Unisar 1.24.1867 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Unisar 1.24.1867 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Unisar 1.24.1867, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Unisar 1.24.1867 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Unisar 1.24.1867. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Unisar 1.24.1867 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Unisar 1.24.1867
- Den Namen des Produzenten und das Produktionsjahr des Geräts Unisar 1.24.1867
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Unisar 1.24.1867
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Unisar 1.24.1867 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Unisar 1.24.1867 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Unisar finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Unisar 1.24.1867 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Unisar 1.24.1867, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Unisar 1.24.1867 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    User's Guide Copyright © 2006 SOFTWIN antivirus antivirus[...]

  • Seite 2

    BitDefender Antivirus Scanner for Unices User's Guide SOFTWIN Published 2006.04.27 V ersion 1.24.1867 Copyright © 2006 SOFTWIN L egal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retr[...]

  • Seite 3

    As every cat owner knows, nobody owns a cat. BitDefender Antivirus Scanner for Unices[...]

  • Seite 4

    BitDefender Antivirus Scanner for Unices[...]

  • Seite 5

    T able of Contents End User Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . ix P r e f a c e ...................................................... x i i i 1 . C o n v e n t i o n s u s e d i n t h i s b o o k ..................................... x i i i 1 . 1 .T y p o g r a p h i c a lc o n v e n t i o n s ...........[...]

  • Seite 6

    5.3.3. Install the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 5.3.4. Install the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 5 . 4 . T h ei n s t a l l e r .............................................. 3 7 6 . U n i n s t a l l ...............................................[...]

  • Seite 7

    1 0 . 2 . 3 .A m a v i s d - n e w ........................................ 7 0 1 1 . U p d a t e s ................................................ 7 3 1 1 . 1 . T r i g g e r e d u p d a t e .......................................... 7 3 1 1.1.1. Run the triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 1 1 . 1 .[...]

  • Seite 8

    viii BitDefender Antivirus Scanner for Unices[...]

  • Seite 9

    End User Softw ar e License A gr eement IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INST ALL THE SOFTW ARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INST ALLING OR USING THE SOFTWARE IN ANY W A Y , YOU ARE INDICA TING YOUR COMPLETE UNDERST ANDING AND ACCEPT ANCE OF THE TERMS OF THIS[...]

  • Seite 10

    product to be used for personal purposes, with no commercial implications whatsoever , under the terms of the EULA. For example, under the Personal License, you are allowed to scan your personal laptop or desktop computer but YOU ARE NOT ALLOWED TO USE THE PRODUCT IN A BUSINESS ENVIRONMENT SUCH AS AN OFFICE COMPUTER OR A COMP ANY SERVER. 3. Commerc[...]

  • Seite 11

    LIMITED W ARRANTY . SOFTWIN warrants a 30 day fault free period for the media on which BitDefender is distributed as of the date BitDefender has been delivered to you. Any breach of this warranty shall only result in SOFTWIN replacing the faulty media, at its sole discretion, upon receipt of the said media, or refunding the BitDefender price. SOFTW[...]

  • Seite 12

    NA VIGA TION, NUCLEAR F ACILITIES, OR COMMUNICA TION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICA TION OR INST ALLA TION WHERE F AILURE COULD RESUL T IN DEA TH, SEVERE PHYSICAL INJURY OR DAMAGE TO PROPERTY . GENERAL. This Agreement shall be governed by the Romanian law and by the internation[...]

  • Seite 13

    Pr eface This User's Guide is intended to all who have chosen BitDefender Antivirus Scanner for Unices as security solution for their systems. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to do administrative tasks on a Linux box. This book will describe for you Bi[...]

  • Seite 14

    Description Appearance The environment variables are MONOSPACED CAPITALS . ENV_VAR The emphasized text is specially marked to require your attention. emphasized The quoted text is provided as reference. “quoted text” Inline commands are printed using strong characters. command Command examples are printed with strong monospaced characters in sp[...]

  • Seite 15

    W arning This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications. Y ou should read and understand it, because it describes something extremely risky . 2. The book structur e The book consists of four parts, containing the major topics: Description and features, Installation, Usage [...]

  • Seite 16

    3. Request for Comments We invite you to help us improve the book. W e have tested and verified all of the information to the best of our ability , but you may find that features have changed (or even that we have made mistakes). Please write to tell us about any flaws you find in this book or how you think it could be improved, to help us provide [...]

  • Seite 17

    Description and featur es Description and features[...]

  • Seite 18

    Description and features[...]

