AVG Internet Security 2012 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of AVG Internet Security 2012, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of AVG Internet Security 2012 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of AVG Internet Security 2012. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of AVG Internet Security 2012 should contain:
- informations concerning technical data of AVG Internet Security 2012
- name of the manufacturer and a year of construction of the AVG Internet Security 2012 item
- rules of operation, control and maintenance of the AVG Internet Security 2012 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of AVG Internet Security 2012 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of AVG Internet Security 2012, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the AVG service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of AVG Internet Security 2012.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the AVG Internet Security 2012 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 Doc um e n t r e v is i o n 2 012 .24 (19 .6.2 01 2) C o p y r ight A V G Te c hno lo gie s C Z , s.r .o . A ll rights re se r v e d. A ll o ther tra d e m a rk s a r e the pr o pe rty of their r e s pe c[...]

  • Page 2

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 Con t e n t s .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . [...]

  • Page 3

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . . 50 6.5 Ant i - R oot k i t[...]

  • Page 4

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. . . . .. [...]

  • Page 5

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 . I n t rod u c ti on T his us er manu al pro v ides c ompre hen s iv e documentation f or AVG I nte rne t S e c urity 201 2 . A V G I nte r ne t Se curity 20 12 pr ov i de s mult iple l ayers of pro t ec[...]

  • Page 6

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 . AV G Inst al la t i on Requ i reme n t s 2 . 1. Op e r ati on Sy st ems S u pp or te d A V G I nte r ne t Se curity 20 12 is int en de d t o pro t ect wo rks t at ions wit h t he f ollow ing op er ating[...]

  • Page 7

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 . AV G Inst al la t i on Pr oce ss W he re do I ge t the i ns ta l l a t i on fil e ? T o ins t all AVG I n t e rne t S e curity 20 12 on y our c o mputer , y ou ne ed t o ge t t he lates t ins t allati o[...]

  • Page 8

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 A tt ent i o n: A t t he m oment you are o nl y s el ec t i ng the l anguage of the i ns ta l l at i on proce s s . The A V G I nterne t S ec urity 201 2 appl i ca ti on wi l l be i ns tall ed i n the s ele[...]

  • Page 9

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 B ac k - Clic k t o re t urn one s t ep ba c k t o t he pr ev i ou s s et up dia log. A cce pt - Clic k t o c on f i r m y o u ha v e re ad , und er s tood , and acc e pted t he lic e ns e ag r ee ment. T h[...]

  • Page 10

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 Press and hold Ct rl , and t hen pr es s C . T his c opies t he numb er . Point an d c li c k t he posi t ion wh ere y o u wo uld lik e t o pa s t e t he c o pied nu mber . Press and hold Ct rl , and t he[...]

  • Page 11

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 c ombine d with t he opti mal use of re s o ur c e s . I n t he f ut ur e, if t he ne ed arises t o c ha ng e t he c on f i gu r ation, y o u will alw ays ha v e t he op t i on of do ing s o dire c t ly i[...]

  • Page 12

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 3 . 5. Cu stom op ti on s T he Cus t om Options dialog allow s y o u t o s e t up detailed par ameters f or t he i nst allat ion: T he Com ponent S elect i on s e c t ion pr ov ides an ov er v i ew of all[...]

  • Page 13

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 . 6. I n st al l p r o g r ess T he I ns ta l l P rogres s dialog s how s t he pr og re s s of t he ins t allati on pr oc es s , and doe s not re qu i re any interv en t ion : After t he i nst allat ion[...]

  • Page 14

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 . 7. I n st al l at i on w as su c c ess fu l T he I ns ta l l at i on wa s s ucce s s ful dialo g c onf irms t ha t y our AVG I nte rne t Se curity 20 12 ha s be en f ully i nst alled and c on f i gu r[...]

  • Page 15

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 4 . Afte r I n sta l l a t i on 4 . 1. Pr od u c t r e g i strati on H av ing f i nis he d t he AVG I n t e rne t S e curity 20 12 i nst allat ion, plea s e reg i s t er y ou pr odu c t online on t he AV [...]

  • Page 16

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 Fro m t he htt p: / / w w w.eic ar . c o m we bsi t e y ou c an als o do w nlo ad t he c ompr es s ed v er s io n of t he EIC A R ' v i ru s ' ( e . g. in t he f or m of eic ar _com. z ip ). Onl[...]

  • Page 17

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 5 . AV G Us e r I n t e r face A V G I nte r ne t Se curity 20 12 op en s with t he main wind ow: T he m ain win do w is div ide d int o s ev era l s ec t ions: Sys te m M enu (top s yst em li ne i n t he[...]

  • Page 18

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 A V G gadget (W i nd ow s s id eb ar , s upp orted in W i nd ow s V is ta/ 7) allow s quick ac c es s t o s c ann ing an d upd at ing within AVG I nte rne t S e c u rity 201 2 - de t ails > > 5 . 1.[...]

  • Page 19

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 5 . 1.3. H i stor y Sc a n re s ult s - s wit c hes t o t he A V G t es t ing interf ace, s pecifically t o t he S c an Re s ult s Ov er v i ew dialog R esi de nt S hield de t ect i on - op en s a dialog [...]

  • Page 20

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 0 5 . 1.5. H el p C onte nts - ope ns t he A V G he lp files Ge t S upport - op en s t he A V G we bsi t e (h t t p:/ / ww w.av g. c om/ ) at t he c u s t omer s u pp or t c en t er pag e Yo ur A V G W e b [...]

  • Page 21

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 1 T he Li cens e and Su pport t ab pr ov ide s inf or mati on on t he pro du c t name (ty pe of li c en c e, an d nu mb e r of s e ats ) , t he li c ense nu mbe r, an d t he ex pir ation date: C ontrol butt[...]

  • Page 22

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 2 T he P roduct I nform at i on t ab pro v ides an ov er v i ew of t he AVG I nte rne t S e curity 20 12 m os t impor t ant t ec hnical data: T he t ab is div i de d int o s ev e ra l s ec t ions: P roduct [...]

  • Page 23

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 3 On t he P rogram t ab y ou c an f i nd inf or mati on on t he AVG I nte rne t S e c u rity 201 2 pr ogr am f ile v ersion, and on t he t hird pa rties c ode us ed in t he pr odu c t :[...]

  • Page 24

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 4 On t he Li ce ns e A gre ement t ab y ou c an re ad t he f ull wo r ding of t he li c ense ag r ee ment be t we en y ou an d A V G T ec hn olo gies: 5 . 2. Sec u ri ty Stat u s In fo T he S ecurity Stat u[...]

  • Page 25

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 5 t he A VG I nte rne t S e c uri ty 201 2 main w indo w. S elec t t his op ti on t o s t at e y ou are awa re of t he c ompo ne nt' s er ro r s tat e bu t f or s ome rea s on y ou wish t o k e ep y o [...]

