Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
AVG Internet Security 2014 manuale d’uso - BKManuals

AVG Internet Security 2014 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso AVG Internet Security 2014. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica AVG Internet Security 2014 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso AVG Internet Security 2014 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso AVG Internet Security 2014 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo AVG Internet Security 2014
- nome del fabbricante e anno di fabbricazione AVG Internet Security 2014
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature AVG Internet Security 2014
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio AVG Internet Security 2014 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti AVG Internet Security 2014 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio AVG in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche AVG Internet Security 2014, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo AVG Internet Security 2014, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso AVG Internet Security 2014. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 Doc um e n t r e v is i o n 2 014 .05 (21 .8.2 01 3) C o p y r ight A V G Te c hno lo gie s C Z , s.r .o . A ll rights re se r v e d. A ll o ther tra d e m a rk s a r e the pr o pe rty of their r e s pe c[...]

  • Pagina 2

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 Con t e n t s .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . [...]

  • Pagina 3

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . . 35 6.4 Em ail Pr ot ec t i[...]

  • Pagina 4

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . . 112 11 . 1 P r ede f i ned[...]

  • Pagina 5

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 . I n t rod u c ti on T his us er manu al pro v ides c ompre hen s iv e us er documentat ion f or AVG I n t e rne t S e curity 20 14 . A V G I nte r ne t Se curity 20 14 pr ov i de s mult iple l ayers of [...]

  • Pagina 6

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 . AV G Inst al la t i on Requ i reme n t s 2 . 1. Op e r ati on Sy st ems S u pp or te d A V G I nte r ne t Se curity 20 14 is int en de d t o pro t ect wo rks t at ions wit h t he f ollow ing op er ating[...]

  • Pagina 7

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 . AV G Inst al la t i on Pr oce ss T o ins t all AVG I n t e rne t S e curity 20 14 on y our c o mputer , y ou ne ed t o ge t t he lates t ins t allati on f i le. T o m ake s ur e y ou ar e ins t alling t[...]

  • Pagina 8

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 3 . 2. W el c ome: L i c en s e Agr eem en t T he W elcom e to A VG I ns t all er dialog pr ov i de s t he n t he f ull w or ding of t he A VG li c ense agr ee m en t : Pl ea s e rea d t he en t ire t ext c[...]

  • Pagina 9

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 3 . 3. Ac ti vat e you r l i c en se I n t he A ct i vat e Yo ur Li ce ns e dialog y ou ar e inv i t ed t o en t er y o ur l ic ense nu mber int o t he pr ov ided t ex t f ield: W he re to f i nd the l i ce[...]

  • Pagina 10

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 C anc el - c lic k t o exi t t he s e t up pr oc es s im media t ely ; A V G I nte rne t S e c uri ty 201 4 will not be ins t alled ! B ac k - c l ic k t o go one s tep ba c k t o t he pr ev iou s s et up[...]

  • Pagina 11

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 T o re v er t t o t he def au l t de s t ination pr e- s e t by t he s of t wa re v en do r us e t he De fault butt on. T hen , pr es s t he Ne xt butt on t o pro c ee d t o t he Cust om Options dia log. [...]

  • Pagina 12

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 C anc el - c lic k t o exi t t he s e t up pr oc es s im media t ely ; A V G I nte rne t S e c uri ty 201 4 will not be ins t alled ! B ac k - c l ic k t o go one s tep ba c k t o t he pr ev iou s s et up[...]

  • Pagina 13

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 . 7. I n st al l p r o g r ess T he I ns ta l l P rogres s dialog s how s t he pr og re s s of t he ins t allati on pr oc es s , and doe s not re qu i re any interv en t ion : After t he i nst allat ion[...]

  • Pagina 14

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 . 8. Co n g r atu l ati on s! T he Congrat ul ations dialog c on f i rms t ha t y o ur AVG I nte rne t S e c u rity 201 4 ha s be en f ully ins t alled an d c on f i gu r ed : Prod uct I m prov e me nt [...]

  • Pagina 15

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 4 . Afte r I n sta l l a t i on 4 . 1. Pr od u c t r e g i strati on H av ing f i nis he d t he AVG I n t e rne t S e curity 20 14 i nst allat ion, plea s e reg i s t er y ou pr odu c t online on t he A V[...]

  • Pagina 16

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 I f AVG fa i l s to i de nt i f y the E I CA R te s t fi l e a s a virus , you s houl d che ck the progra m conf i gura t io n a ga i n! 4 . 5. AV G d efau l t c on f i g u rati on T he def au lt c onf ig[...]

  • Pagina 17

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 5 . AV G Us e r I n t e r face A V G I nte r ne t Se curity 20 14 op en s with t he main wind ow: T he m ain win do w is div ide d int o s ev era l s ec t ions: U pper l i ne navigat i on c onsi s t s of [...]

  • Pagina 18

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 A V G gadget i s ac c es s ible f ro m t he W in do w s s i de ba r ( supp or t ed in OS W ind ow s V i s t a/7/ 8 only ), allow s quic k ac c es s t o s c ann ing an d upd at ing within AVG I nte rne t S[...]

  • Pagina 19

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 5 . 1.3. S u pp or t Op en s a new dialog s t ru c t ur ed i nto f our t abs wh er e y ou c an f ind all re l ev an t inf or mat ion ab ou t AVG I nte rne t Se curity 20 14 : Li ce ns e and S upport - T h[...]

