Instruction/ maintenance manual of the product Internet Security 2012 AVG
Go to page of 197
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 Doc um e n t r e v is i o n 2 012 .24 (19 .6.2 01 2) C o p y r ight A V G Te c hno lo gie s C Z , s.r .o .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 Con t e n t s .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . ..
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 . I n t rod u c ti on T his us er manu al pro v ides c ompre hen s iv e documentation f or AVG I nte rne t S e c urity 201 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 . AV G Inst al la t i on Requ i reme n t s 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 . AV G Inst al la t i on Pr oce ss W he re do I ge t t.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 A tt ent i o n: A t t he m oment you are o nl y s el ec t i ng the l anguage of the i ns ta l l at i on proce s s .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 B ac k - Clic k t o re t urn one s t ep ba c k t o t he pr ev i ou s s et up dia log. A cce pt - Clic k t o c on f i r m y o u ha v e re ad , und er s tood , and acc e pted t he lic e ns e ag r ee ment.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 Press and hold Ct rl , and t hen pr es s C . T his c opies t he numb er . Point an d c li c k t he posi t ion wh ere y o u wo uld lik e t o pa s t e t he c o pied nu mber .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 c ombine d with t he opti mal use of re s o ur c e s .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 3 . 5.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 . 6.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 . 7.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 4 . Afte r I n sta l l a t i on 4 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 Fro m t he htt p: / / w w w.eic ar . c o m we bsi t e y ou c an als o do w nlo ad t he c ompr es s ed v er s io n of t he EIC A R ' v i ru s ' ( e .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 5 . AV G Us e r I n t e r face A V G I nte r ne t Se c.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 A V G gadget (W i nd ow s s id eb ar , s upp orted in W i nd ow s V is ta/ 7) allow s quick ac c es s t o s c ann ing an d upd at ing within AVG I nte rne t S e c u rity 201 2 - de t ails > > 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 5 . 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 0 5 . 1.5. H el p C onte nts - ope ns t he A V G he lp files Ge t S upport - op en s t he A V G we bsi t e (h t t p:/ / ww w.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 1 T he Li cens e and Su pport t ab pr ov ide s inf or ma.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 2 T he P roduct I nform at i on t ab pro v ides an ov er.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 3 On t he P rogram t ab y ou c an f i nd inf or mati on .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 4 On t he Li ce ns e A gre ement t ab y ou c an re ad t he f ull wo r ding of t he li c ense ag r ee ment be t we en y ou an d A V G T ec hn olo gies: 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 5 t he A VG I nte rne t S e c uri ty 201 2 main w indo w.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 6 y ou op en t he AV G s c a nning i nter f ac e whe re y ou c an ru n s cans, s ched ule s c ans, or edit t he ir par ameters.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 7 A nti - R ootk i t s cans fo r da ng ero us ro otk i t.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 8 A V G S ys t e m Tra y I con di s pl a y I n f ull c o.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 9 I nte rne t S e curity 20 12 ; jus t do uble- c lic k t he ic o n.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 0 Spec if i c ally , A VG A d vis or monit or s t he f ollow ing: The s tat e of any curre ntly o pene d web brows er .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 1 Quick a cc e s s to s ca nni n g a nd u pda t i n g I .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 2 Twitte r l i nk - op en s a new A VG gadget i nter f ac e pro v iding an ov er v iew of t he l ates t AV G f ee ds post ed t o T wit t er .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 3 6 . AV G C omp on e n t s 6 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 4 6 . 1.2. R esi den t Pr otec t i on A V G I nte r ne t Se curity 20 12 giv es y ou c ontinuo us pro t ec t ion in t he f orm of s o -c alled re s ide nt pr ot ect i on .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 5 C onfigura tion opti ons T he dialog pr ov i de s s ome elementar y c onf igur at ion op t ion s f or f ea t ur es av ailable within t he A nt i - Vi rus c o mpon ent.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 6 op t ion on t o ac hiev e max im um s ec ur i t y lev els , how ev er it i s s witc h ed of f by de f ault.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 7 6 . 1.5. R esi den t Sh i el d D etec t i on s R es ident S hi eld s c ans f iles as t he y ar e c opied , ope ne d, or s av ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 8 R e s i d e nt S hi e l d de t e c ti ons ove r vie w .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 9 de f ault A V G main dialog ( c ompo ne nts ov erv iew ) .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 0 6 . 2.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 1 En te ri ng s uch webs ite i s hi gh l y ri s k y and cannot be recomm ended! 6 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 2 C l os e - c lic k t he butt on t o c lo s e t he wa rn i ng dia log.