  • Page 26

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 6 y ou op en t he AV G s c a nning i nter f ac e whe re y ou c an ru n s cans, s ched ule s c ans, or edit t he ir par ameters. (For details s e e c hap ter A V G S c a nning ) Scan o ptions - us e t his li[...]

  • Page 27

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 7 A nti - R ootk i t s cans fo r da ng ero us ro otk i t s hidd en ins ide ap plic ati on s , dr iv ers, or libra r ies - de t ails > > Sys te m Tool s of f er s a detailed s umm ar y of t he A V G en[...]

  • Page 28

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 8 A V G S ys t e m Tra y I con di s pl a y I n f ull c olor w it h no add ed eleme nts t he i c on indicat es t ha t all AVG I nte rne t S e c urity 20 12 c o mpon ents ar e ac t iv e an d f ully f unct i o[...]

  • Page 29

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 9 I nte rne t S e curity 20 12 ; jus t do uble- c lic k t he ic o n. B y righ t -c lic k t he ic o n y ou ope n a brie f c ontex t menu wit h t he f ollow ing options: Open A VG U s er I n t erf ace - c li [...]

  • Page 30

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 0 Spec if i c ally , A VG A d vis or monit or s t he f ollow ing: The s tat e of any curre ntly o pene d web brows er . W eb bro w s er s may ov er load t he memor y , es pe c ially i f m ulti ple t ab s or[...]

  • Page 31

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 1 Quick a cc e s s to s ca nni n g a nd u pda t i n g I f ne ed ed , t he A VG gadget allow s y ou t o lau nch a s can or an up date imm ed iat ely : Scan n ow - c lic k t he S can now li nk t o s t ar t t [...]

  • Page 32

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 2 Twitte r l i nk - op en s a new A VG gadget i nter f ac e pro v iding an ov er v iew of t he l ates t AV G f ee ds post ed t o T wit t er . Follow t he V i ew all the A VG T witt er fe eds l ink t o ope n[...]

  • Page 33

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 3 6 . AV G C omp on e n t s 6 . 1. An t i -V i r u s T he A nt i - V i rus c ompo ne nt is a c o r ne r s t one of y o ur AVG I nte rne t Se curity 20 12 an d it c ombines s ev er al fu nda mental f eatur e[...]

  • Page 34

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 4 6 . 1.2. R esi den t Pr otec t i on A V G I nte r ne t Se curity 20 12 giv es y ou c ontinuo us pro t ec t ion in t he f orm of s o -c alled re s ide nt pr ot ect i on . T he A nt i - V i rus c ompo ne nt[...]

  • Page 35

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 5 C onfigura tion opti ons T he dialog pr ov i de s s ome elementar y c onf igur at ion op t ion s f or f ea t ur es av ailable within t he A nt i - Vi rus c o mpon ent. Y ou c an f ind a br ief de s c ript[...]

  • Page 36

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 6 op t ion on t o ac hiev e max im um s ec ur i t y lev els , how ev er it i s s witc h ed of f by de f ault. o En able I ns tant M es s a gi ng and P 2P downl oads prote ct io n - c heck t his it em if y o[...]

  • Page 37

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 7 6 . 1.5. R esi den t Sh i el d D etec t i on s R es ident S hi eld s c ans f iles as t he y ar e c opied , ope ne d, or s av ed. W h en a v ir us or any k i nd of t hr eat is detec t ed , y o u will be wa[...]

  • Page 38

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 8 R e s i d e nt S hi e l d de t e c ti ons ove r vie w T he entire ov er v i ew of all t hr ea t s detec t ed by Re s iden t Shield c a n be f oun d in t he R es i d ent S hi el d det ect i on dialo g ac c[...]

  • Page 39

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 9 de f ault A V G main dialog ( c ompo ne nts ov erv iew ) . 6 . 2. Li n k Sc an n er Li nk Scanne r pr ot ect s y ou f r om t he inc r ea s ing numbe r of ‘ he r e t oda y , go ne t omor ro w’ t hr ea [...]

  • Page 40

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 0 6 . 2.1. L i n k Sc an n er In t er fac e T he Link S c an ne r c ompon ent m ain dialo g pr ov ides a br i ef de s c ription of t he c ompon ent's f un c t iona lit y an d inf or mat ion on it s c u[...]

  • Page 41

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 1 En te ri ng s uch webs ite i s hi gh l y ri s k y and cannot be recomm ended! 6 . 2.3. On l i n e Sh i el d d etec t i on s Onli n e S hi eld s c ans t he c ontent of v is it ed we b pag es and pos s ible[...]

  • Page 42

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 2 C l os e - c lic k t he butt on t o c lo s e t he wa rn i ng dia log. T he s u s p ic ious w eb pa ge will not be op en ed , an d t he t hr eat detec t ion will be logg ed in t he lis t of Onli n e S hi e[...]

  • Page 43

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 3 R ef res h l i s t - upd ate t he li s t of f ind ings detec t ed by Onl i ne Sh i eld B ac k - s wit c h bac k t o t he def ault AV G main dia log (compon en t s ov erv iew ) 6 . 3. E -mai l Pr otec t i [...]

  • Page 44

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 4 A nti - S pam c h ec k s all inc oming e- mail m ess a ges an d marks un w an t ed e- m ails as s pam. A nt i - Sp am c an m od if y t he s ubje c t of t he email ( tha t ha s b e en iden t i f ied as s p[...]

  • Page 45

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 5 I n t he E -m ail P rotec t i on dialog y o u c an als o edit s ome elemen t ar y f eature s of t he c ompo ne nt's f unct i on ality : Scan i n comi ng m es s a ges (on b y de fault ) - t ic k t he [...]

  • Page 46

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 6 6 . 3.4. E- mai l Sc an n er D et ec ti on s I n t he E -m ail S ca nner dete ct i on dia log ( a c c es s ib le via s yst em menu op t ion H is t ory / E -ma il Sc a nn er detec t ion ) y ou will be ab l[...]

  • Page 47

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 7 B ac k - s wit c hes y ou back t o t he pr ev iousl y dis played dialog . 6 . 4. Fi r ew al l T he Fi rewall is a s y s tem t ha t en f or c es an acc e s s c ontrol polic y betwe en t wo or m or e ne t w[...]

  • Page 48

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 8 ad ap t ers 6 . 4.2. Fi r ew al l Pr of i l es T he Fi re wall allows y ou t o de f ine s pec if i c s ec ur it y rule s ba s ed on w he t he r y our c o m pu t er i s loc ated in a do main, is a s t an d[...]

  • Page 49

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 9 T he pro f ile s witc h ing f eatur e allow s t he Firew all t o s w it c h au t omat ic ally t o t he def ine d pr of ile w he n usi ng a c ertain ne t wo rk ad ap t er , or wh en c onn ect ed t o a c er[...]