  • Seite 19

    Chapter 1. Ov ervie w BitDefender provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management for over 41 million home and corporate users in more than 100 countries. Designed to provide full protection for corporate network and systems, the BitDefender solution ra[...]

  • Seite 20

    all complex threats that endanger a network, from a small local area to large multi-server , multi-platform W AN's. Y our Ultimate Protection. The final frontier for any possible threat to your computer system. As virus detection based on code analysis has not always offered good results, BitDefender has implemented behavior-based protection, [...]

  • Seite 21

    viruses, to do antivirus research, to develop new technologies for monitoring all possible ways to infect a system and, last but not least, to educate the IT&C public on the danger of computer viruses. BitDefender security solutions satisfy the protection requirements of today's business environment, enabling management of all complex thre[...]

  • Seite 22

    22 Overvie w Description and featur es 01[...]

  • Seite 23

    Chapter 2. Pr oduct featur es The acquisition and installation of an antivirus product for the personal or company's systems is the most efficient way of preventing the infection of a computer and the spreading of viruses inside the company , and outside the company as well. 2.1. BitDefender Antivirus Scanner for Unices BitDefender Antivirus S[...]

  • Seite 24

    2.2. K ey F eatur es • Antivirus protection for the file system. • Automatic and incremental update of virus definitions and scanning engines directly from BitDefender servers. • Ability to isolate the infected files in the quarantine zone. • Detailed statistics and reports regarding the number of scanned files, the infected files, the dele[...]

  • Seite 25

    Chapter 3. The scanning mechanism The central part of BitDefender Antivirus Scanner for Unices consists of the BitDefender architecture-independent scanning engines. These are specialized data analysis routines and malware signature definitions, since many viruses can be identified upon a distinctive code pattern. The BitDefender Antivirus engine d[...]

  • Seite 26

    26 The scanning mechanism Description and featur es 03[...]

  • Seite 27

    Installation Installation[...]

  • Seite 28

    Installation[...]

  • Seite 29

    Chapter 4. Pr er equisites BitDefender Antivirus Scanner for Unices can be installed on package based Linux distributions (rpm or deb) and tbz based FreeBSD versions, but also all the other distributions are supported, using a pseudo-package system, with the same functionality of the others. These packages are built as bzip2 compressed tars and inc[...]

  • Seite 30

    4.1.2. Softw are s ystem r equirements Linux requirements The Linux kernel should be 2.2, 2.4 or 2.6, the recommended one is 2.6, with support for a fast file system, which works well with multiple small files, such as ext3 or reiserfs. BitDefender requires glibc version 2.3, at least, and libstdc++ from gcc 3.x series. FreeBSD requirements The sup[...]

  • Seite 31

    4.2.2. Fr eeBSD conv ention bitdefender-scanner- {ver} .tbz Where {ver} is the package version. For example, 7.5_3 is version 7, subversion 5, package build 3. 31 04 Installation Prer equisites[...]

  • Seite 32

    32 Prer equisites Installation 04[...]

  • Seite 33

    Chapter 5. P ack age installation This chapter will explain you how to install BitDefender on a Unix-like system, such as Linux or FreeBSD. This is pretty straightforward: get the desired package, test it for integrity , then install it. 5.1. Getting BitDefender Antivirus Scanner for Unices The package can be downloaded from BitDefender servers or [...]

  • Seite 34

    Then, export the key to a local file: # gpg --armor --export 0x0EC4FE05 > bd-pack.key For the rpm packages, you have to import the key into rpm key ring, using the next command. # rpm --import bd-pack.key When you wish to check a rpm package, just issue a command similar to the following. Y ou should get no error . # rpm --checksig BitDefender-*[...]

  • Seite 35

    5.3. Install the pack age The installation process depends on the package type. There are different methods for rpm , deb and self-extractable archive, as well as a typical method for FreeBSD. 5.3.1. Install the rpm package T o install BitDefender Antivirus Scanner for Unices on a RedHat based distribution, using the RedHat package manager , you ha[...]

  • Seite 36

    Additional par ameters For the not-so-inpatient user , the self-extractable archive supports few command line parameters, described in the following table. Description P arameter Prints the short help messages. --help This will print archive information, such as the title, the default target directory , the embedded script to be run after unpacking[...]

  • Seite 37

    Description P arameter Run the embedded uninstaller script instead of the normal installer . For uninstalling, please read more in Chapter 6 “ Uninstall ” (p. 39) . --uninstall 5.3.4. Install the Fr eeBSD pack age T o install BitDefender Antivirus Scanner for Unices on a FreeBSD machine, you have two methods: you can install the package you hav[...]