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 3 R ef res h l i s t - upd ate t he li s t of f ind ings detec t ed by Onl i ne Sh i eld B ac k - s wit c h bac k t o t he def ault AV G main dia log (compon en t s ov erv iew ) 6 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 4 A nti - S pam c h ec k s all inc oming e- mail m ess a ges an d marks un w an t ed e- m ails as s pam.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 5 I n t he E -m ail P rotec t i on dialog y o u c an als.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 6 6 . 3.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 7 B ac k - s wit c hes y ou back t o t he pr ev iousl y dis played dialog .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 8 ad ap t ers 6 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 9 T he pro f ile s witc h ing f eatur e allow s t he Fir.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 0 Sel ec t Fi rewa l l profil e - fr om t he ro ll-d ow .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 W ha t i s a rootk i t? A roo t k it is a pro gr am de.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 2 I n t he bott om par t of t he dialog y o u c an s et up s ome elemen t ar y f un c tions of t he roo t k it pre s e nce s c ann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 3 6 . 6.1. Pr oc ess es T he P roce s s es dialog c ontains a lis t of pr oces s es ( i.e. ru nning app lic a t ion s ) t hat ar e c urr ently ac t iv e on y ou r c omputer .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 4 B ac k - s wit c hes y ou back t o t he def au lt A VG m ain dialo g ( c ompo nen t s ov er v iew ) 6 . 6.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 5 C ontrol butt ons T he c o nt ro l bu t t on s av aila.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 6 R emove s el ec t ed - pr es s t he butt on t o dele t e one or more s elect ed entrie s . B ac k - s wit c hes y ou back t o t he def au lt A VG m ain dialo g (c ompo nen t s ov er v iew ).
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 7 6 . 6.5. L S P V i ew er T he LS P Vi ewer dialo g s how s a l is t of Layere d S er v ic e P r ov ider s (L SP ).
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 8 6 . 7.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 9 T he result s ov erv iew pro v ides t he numb er of detec t ed s y s tem pr ob l ems ( Errors ) div i de d ac c or din g t o t he r espec t iv e c atego rie s t es t ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 0 I dentity P rote ct i o n giv es y our c omputer a re alt ime pr ot ect i on ag ain s t new and ev en unknow n t hr eats .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 1 t he user interf ace of t he Sy st em t ools c ompo ne nt wh ere y ou c an f i nd a detailed ov er v iew of all monitor ed pr oc es s es .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 op en ed via t he S up por t s y s t em menu i t em) .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 3 7 . My A pp s M y A pps dialo g (a c c es s i b le v i.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 4 For det ail ed i nformat i on pl eas e vis i t the dedi ca t ed A VG webpa ge, where you ca n als o downl oad the com ponent i m m edi at ely.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 5 downl oad the com ponent i m m edi at ely. To do s o, you m ay us e the A VG M obi l ation l i nk withi n the M y A pps di alog.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 6 withi n the M y A pps di alog.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 7 8 . AV G S e cu rit y Tool bar A V G S ec uri t y Too .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 8 D elet e - t he 'tra s h bin' butt on of f e.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 9 9 . AV G D o Not Tr a ck A V G Do Not T ra ck helps y ou iden t if y we bs it es t hat ar e c ollec t ing data abo ut y our online act i v i t ies .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 0 9 . 1. AV G D o N ot Tr ac k i n te r f ac e W h i le online , A V G Do Not T rac k w ar ns y ou as s oon as any k ind of data c o llec t ion ac t iv it y is de t ect ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 1 W ha t i s tra ck ing? - c li c k t his l ink in t he .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 2 may b re ak f unct iona lit y in t he re s p ect ive w.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 N otificat i on pos i tion (Top - R ight b y defau lt .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 4 N etwo r k s .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 5 1 0 . A V G A dv a n ce d S et t i n gs T he adv an c ed c onf igu ra t i on dia log of A V G I n t e rne t S e curity 201 2 ope ns i n a new wind ow name d A dvanc ed A VG S et ti ngs .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 6 C on f irm y our s e lec t ion by pre s s ing t he A p.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 7 inf or mati on up on automati c laun c h of t he s c h ed ule d s c a n, it s pro gr es s , and r esult s s ho uld be dis played.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 8 1 0.2.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 9 1 0.3.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 0 s of t wa re etc . Y ou c an de c ide f or a long er t im e per i od , how ev e r t his op t ion is not re c o mmend ed if not absolutely nec ess a ry .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 1 1 0.4.1. Res i d en t Sh i el d R esi de nt S hield pe rf orms liv e pr otec t ion of f i les an d f old er s aga i nst v iru s es , s py w ar e, an d ot he r malwa re.