  • Pagina 20

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 0 5 . 1.4. Opti on s T he m ainten an c e of AVG I nte rne t S e c u rity 201 4 is ac c es s i ble v ia t he Opt i ons it em. Clic k t he ar row t o op en t he r oll-d own m en u: Scan com puter laun c he s[...]

  • Pagina 21

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 1 c ompo ne nt. H elp conte nts - Open s t he A VG help f i les . Ge t s uppo rt - Ope ns t he A V G web s ite ( h t t p: / / w w w . av g. c om/ ) at t he c u s tomer s up po rt c enter pa ge. Yo ur A V G [...]

  • Pagina 22

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 2 - t he or ang e ic o n indic ates t ha t A V G I nterne t S ec urity 201 4 i s i n a cri tica l s ta tus ! One or mor e c ompo ne nts do not wo rk pr op erly an d AVG I n te rne t S e curity 20 14 c a nn [...]

  • Pagina 23

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 3 A ct i o ns a c ce s s i bl e M ove m ous e over any com ponent 's i con t o high l igh t it within t he c o mpon ents ov er v i ew . A t t he s ame t im e, t he c ompon en t ' s basic f un c t [...]

  • Pagina 24

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 4 Scan n ow - T he butt on is gra ph i c ally div ide d int o t wo s ec t ion s . Follow t he Scan n ow l ink t o laun c h t he W hole Co m pu t er S c a n im media t ely , an d wa tc h it s pr og re s s an[...]

  • Pagina 25

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 5 T he A VG S ys tem Tray I con als o inf or ms abo ut c urr ent ac t iv it ies w it hin y our AVG I nte rne t S e c uri t y 201 4 , an d on po s s i ble s t at us c h ang es i n t he pr og r am ( e.g. au t[...]

  • Pagina 26

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 6 A V G ga dge t cont rol s I f ne ed ed , t he A V G ga dg et allow s y ou t o lau nch a s can or an up da t e im media t ely . I t pr ov ides a qu ic k link c on ne c t ing y ou t o t he major s o c ial n[...]

  • Pagina 27

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 7 5 . 8. AV G Ad vi sor A V G A d vis or has bee n de s igne d t o detec t pr ob lems t hat mi gh t be s lo w ing y our c o m pu t er dow n, or putt i ng i t at ris k , and t o re c ommend an ac t ion t o s[...]

  • Pagina 28

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 8 5 . 9. AV G Ac c el erator A V G A cce l era tor allow s s moo t her on l ine v ide o playback and m ak es add it iona l do w nloa ds easi er . W he n t he v i de o- ac c eler ation pr oces s i s in pr og[...]

  • Pagina 29

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 9 6 . AV G C omp on e n t s 6 . 1. Co mp u t er Pr otec ti o n T he Com pute r c o mpo ne nt c ov e rs t wo main s ec ur it y s e r v i c es : A nti Vi rus and Da ta S af e : A nti Vi rus c o nsi s t s of a[...]

  • Pagina 30

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 0 En abled / D i s abled - T he bu t t on may re m ind y ou of a t raf f ic li gh t, both in app ea r an c e and in f unct i on ality . S ingle c li c k t o s witc h betwe en t w o posi t ion s . T he gr ee[...]

  • Pagina 31

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 1 Firs t , y ou ha v e t o s pec if y y our s a f e' s name , an d c rea t e a s tro ng pas s wo rd: Safe name - T o c re ate a new data s a fe , y o u f i rst nee d t o c h oos e a s u it ab le s a f [...]

  • Pagina 32

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 2 A cce s s - t he c heck box es i n t his s ec t ion ena ble y ou t o c rea t e c onv en ien t s hor t c u t s t o y o ur data s a f e. H ow to unl ock your da t a s a f e On c e y ou ar e ha pp y with t h[...]

  • Pagina 33

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 3 c ompu t er s imply by v is i t ing t he af f ec t ed s it e. Onl i ne S hi el d i s not i ntende d for s erv er pl atf orm s prote ction! D i a log controls T o s witc h be twee n bo t h s ec t ions of t[...]

  • Pagina 34

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 4 D et ai l s - Clic k t he butt on , an d a brie f desc r i ption of t he high lighted s er v i c e app ea rs in t he bo t t om pa r t of t h dialog . - Use t he gre en arr ow in t he upp er lef t s e c ti[...]

  • Pagina 35

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 5 En abled / D i s abled - T he bu t t on may re m ind y ou of a t raf f ic li gh t, both in app ea r an c e and in f unct i on ality . S ingle c li c k t o s witc h betwe en t w o posi t ion s . T he gr ee[...]

  • Pagina 36

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 6 mes s age s . A nti -Spa m us es a re gular l y up da t ed da taba s e fo r t he detec t ion of s pam. I t is als o po s s ible t o us e RBL s e rv ers (p ub l ic datab as es of " k now n s pammer &q[...]

  • Pagina 37

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 7 on ly ! Stat i s ti cs - C lic k t he bu t t on t o get re dir ect ed t o t he ded ic at ed pag e on t he A V G we bsi t e (h t t p:/ / w w w.av g.c o m / ). On t his pag e y ou c an f ind a detailed s t [...]