  • Seite 38

    Next, the Installation directory is asked, if you have installed BitDefender Antivirus Scanner for Unices on Linux, using the self-extracting archive. The default is /opt and we will assume you go for it. The installer will create the directory /opt/BitDefender-scanner , which will be the top-level directory on BitDefender Antivirus Scanner for Uni[...]

  • Seite 39

    Chapter 6. Uninstall If you ever need to remove BitDefender Antivirus Scanner for Unices, there are several methods to do it, depending on the package type. 6.1. Uninstall the rpm package T o uninstall BitDefender Antivirus Scanner for Unices on a RedHat based distribution, using the RedHat package manager , you have to run the following command. #[...]

  • Seite 40

    Next, the uninstall procedure begins by removing installation directory , /opt/BitDefender-scanner . The MANPATH environment variable is restored to its previous value. Finally , the /usr/bin/bdscan symlink is deleted. At this moment, the system should be left in the same condition as found before installing. 6.4. Uninstall the FreeBSD pack age T o[...]

  • Seite 41

    Using BitDefender Using BitDefender[...]

  • Seite 42

    Using BitDefender[...]

  • Seite 43

    Chapter 7. The configur ation file The system-wide configuration of BitDefender Antivirus Scanner for Unices is stored inside a file located at /etc/BitDefender-scanner/bdscan.conf on Linux systems and at /usr/local/etc/bitdefender/bdscan.conf on FreeBSD systems. There is another configuration file, located inside the user's home directory , a[...]

  • Seite 44

    # argument only files having the following extensions are scanned Extensions = 386:asp:bas:bin:chm:cla:class:cmd:com:bat:csc:dat:dll: doc:dot:exe:bat:hlp:hta:htm:html:ini:js:lnk:mdb:msi:nws:ocx:ole: ovl:pfd:php:pif:pot:ppa:ppt:prc:rtf:scr:shs:smm:sys:url:vbe:vbs: vxd:wbk:wdm:wiz:xla:xls:xlt:xml:xtp: # The update location. Change this if you want to[...]

  • Seite 45

    Description K ey This is the location of the quarantine directory , where the infected files are stored when quarantine actions are invoked. QuarantinePath The quarantine directory can be specified at run-time using the --quarantine= path option. The default quarantine path is located at /opt/BitDefender-scanner/var/quarantine . Regular users and q[...]

  • Seite 46

    Description K ey The list can be specified at run-time using the --exclude-ext= ext1:ext2 option. This is the license key , necessary for product activation. Key Product r egistration Please see Chapter Product registration (page 77) for more information about license keys. 46 The configuration file Using BitDefender 07[...]

  • Seite 47

    Chapter 8. T esting BitDefender Y ou can verify that BitDefender Antivirus component works properly with the help of a special test file, known as EICAR Standard Anti-virus T est file. EICAR stands for the European Institute of Computer Anti-virus Research . This is a dummy file, detected by antivirus products. There is no reason to worry , because[...]

  • Seite 48

    Y ou will be told one file has been scanned, found infected and the virus identified. Y ou will see the virus name: EICAR-Test-File (not a virus) . Since no action was specified, the file EICAR.COM still lays on your hard disk. The command output will be the following. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwi[...]

  • Seite 49

    BitDefender will unpack the archive and scan the content. This will be the command output. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commercial use. Default action upon detecting an infected file: ignore action Default action upon detecting a suspected fi[...]

  • Seite 50

    Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /tmp/mail.mbox ok /tmp/mail.mbox=>(message 0) ok /tmp/mail.mbox=>(message 1) ok /tmp/mail.mbox=>(message 1)=> ... 34 +0300 (EEST)]=>(MIME part) ok /tmp/mail.mbox=>(message 1)=> ... =>(MIME part)=>(me[...]

  • Seite 51

    Chapter 9. Real life usage These are some real-life usage examples of BitDefender . Use them as guidelines for improving your system protection and, if you have found a different way to use BitDefender Antivirus Scanner for Unices, do not hesitate to contact us and share your experience. Y ou can write us at < documentation@bitdefender.com > [...]

  • Seite 52

    Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /t ... xe infected: EICAR-Test-File (not a virus) <- cevakrnl.xmd Results: Folders :0 Files :1 Packed :0 Archives :0 Infected files :1 Suspect files :0 Warnings :0 Identified viruses:1 I/O errors :0 9.1.2. Scan a dir ectory[...]