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 2 R eport enhance d s et o f P otent i al l y Unwa nt ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 3 I n t he F i l es s ca n ned by the R es i d ent S hi .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 4 T he Re s i dent S hi eld - E xce ptions dialog of f er s t he op t ion of de f ining f iles an d/or f olde rs t hat s hou ld be exc lu de d f rom t he Re s i dent S hi eld s cann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 5 1 0.4.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 6 1 0.5. E- mai l p ro t ec ti o n I n t he E -m ail prote ct io n s ec t ion y ou c an edit t he detailed c onf i gu ra t i on of E-mail S c ann er and A nt i- Spam : 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 7 Sca nni ng prope rt i e s I n t his s ec t ion , y ou .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 8 f il e " s omet hing . t x t. ex e" app ear as har m les s plain t ex t f il e " s omet hing .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 9 T he A t tac hm ent f i l te r dialog allow s y o u t o s e t up par ame t er s f or e- mail mes s age att ac hmen t s c ann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 0 You c a n als o def ine ne w s er v ers f or i ncomi ng or outgo ing mail, us ing t he A dd new s erve r butt on.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 1 de lim it er ( f or ex ample , po p.ac me.c o m: 820 0 ). T he s tand ard po rt f or P OP3 c ommunic ation is 110 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 2 SM TP S erve r Na m e - in t his f ield y ou c a n s p.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 3 I n t his dia log (o pe ned v i a S erv ers / IM A P ).
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 4 o C onnect i on - in t his dro p- dow n menu , y o u c an s peci f y wh i c h k ind of c o nne c t ion t o use ( r egu lar / S S L/ SS L de f au lt ).
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 5 Val ue 80- 90 - e- m ail mes s age s lik e ly t o be s p am will be f ilt er ed ou t . Some no n- s p am mes s age s m ay be inc or re c tly f i lt er ed as we ll.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 6 T her e ar e t he f ollow ing options t o c ho ose f r.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 7 I n t his dia log, plea s e s elec t t he f older with t he mes s age s y ou wa nt t o us e fo r t rain ing.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 8 pr of ile f irst .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 9 Pe rforma nce T he E ngi n e perf orm anc e s ett i ng.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 0 hav e a vali d reas on to do s o.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 1 W hite l i s t T he W hi te l i s t it em op en s a .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 2 t his bu t t on .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 3 T he f ollow i ng c o ntro l bu t t on s ar e av ail.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 4 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 5 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 6 I n t he W eb P rot ec tion dialog y o u c an edit t he c ompon en t 's c o nf igu ra t i on re gar ding t he s c an of t he w eb s it e c on t en t .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 7 o U s e heuri s tic analys i s - ( o n b y default ).
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 8 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 9 ad diti on al m ea s ur e t ha t inc re as es y our c o m pu t er s e c ur it y ev en more , ho wev er i t may block leg al pr ogr ams , and is t her ef ore s w i t c he d of f by def au lt .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 0 s c ann ing s pee d de pe nd en t on s ys t em resour c e us age . B y de f ault, t his opti on v alue is s e t t o us er s en s it i v e lev el of automatic re s ou rce usage .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 1 T he l is t of par ameters i s iden ti c al t o t hose av ailab le fo r t he S c a n of t he w ho le c o mputer .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 2 Al l par ameters s e t up i n t his c onf igu ra ti .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 3 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 4 1 0.8.1. S c h ed u l ed S c an T he par amet er s of t he s c hed uled s can c an be edited ( o r a new s c h ed ule s et up ) on t hr ee t ab s .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 5 Sche dul e runni ng H er e, y ou c an s peci f y t im e int er v als f or t he ne w ly s ched ule d s can laun c h.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 6 On t he H ow to s can t ab y ou will f i nd a li s t of s c ann ing pa ra m eters t hat c an be op t iona l ly s w it c h ed on / of f .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 7 pr ef er enc es or t he c onten t s of t heir elect .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 8 Se t a ddi t i ona l s ca n re port s C lic k t he S et additio nal s can report s .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 9 On t he W ha t to s can t ab y ou c an def ine w he t he r y ou wa nt t o s ched ule s c ann ing of t he w ho le c ompu t er or s c a nning of s p eci f ic f iles or fo l de rs .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 0 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 1 Ot he r upda te s e t t i ngs Finally , c heck t he .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 2 up da t e laun c h s hou ld be as s oc iat ed w it h ( A ct i on bas ed on compu t er s ta rt up ).