  • Page 50

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 0 Sel ec t Fi rewa l l profil e - fr om t he ro ll-d ow n menu s e lec t on e of t he de f ined pr of i les ( for a de t ailed des c rip t ion of each pr ofile an d i t s re c o mmend ed use plea s e c on s[...]

  • Page 51

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 W ha t i s a rootk i t? A roo t k it is a pro gr am designe d t o t ake f und amen t al c ontro l of a c o mputer s ys tem, withou t au t ho riz at ion by t he s ys tem' s ow ne rs an d legit imat e [...]

  • Page 52

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 2 I n t he bott om par t of t he dialog y o u c an s et up s ome elemen t ar y f un c tions of t he roo t k it pre s e nce s c ann ing . Firs t , mar k up t he re s p ect i v e c he c k -bo x e s t o s p ec[...]

  • Page 53

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 3 6 . 6.1. Pr oc ess es T he P roce s s es dialog c ontains a lis t of pr oces s es ( i.e. ru nning app lic a t ion s ) t hat ar e c urr ently ac t iv e on y ou r c omputer . T he li s t is div ide d int o [...]

  • Page 54

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 4 B ac k - s wit c hes y ou back t o t he def au lt A VG m ain dialo g ( c ompo nen t s ov er v iew ) 6 . 6.2. N et w or k Con n ec t i on s T he Ne tw ork Connec ti ons dialo g c o nt ains a lis t of c ur [...]

  • Page 55

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 5 C ontrol butt ons T he c o nt ro l bu t t on s av ailable w it hin t he Ne twork Connec t i ons t ab ar e as f ollow s : Termi nate Connec tion - c lo s es on e or mor e c o nne c t ions s e lec t ed i n [...]

  • Page 56

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 6 R emove s el ec t ed - pr es s t he butt on t o dele t e one or more s elect ed entrie s . B ac k - s wit c hes y ou back t o t he def au lt A VG m ain dialo g (c ompo nen t s ov er v iew ). W e s trongl [...]

  • Page 57

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 7 6 . 6.5. L S P V i ew er T he LS P Vi ewer dialo g s how s a l is t of Layere d S er v ic e P r ov ider s (L SP ). A L ay ere d S ervice P rovi der (L S P) is a s y s t em driv er l ink ed into t he ne t [...]

  • Page 58

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 8 6 . 7. PC An al yzer T he P C A nal yz er c ompo ne nt is able t o s c a n y our c o m pu t er fo r s y s t em pro blems , and giv e y o u a t ra ns par ent ov er v i ew of wh at m igh t be ag gr av at in[...]

  • Page 59

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 9 T he result s ov erv iew pro v ides t he numb er of detec t ed s y s tem pr ob l ems ( Errors ) div i de d ac c or din g t o t he r espec t iv e c atego rie s t es t ed . T he ana ly s i s re s ult s will[...]

  • Page 60

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 0 I dentity P rote ct i o n giv es y our c omputer a re alt ime pr ot ect i on ag ain s t new and ev en unknow n t hr eats . It monitors all (incl ud ing hidd en) pro c es s es an d ov er 28 5 dif f er ent [...]

  • Page 61

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 1 t he user interf ace of t he Sy st em t ools c ompo ne nt wh ere y ou c an f i nd a detailed ov er v iew of all monitor ed pr oc es s es . B a s i c I de nt i ty P rote ction s e tt i ngs I n t he bott om[...]

  • Page 62

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 op en ed via t he S up por t s y s t em menu i t em) . For de tailed desc r i ption of t he c ompon ent's options and f unct i on ality within t he A V G Re m ote A dminis t ra t i on s y s t em plea[...]

  • Page 63

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 3 7 . My A pp s M y A pps dialo g (a c c es s i b le v i a t he M y A pp s b u t t on dir ect ly f ro m t he A V G m ain dialog ) pr ov i de s an ov er v iew of AV G s t and alo ne ap plic ati on s , both a[...]

  • Page 64

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 4 For det ail ed i nformat i on pl eas e vis i t the dedi ca t ed A VG webpa ge, where you ca n als o downl oad the com ponent i m m edi at ely. To do s o, you m ay us e the A VG Fami l y S af ety l i n k w[...]

  • Page 65

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 5 downl oad the com ponent i m m edi at ely. To do s o, you m ay us e the A VG M obi l ation l i nk withi n the M y A pps di alog. 7 . 4. AV G PC T u n eu p A V G P C Tun eup app lic a t i on is an adv an c[...]

  • Page 66

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 6 withi n the M y A pps di alog.[...]

  • Page 67

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 7 8 . AV G S e cu rit y Tool bar A V G S ec uri t y Too l bar is a t ool t hat c lo s ely c oop er at es wit h t he LinkS c ann er c o mpon ent, and gu ar ds y our m axi mum s ec ur it y wh ile br owsing t [...]

  • Page 68

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 8 D elet e - t he 'tra s h bin' butt on of f ers a r oll do w n t he menu w he re y o u c an s elec t wh et he r y ou w an t t o dele t e inf orma t ion on y our br ow s in g, dow nloa ds, online [...]

  • Page 69

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 9 9 . AV G D o Not Tr a ck A V G Do Not T ra ck helps y ou iden t if y we bs it es t hat ar e c ollec t ing data abo ut y our online act i v i t ies . An ic on i n y our bro w s er s h ow s t he we bsi t es[...]

  • Page 70

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 0 9 . 1. AV G D o N ot Tr ac k i n te r f ac e W h i le online , A V G Do Not T rac k w ar ns y ou as s oon as any k ind of data c o llec t ion ac t iv it y is de t ect ed. Y ou will s ee t he f ollow ing d[...]

  • Page 71

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 1 W ha t i s tra ck ing? - c li c k t his l ink in t he upp er s ec t ion of t he dialo g t o ge t red ire c ted t o t he de dic ated we bpa ge pr ov i ding detailed ex plan at ion on t he t ra c ki ng prin[...]

  • Page 72

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 2 may b re ak f unct iona lit y in t he re s p ect ive w e b p ag e w he r e t he s erv ic e is run ning!) - I f y ou do no t w an t t o block all t he detect ed s e rv i c es at once, y ou c an s peci f y [...]

  • Page 73

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 N otificat i on pos i tion (Top - R ight b y defau lt ) - Open t he roll- do w n m en u t o s p ec ify in wh i c h po s it ion y o u wa nt t he A V G Do Not T rac k dialo g t o app ea r on y our m on it o[...]

  • Page 74

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 4 N etwo r k s . B y de f ault, A VG Do Not T rac k block s s ome of Ad Ne t wor k s automatic a lly and it re m ains up t o y o ur deci s ion wh ethe r t he re s t s hou ld be bloc k ed as w ell, or l ef t[...]

