Instruction/ maintenance manual of the product Internet Security 2014 AVG
Go to page of 149
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 Doc um e n t r e v is i o n 2 014 .05 (21 .8.2 01 3) C o p y r ight A V G Te c hno lo gie s C Z , s.r .o .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 Con t e n t s .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . ..
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . ..
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 . I n t rod u c ti on T his us er manu al pro v ides c ompre hen s iv e us er documentat ion f or AVG I n t e rne t S e curity 20 14 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 . AV G Inst al la t i on Requ i reme n t s 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 . AV G Inst al la t i on Pr oce ss T o ins t all AVG I n t e rne t S e curity 20 14 on y our c o mputer , y ou ne ed t o ge t t he lates t ins t allati on f i le.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 3 . 2. W el c ome: L i c en s e Agr eem en t T he W elco.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 3 . 3. Ac ti vat e you r l i c en se I n t he A ct i vat.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 C anc el - c lic k t o exi t t he s e t up pr oc es s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 T o re v er t t o t he def au l t de s t ination pr e- s e t by t he s of t wa re v en do r us e t he De fault butt on.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 C anc el - c lic k t o exi t t he s e t up pr oc es s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 . 7.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 . 8.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 4 . Afte r I n sta l l a t i on 4 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 I f AVG fa i l s to i de nt i f y the E I CA R te s t fi l e a s a virus , you s houl d che ck the progra m conf i gura t io n a ga i n! 4 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 5 . AV G Us e r I n t e r face A V G I nte r ne t Se c.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 A V G gadget i s ac c es s ible f ro m t he W in do w .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 5 . 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 0 5 . 1.4. Opti on s T he m ainten an c e of AVG I nte rne t S e c u rity 201 4 is ac c es s i ble v ia t he Opt i ons it em.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 1 c ompo ne nt. H elp conte nts - Open s t he A VG help f i les . Ge t s uppo rt - Ope ns t he A V G web s ite ( h t t p: / / w w w .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 2 - t he or ang e ic o n indic ates t ha t A V G I ntern.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 3 A ct i o ns a c ce s s i bl e M ove m ous e over any com ponent 's i con t o high l igh t it within t he c o mpon ents ov er v i ew .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 4 Scan n ow - T he butt on is gra ph i c ally div ide d int o t wo s ec t ion s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 5 T he A VG S ys tem Tray I con als o inf or ms abo ut c urr ent ac t iv it ies w it hin y our AVG I nte rne t S e c uri t y 201 4 , an d on po s s i ble s t at us c h ang es i n t he pr og r am ( e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 6 A V G ga dge t cont rol s I f ne ed ed , t he A V G ga dg et allow s y ou t o lau nch a s can or an up da t e im media t ely .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 7 5 . 8.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 8 5 . 9. AV G Ac c el erator A V G A cce l era tor allow s s moo t her on l ine v ide o playback and m ak es add it iona l do w nloa ds easi er .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 9 6 . AV G C omp on e n t s 6 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 0 En abled / D i s abled - T he bu t t on may re m ind y ou of a t raf f ic li gh t, both in app ea r an c e and in f unct i on ality .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 1 Firs t , y ou ha v e t o s pec if y y our s a f e&apos.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 2 A cce s s - t he c heck box es i n t his s ec t ion ena ble y ou t o c rea t e c onv en ien t s hor t c u t s t o y o ur data s a f e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 3 c ompu t er s imply by v is i t ing t he af f ec t ed s it e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 4 D et ai l s - Clic k t he butt on , an d a brie f desc r i ption of t he high lighted s er v i c e app ea rs in t he bo t t om pa r t of t h dialog .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 5 En abled / D i s abled - T he bu t t on may re m ind y ou of a t raf f ic li gh t, both in app ea r an c e and in f unct i on ality .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 6 mes s age s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 7 on ly ! Stat i s ti cs - C lic k t he bu t t on t o get re dir ect ed t o t he ded ic at ed pag e on t he A V G we bsi t e (h t t p:/ / w w w.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 8 A va i l a bl e Fi re w a l l m ode s Fire w all allow.