Unisar 1.24.1867 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Unisar 1.24.1867. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Unisar 1.24.1867 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Unisar 1.24.1867 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций Unisar 1.24.1867, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции Unisar 1.24.1867 должна находится:
- информация относительно технических данных устройства Unisar 1.24.1867
- название производителя и год производства оборудования Unisar 1.24.1867
- правила обслуживания, настройки и ухода за оборудованием Unisar 1.24.1867
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Unisar 1.24.1867 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Unisar 1.24.1867 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Unisar, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Unisar 1.24.1867, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Unisar 1.24.1867, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Unisar 1.24.1867. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    User's Guide Copyright © 2006 SOFTWIN antivirus antivirus[...]

  • Страница 2

    BitDefender Antivirus Scanner for Unices User's Guide SOFTWIN Published 2006.04.27 V ersion 1.24.1867 Copyright © 2006 SOFTWIN L egal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retr[...]

  • Страница 3

    As every cat owner knows, nobody owns a cat. BitDefender Antivirus Scanner for Unices[...]

  • Страница 4

    BitDefender Antivirus Scanner for Unices[...]

  • Страница 5

    T able of Contents End User Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . ix P r e f a c e ...................................................... x i i i 1 . C o n v e n t i o n s u s e d i n t h i s b o o k ..................................... x i i i 1 . 1 .T y p o g r a p h i c a lc o n v e n t i o n s ...........[...]

  • Страница 6

    5.3.3. Install the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 5.3.4. Install the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 5 . 4 . T h ei n s t a l l e r .............................................. 3 7 6 . U n i n s t a l l ...............................................[...]

  • Страница 7

    1 0 . 2 . 3 .A m a v i s d - n e w ........................................ 7 0 1 1 . U p d a t e s ................................................ 7 3 1 1 . 1 . T r i g g e r e d u p d a t e .......................................... 7 3 1 1.1.1. Run the triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 1 1 . 1 .[...]

  • Страница 8

    viii BitDefender Antivirus Scanner for Unices[...]

  • Страница 9

    End User Softw ar e License A gr eement IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INST ALL THE SOFTW ARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INST ALLING OR USING THE SOFTWARE IN ANY W A Y , YOU ARE INDICA TING YOUR COMPLETE UNDERST ANDING AND ACCEPT ANCE OF THE TERMS OF THIS[...]

  • Страница 10

    product to be used for personal purposes, with no commercial implications whatsoever , under the terms of the EULA. For example, under the Personal License, you are allowed to scan your personal laptop or desktop computer but YOU ARE NOT ALLOWED TO USE THE PRODUCT IN A BUSINESS ENVIRONMENT SUCH AS AN OFFICE COMPUTER OR A COMP ANY SERVER. 3. Commerc[...]

  • Страница 11

    LIMITED W ARRANTY . SOFTWIN warrants a 30 day fault free period for the media on which BitDefender is distributed as of the date BitDefender has been delivered to you. Any breach of this warranty shall only result in SOFTWIN replacing the faulty media, at its sole discretion, upon receipt of the said media, or refunding the BitDefender price. SOFTW[...]

  • Страница 12

    NA VIGA TION, NUCLEAR F ACILITIES, OR COMMUNICA TION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICA TION OR INST ALLA TION WHERE F AILURE COULD RESUL T IN DEA TH, SEVERE PHYSICAL INJURY OR DAMAGE TO PROPERTY . GENERAL. This Agreement shall be governed by the Romanian law and by the internation[...]

  • Страница 13

    Pr eface This User's Guide is intended to all who have chosen BitDefender Antivirus Scanner for Unices as security solution for their systems. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to do administrative tasks on a Linux box. This book will describe for you Bi[...]

  • Страница 14

    Description Appearance The environment variables are MONOSPACED CAPITALS . ENV_VAR The emphasized text is specially marked to require your attention. emphasized The quoted text is provided as reference. “quoted text” Inline commands are printed using strong characters. command Command examples are printed with strong monospaced characters in sp[...]

  • Страница 15

    W arning This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications. Y ou should read and understand it, because it describes something extremely risky . 2. The book structur e The book consists of four parts, containing the major topics: Description and features, Installation, Usage [...]

  • Страница 16

    3. Request for Comments We invite you to help us improve the book. W e have tested and verified all of the information to the best of our ability , but you may find that features have changed (or even that we have made mistakes). Please write to tell us about any flaws you find in this book or how you think it could be improved, to help us provide [...]

  • Страница 17

    Description and featur es Description and features[...]