  • Pagina 38

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 8 A va i l a bl e Fi re w a l l m ode s Fire w all allow s y ou t o def ine s peci f i c s ec ur i t y ru les ba s ed on w he t he r y our c omputer is l ocat ed in a do main, i s a s t and alo ne c ompu t [...]

  • Pagina 39

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 9 D i a log controls T he dialog pr ov i de s an ov er v iew of ba s ic inf orma t ion on t he Fire w all c ompo ne nt s t at us : Fi rew all M ode - Prov ides inf orma t ion on t he c ur re nt ly s e lect [...]

  • Pagina 40

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 0 T he f ollow i ng c a t eg or ies c an be ana l y z ed and fixed: reg i s t ry err ors, junk f il es, f ra gme ntat ion , an d br oken s ho rtc ut s : R egis try E rrors will giv e y ou t he nu mber of er[...]

  • Pagina 41

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 1 T he result s ov erv iew pro v ides t he numb er of detec t ed s y s tem pr ob l ems c l ass if ied ac c or ding t o t he respect i v e c atego rie s t es t ed . T he ana l y s i s re s u lt s will als o [...]

  • Pagina 42

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 2 7 . AV G S e cu rit y Tool bar A V G S ec uri t y Too l bar is a t ool t hat c lo s ely c oop er at es wit h t he LinkS c ann er S urf - S hie ld s e r v i c e, and gu ar ds y ou r max im um s ec ur i t y[...]

  • Pagina 43

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 3 D o Not Track - t he DN T s er v ic e help s y ou iden t if y we bs it es t hat ar e c ollec t ing data abo ut y our online act i v i t ies , an d giv es y ou t he c hoic e t o allow or dis allow i t . D [...]

  • Pagina 44

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 4 A V G S ec uri t y Too l bar . Shor t c ut butt ons f or quic k ac c es s t o t hes e app l ic at ion s : Ca l culat or , Not epad , W i ndows E xplorer .[...]

  • Pagina 45

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 5 8 . AV G D o Not Tr a ck A V G Do Not T ra ck helps y ou iden t if y we bs it es t hat ar e c ollec t ing data abo ut y our online act i v i t ies . T he A VG D o Not Track t hat is a par t a A VG S ec ur[...]

  • Pagina 46

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 6 Al l detec t ed data c ollec t ion s er v i c es ar e lis ted in t he Trac k ers o n this page ov erv iew . T her e ar e t hr ee t y p es of da t a c ollec t ion ac t iv it ies re c o gn i z ed by A V G D[...]

  • Pagina 47

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 7 B l ock A ll - Clic k t he bu t t on loc ated in t he bott om s ec t ion of t he dialo g t o t o s ay y ou do no t wish an y da t a c ollec t ion ac t iv it y at all (f or details s e e c hap ter B loc k [...]

  • Pagina 48

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 8 s er v i c e s h ould be allow ed or block ed i nd iv idu ally . Y ou may allow run nin g of s ome of t he detec t ed s y s tems (e . g. W e b A naly t ic s): t hese s y s tems us e t he c ollec t ed da t[...]

  • Pagina 49

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 9 9 . AV G A dv a n ce d S et t i n gs T he adv an c ed c onf igu ra t i on dia log of A V G I n t e rne t S e curity 201 4 ope ns i n a new wind ow name d A dv anc ed A V G S et tin gs . T he wind ow is di[...]

  • Pagina 50

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 0 Press t he Re s tart A VG now bu tt on t o ag r ee w it h t he pro gra m re s t ar t, and w ait a s ec on d f or t he lan gu ag e c han ge t o t ak e ef f ect : Sys te m tra y notifica t i on s W ithin t [...]

  • Pagina 51

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 on . o Em a il S canner notificat i o ns (o n, b y defau lt ) - deci de w he t he r inf or mati on on s c ann i ng of all inc oming an d outgo ing email mes s age s s hou ld be dis play ed . o Stat i s ti[...]

  • Pagina 52

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 2 9 . 2. Sou n d s W ithin t he S ound Sett i ng s dia log y ou c an s pec if y wh ethe r y ou wa nt t o be inf ormed abo ut s peci f i c AVG I nte rne t S e curity 20 14 act i on s by a s o und no t if i c[...]

  • Pagina 53

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 3 9 . 3. T e mp or ar i l y d i sab l e A V G p r otec ti on I n t he T emporari l y di s abl e A VG prote ct i on dialog y ou ha v e t he op t ion of s witc h ing of f t he entire pr ot ec t ion s ec ur ed[...]

  • Pagina 54

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 4 9 . 4. Co mp u t er Pr otec ti o n 9 . 4.1. A n t i V i ru s A nti Vi rus t oge t he r with Res i dent S hi el d pr ot ec t y ou r c omputer c o ntinuo usl y f rom all k n ow n t y p es of v iru s es , s [...]

  • Pagina 55

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 5 A s k m e before rem ovin g thre ats ( on b y de fault ) - c heck t o ens ur e t ha t t he Residen t S hie ld w ill not pe r f orm any ac t ion automati c ally ; ins t ead i t will dis play a dialog de s [...]

  • Pagina 56

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 6 I n t he F i l es S canned by t he Re s i dent S hi eld dialog it is po s s i ble t o c o nf i gu r e wh ic h f i les w ill be s cann ed ( b y s pe c if i c ex t ensi on s ): Mar k t he re s pe c t iv e c[...]