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 9 D i a log controls T he dialog pr ov i de s an ov er v.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 0 T he f ollow i ng c a t eg or ies c an be ana l y z ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 1 T he result s ov erv iew pro v ides t he numb er of detec t ed s y s tem pr ob l ems c l ass if ied ac c or ding t o t he respect i v e c atego rie s t es t ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 2 7 . AV G S e cu rit y Tool bar A V G S ec uri t y Too .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 3 D o Not Track - t he DN T s er v ic e help s y ou iden t if y we bs it es t hat ar e c ollec t ing data abo ut y our online act i v i t ies , an d giv es y ou t he c hoic e t o allow or dis allow i t .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 4 A V G S ec uri t y Too l bar . Shor t c ut butt ons f or quic k ac c es s t o t hes e app l ic at ion s : Ca l culat or , Not epad , W i ndows E xplorer .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 5 8 . AV G D o Not Tr a ck A V G Do Not T ra ck helps y ou iden t if y we bs it es t hat ar e c ollec t ing data abo ut y our online act i v i t ies .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 6 Al l detec t ed data c ollec t ion s er v i c es ar e lis ted in t he Trac k ers o n this page ov erv iew .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 7 B l ock A ll - Clic k t he bu t t on loc ated in t he .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 8 s er v i c e s h ould be allow ed or block ed i nd iv idu ally . Y ou may allow run nin g of s ome of t he detec t ed s y s tems (e .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 9 9 . AV G A dv a n ce d S et t i n gs T he adv an c ed c onf igu ra t i on dia log of A V G I n t e rne t S e curity 201 4 ope ns i n a new wind ow name d A dv anc ed A V G S et tin gs .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 0 Press t he Re s tart A VG now bu tt on t o ag r ee w i.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 on . o Em a il S canner notificat i o ns (o n, b y defau lt ) - deci de w he t he r inf or mati on on s c ann i ng of all inc oming an d outgo ing email mes s age s s hou ld be dis play ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 2 9 . 2.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 3 9 . 3.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 4 9 . 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 5 A s k m e before rem ovin g thre ats ( on b y de fault.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 6 I n t he F i l es S canned by t he Re s i dent S hi el.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 7 Scan appl i cat i on s an d S ca n dri ve rs en ab l e y ou t o s pecify in de t ail w ha t s hou l d be inc lude d in an t i-r ootk i t s c ann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 8 9 . 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 9 9 . 5.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 0 R eport P ote ntiall y U nwant ed P rog rams and S pywa re thre ats ( on b y de fault ) - c heck t o ac t iv ate s c ann ing f or s py wa re as w ell as fo r v iru s es .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 1 t o email mes s age s with att ac hmen t s : By def au l t , t he c er t if i c ati on t ext c o ns is ts of j ust a ba s ic inf or mat ion t ha t s t ates No v i ru s f oun d in t his mes s age .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 T he A t tac hm ent f i l te r dialog allow s y o u t o s e t up par ame t er s f or email mes s age at t ac hmen t s cann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 3 I n t his dia log y ou c an s et up a new E mail S c a.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 4 au t omatic ally c rea t ed " A utoP OP3" s er v ers t his f ield is dea c tiv ated.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 5 SM TP S erve r Na m e - in t his f ield y ou c a n s p.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 6 I n t his dia log y ou c an s et up a new E mail S c a.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 7 au t omatic ally c rea t ed " A utoI M A P " s er v ers t his f ield is de ac t iv a t ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 8 I n t he A nt i -Spam S ett i ngs dialog y ou c an c heck /uncheck t he Turn on A nt i -Spam p rot ec tion c heck b ox t o allow / pr oh ibit t he an ti -spam s cann ing of email c ommunic ation.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 9 A dd rec i pi ents of s ent em ail s to whi t eli s t .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 0 c ommunic ation with t he Mails hell s er v e rs, i. e. t he s c ann ed da t a will be c ompa re d with M ails hell da t ab as es on line.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 1 impor t i t by s e lec t ing t his bu t t on . T he c ontent of t he f i le m us t c on t ain on ly one it em ( a dd ress , do main na me ) pe r line.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 2 The E xpert S et tings branch conta i ns ex te ns i ve s et tin g options for t he A nt i -Spam fea ture.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 A dd 'Secure d by Li nk S ca nner'.