  • Страница 18

    Description and features[...]

  • Страница 19

    Chapter 1. Ov ervie w BitDefender provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management for over 41 million home and corporate users in more than 100 countries. Designed to provide full protection for corporate network and systems, the BitDefender solution ra[...]

  • Страница 20

    all complex threats that endanger a network, from a small local area to large multi-server , multi-platform W AN's. Y our Ultimate Protection. The final frontier for any possible threat to your computer system. As virus detection based on code analysis has not always offered good results, BitDefender has implemented behavior-based protection, [...]

  • Страница 21

    viruses, to do antivirus research, to develop new technologies for monitoring all possible ways to infect a system and, last but not least, to educate the IT&C public on the danger of computer viruses. BitDefender security solutions satisfy the protection requirements of today's business environment, enabling management of all complex thre[...]

  • Страница 22

    22 Overvie w Description and featur es 01[...]

  • Страница 23

    Chapter 2. Pr oduct featur es The acquisition and installation of an antivirus product for the personal or company's systems is the most efficient way of preventing the infection of a computer and the spreading of viruses inside the company , and outside the company as well. 2.1. BitDefender Antivirus Scanner for Unices BitDefender Antivirus S[...]

  • Страница 24

    2.2. K ey F eatur es • Antivirus protection for the file system. • Automatic and incremental update of virus definitions and scanning engines directly from BitDefender servers. • Ability to isolate the infected files in the quarantine zone. • Detailed statistics and reports regarding the number of scanned files, the infected files, the dele[...]

  • Страница 25

    Chapter 3. The scanning mechanism The central part of BitDefender Antivirus Scanner for Unices consists of the BitDefender architecture-independent scanning engines. These are specialized data analysis routines and malware signature definitions, since many viruses can be identified upon a distinctive code pattern. The BitDefender Antivirus engine d[...]

  • Страница 26

    26 The scanning mechanism Description and featur es 03[...]

  • Страница 27

    Installation Installation[...]

  • Страница 28

    Installation[...]

  • Страница 29

    Chapter 4. Pr er equisites BitDefender Antivirus Scanner for Unices can be installed on package based Linux distributions (rpm or deb) and tbz based FreeBSD versions, but also all the other distributions are supported, using a pseudo-package system, with the same functionality of the others. These packages are built as bzip2 compressed tars and inc[...]

  • Страница 30

    4.1.2. Softw are s ystem r equirements Linux requirements The Linux kernel should be 2.2, 2.4 or 2.6, the recommended one is 2.6, with support for a fast file system, which works well with multiple small files, such as ext3 or reiserfs. BitDefender requires glibc version 2.3, at least, and libstdc++ from gcc 3.x series. FreeBSD requirements The sup[...]

  • Страница 31

    4.2.2. Fr eeBSD conv ention bitdefender-scanner- {ver} .tbz Where {ver} is the package version. For example, 7.5_3 is version 7, subversion 5, package build 3. 31 04 Installation Prer equisites[...]

  • Страница 32

    32 Prer equisites Installation 04[...]

  • Страница 33

    Chapter 5. P ack age installation This chapter will explain you how to install BitDefender on a Unix-like system, such as Linux or FreeBSD. This is pretty straightforward: get the desired package, test it for integrity , then install it. 5.1. Getting BitDefender Antivirus Scanner for Unices The package can be downloaded from BitDefender servers or [...]

  • Страница 34

    Then, export the key to a local file: # gpg --armor --export 0x0EC4FE05 > bd-pack.key For the rpm packages, you have to import the key into rpm key ring, using the next command. # rpm --import bd-pack.key When you wish to check a rpm package, just issue a command similar to the following. Y ou should get no error . # rpm --checksig BitDefender-*[...]

  • Страница 35

    5.3. Install the pack age The installation process depends on the package type. There are different methods for rpm , deb and self-extractable archive, as well as a typical method for FreeBSD. 5.3.1. Install the rpm package T o install BitDefender Antivirus Scanner for Unices on a RedHat based distribution, using the RedHat package manager , you ha[...]

  • Страница 36

    Additional par ameters For the not-so-inpatient user , the self-extractable archive supports few command line parameters, described in the following table. Description P arameter Prints the short help messages. --help This will print archive information, such as the title, the default target directory , the embedded script to be run after unpacking[...]