  • Seite 53

    The next screen output shows the files scanned, found infected and finally quarantined. Y ou can notice the two sub-directories were not scanned. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commercial use. Default action upon detecting an infected file: ign[...]

  • Seite 54

    Only the found malware will be displayed on the screen, but the log file will contain one line about every file scanned and its status. Y ou can easily grep for “infected” and “suspected” keywords to see the report regarding them. This is the beginning of the log file. // // BitDefender scan report // // Time: Fri Jan 27 15:24:03 2006 // Co[...]

  • Seite 55

    As you can see, BitDefender reports to have scanned more files. This happens because each archive should be unpacked separately . Y ou can see also which engine process each step of unpacking and scanning. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commerc[...]

  • Seite 56

    BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commercial use. Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /tmp/mail.mbox ok /tmp/mail.mbox=>(message 0) ok <- mbox.xmd /tmp/m[...]

  • Seite 57

    # bdscan --log=/tmp/antivirus_scan.log --log-overwrite file.exe 9.2.2. Get mor e information BitDefender can offer some information about scanning engines, last update, key validity , etc. when called with --info command line option. # bdscan --info Y ou will get the next screen output. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C[...]

  • Seite 58

    9.2.4. Displa y the product ver sion Maybe you will need just to find the version of your installed BitDefender Antivirus Scanner for Unices. # bdscan --version BitDefender will display the product name, version and build number , architecture and copyright information. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softw[...]

  • Seite 59

    Chapter 1 0. BitDefender integr ation BitDefender Antivirus Scanner for Unices is a versatile antivirus scanning solution, that could be easily integrated in desktop and server software to perform an instant target scan. 1 0.1. Desktop integration Y ou can configure your favorite file manager , email or news client to use BitDefender Antivirus Scan[...]

  • Seite 60

    Different installation path If you have used another installation path and not the default one, please change the first line accordingly . That condition is used not to show the menu item if BitDefender Antivirus Scanner for Unices is not installed. Figure 1 0.1. The User Menu of mc From now on, when you press the F2 key on top of some tagged or no[...]

  • Seite 61

    [Desktop Action Scan_With_BitDefender] Name=Scan with BitDefender Comment=Perform an AntiVirus scan with BitDefender Icon=bitdefender Exec=konsole -T "BitDefender Antivirus Scanner" --noclose --nomenubar --notoolbar --icon bitdefender --vt_sz 80x25 -e bdscan --no-list %f Figure 1 0.2. Action on file in K onqueror Y ou may now open Kon[...]

  • Seite 62

    • T ooltip. Set Perform an AntiVirus scan with BitDefender . • Command line. Set bdscan --no-list %aCurrent% . • Then check Execution mode → Run in terminal checkbox. Figure 1 0.3. Krusader's User A ctions Press the Ok button and close the window . Now , in the Useractions menu there will be a new item, Scan with BitDefender . Select i[...]

  • Seite 63

    # Now let's run the scan process xterm -e "bdscan --no-list $*; echo -n 'Press ENTER to continue...'; read" # End of the script Do not forget to give it executable rights. # chmod 755 ~/.rox_choices/SendTo/BitDefender Y ou can right-click a file or a directory , select Send to → BitDefender menu and the scanning proce[...]

  • Seite 64

    cat > $TMPFILE # Scan it with BitDefender and remember the exitcode $BDSCAN $TMPFILE EXIT=$? # Remove the temporary file and return the exitcode rm -f $TMPFILE exit $EXIT # End of the script What to do with infected emails Y ou will not be able to disinfect the message, the only action that can be done is ignore , therefore it's up to you t[...]

  • Seite 65

    displayed by Pine. Y ou should notice whether the email was infected or not. When finished reading the messages, press E to Exit the viewer . As stated before, it would be better to tell Pine to automatically scan the messages and what to do when some infected email is found. This way , every new message will be scanned and treated accordingly , me[...]

  • Seite 66

    1 0.1.6. Ev olution Evolution makes the tasks of storing, organizing, and retrieving your personal information easy , so you can work and communicate more effectively with others. It's a highly evolved groupware program, an integral part of the Internet-connected desktop. —Evolution User Guide Making Evolution scan emails through BitDefender[...]

  • Seite 67

    1 0.1.7. KMail KMail is a fully-featured email client that fits nicely into the K Desktop Environment, KDE. It has features such as support for IMAP , POP3, multiple accounts, powerful filters, PGP/GnuPG privacy , inline attachments, and much more. —KMail website KMail integration can be done using the wizard from T ools → Anti-virus Wizard... [...]