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 4 de t ect ed t hr ea t : v i a s t and ar d po p- up dialog , v ia t r ay balloo n notif ic at ion, or v ia t r ay i c on inf o.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 5 c ompu t er b eing i nfec t ed ) y ou may c heck t his.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 6 W h en t he I de nt it y P rotec t ion is ac t iv ated.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 7 9 . 8.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 8 Scan i n s i de archives ( off b y defau lt ) - t his par amet er s tipulates t ha t s cann ing s hou l d c hec k all f i les s t or ed i nsi de ar c h iv es , e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 9 9 . 8.2. S p ec i fi c Fi l es o r Fol d ers Sc an T he editi ng interf ac e f or S ca n S pec i f i c Fi l es or Fol ders is iden t ic al t o t he W ho l e Co mputer Sc a n ed it ing dia log.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 0 T he l is t of par ameters i s iden ti c al t o t hose av ailab le fo r t he S c a n of t he W h ole C ompu t er .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 1 9 . 8.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 2 9 . 9.1. S c h edu l ed Sc an T he par amet er s of t he s c hed uled s can c an be edited ( o r a new s c h ed ule s et up ) on t hr ee t ab s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 3 A dva nce d s che dul e optio ns T his s e c t ion all.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 4 R eport enhance d s et o f pote ntiall y unwant ed pro.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 5 s w it c hed on b ut nob od y is c urr ently w or k ing on it ). On t he other han d, y o u c an de c re ase t he s y s tem re s o ur c es us ed by ex t end ing t he s c ann i ng du r ation.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 6 On t he Locat i on t ab y o u c an de f i ne w he t he r y ou wa nt t o s c h ed ule s c ann ing of t he w ho le c o m pu t er or s c ann ing of s pecific files or f older s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 7 Finally , c heck t he Run t he u pdat e again as s oon.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 8 Ot he r upda te s e t t i ngs C he c k t he Run the up.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 9 A dva nce d s che dul e optio ns T his s e c t ion all.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 0 R equire conf i rm at i on f rom the us er (b y defau .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 1 9 . 10 .1. Pr ox y T he pro x y s e rv er is a s t and - alon e s er v er or a s erv ic e r un ning on a PC t hat gua r an t ee s s af er c onn ec t ion t o t he I nt er net.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 2 c on ne c t ing t o t he In t ern et v ia t he pr oxy s e r v e r.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 3 M ove down - m ov es t he s e lec t ed U R L one pos it ion dow n i n t he lis t 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 4 T he c h art in t he dia log dis plays a l is t of ex c eptions, i f any hav e bee n alre ady de fin ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 5 9 . 12 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 6 9 . 13 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 7 W ithin t he dialog , t he f ollow i ng s e t t ing op.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 8 max im um s a f ety . Mos t com m on t hre a ts N ow ada y s , t her e ar e f ar more t hre at s out t her e t ha n plain v i ru s e s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 9 9 . 15 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 0 re m embe r t he un iqu e at t r ibutes of t he netwo rk (s pe c if ic a lly t he M A C ad dr es s ) , and w ill no t dis pla y t he no t if i c ati on ne x t t ime.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 1 1 0 . Firew a l l S e t t i ngs T he Fi re wall c o nf igu ra t i on op ens in a ne w w indo w whe re in s ev er al dialog s y ou c an s et up ad v anc ed pa r ameter s f or t he c ompon ent.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 2 Fire w all allow s y ou t o def ine s peci f i c s ec ur i t y ru les ba s ed on w he t he r y our c omputer is l ocat ed in a do main, i s a s t and alo ne c ompu t er , or ev en a notebo ok.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 3 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 4 do not m odify the s et tin gs ! C ontrol butt ons T he l is t c an be edited us ing t he f ollow ing c ontro l bu t t on s : A dd - op en s an empty dialog f or de f ining new app l ic at ion ru l es.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 5 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 6 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 7 Ed i t net work - ope ns t he Ne tw ork propert i es.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 8 A ction - T his c olumn dis play s an ic on f or t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 9 re s p ect iv e l og ac t ion, us er na me, P I D , .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 0 C ontrol butt ons R ef res h l i s t - all l og ged .