  • Страница 37

    Description P arameter Run the embedded uninstaller script instead of the normal installer . For uninstalling, please read more in Chapter 6 “ Uninstall ” (p. 39) . --uninstall 5.3.4. Install the Fr eeBSD pack age T o install BitDefender Antivirus Scanner for Unices on a FreeBSD machine, you have two methods: you can install the package you hav[...]

  • Страница 38

    Next, the Installation directory is asked, if you have installed BitDefender Antivirus Scanner for Unices on Linux, using the self-extracting archive. The default is /opt and we will assume you go for it. The installer will create the directory /opt/BitDefender-scanner , which will be the top-level directory on BitDefender Antivirus Scanner for Uni[...]

  • Страница 39

    Chapter 6. Uninstall If you ever need to remove BitDefender Antivirus Scanner for Unices, there are several methods to do it, depending on the package type. 6.1. Uninstall the rpm package T o uninstall BitDefender Antivirus Scanner for Unices on a RedHat based distribution, using the RedHat package manager , you have to run the following command. #[...]

  • Страница 40

    Next, the uninstall procedure begins by removing installation directory , /opt/BitDefender-scanner . The MANPATH environment variable is restored to its previous value. Finally , the /usr/bin/bdscan symlink is deleted. At this moment, the system should be left in the same condition as found before installing. 6.4. Uninstall the FreeBSD pack age T o[...]

  • Страница 41

    Using BitDefender Using BitDefender[...]

  • Страница 42

    Using BitDefender[...]

  • Страница 43

    Chapter 7. The configur ation file The system-wide configuration of BitDefender Antivirus Scanner for Unices is stored inside a file located at /etc/BitDefender-scanner/bdscan.conf on Linux systems and at /usr/local/etc/bitdefender/bdscan.conf on FreeBSD systems. There is another configuration file, located inside the user's home directory , a[...]

  • Страница 44

    # argument only files having the following extensions are scanned Extensions = 386:asp:bas:bin:chm:cla:class:cmd:com:bat:csc:dat:dll: doc:dot:exe:bat:hlp:hta:htm:html:ini:js:lnk:mdb:msi:nws:ocx:ole: ovl:pfd:php:pif:pot:ppa:ppt:prc:rtf:scr:shs:smm:sys:url:vbe:vbs: vxd:wbk:wdm:wiz:xla:xls:xlt:xml:xtp: # The update location. Change this if you want to[...]

  • Страница 45

    Description K ey This is the location of the quarantine directory , where the infected files are stored when quarantine actions are invoked. QuarantinePath The quarantine directory can be specified at run-time using the --quarantine= path option. The default quarantine path is located at /opt/BitDefender-scanner/var/quarantine . Regular users and q[...]

  • Страница 46

    Description K ey The list can be specified at run-time using the --exclude-ext= ext1:ext2 option. This is the license key , necessary for product activation. Key Product r egistration Please see Chapter Product registration (page 77) for more information about license keys. 46 The configuration file Using BitDefender 07[...]

  • Страница 47

    Chapter 8. T esting BitDefender Y ou can verify that BitDefender Antivirus component works properly with the help of a special test file, known as EICAR Standard Anti-virus T est file. EICAR stands for the European Institute of Computer Anti-virus Research . This is a dummy file, detected by antivirus products. There is no reason to worry , because[...]

  • Страница 48

    Y ou will be told one file has been scanned, found infected and the virus identified. Y ou will see the virus name: EICAR-Test-File (not a virus) . Since no action was specified, the file EICAR.COM still lays on your hard disk. The command output will be the following. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwi[...]

  • Страница 49

    BitDefender will unpack the archive and scan the content. This will be the command output. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commercial use. Default action upon detecting an infected file: ignore action Default action upon detecting a suspected fi[...]

  • Страница 50

    Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /tmp/mail.mbox ok /tmp/mail.mbox=>(message 0) ok /tmp/mail.mbox=>(message 1) ok /tmp/mail.mbox=>(message 1)=> ... 34 +0300 (EEST)]=>(MIME part) ok /tmp/mail.mbox=>(message 1)=> ... =>(MIME part)=>(me[...]

  • Страница 51

    Chapter 9. Real life usage These are some real-life usage examples of BitDefender . Use them as guidelines for improving your system protection and, if you have found a different way to use BitDefender Antivirus Scanner for Unices, do not hesitate to contact us and share your experience. Y ou can write us at < documentation@bitdefender.com > [...]

  • Страница 52

    Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /t ... xe infected: EICAR-Test-File (not a virus) <- cevakrnl.xmd Results: Folders :0 Files :1 Packed :0 Archives :0 Infected files :1 Suspect files :0 Warnings :0 Identified viruses:1 I/O errors :0 9.1.2. Scan a dir ectory[...]

