep BitDefender up to date with the latest virus signatures. By default, BitDefender automatically checks for updates every three hours. Features Updates come in three flavors: • Product upgrades - when a new product version i[...]
-
Página 52
The management console Manual update In case you haven’t already opened the managem ent console, you can access it from the Windows Start menu, following the path Start → Programs → BitDefender → BitDefender 8 Standard or quicker, double click the BitDefender icon from the system tray. In the management console, click Update . Figure 39 The[...]
-
Página 53
The management console Automatic update If you're an advanced user, click the Settings tab in order to configure the Update module. Figure 40 Updates can be performed from the local network, over the Internet, directly or through a proxy server. The window with the update settings contains three categories of options ( Update location settings[...]
-
Página 54
The management console Syntax: domainuser . • Proxy password - type in the valid password for the previously specified user Automatic update options Automatic check for updates – This ensures that BitDefender automatically checks our servers for available updates. • Automatic update - If BitDefender detects a new update on our servers, t[...]
-
Página 55
Best practices Antivirus Steps to follow in order to ensure a computer free from viruses: 1. After the installation process is over, please register your product, as described in the Product registration section. 2. Perform a manual update of your virus signatures. In the BitDefender Management Console , enter the Update module and click Check . 3.[...]
-
Página 56
Frequently Asked Questions General 1. Q : How can I tell if BitDefender is actually working ? A: In the General module, access the Status A: In the General module, access the Status section and look at the statistics. 2. Q : What are the system requirements? A: You can see the system requirements in the Installation section. 3. Q : How do I uninsta[...]
-
Página 57
Frequently Asked Questions Update 10. Q : Why is it necessary to update BitDefender? A: Every time you perform an update new virus signatures will be added to the scan engines, new rules will be added to the Heuristic & URL filters. 11. Q : How can I update BitDefender? A: By default, BitDefender will automatically update every 3 hours. But you[...]
-
Página 58
Vocabulary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs, rather than static pages. With ActiveX, users can ask or answer questions, use push buttons, [...]
-
Página 59
Vocabulary Cookie Within the Internet industry, cookies are described as small files containing information about individual computers that can be analyzed and used by advertisers to track your online interests and tastes. In this realm, cookie technology is still being developed and the intention is to target ads directly to what you've said [...]
-
Página 60
Vocabulary 60 Java applet A Java program which is designed to run only on a web page. To use an applet on a web page, you would specify the name of the applet and the size (length and width--in pixels) that the applet can utilize. When the web page is accessed, the browser downloads the applet from a server and runs it on the user's machine (t[...]
-
Página 61
Vocabulary Port (1) An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally, there are several ports for connecting disk drives, display screens, and keyboards. Externally, personal computers have ports for connecting modems, printers, mice, and other peripheral devices. (2) In TCP/IP[...]
-
Página 62
Vocabulary Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your will. Most viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can copy itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will qu[...]
-
Página 63
Contact information As a valued provider, SOFTWIN strives to provide its customers an unparallel level of fast and accurate support. The Support Center is continually updated with the newest virus descriptions and answers to common questions to help you find answers to your problems in a timely manner. We at SOFTWIN, are dedicated to saving cust om[...]