  • Page 75

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 5 1 0 . A V G A dv a n ce d S et t i n gs T he adv an c ed c onf igu ra t i on dia log of A V G I n t e rne t S e curity 201 2 ope ns i n a new wind ow name d A dvanc ed A VG S et ti ngs . T he w ind ow i s[...]

  • Page 76

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 6 C on f irm y our s e lec t ion by pre s s ing t he A pply bu t t on (rig ht-h an d b o t t om c or ne r of t he dia log) Press t he OK bu tt on c o nf i rm A new dialog po ps-up i nf or m ing y ou t hat i[...]

  • Page 77

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 7 inf or mati on up on automati c laun c h of t he s c h ed ule d s c a n, it s pro gr es s , and r esult s s ho uld be dis played. o D i s pl ay Fi rewa l l rel at ed tra y notificat i ons (o n, b y defau [...]

  • Page 78

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 8 1 0.2. S ou n d s W ithin t he S ound s dia log y ou c an s pec if y wh ethe r y ou wa nt t o be inf ormed abo ut s pec if i c AVG I nte rne t S e curity 20 12 act i on s by a s o und no t if i c ati on :[...]

  • Page 79

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 9 1 0.3. Temp o r ar i l y d i sab l e A V G p r otec t i on I n t he T emporari l y di s abl e A VG prote ct i on dialog y ou ha v e t he op t ion of s witc h ing of f t he entire pr ot ect i on s ec ur ed[...]

  • Page 80

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 0 s of t wa re etc . Y ou c an de c ide f or a long er t im e per i od , how ev e r t his op t ion is not re c o mmend ed if not absolutely nec ess a ry . A f t erw ar ds, all dea c t iv ated c ompon ents w[...]

  • Page 81

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 1 1 0.4.1. Res i d en t Sh i el d R esi de nt S hield pe rf orms liv e pr otec t ion of f i les an d f old er s aga i nst v iru s es , s py w ar e, an d ot he r malwa re. I n t he Res i dent S hi el d S et [...]

  • Page 82

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 2 R eport enhance d s et o f P otent i al l y Unwa nt ed P rograms ( off b y defau lt ) - m ar k t o detec t ext end ed pa c kage s of s py wa r e : pr og r ams t hat ar e pe rf ect ly ok an d har m les s w[...]

  • Page 83

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 3 I n t he F i l es s ca n ned by the R es i d ent S hi el d dialog i t is poss ib le t o c onf igu re which f i les w ill be s c ann ed ( b y s peci f ic ex t ens ion s ): Mar k t he re s pe c t iv e c hec[...]

  • Page 84

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 4 T he Re s i dent S hi eld - E xce ptions dialog of f er s t he op t ion of de f ining f iles an d/or f olde rs t hat s hou ld be exc lu de d f rom t he Re s i dent S hi eld s cann ing . I f thi s i s not [...]

  • Page 85

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 5 1 0.4.2. Cac h e S erver T he Ca che S erv er S et tin gs dialo g re f ers t o t he c a c h e s erv er pro c e s s designe d t o s pe ed up all t y pe s of A V G I nte r ne t Se curity 20 12 s c ans: T he[...]

  • Page 86

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 6 1 0.5. E- mai l p ro t ec ti o n I n t he E -m ail prote ct io n s ec t ion y ou c an edit t he detailed c onf i gu ra t i on of E-mail S c ann er and A nt i- Spam : 1 0.5.1. E- mai l S c an n er T he E -[...]

  • Page 87

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 7 Sca nni ng prope rt i e s I n t his s ec t ion , y ou c an s peci f y ho w t he e- m ail mes s age s will be s c ann ed : U s e He uri s tics ( on b y de fault ) - c heck t o us e t he heu ris t ic s dete[...]

  • Page 88

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 8 f il e " s omet hing . t x t. ex e" app ear as har m les s plain t ex t f il e " s omet hing . t x t" ; c heck t he bo x t o re por t t hes e as po t en t i ally dan ger ou s . M ove r[...]

  • Page 89

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 9 T he A t tac hm ent f i l te r dialog allow s y o u t o s e t up par ame t er s f or e- mail mes s age att ac hmen t s c ann ing . B y de f ault, t he Remove at t ac hm ent s op t ion is s w it c h ed of [...]

  • Page 90

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 0 You c a n als o def ine ne w s er v ers f or i ncomi ng or outgo ing mail, us ing t he A dd new s erve r butt on. POP 3 I n t his dia log ( o pe ned v ia S erve rs / P OP 3 ) y o u c an s et up a new E -m[...]

  • Page 91

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 1 de lim it er ( f or ex ample , po p.ac me.c o m: 820 0 ). T he s tand ard po rt f or P OP3 c ommunic ation is 110 . A dd i t i onal s et ting s - s peci f ies m or e de tailed par amet er s : o Loca l por[...]

  • Page 92

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 2 SM TP S erve r Na m e - in t his f ield y ou c a n s peci f y t he name of ne w ly add ed s er v ers ( to ad d a S M TP s er v er , c lic k t he righ t m ou s e b utt on ov er t he S M TP it em of t he le[...]

  • Page 93

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 3 I n t his dia log (o pe ned v i a S erv ers / IM A P ) y o u c an s et up a new E -mail S c a nne r s er v e r us ing t he I M AP pro t oc ol f or ou t go ing mail: I M A P Serve r Name - in t his f ield [...]

  • Page 94

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 4 o C onnect i on - in t his dro p- dow n menu , y o u c an s peci f y wh i c h k ind of c o nne c t ion t o use ( r egu lar / S S L/ SS L de f au lt ). I f y ou c hoo s e a S SL c onn ec t ion, t he data s[...]

  • Page 95

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 5 Val ue 80- 90 - e- m ail mes s age s lik e ly t o be s p am will be f ilt er ed ou t . Some no n- s p am mes s age s m ay be inc or re c tly f i lt er ed as we ll. Val ue 60- 79 - c on s ider ed as a quit[...]

  • Page 96

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 6 T her e ar e t he f ollow ing options t o c ho ose f rom: A s pecific e- m a il cl i ent - if y ou use on e of t he li s t ed e- m ail c li en t s ( M S Outlook , Ou t look Exp re s s, The B at ! ) , s im[...]

  • Page 97

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 7 I n t his dia log, plea s e s elec t t he f older with t he mes s age s y ou wa nt t o us e fo r t rain ing. P re s s t he A dd f ol der butt on t o l ocat e t he f old er wit h t he . eml f iles ( sav ed[...]

  • Page 98

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 8 pr of ile f irst . I n t he F ol ders conta i n dr op- do wn menu , s et one of t he t wo op t ions - wh ether t he s elec t ed f older c on t ains wa nted ( H A M ), or un s olic i t ed ( S PA M ) m es s[...]