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 1 1 1 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 2 I n t he S can Option s dia log, y ou c an s ee t hr.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 3 Sca n configu ra ti on e ditin g You c a n ed it t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 4 R eport P ote ntiall y U nwant ed P rog rams and S pywa re thre ats (on b y de fault ) - Ch ec k t o ac t iv a t e t he s c ann i ng f or s py wa re as w ell as fo r v i r uses .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 5 o C om puter s hutdown o ptions - deci de w he t he r t he c ompu t er s h ou l d be s hut dow n au t omatic ally once t he run nin g s c a nn ing pr oc es s is ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 6 W a rni n g: These s c an s et t ing s ar e iden t i.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 7 Sca n configu ra ti on e ditin g You c a n ed it t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 8 s c ann ing f or s py wa re as w ell as fo r v iru s es .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 9 o C om puter s hutdown o ptions - deci de w he t he r t he c ompu t er s h ou l d be s hut dow n au t omatic ally once t he run nin g s c a nn ing pr oc es s is ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 0 W a rni n g: These s c an s et t ing s ar e iden t i.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 1 Sca n configu ra ti on e ditin g You c a n ed it t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 2 W ithin W ind ow s E x plor er high light t he f i l.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 3 if a pa ra m eter re qu i re s s peci f i c v a lue t o be pr ov ided (e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 4 / LO G Ge ne ra t e a s c a n re s ult f il e / MA C.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 5 1 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 6 1 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 7 1 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 8 U s e heuri s tics ( on b y de fault ) : he ur i s t.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 9 o Sel ec te d fil e ty pes - y ou c an s peci f y t .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 0 1 1.4.3. L oc ati on On t he Locat i on t ab y o u c an de f i ne w he t he r y ou wa nt t o s c h ed ule s c ann ing of t he w ho le c o m pu t er or s c ann ing of s pecific files or f older s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 1 W indows fold er - C: W ind ows Ot her o Syst em dri.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 2 o N o inf ec t ions fo und , s c an c ompleted o N o.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 D et ect i o ns - T his t ab is only dis pla y ed if.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 4 1 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 5 1 3 . V i rus V a u l t Vi rus V aul t is a s a f e env iron m en t f or t he mana gemen t of s us pe c t / inf ec t ed ob jec t s de t ect ed dur i ng AV G t es t s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 6 C ontrol butt ons T he f ollow i ng c o ntro l bu t .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 7 1 4 . Hi st or y T he His tory s ec t ion inc lude s inf or mat ion on all pa s t ev ents (s uch as upd ates , s c ans, detec t ions, et c .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 8 - re d ic on wa rn s t her e w as an i nf ect ion de.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 9 W ithin t his wa rn i ng dia log y ou will f i nd in.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 0 For eac h detec t ed object t he f ollow ing i nf or.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 1 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 2 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 4 For eac h detec t ed object t he f ollow ing i nf or.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 5 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 6 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 7 1 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 8 Prog r am up da t e s c hed ule N ote : I f a s c h .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 9 1 6 .
An important point after buying a device AVG Internet Security 2014 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought AVG Internet Security 2014 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data AVG Internet Security 2014 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, AVG Internet Security 2014 you will learn all the available features of the product, as well as information on its operation. The information that you get AVG Internet Security 2014 will certainly help you make a decision on the purchase.
If you already are a holder of AVG Internet Security 2014, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime AVG Internet Security 2014.
However, one of the most important roles played by the user manual is to help in solving problems with AVG Internet Security 2014. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device AVG Internet Security 2014 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center