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 3 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 4 Ot he r upda te s e t t i ngs C he c k t he Run the .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 5 R equire conf i rm at i on f rom the us er (b y defa.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 6 1 0.9.1. Pr o xy T he pro x y s e rv er is a s t and - alon e s er v er or a s erv ic e r un ning on a PC t hat gua r an t ee s s af er c on ne c t ion t o t he In t ern et.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 7 P ort – s pe c ify t he nu mber of t he por t t ha.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 8 Spec if y wh ether y ou wa nt t o c o nn ect t o t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 9 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 0 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 1 Edit ing all f un c t ions of t he A nti -R ootk it c o mpon ent as pr ov ide d wit hin t his dialo g is als o ac c es s i ble dir ect l y f rom t he A nti -R ootk it c o mpon ent's i nter f ac e .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 2 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 4 You c a n als o as s i gn s p eci f ic it ems t o op.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 5 T he I dent i ty P rote ction A ll owed l i s t pr o.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 6 on y ou r c omputer , y o u c an def ine it as a pot.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 7 A dd ex cept i on - ope ns an editing dialog w he r .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 8 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 9 W ithin t he dialog , t he f ollow i ng s e t t ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 0 c he c k ed i f re ally inf ec t ed , t o s o rt ou t fa l s e pos it iv es. Mos t com m on t hre a ts N ow ada y s , t her e ar e f ar more t hre at s out t her e t ha n plain v i ru s e s .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 1 Ov erv i ew cha pte r.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 2 For t his s ituati on , wit hin t he ab ov e dialog .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 1 1 . Firew a l l S e t t i ngs T he Fi re wall c o nf igu ra t i on op ens in a ne w w indo w whe re in s ev er al dialog s y ou c an s et up v e ry ad v anced par amet er s f or t he c ompo ne nt.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 4 En able all tra f fic to VP N (o n b y defau lt ) - i f y ou us e a V P N ( V irtual P riv at e Ne t w o rk ) c on ne c t ion, e.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 5 Sh ow confirm ation di al ogs for - s p eci f y t o .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 6 Li s t of adapt ers , area s and as s i gned profil es - in t his l is t y ou c a n f i nd an ov e rv iew of t he de t ect ed ada pt er s an d ar ea s .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 7 T he I ntrus i o n D et ec ti on S ys t em (I D S ) .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 8 1 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 9 R ef res h l i s t - all l og ged pa ra m eter s c a.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 0 Export profil e - re c or ds t he s elec t ed pr of i le' s c onf igu ra t i on into a f ile t ha t w ill be s a v ed f or po s s ible f ur t he r us e.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 1 En able Vi rtual M achin es Bridged net work ing ( o f f b y defau lt ) - t i c k t his it em t o allow v i rtua l mac hine s in V Mwa r e t o c on ne c t dire c tly t o t he netwo rk .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 2 1 1.6.2. D efi n ed N etw o r ks T he De fined net work s dia log of f ers a lis t of all netwo rks t hat y o ur c omputer is c o nne c t ed t o.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 3 W ithin t his dialog , y ou c an s peci f y t he Ne tw ork nam e , pr ov ide t he Ne twork des c ri ption and pos s ibly as s ign t he netwo rk as s af e.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 4 1 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 5 Apar t f ro m app lic at ions, t he li s t als o c o.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 6 I n t he P age ac tions dialog , y o u c an def ine .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 7 A l l ow for al l - allow s t he ap plic ati on t o c omm un ic ate ov er all de f ined ne t w or k s and ad ap t ers wit ho ut li mit at ions.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 8 Li s t of s ys te m s e rvice s a nd protoc ol s T h.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 9 P l eas e bea r i n m i nd that deta i l rul e s et t i ngs are adva nced and pri m ari l y i nte nded f or net work admi ni s t rat ors who need ful l cont rol ove r F i rew all configurat i on.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 0 1 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 1 Scan h i s tory - dis play s t he S c an re s ult s .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 2 Sca n configu ra ti on e ditin g You hav e t he option of ed it ing t he pr ed ef ine d def au l t s ett i ng s f or t he W hole comp ute r s can .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 3 Scanni ng para m et ers - i n t he li s t of s c ann.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 4 o Scan i n s i de archives ( off b y defau lt ) - T his par ameter s peci f ies t hat s c a nning s ho uld c heck all f iles s t or ed ins ide ar c h iv e s , e.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 5 A l l fil e ty p es wit h t he option of de f i nin .