  • Страница 53

    The next screen output shows the files scanned, found infected and finally quarantined. Y ou can notice the two sub-directories were not scanned. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commercial use. Default action upon detecting an infected file: ign[...]

  • Страница 54

    Only the found malware will be displayed on the screen, but the log file will contain one line about every file scanned and its status. Y ou can easily grep for “infected” and “suspected” keywords to see the report regarding them. This is the beginning of the log file. // // BitDefender scan report // // Time: Fri Jan 27 15:24:03 2006 // Co[...]

  • Страница 55

    As you can see, BitDefender reports to have scanned more files. This happens because each archive should be unpacked separately . Y ou can see also which engine process each step of unpacking and scanning. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commerc[...]

  • Страница 56

    BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commercial use. Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /tmp/mail.mbox ok /tmp/mail.mbox=>(message 0) ok <- mbox.xmd /tmp/m[...]

  • Страница 57

    # bdscan --log=/tmp/antivirus_scan.log --log-overwrite file.exe 9.2.2. Get mor e information BitDefender can offer some information about scanning engines, last update, key validity , etc. when called with --info command line option. # bdscan --info Y ou will get the next screen output. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C[...]

  • Страница 58

    9.2.4. Displa y the product ver sion Maybe you will need just to find the version of your installed BitDefender Antivirus Scanner for Unices. # bdscan --version BitDefender will display the product name, version and build number , architecture and copyright information. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softw[...]

  • Страница 59

    Chapter 1 0. BitDefender integr ation BitDefender Antivirus Scanner for Unices is a versatile antivirus scanning solution, that could be easily integrated in desktop and server software to perform an instant target scan. 1 0.1. Desktop integration Y ou can configure your favorite file manager , email or news client to use BitDefender Antivirus Scan[...]

  • Страница 60

    Different installation path If you have used another installation path and not the default one, please change the first line accordingly . That condition is used not to show the menu item if BitDefender Antivirus Scanner for Unices is not installed. Figure 1 0.1. The User Menu of mc From now on, when you press the F2 key on top of some tagged or no[...]

  • Страница 61

    [Desktop Action Scan_With_BitDefender] Name=Scan with BitDefender Comment=Perform an AntiVirus scan with BitDefender Icon=bitdefender Exec=konsole -T "BitDefender Antivirus Scanner" --noclose --nomenubar --notoolbar --icon bitdefender --vt_sz 80x25 -e bdscan --no-list %f Figure 1 0.2. Action on file in K onqueror Y ou may now open Kon[...]

  • Страница 62

    • T ooltip. Set Perform an AntiVirus scan with BitDefender . • Command line. Set bdscan --no-list %aCurrent% . • Then check Execution mode → Run in terminal checkbox. Figure 1 0.3. Krusader's User A ctions Press the Ok button and close the window . Now , in the Useractions menu there will be a new item, Scan with BitDefender . Select i[...]

  • Страница 63

    # Now let's run the scan process xterm -e "bdscan --no-list $*; echo -n 'Press ENTER to continue...'; read" # End of the script Do not forget to give it executable rights. # chmod 755 ~/.rox_choices/SendTo/BitDefender Y ou can right-click a file or a directory , select Send to → BitDefender menu and the scanning proce[...]

  • Страница 64

    cat > $TMPFILE # Scan it with BitDefender and remember the exitcode $BDSCAN $TMPFILE EXIT=$? # Remove the temporary file and return the exitcode rm -f $TMPFILE exit $EXIT # End of the script What to do with infected emails Y ou will not be able to disinfect the message, the only action that can be done is ignore , therefore it's up to you t[...]

  • Страница 65

    displayed by Pine. Y ou should notice whether the email was infected or not. When finished reading the messages, press E to Exit the viewer . As stated before, it would be better to tell Pine to automatically scan the messages and what to do when some infected email is found. This way , every new message will be scanned and treated accordingly , me[...]

  • Страница 66

    1 0.1.6. Ev olution Evolution makes the tasks of storing, organizing, and retrieving your personal information easy , so you can work and communicate more effectively with others. It's a highly evolved groupware program, an integral part of the Internet-connected desktop. —Evolution User Guide Making Evolution scan emails through BitDefender[...]

  • Страница 67

    1 0.1.7. KMail KMail is a fully-featured email client that fits nicely into the K Desktop Environment, KDE. It has features such as support for IMAP , POP3, multiple accounts, powerful filters, PGP/GnuPG privacy , inline attachments, and much more. —KMail website KMail integration can be done using the wizard from T ools → Anti-virus Wizard... [...]