  • Pagina 57

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 7 Scan appl i cat i on s an d S ca n dri ve rs en ab l e y ou t o s pecify in de t ail w ha t s hou l d be inc lude d in an t i-r ootk i t s c ann ing . T he s e s e t t ing s ar e int en de d f or adv an c[...]

  • Pagina 58

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 8 9 . 4.3. Cac h e Server T he Ca che S erv er S et tin gs dialo g re f ers t o t he c a c h e s erv er pro c e s s designe d t o s pe ed up all t y pe s of AVG I nte rne t S e curity 20 14 s c ans: T he c [...]

  • Pagina 59

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 9 9 . 5.1. Emai l S c an n er T he E m ai l S ca n ner dialog i s div i de d int o t hr ee s ec t ion s : E m a i l s ca nni ng I n t his s ec t ion , y ou c an s et t he s e basi c s f or i ncomi ng an d/ [...]

  • Pagina 60

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 0 R eport P ote ntiall y U nwant ed P rog rams and S pywa re thre ats ( on b y de fault ) - c heck t o ac t iv ate s c ann ing f or s py wa re as w ell as fo r v iru s es . S pywa re rep r esents a que s t [...]

  • Pagina 61

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 1 t o email mes s age s with att ac hmen t s : By def au l t , t he c er t if i c ati on t ext c o ns is ts of j ust a ba s ic inf or mat ion t ha t s t ates No v i ru s f oun d in t his mes s age . How ev [...]

  • Pagina 62

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 T he A t tac hm ent f i l te r dialog allow s y o u t o s e t up par ame t er s f or email mes s age at t ac hmen t s cann ing . B y de f ault, t he Re m ove at tac hm ent s op t ion is s w it c h ed of f[...]

  • Pagina 63

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 3 I n t his dia log y ou c an s et up a new E mail S c a nne r s er v er us ing t he P OP3 pr ot ocol f or i ncoming m ail: P OP 3 Serve r Name - in t his f ield y ou c a n s peci f y t he name of ne w ly a[...]

  • Pagina 64

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 4 au t omatic ally c rea t ed " A utoP OP3" s er v ers t his f ield is dea c tiv ated. Type of Log i n - de f i ne s t he met ho d f or deter m ining t he mail s erv er us ed f or inc oming mail: [...]

  • Pagina 65

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 5 SM TP S erve r Na m e - in t his f ield y ou c a n s peci f y t he name of ne w ly add ed s er v ers ( to ad d a S M TP s er v er, c l ic k t he righ t mouse b u t t on ov er t he S M TP it em of t he lef[...]

  • Pagina 66

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 6 I n t his dia log y ou c an s et up a new E mail S c a nne r s er v er us ing t he I M A P pro toc ol f or outgo ing mail: I M A P Serve r Name - in t his f ield y ou c a n s peci f y t he name of ne w ly[...]

  • Pagina 67

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 7 au t omatic ally c rea t ed " A utoI M A P " s er v ers t his f ield is de ac t iv a t ed . Type of Log i n - de f i ne s t he met ho d f or deter m ining t he mail s erv er us ed f or outgo ing[...]

  • Pagina 68

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 8 I n t he A nt i -Spam S ett i ngs dialog y ou c an c heck /uncheck t he Turn on A nt i -Spam p rot ec tion c heck b ox t o allow / pr oh ibit t he an ti -spam s cann ing of email c ommunic ation. T his op[...]

  • Pagina 69

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 9 A dd rec i pi ents of s ent em ail s to whi t eli s t - t ic k t his c h eck b ox t o c on f i rm t hat all re c ipients of s ent emails c an be t ru s ted, an d all email m ess a ges c oming f rom t heir[...]

  • Pagina 70

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 0 c ommunic ation with t he Mails hell s er v e rs, i. e. t he s c ann ed da t a will be c ompa re d with M ails hell da t ab as es on line. Ge nera l l y i t i s recomm ended tha t you k ee p the def aul t[...]

  • Pagina 71

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 1 impor t i t by s e lec t ing t his bu t t on . T he c ontent of t he f i le m us t c on t ain on ly one it em ( a dd ress , do main na me ) pe r line. T he Black l i s t i t em ope ns a dialo g with a glo[...]

  • Pagina 72

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 2 The E xpert S et tings branch conta i ns ex te ns i ve s et tin g options for t he A nt i -Spam fea ture. Thes e s et ti ngs are i nte n ded exc l us i ve l y for expe ri enc ed us ers , ty p i ca ll y ne[...]

  • Pagina 73

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 A dd 'Secure d by Li nk S ca nner'.. . - ( o f f b y de f au lt ): c onf irm t his op t ion t o m ake s ur e t hat all mes s age s s ent f ro m t he Fac eb oo k / My Space s o c ial ne t wo rk s[...]

  • Pagina 74

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 4 de t ect ed t hr ea t : v i a s t and ar d po p- up dialog , v ia t r ay balloo n notif ic at ion, or v ia t r ay i c on inf o. I n t he W eb P rot ec tion dialog y o u c an edit t he c ompon en t 's[...]

  • Pagina 75

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 5 c ompu t er b eing i nfec t ed ) y ou may c heck t his option t o ac t iv ate t he mos t t ho r ou gh s c ann ing alg or it hms t ha t will s c an ev en t hose ar eas of y o ur c omputer t ha t r ar ely g[...]