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 6 Sca n l a unch T he S can of s p ec ifi c fil es or folders c a n be laun c h ed dir ec t ly f r om t he s c ann ing interf ace by c li c k ing on t he s c an' s i c on.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 7 Scanni ng para m et ers - i n t he li s t of s c ann.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 8 o Scan i n s i de archives ( on b y default ) - t his pa ra m eters def ine s t ha t s c ann ing s hou l d c he c k all files s t ore d ins ide ar c hiv es , e.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 9 au dio f iles - if yo u leav e t his b ox uncheck e .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 0 W ithin W ind ow s E x plor er high light t he f i l.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 1 av gs ca nx / paramet er / paramet er .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 2 / T RAS H M ov e inf ec t ed f i les t o t he V iru .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 3 / C LOU DC HECK C he c k f or fa l s e posi t iv es / ARC BOM BS W R ep or t re- c ompre s sed ar c hiv e f i les 1 2.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 4 You c a n ed it / add s cans us ing t he f ollow ing.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 5 On t he S che dul e s ett i ng s t ab y o u c an f i.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 6 T her e ar e t wo c o ntro l bu t t on s av ailable .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 7 risk , s ome of t he s e pr ogr ams c an be ins t alled intenti on ally . W e re c ommend t hat y o u k eep t his f eatur e ac t iv ated as i t inc re as es y our c omputer s ec ur i t y .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 8 o C om puter s hutdown o ptions - deci de w he t he r t he c ompu t er s h ou l d be s hut dow n au t omatic ally once t he run nin g s c a nn ing pr oc es s is ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 9 C ontrol butt ons T her e ar e t wo c o ntro l bu t .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 0 On t he W ha t to s can t ab y ou c an def ine w he t he r y ou wa nt t o s ched ule s c ann ing of t he w ho le c ompu t er or s c a nning of s p eci f ic f iles or fo l de rs .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 1 C ontrol butt ons T he s a m e t wo c ontro l bu t t.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 2 - blue i c on an no un c es t he re wa s an inf ec t.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 3 I nf ec t ions - t his t ab i s dis played only i f .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 4 C ontrol butt ons T her e is only on e c ontrol butt on av ailab le in t his dialog . T he Clos e res u l t s bu t t on re t urn s t o t he S c an re s u lt s ov er v iew dialog .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 5 o A dd ed to P U P exc ept i on s - t he f i nd ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 6 1 2.7.3. S p y w are T ab T he S pywar e t ab is on ly dis play ed in t he S can res ults dialo g in if s p y wa re wa s de t ect ed dur i ng s c ann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 7 o P ote ntial l y dangerous o bj ec t - t he ob jec .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 8 T his i s a brie f desc r i ption of t he mos t c om.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 9 H i dden ex t ens ion - f i les w it h hidde n ex t en s ions m ay app ea r t o be e.g. pic t ur es, but in f ac t t he y ar e ex ecut ab le f iles ( e .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 0 Seve ri ty - i n c as e y ou de c ided t o ins t all.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 1 D elet e - remo v e s t he inf ec t ed f i le f ro m t he V i rus Vaul t c ompletely and irr ev e rsibly Em pt y V ault - r emov es all V i rus V aul t c ontent c ompletely .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 2 1 3 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 3 N ote : B ef or e ea c h A V G pr og ram upd ate lau nch, a s y s t em re s t or e po int i s c rea t ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 4 1 4 . Even t H i story T he His tory dialo g is ac c es s ible f ro m t he s y st em menu v i a t he His tory / E ve nt His tory Log it em.
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 5 C ontrol butt ons Em pt y l i s t - pr es s t he bu .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 6 1 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 7 w ell-o rga niz ed wa y int o s a l es, t ec hnic al, and v i r us c a t eg or ies . A bo ut virus es & thre at s : A s peci f i c pa rt of t he A VG we bsi t e (h t t p:/ / ww w.
An important point after buying a device AVG Internet Security 2012 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought AVG Internet Security 2012 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data AVG Internet Security 2012 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, AVG Internet Security 2012 you will learn all the available features of the product, as well as information on its operation. The information that you get AVG Internet Security 2012 will certainly help you make a decision on the purchase.
If you already are a holder of AVG Internet Security 2012, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime AVG Internet Security 2012.
However, one of the most important roles played by the user manual is to help in solving problems with AVG Internet Security 2012. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device AVG Internet Security 2012 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center