  • Страница 68

    # Save the standard-input to a temporay file cat > $TMPFILE # Scan it with BitDefender, filter the output and echo the header if $BDSCAN $TMPFILE | grep -q infected; then echo "X-Virus-Flag: yes" else echo "X-Virus-Flag: no" fi # Output the email and remove the temporary file cat $TMPFILE rm $TMPFILE # End of the script Even [...]

  • Страница 69

    1 0.2.1. Qmail-Scanner Qmail-Scanner is an add-on that enables a Qmail e-mail server to scan all gateway-ed e-mail for certain characteristics (i.e. a content scanner). —Qmail-Scanner website Qmail-Scanner supports BitDefender Antivirus Scanner for Unices out of package. T o use it, you can just proceed to normal installation, since the configura[...]

  • Страница 70

    Once you have a working MailScanner installed on your server , open its configuration file /opt/MailScanner/etc/MailScanner.conf (for a default location) and find the next line. Virus Scanners = none Change it to the following form. Virus Scanners = bitdefender If you need to further customize the command-line options passed to BitDefender , open t[...]

  • Страница 71

    amavisd-ne w installation Please refer to amavisd-new documentation for a detailed description of installation and configuration. 71 10 Using BitDefender BitDefender integration[...]

  • Страница 72

    72 BitDefender integration Using BitDefender 10[...]

  • Страница 73

    Chapter 1 1. Updates BitDefender Antivirus Scanner for Unices was designed with capabilities for triggered update. At the present time, the risk of getting infected is high, both because new viruses appear and the existing ones keep on spreading. This is why your antivirus must be kept up-to-date, by periodically checking the BitDefender servers fo[...]

  • Страница 74

    Edit the cron table The first method is to edit the cron tables, using the crontab tool. For example, if you want to run a daily update, run the following as root: # crontab -e Then add the next line: 00 02 * * * /opt/BitDefender-scanner/bin/bdscan --update All you have to do now is to signal the cron daemon to reload the crontables. Run the next c[...]

  • Страница 75

    #!/bin/sh # BitDefender update script, using cron service # Copyright (C) 1996-2005 SOFTWIN SRL. All rights reserved. # Place this script under one of the following directories for daily # or even hourly updates (find their equivalents on your system if # they do not exactly match): # /etc/cron.daily # /etc/cron.hourly # IMPORTANT: change this para[...]

  • Страница 76

    on the update server , containing the updates of the scanning engines and virus signatures: cumulative.zip and daily.zip . • cumulative.zip is released every week on Monday and it includes all the virus definitions and scan engines updates up to the release date. • daily.zip is released each day and it includes all the virus definitions and sca[...]

  • Страница 77

    Chapter 12. Pr oduct r egistr ation The product is delivered with a trial registration key valid for thirty days. At the end of the trial period, if you want to continue using the program, you have to provide a new license key . When you have the new key , open the configuration file from /etc/BitDefender-scanner/bdscan.conf (for a default Linux in[...]

  • Страница 78

    commercial implications whatsoever . For example, using the Personal License, you are allowed to scan your personal laptop or desktop computer but YOU ARE NOT ALLOWED TO USE IT IN A PRODUCTION ENVIRONMENT LIKE AN OFFICE COMPUTER OR COMP ANY SERVER. 12.3. License for commer cial use If you plan on using BitDefender Antivirus Scanner for Unices with [...]

  • Страница 79

    Chapter 13. Best pr actices These are some steps you should follow to ensure a system free from viruses. 1. After installing BitDefender Antivirus Scanner for Unices, perform a triggered update to have the latest virus signatures and engines, as described in Section T riggered update (page 73) . 2. Perform a full system scan to find any already inf[...]

  • Страница 80

    80 Best practices Using BitDefender 13[...]

  • Страница 81

    Getting help Getting help[...]

  • Страница 82

    Getting help[...]

  • Страница 83

    Chapter 14. Fr equently A sk ed Questions 1. Installation 1. What are the system requirements? Please consult Section 4.1 “ System requirements ” (p. 29) for an up to date system requirements. 2. Does BitDefender alter my system configuration? Y es, BitDefender Antivirus Scanner for Unices will touch several system files ( man.config and manpat[...]