  • Pagina 76

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 6 W h en t he I de nt it y P rotec t ion is ac t iv ated, y ou c an s pec if y wh at t o do wh en a t hr ea t is detec t ed : A l way s prom pt ( on b y de f au lt ) - wh en a t hr ea t i s detec t ed , y o[...]

  • Pagina 77

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 7 9 . 8.1. W h ol e Comp u t er Sc an T he W hol e Comp ute r S can option allow s y ou t o edit par ameter s of one of t he s c a ns pre def ined by t he s of t wa re v e nd or , W ho le Co mputer Sc a n :[...]

  • Pagina 78

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 8 Scan i n s i de archives ( off b y defau lt ) - t his par amet er s tipulates t ha t s cann ing s hou l d c hec k all f i les s t or ed i nsi de ar c h iv es , e. g. Z I P , RAR, . . . U s e heuri s tics [...]

  • Pagina 79

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 9 9 . 8.2. S p ec i fi c Fi l es o r Fol d ers Sc an T he editi ng interf ac e f or S ca n S pec i f i c Fi l es or Fol ders is iden t ic al t o t he W ho l e Co mputer Sc a n ed it ing dia log. A ll c o nf[...]

  • Pagina 80

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 0 T he l is t of par ameters i s iden ti c al t o t hose av ailab le fo r t he S c a n of t he W h ole C ompu t er . Ho w ev er , t he def au lt s ett i ng s dif f er ( for ins t an c e, W hole Co m pu t er[...]

  • Pagina 81

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 1 9 . 8.4. R emovab l e D evi c e Sc an T he editi ng interf ac e f or R emo va b l e De vice S ca n is als o v ery s imilar t o t he W h ole Co m pu t er S c a n ed it ing dia log: T he Re m ovable Dev i c[...]

  • Pagina 82

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 2 9 . 9.1. S c h edu l ed Sc an T he par amet er s of t he s c hed uled s can c an be edited ( o r a new s c h ed ule s et up ) on t hr ee t ab s . On each t ab y ou c an f i rst c h ec k / unc he c k t he [...]

  • Pagina 83

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 3 A dva nce d s che dul e optio ns T his s e c t ion allow s y ou t o def ine un de r wh i c h c o nd i t ions t he s c a n s hou ld/s hou ld not be laun c hed i f t he c ompu t er i s in low pow er mode or[...]

  • Pagina 84

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 4 R eport enhance d s et o f pote ntiall y unwant ed program s ( o f f b y de f au lt ): mark t o de t ect ex t end ed pa c k age s of s py wa r e: pr og ra m s t hat ar e per f ect l y ok an d ha rmless wh[...]

  • Pagina 85

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 5 s w it c hed on b ut nob od y is c urr ently w or k ing on it ). On t he other han d, y o u c an de c re ase t he s y s tem re s o ur c es us ed by ex t end ing t he s c ann i ng du r ation. Se t a ddi t [...]

  • Pagina 86

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 6 On t he Locat i on t ab y o u c an de f i ne w he t he r y ou wa nt t o s c h ed ule s c ann ing of t he w ho le c o m pu t er or s c ann ing of s pecific files or f older s . I f y o u s elec t s c ann i[...]

  • Pagina 87

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 7 Finally , c heck t he Run t he u pdat e again as s oon as the I nte rnet connec tion i s ava il abl e opti on t o mak e s ur e t han i f t he I nter ne t c o nn ect ion i s int er rup t ed and t he upd at[...]

  • Pagina 88

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 8 Ot he r upda te s e t t i ngs C he c k t he Run the update again as s o on as the I nte rnet connec tion i s ava i l able op t i on t o m ake s ur e t ha t if t he I nter ne t c onn ec t ion is int er r u[...]

  • Pagina 89

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 9 A dva nce d s che dul e optio ns T his s e c t ion allow s y ou t o def ine un de r wh i c h c o nd i t ions t he A nti - S pa m up da t e s hou ld/s h ou ld not be laun c h ed if t he c o m pu t er i s i[...]

  • Pagina 90

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 0 R equire conf i rm at i on f rom the us er (b y defau lt ) - y o u will be ask e d t o app ro v e a P C rest ar t ne ed ed t o f ina liz e t he upd ate pro c ess R es t art i m m edi at el y - t he c ompu[...]

  • Pagina 91

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 1 9 . 10 .1. Pr ox y T he pro x y s e rv er is a s t and - alon e s er v er or a s erv ic e r un ning on a PC t hat gua r an t ee s s af er c onn ec t ion t o t he I nt er net. A c c o rdin g t o t he s p e[...]

  • Pagina 92

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 2 c on ne c t ing t o t he In t ern et v ia t he pr oxy s e r v e r. A utoma tic configura t i on I f y ou s elect automat ic c onf igur at ion ( mar k t he A ut o op t ion t o ac t iva t e t he re s p ect [...]

  • Pagina 93

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 3 M ove down - m ov es t he s e lec t ed U R L one pos it ion dow n i n t he lis t 9 . 10 .3. Man ag e T he Updat e M anage m ent dia log of f ers t wo op t ion s ac c es s ible v ia t w o butt on s : D ele[...]