  • Page 99

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 9 Pe rforma nce T he E ngi n e perf orm anc e s ett i ngs dialog ( link ed t o via t he P erf orm anc e it em of t he left nav igation ) of f er s t he A n t i -Spam c ompo ne nt pe rf or m an c e s et t in[...]

  • Page 100

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 0 hav e a vali d reas on to do s o. A ny cha nges t o this configuration s ho ul d onl y be m ade by ex pert us ers ! R B L T he RB L it em op en s an ed it ing dialog c a lled Re al tim e B l ac k h ol e[...]

  • Page 101

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 1 W hite l i s t T he W hi te l i s t it em op en s a dialog named A pp rove d e- m ai l s enders l i s t w it h a glob al li s t of ap pr ov ed s end er e-mail add re s ses and domain na mes wh os e mes [...]

  • Page 102

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 2 t his bu t t on . A l l re c or ds will be s av ed t o a plain t ex t f il e. I m po rt - if y ou alr ea dy hav e a t ext file of email ad dr es s es / do main names pre par ed , y o u c an s im ply imp[...]

  • Page 103

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 3 T he f ollow i ng c o ntro l bu t t on s ar e av ailable : Ed i t - pr ess t his bu t t on t o ope n a dialog , w he r e y ou c a n manu ally en t er a lis t of add ress e s ( y ou c a n als o us e c o [...]

  • Page 104

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 4 1 0.6.1. L i n k S c an n er setti n g s T he Li n k Sca nner s ett i ngs dia log allow s y ou t o s witc h t he elemen t ar y f ea t ure s of t he Lin k S c ann er : Enab l e S ea rch- S hield - I n t [...]

  • Page 105

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 5 1 0.6.2. On l i n e Sh i el d T he Onl i ne S hi eld dialog of f er s t he f ollowin g options: En able Onli n e S hi eld ( on , b y de f au lt ) - ac t iv ate/dea c t iv ate t he entire Onl i ne S hi e[...]

  • Page 106

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 6 I n t he W eb P rot ec tion dialog y o u c an edit t he c ompon en t 's c o nf igu ra t i on re gar ding t he s c an of t he w eb s it e c on t en t . T he editi ng interf ace allow s y o u t o c o[...]

  • Page 107

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 7 o U s e heuri s tic analys i s - ( o n b y default ): s can t he c ontent of t he pa ge t o be dis pla y ed us ing t he he ur i s t ic ana ly s is method ( d yn amic emulation of t he s cann ed ob jec t[...]

  • Page 108

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 8 1 0.7.1. W h ol e c omp u ter sc an T he W hol e Comp ute r s can option allow s y ou t o ed it pa ra m eter s of one of t he s cans pre def ined by t he s of t wa re v e nd or , W ho l e c omputer s c [...]

  • Page 109

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 9 ad diti on al m ea s ur e t ha t inc re as es y our c o m pu t er s e c ur it y ev en more , ho wev er i t may block leg al pr ogr ams , and is t her ef ore s w i t c he d of f by def au lt . Scan for T[...]

  • Page 110

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 0 s c ann ing s pee d de pe nd en t on s ys t em resour c e us age . B y de f ault, t his opti on v alue is s e t t o us er s en s it i v e lev el of automatic re s ou rce usage . I f y ou wa nt t he s c [...]

  • Page 111

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 1 T he l is t of par ameters i s iden ti c al t o t hose av ailab le fo r t he S c a n of t he w ho le c o mputer . How ev er , t he de fa ult s et t ings dif fe r ( f or i nst anc e, W h ole Co m pu t er[...]

  • Page 112

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 2 Al l par ameters s e t up i n t his c onf igu ra ti on dialo g app l y on ly t o t he ar eas s elect ed f or s c a nn ing w it h Sc a n of s peci f i c f i les or f olde rs ! N ote : For a de s c ripti [...]

  • Page 113

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 3 1 0.7.4. Rem ovab l e d ev i c e sc an T he editi ng interf ac e f or R emo va b l e device s ca n is als o v er y s i mil ar t o t he W hole Co mpu t er s can ed it ing dialo g: T he Re m ovable d ev i[...]

  • Page 114

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 4 1 0.8.1. S c h ed u l ed S c an T he par amet er s of t he s c hed uled s can c an be edited ( o r a new s c h ed ule s et up ) on t hr ee t ab s . On ea c h t ab y ou c an f irs t c he c k / unchec k t[...]

  • Page 115

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 5 Sche dul e runni ng H er e, y ou c an s peci f y t im e int er v als f or t he ne w ly s ched ule d s can laun c h. T he t im ing c an eit he r be de f ined by t he re pe ated s c a n laun c h af t er a[...]

  • Page 116

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 6 On t he H ow to s can t ab y ou will f i nd a li s t of s c ann ing pa ra m eters t hat c an be op t iona l ly s w it c h ed on / of f . B y def au l t , mos t pa ra meters ar e s wit c hed on and t he [...]

  • Page 117

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 7 pr ef er enc es or t he c onten t s of t heir elect ro nic s hop ping c arts ) Scan i n s i de archives ( off b y defau lt ): t his par amet er s p ec ifie s t ha t t he s c ann ing s hou l d c he c k a[...]

  • Page 118

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 8 Se t a ddi t i ona l s ca n re port s C lic k t he S et additio nal s can report s . . . link t o op en a s t and alone dialog w indo w c a lled S ca n report s whe re y ou c an t ic k s e v er al it em[...]

  • Page 119

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 9 On t he W ha t to s can t ab y ou c an def ine w he t he r y ou wa nt t o s ched ule s c ann ing of t he w ho le c ompu t er or s c a nning of s p eci f ic f iles or fo l de rs . I f y ou s e l ect s ca[...]

  • Page 120

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 0 1 0.8.2. D efi n i ti on s Up d ate S c h edu l e I f rea l l y nece s s ar y , y ou c a n un c heck t he E nabl e thi s t as k i t em t o s im ply de act i v at e t he s c h ed uled de f init ions upd [...]

  • Page 121

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 1 Ot he r upda te s e t t i ngs Finally , c heck t he Run t he u pdat e again as s oon as the I nte rnet connec tion i s ava il abl e opti on t o mak e s ure t ha n if t he I nt er net c onn ect i on is i[...]

  • Page 122

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 2 up da t e laun c h s hou ld be as s oc iat ed w it h ( A ct i on bas ed on compu t er s ta rt up ). A dva nce d s che dul e optio ns T his s e c t ion allow s y ou t o def ine un de r wh i c h c o nd i [...]

  • Page 123

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 3 1 0.8.4. A n ti -Sp am Up date Sc h edu l e I f re ally neces s ar y , y ou c an uncheck t he E nabl e this tas k it em t o s i mply dea c t iv ate t he s c h ed uled Ant i-Spam upd ate t empo rar i ly [...]