  • Страница 84

    If you have BitDefender Antivirus Scanner for Unices performing a regular update, this time should be recent enough. If not, this is a good moment to update you antivirus. 3. When I try to update the virus definitions/scanning engines, I always get this “No update available” message. Why? Make sure you are not running the update as an unprivile[...]

  • Страница 85

    Chapter 15. Support 15.1. Support department As a valued provider , SOFTWIN strives to provide its customers with an unparallel level of fast and accurate support. The Support Center listed below is continually being updated with the newest virus descriptions and answers to common questions, so that you obtain the necessary information in a timely [...]

  • Страница 86

    15.3. Contact information Efficient communication is the key to a successful business. For the past 10 years SOFTWIN has established an indisputable reputation in exceeding the expectations of clients and partners, by constantly striving for better communications. Please do not hesitate to contact us regarding any issues or questions you might have[...]

  • Страница 87

    Soporte técnico: < soporte@bitdefender-es.com > V entas: < comercial@bitdefender-es.com > Phone: +34 932189615 Fax: +34 932179128 Sitio web del producto: http://www .bitdefender-es.com U.S.A BitDefender LLC 6301 NW 5th W ay , Suite 3500 Fort Lauderdale, Florida 33308 T echnical support: < support@bitdefender.us > Sales: < sale[...]

  • Страница 88

    88 Support Getting help 15[...]

  • Страница 89

    Manual P ages 89 Manual P ages[...]

  • Страница 90

    90 Manual P ages[...]

  • Страница 91

    bdscan bdscan — BitDefender Antivirus Scanner for Unices Synopsis bdscan [ --action= disinfect | quarantine | delete | ignore ] [--no-archive] [--no-mail] [--no-pack] [--no-recursive] [--recursive-level= level ] [--archive-level= level ] [--ext[= ext1:ext2 ]] [--exclude-ext[= ext1:ext2 ]] [--suspect-copy] [--suspect-move] [--quarantine= quarantin[...]

  • Страница 92

    --no-pack Specifies that bdscan should not scan inside packed programs. --no-recursive Specifies that bdscan should not enter sub-directories for scanning. If you select this option only the first level directories will be scanned. --recursive-level= level Set the maximum recursive level to level . The default is 0 , meaning no limitation. --archiv[...]

  • Страница 93

    --log[= file.log ] Specifies that bdscan should log its activity to the mentioned file. If the user has no right to write this file, an error message will be output and the default one will be used. The default is ~/.BitDefender/bdscan.log . --log-overwrite Specifies that bdscan should not append the new output to the existing log file. The old log[...]

  • Страница 94

    disinfect BitDefender will try to disinfect the object, by removing the infected or suspected part. The action can fail sometimes. quarantine The object will be moved from its original location to a secured directory , the quarantine. delete The object will be simply removed from the filesystem ignore Even if infected objects are found, BitDefender[...]

  • Страница 95

    Bugs Sometimes, bdscan may hang while scanning directories containing pipes or UNIX socket files. T o avoid this behavior , try to use it exclusively for regular files. Also, there may be rare cases when bdscan crashes while doing file scan. If this is the case, you should update the scan engines and virus signatures and definitions. See also Pleas[...]

  • Страница 96

    96 bdscan Manual P ages[...]

  • Страница 97

    Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs, rather than static pages. With ActiveX, users can ask or answer questions, use push buttons, an[...]

  • Страница 98

    Internet Explorer . Both of these are graphical browsers, which means that they can display graphics as well as text. In addition, most modern browsers can present multimedia information, including sound and video, though they require plug-ins for some formats. Command line In a command line interface, the user types commands in the space provided [...]

  • Страница 99

    Events An action or occurrence detected by a program. Events can be user actions, such as clicking a mouse button or pressing a key , or system occurrences, such as running out of memory . False positive Occurs when a scanner identifies a file as infected when in fact it is not. Filename extension The portion of a filename, following the final poin[...]

  • Страница 100

    Macro virus A type of computer virus that is encoded as a macro embedded in a document. Many applications, such as Microsoft Word and Excel, support powerful macro languages. These applications allow you to embed a macro in a document, and have the macro execute each time the document is opened. Mail client An e-mail client is an application that e[...]

  • Страница 101

    Port An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally , there are several ports for connecting disk drives, display screens, and keyboards. Externally , personal computers have ports for connecting modems, printers, mice, and other peripheral devices. In TCP/IP and UDP networks[...]

  • Страница 102

    horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture T roy . Update A new version of a software or hardware product designed to replace an older version of the same product. In addition, the installation routines for updates often check to make sure that an older version is already installed on your c[...]