  • Seite 68

    # Save the standard-input to a temporay file cat > $TMPFILE # Scan it with BitDefender, filter the output and echo the header if $BDSCAN $TMPFILE | grep -q infected; then echo "X-Virus-Flag: yes" else echo "X-Virus-Flag: no" fi # Output the email and remove the temporary file cat $TMPFILE rm $TMPFILE # End of the script Even [...]

  • Seite 69

    1 0.2.1. Qmail-Scanner Qmail-Scanner is an add-on that enables a Qmail e-mail server to scan all gateway-ed e-mail for certain characteristics (i.e. a content scanner). —Qmail-Scanner website Qmail-Scanner supports BitDefender Antivirus Scanner for Unices out of package. T o use it, you can just proceed to normal installation, since the configura[...]

  • Seite 70

    Once you have a working MailScanner installed on your server , open its configuration file /opt/MailScanner/etc/MailScanner.conf (for a default location) and find the next line. Virus Scanners = none Change it to the following form. Virus Scanners = bitdefender If you need to further customize the command-line options passed to BitDefender , open t[...]

  • Seite 71

    amavisd-ne w installation Please refer to amavisd-new documentation for a detailed description of installation and configuration. 71 10 Using BitDefender BitDefender integration[...]

  • Seite 72

    72 BitDefender integration Using BitDefender 10[...]

  • Seite 73

    Chapter 1 1. Updates BitDefender Antivirus Scanner for Unices was designed with capabilities for triggered update. At the present time, the risk of getting infected is high, both because new viruses appear and the existing ones keep on spreading. This is why your antivirus must be kept up-to-date, by periodically checking the BitDefender servers fo[...]

  • Seite 74

    Edit the cron table The first method is to edit the cron tables, using the crontab tool. For example, if you want to run a daily update, run the following as root: # crontab -e Then add the next line: 00 02 * * * /opt/BitDefender-scanner/bin/bdscan --update All you have to do now is to signal the cron daemon to reload the crontables. Run the next c[...]

  • Seite 75

    #!/bin/sh # BitDefender update script, using cron service # Copyright (C) 1996-2005 SOFTWIN SRL. All rights reserved. # Place this script under one of the following directories for daily # or even hourly updates (find their equivalents on your system if # they do not exactly match): # /etc/cron.daily # /etc/cron.hourly # IMPORTANT: change this para[...]

  • Seite 76

    on the update server , containing the updates of the scanning engines and virus signatures: cumulative.zip and daily.zip . • cumulative.zip is released every week on Monday and it includes all the virus definitions and scan engines updates up to the release date. • daily.zip is released each day and it includes all the virus definitions and sca[...]

  • Seite 77

    Chapter 12. Pr oduct r egistr ation The product is delivered with a trial registration key valid for thirty days. At the end of the trial period, if you want to continue using the program, you have to provide a new license key . When you have the new key , open the configuration file from /etc/BitDefender-scanner/bdscan.conf (for a default Linux in[...]

  • Seite 78

    commercial implications whatsoever . For example, using the Personal License, you are allowed to scan your personal laptop or desktop computer but YOU ARE NOT ALLOWED TO USE IT IN A PRODUCTION ENVIRONMENT LIKE AN OFFICE COMPUTER OR COMP ANY SERVER. 12.3. License for commer cial use If you plan on using BitDefender Antivirus Scanner for Unices with [...]

  • Seite 79

    Chapter 13. Best pr actices These are some steps you should follow to ensure a system free from viruses. 1. After installing BitDefender Antivirus Scanner for Unices, perform a triggered update to have the latest virus signatures and engines, as described in Section T riggered update (page 73) . 2. Perform a full system scan to find any already inf[...]

  • Seite 80

    80 Best practices Using BitDefender 13[...]

  • Seite 81

    Getting help Getting help[...]

  • Seite 82

    Getting help[...]

  • Seite 83

    Chapter 14. Fr equently A sk ed Questions 1. Installation 1. What are the system requirements? Please consult Section 4.1 “ System requirements ” (p. 29) for an up to date system requirements. 2. Does BitDefender alter my system configuration? Y es, BitDefender Antivirus Scanner for Unices will touch several system files ( man.config and manpat[...]