  • Pagina 94

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 4 T he c h art in t he dia log dis plays a l is t of ex c eptions, i f any hav e bee n alre ady de fin ed . Eac h it em ha s a c he c k box ne x t t o it . I f t he c heck box i s m ar k e d, t he n t he ex[...]

  • Pagina 95

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 5 9 . 12 . V i ru s V au l t T he V i rus V aul t M ai nte n anc e dialog allows y ou t o de f ine s ev e ra l pa r ameter s re ga r ding t he adminis t ra t i on of ob jec t s s t or ed in t he V irus V au[...]

  • Pagina 96

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 6 9 . 13 . AV G Sel f Pr otec ti on T he A VG S elf P rot ec t i on ena bles AVG I n t e rne t S e curity 20 14 t o pr ot ec t it s ow n pr oces s es , f iles , re gis t r y k ey s an d driv er s f r om be [...]

  • Pagina 97

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 7 W ithin t he dialog , t he f ollow i ng s e t t ing op t ions ar e av ailable: I 'd l i k e to hel p A V G i m prove their product s by participating i n the A VG P roduct I m prov ement P rogram ( o[...]

  • Pagina 98

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 8 max im um s a f ety . Mos t com m on t hre a ts N ow ada y s , t her e ar e f ar more t hre at s out t her e t ha n plain v i ru s e s . A uthor s of malic io us c o de s and dan ge ro us w eb s it es ar [...]

  • Pagina 99

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 9 9 . 15 . I gn or e Er r or St atu s I n t he Ignore error s ta t us dialo g y o u c an t ic k t hose c ompo ne nts t hat y ou do not wa nt t o get inf orme d abo ut: By def au l t , no c ompo ne nt is s e[...]

  • Pagina 100

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 0 re m embe r t he un iqu e at t r ibutes of t he netwo rk (s pe c if ic a lly t he M A C ad dr es s ) , and w ill no t dis pla y t he no t if i c ati on ne x t t ime. E ach ne t w or k t ha t y ou c onn [...]

  • Pagina 101

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 1 1 0 . Firew a l l S e t t i ngs T he Fi re wall c o nf igu ra t i on op ens in a ne w w indo w whe re in s ev er al dialog s y ou c an s et up ad v anc ed pa r ameter s f or t he c ompon ent. Fi re wa l[...]

  • Pagina 102

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 2 Fire w all allow s y ou t o def ine s peci f i c s ec ur i t y ru les ba s ed on w he t he r y our c omputer is l ocat ed in a do main, i s a s t and alo ne c ompu t er , or ev en a notebo ok. E ac h of[...]

  • Pagina 103

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 3 1 0.2. A p p l i c ati o n s T he A ppli cat i on dialo g li s t s all app lic at ions t hat hav e t ried t o c ommunic ate ov er t he netwo r k s o f ar, an d i c on s f or t he ass ig ne d ac t ion: T[...]

  • Pagina 104

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 4 do not m odify the s et tin gs ! C ontrol butt ons T he l is t c an be edited us ing t he f ollow ing c ontro l bu t t on s : A dd - op en s an empty dialog f or de f ining new app l ic at ion ru l es. [...]

  • Pagina 105

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 5 1 0.4. A d van c ed se tti n g s A ny editin g withi n the A dvance d s et tin gs di alog i s i nte nded for E X P ERI E N CED U S E R S ONLY! T he A dv ance d s et ting s dia log allow s y ou t o op t [...]

  • Pagina 106

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 6 1 0.5. D efi n ed n etw o r ks A ny editin g withi n the D ef i n ed netw ork s d i alog i s i ntende d for E X P E RI ENC ED USE RS ON LY ! T he De fined net work s dia log of f ers a lis t of all netw[...]

  • Pagina 107

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 7 Ed i t net work - ope ns t he Ne tw ork propert i es dialog w ind ow ( s ee ab ov e ) wh ere y o u c an edit t he pa r ameter s of an alr ea dy def ined netwo rk ( the dialog i s iden t ic al w it h t h[...]

  • Pagina 108

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 8 A ction - T his c olumn dis play s an ic on f or t he as s igne d ac t ion: o Al low c ommunic ation f or all netwo r k s o Bl ock c omm un ic at ion T o ed it s et t ings of any i t em i n t he lis t ([...]

  • Pagina 109

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 9 re s p ect iv e l og ac t ion, us er na me, P I D , t ra ff ic dire c tion, pr otoc ol t y pe , nu mber s of t he re m ote an d loc al por t s , and i nf or m ati on on t he loc al an d re mot e I P add[...]

  • Pagina 110

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 0 C ontrol butt ons R ef res h l i s t - all l og ged pa ra m eter s c an be ar ra nge d ac c or ding t o t he s elect ed at t rib ute: c hr on olo gic ally ( d ates ) or alpha be t i c ally ( othe r c ol[...]

  • Pagina 111

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 1 1 1 . A V G S ca n n i n g By def au l t , A V G I n t e rne t S e curity 201 4 doe s no t ru n an y s c a ns , as af t er t he i niti al one ( t ha t y ou w il l b e inv it ed t o laun c h ) , y ou s h[...]

  • Pagina 112

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 2 I n t he S can Option s dia log, y ou c an s ee t hre e main s can c onf igur at ion s ec t ions: o M anage s che dul es s ca n s - Clic k t his option t o ope n a new dialog w it h an ov erv iew of all[...]