  • Page 124

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 4 Ot he r upda te s e t t i ngs C he c k t he Run the update again as s o on as the I nte rnet connec tion i s ava i l able op t i on t o m ake s ur e t hat if t he In t ern et c onn ect ion i s int er ru[...]

  • Page 125

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 5 R equire conf i rm at i on f rom the us er (b y defau lt ) - y o u will be ask e d t o app ro v e a P C re s tar t ne ed ed t o f i na l iz e t he up da t e pr oces s R es t art i m m edi at el y - t he[...]

  • Page 126

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 6 1 0.9.1. Pr o xy T he pro x y s e rv er is a s t and - alon e s er v er or a s erv ic e r un ning on a PC t hat gua r an t ee s s af er c on ne c t ion t o t he In t ern et. A c c ord i ng t o t he s pe[...]

  • Page 127

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 7 P ort – s pe c ify t he nu mber of t he por t t hat ena bles I nt er net ac c es s ( b y defau lt , t his numb er is s e t t o 31 28 b u t c a n b e s et dif f er en t ly – if yo u ar e not s ure , [...]

  • Page 128

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 8 Spec if y wh ether y ou wa nt t o c o nn ect t o t he I ntern et au t omatic a lly ( A utom at i call y open thi s connec ti on ) or y ou wish t o c onf irm t he c on ne c t ion m an ua l ly ev ery t i [...]

  • Page 129

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 9 1 0.9.3. URL T he UR L dia log of f ers a lis t of In t ern et ad dr es s es f ro m wh i c h t he upd ate f iles c an be dow nloa de d: C ontrol butt ons T he l is t and i t s it ems c an be modif ied u[...]

  • Page 130

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 0 1 0.9.4. Man age T he Updat e m ana gem ent dialog of f er s t wo op ti on s ac c es s ible v ia t wo bu t t on s : D elet e te m porary update fi l es - pre s s t his butt on t o delete all re du nd an[...]

  • Page 131

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 1 Edit ing all f un c t ions of t he A nti -R ootk it c o mpon ent as pr ov ide d wit hin t his dialo g is als o ac c es s i ble dir ect l y f rom t he A nti -R ootk it c o mpon ent's i nter f ac e .[...]

  • Page 132

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 2 1 0.10 .1. Ex c ep ti on s W ithin t he A nt i -R ootk i t E xce p tions dialog y o u c an def ine s pecific files (for ins t an c e s o me driv er s t ha t might b e inc or r ect l y detec t ed as r oo[...]

  • Page 133

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 1 0.11 .1. Id en t i ty Pr otec ti on Set ti n g s T he I dent i ty P rote ction s ett i ngs dia log allow s y ou t o s witc h t he elemen t ar y f ea t ure s of t he I den ti t y Protec t ion c ompon e[...]

  • Page 134

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 4 You c a n als o as s i gn s p eci f ic it ems t o optiona lly ac t iv a t e m or e I den t it y P ro t ect i on f unct iona lit y : P rom pt to s av e your work b ef ore removal - ( o n b y default ) - [...]

  • Page 135

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 5 T he I dent i ty P rote ction A ll owed l i s t pr ov ide s t he f ollowin g inf orma t ion on ea c h app lic a t i on : Lev el - gra phic al i de ntif ic at ion of t he re s p ect i v e pr oc es s s ev[...]

  • Page 136

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 6 on y ou r c omputer , y o u c an def ine it as a poten t ially unw anted pr og r am exc e pt ion: T he P ote n t i all y U nwant ed P rogram s E xc ept io ns dialo g dis play s a l is t of alre ady de f[...]

  • Page 137

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 7 A dd ex cept i on - ope ns an editing dialog w he r e y ou c a n de f i ne par ame t er s of t he ne w exc e ption t o be c r eated: o Fi l e - t y p e t he f ull path t o t he f i le t hat y ou wa nt t[...]

  • Page 138

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 8 1 0.13 . V i r u s Vau l t T he V i rus V aul t m ain t ena nce dialo g allow s y ou t o def ine s ev era l pa r ameter s re ga r ding t he ad minis t ration of ob jec t s s t ore d in t he V i ru s V a[...]

  • Page 139

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 9 W ithin t he dialog , t he f ollow i ng s e t t ing op t ions ar e av ailable: A l l ow report i ng (o n b y default) - If y o u wa nt t o help us f ur t he r im pr ov e AVG I nte rne t Se curity 20 12 [...]

  • Page 140

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 0 c he c k ed i f re ally inf ec t ed , t o s o rt ou t fa l s e pos it iv es. Mos t com m on t hre a ts N ow ada y s , t her e ar e f ar more t hre at s out t her e t ha n plain v i ru s e s . A uthor s [...]

  • Page 141

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 1 Ov erv i ew cha pte r. 1 0.15 . Ig n or e er ro r st atu s I n t he Ignore error s ta t us dialo g y o u c an t ic k t hose c ompo ne nts t hat y ou do not wa nt t o get inf or med ab ou t : By def au l[...]

  • Page 142

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 2 For t his s ituati on , wit hin t he ab ov e dialog y ou c an s elec t c ompo ne nts t hat may be in an er ror s t at e ( or s w it c h ed of f ) an d y ou do not wish t o receiv e inf or mati on ab ou [...]

  • Page 143

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 1 1 . Firew a l l S e t t i ngs T he Fi re wall c o nf igu ra t i on op ens in a ne w w indo w whe re in s ev er al dialog s y ou c an s et up v e ry ad v anced par amet er s f or t he c ompo ne nt. H o[...]

  • Page 144

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 4 En able all tra f fic to VP N (o n b y defau lt ) - i f y ou us e a V P N ( V irtual P riv at e Ne t w o rk ) c on ne c t ion, e. g. t o c o nn ec t t o y ou r of f i c e fr om ho me, w e re c ommend t [...]

  • Page 145

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 5 Sh ow confirm ation di al ogs for - s p eci f y t o w ho m t he c onf irmation dialog s (d ialog s as k ing f or deci s ions i n s i t ua t ion s t hat ar e not c ov ere d b y a defi ne d Firew all ru l[...]

  • Page 146

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 6 Li s t of adapt ers , area s and as s i gned profil es - in t his l is t y ou c a n f i nd an ov e rv iew of t he de t ect ed ada pt er s an d ar ea s . T o each of t hem y ou c an as s ign a s p eci f [...]

  • Page 147

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 7 T he I ntrus i o n D et ec ti on S ys t em (I D S ) s et t i ngs dialog of fe rs t he s e c o nf igu ra t i on op ti on s : B l ock (P ort s can and A RP at tac k s ) at ta ck e rs for def i n ed tim e [...]

  • Page 148

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 8 1 1.5. L og s T he Lo gs dialo g allow s y ou t o rev iew t he l is t of all logg ed Fire w all act i on s an d ev ents wit h a de tailed de s c ription of re lev ant pa ra m eters ( e v en t t i me, ap[...]