  • Seite 84

    If you have BitDefender Antivirus Scanner for Unices performing a regular update, this time should be recent enough. If not, this is a good moment to update you antivirus. 3. When I try to update the virus definitions/scanning engines, I always get this “No update available” message. Why? Make sure you are not running the update as an unprivile[...]

  • Seite 85

    Chapter 15. Support 15.1. Support department As a valued provider , SOFTWIN strives to provide its customers with an unparallel level of fast and accurate support. The Support Center listed below is continually being updated with the newest virus descriptions and answers to common questions, so that you obtain the necessary information in a timely [...]

  • Seite 86

    15.3. Contact information Efficient communication is the key to a successful business. For the past 10 years SOFTWIN has established an indisputable reputation in exceeding the expectations of clients and partners, by constantly striving for better communications. Please do not hesitate to contact us regarding any issues or questions you might have[...]

  • Seite 87

    Soporte técnico: < soporte@bitdefender-es.com > V entas: < comercial@bitdefender-es.com > Phone: +34 932189615 Fax: +34 932179128 Sitio web del producto: http://www .bitdefender-es.com U.S.A BitDefender LLC 6301 NW 5th W ay , Suite 3500 Fort Lauderdale, Florida 33308 T echnical support: < support@bitdefender.us > Sales: < sale[...]

  • Seite 88

    88 Support Getting help 15[...]

  • Seite 89

    Manual P ages 89 Manual P ages[...]

  • Seite 90

    90 Manual P ages[...]

  • Seite 91

    bdscan bdscan — BitDefender Antivirus Scanner for Unices Synopsis bdscan [ --action= disinfect | quarantine | delete | ignore ] [--no-archive] [--no-mail] [--no-pack] [--no-recursive] [--recursive-level= level ] [--archive-level= level ] [--ext[= ext1:ext2 ]] [--exclude-ext[= ext1:ext2 ]] [--suspect-copy] [--suspect-move] [--quarantine= quarantin[...]

  • Seite 92

    --no-pack Specifies that bdscan should not scan inside packed programs. --no-recursive Specifies that bdscan should not enter sub-directories for scanning. If you select this option only the first level directories will be scanned. --recursive-level= level Set the maximum recursive level to level . The default is 0 , meaning no limitation. --archiv[...]

  • Seite 93

    --log[= file.log ] Specifies that bdscan should log its activity to the mentioned file. If the user has no right to write this file, an error message will be output and the default one will be used. The default is ~/.BitDefender/bdscan.log . --log-overwrite Specifies that bdscan should not append the new output to the existing log file. The old log[...]

  • Seite 94

    disinfect BitDefender will try to disinfect the object, by removing the infected or suspected part. The action can fail sometimes. quarantine The object will be moved from its original location to a secured directory , the quarantine. delete The object will be simply removed from the filesystem ignore Even if infected objects are found, BitDefender[...]

  • Seite 95

    Bugs Sometimes, bdscan may hang while scanning directories containing pipes or UNIX socket files. T o avoid this behavior , try to use it exclusively for regular files. Also, there may be rare cases when bdscan crashes while doing file scan. If this is the case, you should update the scan engines and virus signatures and definitions. See also Pleas[...]

  • Seite 96

    96 bdscan Manual P ages[...]

  • Seite 97

    Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs, rather than static pages. With ActiveX, users can ask or answer questions, use push buttons, an[...]

  • Seite 98

    Internet Explorer . Both of these are graphical browsers, which means that they can display graphics as well as text. In addition, most modern browsers can present multimedia information, including sound and video, though they require plug-ins for some formats. Command line In a command line interface, the user types commands in the space provided [...]

  • Seite 99

    Events An action or occurrence detected by a program. Events can be user actions, such as clicking a mouse button or pressing a key , or system occurrences, such as running out of memory . False positive Occurs when a scanner identifies a file as infected when in fact it is not. Filename extension The portion of a filename, following the final poin[...]

  • Seite 100

    Macro virus A type of computer virus that is encoded as a macro embedded in a document. Many applications, such as Microsoft Word and Excel, support powerful macro languages. These applications allow you to embed a macro in a document, and have the macro execute each time the document is opened. Mail client An e-mail client is an application that e[...]

  • Seite 101

    Port An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally , there are several ports for connecting disk drives, display screens, and keyboards. Externally , personal computers have ports for connecting modems, printers, mice, and other peripheral devices. In TCP/IP and UDP networks[...]

  • Seite 102

    horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture T roy . Update A new version of a software or hardware product designed to replace an older version of the same product. In addition, the installation routines for updates often check to make sure that an older version is already installed on your c[...]