  • Pagina 113

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 3 Sca n configu ra ti on e ditin g You c a n ed it t he W hole com pute r s can c o nf igu r ati on i n t he S ca n whol e com puter - S et ti ngs dialog (t he dia log is ac c es s ib le via t he Set t in[...]

  • Pagina 114

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 4 R eport P ote ntiall y U nwant ed P rog rams and S pywa re thre ats (on b y de fault ) - Ch ec k t o ac t iv a t e t he s c ann i ng f or s py wa re as w ell as fo r v i r uses . S py w ar e re pr es en[...]

  • Pagina 115

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 5 o C om puter s hutdown o ptions - deci de w he t he r t he c ompu t er s h ou l d be s hut dow n au t omatic ally once t he run nin g s c a nn ing pr oc es s is ov er . H av ing c onf irmed t his opti o[...]

  • Pagina 116

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 6 W a rni n g: These s c an s et t ing s ar e iden t ic al t o t he par amet er s f or a new ly de f ined s can - as desc rib e d in t he AV G S c ann ing / S c an s c hed uling / H ow t o S c a n c hap t[...]

  • Pagina 117

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 7 Sca n configu ra ti on e ditin g You c a n ed it t he S ca n S pec i fic Fi l es or Fol ders c on f i gu r ation i n t he S ca n S pec i f i c Fi l es or Fol ders - Sett i ng s dialo g (the dialo g i s [...]

  • Pagina 118

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 8 s c ann ing f or s py wa re as w ell as fo r v iru s es . S pywa re rep r esents a que s t iona ble malwa re c at eg or y : ev en t ho ug h it us ua lly re pr es ents a s ec ur i t y ris k , s ome of t [...]

  • Pagina 119

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 9 o C om puter s hutdown o ptions - deci de w he t he r t he c ompu t er s h ou l d be s hut dow n au t omatic ally once t he run nin g s c a nn ing pr oc es s is ov er . H av ing c onf irmed t his opti o[...]

  • Pagina 120

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 0 W a rni n g: These s c an s et t ing s ar e iden t ic al t o t he par amet er s f or a new ly de f ined s can - as desc rib e d in t he AV G S c ann ing / S c an s c hed uling / H ow t o S c a n c hap t[...]

  • Pagina 121

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 1 Sca n configu ra ti on e ditin g You c a n ed it t he A nti-R oo t k it s c a n c onf igu ra ti on in t he A nt i-R ootk i t S et tings dialog ( t he dialo g is ac c es s ib le v i a t he S ett i ng s l[...]

  • Pagina 122

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 2 W ithin W ind ow s E x plor er high light t he f i le (or f olde r) y o u wa nt t o c hec k R ight-cl ic k y o ur m ou s e ov er t he ob jec t t o ope n t he c ontex t menu Selec t t he S ca n with A V [...]

  • Pagina 123

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 3 if a pa ra m eter re qu i re s s peci f i c v a lue t o be pr ov ided (e.g. t he / s can par amet er t hat re qu ire s inf or mati on on t he s e l ect ed are as of y our c o mputer t hat are t o be s c[...]

  • Pagina 124

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 4 / LO G Ge ne ra t e a s c a n re s ult f il e / MA CR OW R ep or t m acros / PW D W R ep or t pass w or d- pr ot ect ed f iles / ARC BOM BS W R ep or t archiv e bo mbs (r epe ated ly c ompr ess e d ar c[...]

  • Pagina 125

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 5 1 1.4. S c an S c h edu l i n g W ith A VG I nte rne t S e c uri ty 201 4 y ou c an run s can on dema nd ( f or i nst anc e w he n y ou s us pe c t an infec t ion ha s pe ne t r ated y ou r c omputer ) [...]

  • Pagina 126

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 6 1 1.4.1. S c h ed u l e I n t he upp er par t of t he S chedule t ab y ou c an f i nd t he t ext f ield wh er e y ou c an s peci f y t he na me of t he s can s c hed ule t ha t is c urr ently bein g def[...]

  • Pagina 127

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 7 1 1.4.2. S etti n gs I n t he upp er par t of t he S et tings t ab y ou c an f ind t he t ex t f ield whe re y ou c an s pec if y t he na me of t he s can s c hed ule t ha t is c urr ently bein g def in[...]

  • Pagina 128

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 8 U s e heuri s tics ( on b y de fault ) : he ur i s t ic an aly s is ( d y na m ic emulati on of t he s c ann ed ob jec t ’ s ins t ru c tions i n a vir t ua l c omputer env iron men t ) will be on e o[...]

  • Pagina 129

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 9 o Sel ec te d fil e ty pes - y ou c an s peci f y t hat y o u wa nt t o s c a n only files t hat c an be inf ec t ed (files t hat c ann ot ge t inf ect ed w ill no t b e s cann ed , f or ins t ance s o [...]

  • Pagina 130

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 0 1 1.4.3. L oc ati on On t he Locat i on t ab y o u c an de f i ne w he t he r y ou wa nt t o s c h ed ule s c ann ing of t he w ho le c o m pu t er or s c ann ing of s pecific files or f older s . I n c[...]