  • Page 149

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 9 R ef res h l i s t - all l og ged pa ra m eter s c an be ar ra nge d ac c or ding t o t he s elect ed at t rib ute: c hr on olo gic ally ( d ates ) or alpha be t i c ally ( othe r c olumns ) - jus t c l[...]

  • Page 150

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 0 Export profil e - re c or ds t he s elec t ed pr of i le' s c onf igu ra t i on into a f ile t ha t w ill be s a v ed f or po s s ible f ur t he r us e. I m po rt profil e - c on f i gu r es t he s[...]

  • Page 151

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 1 En able Vi rtual M achin es Bridged net work ing ( o f f b y defau lt ) - t i c k t his it em t o allow v i rtua l mac hine s in V Mwa r e t o c on ne c t dire c tly t o t he netwo rk . U s e behav i or[...]

  • Page 152

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 2 1 1.6.2. D efi n ed N etw o r ks T he De fined net work s dia log of f ers a lis t of all netwo rks t hat y o ur c omputer is c o nne c t ed t o. T he l is t pr ov ides t he f ollow ing i nf or m ation [...]

  • Page 153

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 3 W ithin t his dialog , y ou c an s peci f y t he Ne tw ork nam e , pr ov ide t he Ne twork des c ri ption and pos s ibly as s ign t he netwo rk as s af e. T he ne w ne t w or k c an be eit he r de f ine[...]

  • Page 154

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 4 1 1.6.3. A p pl i c ati on s T he A ppli cat i ons i nformation dialog l is t s all ins t alled ap plic ati on s t ha t mi gh t nee d t o c ommunic ate ov er t he netwo r k and i c ons f or t he as s ig[...]

  • Page 155

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 5 Apar t f ro m app lic at ions, t he li s t als o c o nt ains t wo s pecial it ems : P ri ori ty A ppl i cat i o n Rules ( at t he t op of t he lis t ) are pre fe ren ti al, and ar e alw ays app l ied pr[...]

  • Page 156

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 6 I n t he P age ac tions dialog , y o u c an def ine t he s ett i ng s f or t he re s p ect i v e ap plic ati on i n detail: C ontrol butt ons T wo c ontro l bu t t on s ar e av ailable at t he t op of t[...]

  • Page 157

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 7 A l l ow for al l - allow s t he ap plic ati on t o c omm un ic ate ov er all de f ined ne t w or k s and ad ap t ers wit ho ut li mit at ions. A l l ow for s afe - on l y allow s t he ap plic ati on t [...]

  • Page 158

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 8 Li s t of s ys te m s e rvice s a nd protoc ol s T he c h art c onsi s t s of t he f ollow ing c olumns : Log rul e act i on - T his bo x en ab les y ou t o s w it c h on recor ding fo r ea c h r ule ap[...]

  • Page 159

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 9 P l eas e bea r i n m i nd that deta i l rul e s et t i ngs are adva nced and pri m ari l y i nte nded f or net work admi ni s t rat ors who need ful l cont rol ove r F i rew all configurat i on. I f yo[...]

  • Page 160

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 0 1 2 . A V G S ca n n i n g By def au l t , A V G I n t e rne t S e curity 201 2 doe s no t ru n an y s c a ns , as af t er t he i niti al one , y ou s hou l d be pe rf ec t ly pro t ect ed by t he re s [...]

  • Page 161

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 1 Scan h i s tory - dis play s t he S c an re s ult s ov er v i ew dialog w it h t he entire his t or y of s c a nn i ng Vi ew Vi rus V aul t - ope ns a ne w w ind ow wit h t he V iru s V au lt - a s pa c[...]

  • Page 162

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 2 Sca n configu ra ti on e ditin g You hav e t he option of ed it ing t he pr ed ef ine d def au l t s ett i ng s f or t he W hole comp ute r s can . P re s s t he C hange s ca n s et tings li nk t o ge t[...]

  • Page 163

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 3 Scanni ng para m et ers - i n t he li s t of s c ann ing pa ra m eters y ou c a n s witc h on / of f s peci f ic pa r ameter s as ne ed ed: o H ea l / remove virus i n f ec tion wi thout as k i ng m e ([...]

  • Page 164

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 4 o Scan i n s i de archives ( off b y defau lt ) - T his par ameter s peci f ies t hat s c a nning s ho uld c heck all f iles s t or ed ins ide ar c h iv e s , e.g. Z I P , RAR, . . . o U s e He uri s ti[...]

  • Page 165

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 5 A l l fil e ty p es wit h t he option of de f i nin g ex c eptions fr om s c a nning by pr ov iding a lis t of c omma s epa rated f i le ex t ensi on s t hat s hou ld not be s c ann ed ; Sel ec te d fil[...]

  • Page 166

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 6 Sca n l a unch T he S can of s p ec ifi c fil es or folders c a n be laun c h ed dir ec t ly f r om t he s c ann ing interf ace by c li c k ing on t he s c an' s i c on. A ne w dialo g c alled S el[...]

  • Page 167

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 7 Scanni ng para m et ers - i n t he li s t of s c ann ing pa ra m eters y ou c a n s witc h s pe c if ic pa r ameter s on / of f as nee ded : o H ea l / remove virus i n f ec tion wi thout as k i ng m e [...]

  • Page 168

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 8 o Scan i n s i de archives ( on b y default ) - t his pa ra m eters def ine s t ha t s c ann ing s hou l d c he c k all files s t ore d ins ide ar c hiv es , e.g. Z I P , RAR, . . . o U s e He uri s tic[...]

  • Page 169

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 9 au dio f iles - if yo u leav e t his b ox uncheck e d, i t w ill re du c e t he s c a nn i ng t ime ev en more , b ecause t he s e f i les ar e oft en quite lar ge and ar e no t lik ely t o b e infec t [...]

  • Page 170

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 0 W ithin W ind ow s E x plor er high light t he f i le (or f olde r) y o u wa nt t o c hec k R ight-cl ic k y o ur m ou s e ov er t he ob jec t t o ope n t he c ontex t menu Selec t t he S ca n with A V [...]

  • Page 171

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 1 av gs ca nx / paramet er / paramet er . . with mult iple par amet er s t he s e s h ou ld be li ne d up in a ro w and s ep ar ated by a s pace an d a s la s h c ha ra c ter if a pa ra m eter re qu i re [...]

  • Page 172

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 2 / T RAS H M ov e inf ec t ed f i les t o t he V iru s V au lt / QT Qu ic k t es t / LO G Ge ne ra t e a s c a n re s ult f il e / MA CR OW R ep or t m acros / PW D W R ep or t pass w or d- pr ot ect ed [...]

  • Page 173

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 3 / C LOU DC HECK C he c k f or fa l s e posi t iv es / ARC BOM BS W R ep or t re- c ompre s sed ar c hiv e f i les 1 2.5. S c an S c h edu l i n g W ith A VG I nte rne t S e c uri ty 201 2 y ou c an run [...]

  • Page 174

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 4 You c a n ed it / add s cans us ing t he f ollow ing c o nt ro l bu t t on s : A dd s ca n s che dul e - t he butt on ope ns t he S et t i ngs for s chedul ed s can dialog , S c h edu le s ett i ng s t [...]

  • Page 175

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 5 On t he S che dul e s ett i ng s t ab y o u c an f irst c h eck / unc he c k t he E nable this ta s k i t em t o s im ply de act i v at e t he s c hed uled t es t t empor ar ily , an d s w it c h i t on[...]

  • Page 176

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 6 T her e ar e t wo c o ntro l bu t t on s av ailable on all t hr ee t abs of t he S et t i ngs for s chedul ed s can dialog (Sc he du le s e t t ing s , Ho w t o s c an and W ha t t o s c an ) an d t he [...]

  • Page 177

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 7 risk , s ome of t he s e pr ogr ams c an be ins t alled intenti on ally . W e re c ommend t hat y o u k eep t his f eatur e ac t iv ated as i t inc re as es y our c omputer s ec ur i t y . R eport enhan[...]

  • Page 178

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 8 o C om puter s hutdown o ptions - deci de w he t he r t he c ompu t er s h ou l d be s hut dow n au t omatic ally once t he run nin g s c a nn ing pr oc es s is ov er . H av ing c onf irmed t his op t i[...]

  • Page 179

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 9 C ontrol butt ons T her e ar e t wo c o ntro l bu t t on s av ailable on all t hr ee t abs of t he S et t i ngs for s chedul ed s can dialog ( Sc h ed ule s ett i ng s , Ho w t o s can, and W hat t o s [...]

  • Page 180

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 0 On t he W ha t to s can t ab y ou c an def ine w he t he r y ou wa nt t o s ched ule s c ann ing of t he w ho le c ompu t er or s c a nning of s p eci f ic f iles or fo l de rs . I n c as e y ou s elec [...]

  • Page 181

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 1 C ontrol butt ons T he s a m e t wo c ontro l bu t t on s ar e av ailable on all t hr ee t abs on t he S et tin gs for s cheduled s ca n dia log ( Sc hed ule s ett i ng s , Ho w t o s c an , an d W ha t[...]

  • Page 182

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 2 - blue i c on an no un c es t he re wa s an inf ec t ion de t ect ed dur i ng t he s can but t he inf ec t ed object wa s re mov ed automatic a lly - re d ic on wa rn s t her e w as an i nf ect ion dete[...]

  • Page 183

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 3 I nf ec t ions - t his t ab i s dis played only i f a v i ru s inf ec t ion wa s de t ect ed dur i ng s c ann ing Spy wa re - t his t ab i s dis played only if s p y wa re wa s de t ect ed dur i ng s ca[...]

  • Page 184

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 4 C ontrol butt ons T her e is only on e c ontrol butt on av ailab le in t his dialog . T he Clos e res u l t s bu t t on re t urn s t o t he S c an re s u lt s ov er v iew dialog . 1 2.7.2. In f ec ti o [...]

  • Page 185

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 5 o A dd ed to P U P exc ept i on s - t he f i nd ing w as ev a luated as an ex c eption and add ed t o t he lis t of P UP ex c eptions (c on f igu re d in t he P UP E x c eptions dialog of t he ad v an c[...]

  • Page 186

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 6 1 2.7.3. S p y w are T ab T he S pywar e t ab is on ly dis play ed in t he S can res ults dialo g in if s p y wa re wa s de t ect ed dur i ng s c ann ing . T he t ab is div ide d int o t hr ee s e c t i[...]

  • Page 187

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 7 o P ote ntial l y dangerous o bj ec t - t he ob jec t w as de t ec t ed as po t en ti ally dan ger ou s bu t no t i nf ect ed (it may c ontain m acros, f or i nst ance); t he inf or mat ion is a w ar ni[...]

  • Page 188

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 8 T his i s a brie f desc r i ption of t he mos t c omm on examples of s u c h object s : H i dden f i l es - t he hidd en f i les ar e by def au lt no t v is ible in W ind ow s , and s o me v iru s es or[...]

  • Page 189

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 9 H i dden ex t ens ion - f i les w it h hidde n ex t en s ions m ay app ea r t o be e.g. pic t ur es, but in f ac t t he y ar e ex ecut ab le f iles ( e . g. pic t ur e.jpg.ex e ) . T he s ec on d ex t e[...]

  • Page 190

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 0 Seve ri ty - i n c as e y ou de c ided t o ins t all t he I den t it y P ro t ect i on c ompo ne nt within y o ur AVG I nte rne t S e curity 20 12 , a gr ap hical iden t if ic at ion of t he r es pe c t[...]

  • Page 191

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 1 D elet e - remo v e s t he inf ec t ed f i le f ro m t he V i rus Vaul t c ompletely and irr ev e rsibly Em pt y V ault - r emov es all V i rus V aul t c ontent c ompletely . B y remo v i ng t he f il e[...]

  • Page 192

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 2 1 3 . A V G Up dat e s N o s ec ur it y s o f t wa r e c an gua r an t ee t r ue pr ot ect i on f ro m v ar i ou s t y pes of t hr ea t s unle s s it i s re gu lar ly up da t ed! V iru s wr it ers are a[...]

  • Page 193

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 3 N ote : B ef or e ea c h A V G pr og ram upd ate lau nch, a s y s t em re s t or e po int i s c rea t ed. I f t he upd at e pr oc es s f ails and y our op era ti ng s y s t em c ra s hes yo u c an alw a[...]

  • Page 194

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 4 1 4 . Even t H i story T he His tory dialo g is ac c es s ible f ro m t he s y st em menu v i a t he His tory / E ve nt His tory Log it em. W ithin t his dialog y ou c an f i nd a s umm ar y of im po r [...]

  • Page 195

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 5 C ontrol butt ons Em pt y l i s t - pr es s t he bu t t on t o de letes all entries in t he lis t of ev ents R ef res h l i s t - pre s s t he butt on t o upd ates all en t r ies in t he l is t of ev en[...]

  • Page 196

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 6 1 5 . FAQ an d Tech n i ca l S upp or t Shou ld y o u hav e any s ales or t ec hnic al t rou ble w it h y o ur AVG I nte rne t S e curity 20 12 app lic a ti on , t he r e ar e s ev e ra l w ay s t o obt[...]

  • Page 197

    A V G I nt e rn e t S e c ur i t y 2 0 1 2 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 7 w ell-o rga niz ed wa y int o s a l es, t ec hnic al, and v i r us c a t eg or ies . A bo ut virus es & thre at s : A s peci f i c pa rt of t he A VG we bsi t e (h t t p:/ / ww w.av g. c om/ ) is de[...]