  • Pagina 131

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 1 W indows fold er - C: W ind ows Ot her o Syst em driv e - t he har d dr iv e on w hic h t he op er at ing s y st em is ins t alled (u s ua lly C:) o Syst em f older - C: W ind ow s S y s t em32 o T[...]

  • Pagina 132

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 2 o N o inf ec t ions fo und , s c an c ompleted o N o inf ec t ions f ou nd , s c an wa s interr upted bef ore c o mpletion o I nf ec t ions we r e f ou nd and no t he ale d, s c a n c ompleted o I nf ec[...]

  • Pagina 133

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 D et ect i o ns - T his t ab is only dis pla y ed if t he r e we re any t hre ats detec t ed du r ing t he s c an, and giv es de t ailed i nf or m ati on abo ut t he t hr ea t s : I nform at i on s ev e[...]

  • Pagina 134

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 4 1 2 . A V G Fil e S hredd e r A V G Fi l e S hredder has bee n designe d t o de l ete f il es abs olu t ely s ec ur ely , t hat i s with no c h an c e t o r ec ov er t he m, ev en with ad v anced s of t[...]

  • Pagina 135

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 5 1 3 . V i rus V a u l t Vi rus V aul t is a s a f e env iron m en t f or t he mana gemen t of s us pe c t / inf ec t ed ob jec t s de t ect ed dur i ng AV G t es t s . On c e an i nf ect ed object is de[...]

  • Pagina 136

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 6 C ontrol butt ons T he f ollow i ng c o ntro l bu t t on s ar e ac c es s ible fr om t he V i rus V ault i nter f ac e: R es t o re - re mov es t he inf ec t ed f il e back t o i t s or igina l loc atio[...]

  • Pagina 137

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 7 1 4 . Hi st or y T he His tory s ec t ion inc lude s inf or mat ion on all pa s t ev ents (s uch as upd ates , s c ans, detec t ions, et c . ) and re por t s abo ut t he s e ev e nts . T his s ec t ion [...]

  • Pagina 138

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 8 - re d ic on wa rn s t her e w as an i nf ect ion detec t ed du r ing t he s c an and it c ould no t be re m ov ed ! Eac h ic on c an eit he r be s olid or c ut in half - t he s olid ic ons s tand s f o[...]

  • Pagina 139

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 9 W ithin t his wa rn i ng dia log y ou will f i nd inf or mati on on t he object t hat wa s detec t ed an d as s igne d as inf ec t ed ( Thr eat ), and s ome desc r i ptiv e f act s on t he re c o gn i z[...]

  • Pagina 140

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 0 For eac h detec t ed object t he f ollow ing i nf or m ation is pr ov ided : Threa t Na m e - de s cripti on ( po s s ib ly ev en na me ) of t he de t ect ed obje c t an d i t s loc ati on R es ult - ac[...]

  • Pagina 141

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 1 1 4.3. Id en ti t y Pro t ec ti on Re su l t s T he I dent i ty P rote ction Re s ul ts dialog is ac c es s i ble v i a t he Options / His tory / I dent i ty P rotec t i on Re s ul ts menu i t em in t h[...]

  • Pagina 142

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 2 1 4.4. Emai l Pr otec ti on Resu l t s T he E m ai l P rote ct i o n R es ults dia log is ac c es s i ble v ia t he Options / His tory / E m ail P rot ec tion Re s ul ts menu i t em in t he upp er li ne[...]

  • Pagina 143

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 1 4.5. On l i n e Sh i el d Resu l ts Onli n e S hi eld s c ans t he c ontent of v is it ed we b pag es and pos s ible f iles inc lude d in t he m ev en bef ore t hes e ar e dis played in y our we b br [...]

  • Pagina 144

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 4 For eac h detec t ed object t he f ollow ing i nf or m ation is pr ov ided : Threa t Na m e - de s cripti on ( po s s ib ly ev en na me ) of t he de t ect ed obje c t , an d i t s s our c e ( w e b pag [...]

  • Pagina 145

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 5 1 4.6. Even t H i s tor y T he E vent hi s t ory dialog i s ac c es s ible v ia t he Optio ns / His tory / E vent H i s tory m en u it em i n t he up pe r line na v i ga t i on of t he A VG I nte rne t [...]

  • Pagina 146

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 6 1 4.7. Fi r ew al l l o g Thi s di al og i s i nte nded f or an expe rt conf i gurat i on, and we rec om m end tha t you do not change any of the s et ting s unl es s you are abs ol ute l y s ure about [...]

  • Pagina 147

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 7 1 5 . A V G Up dat e s N o s ec ur it y s o f t wa r e c an gua r an t ee t r ue pr ot ect i on f ro m v ar i ou s t y pes of t hr ea t s unle s s it i s re gu lar ly upd at ed ! Vi ru s wr i t er s ar [...]

  • Pagina 148

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 8 Prog r am up da t e s c hed ule N ote : I f a s c h ed uled pr og r am up da t e an d s c h ed ule d s c a n c oinc ide s , t he up da t e pr oces s i s of highe r pr i or i t y an d t he s c an w ill b[...]

  • Pagina 149

    A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 9 1 6 . FAQ an d Tech n i ca l S upp or t Shou ld y o u hav e any s ales or t ec hnic al t rou ble w it h y o ur AVG I nte rne t S e curity 20 14 app lic a ti on , t he r e ar e s ev er al ways t o ob t a[...]