User manual AVIRA ANTIVIR PREMIUM 10

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual AVIRA ANTIVIR PREMIUM 10. We hope that this AVIRA ANTIVIR PREMIUM 10 user guide will be useful to you.


AVIRA ANTIVIR PREMIUM 10 : Download the complete user guide (1444 Ko)

Manual abstract: user guide AVIRA ANTIVIR PREMIUM 10

Detailed instructions for use are in the User's Guide.

[. . . ] Avira AntiVir Premium User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand and product names are trademarks or registered trademarks of their respective owners. This does not mean, however that they may be used freely. Code provided by third party providers was used for Avira AntiVir Premium. [. . . ] Backdoor Clients (BDC) In order to steal data or manipulate computers, a backdoor server program is smuggled in unknown to the user. This program can be controlled by a third party using backdoor control software (client) via the Internet or a network. Your AntiVir program recognizes "Backdoor control software". If the Backdoor control software (BDC) option is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if your AntiVir program detects such software. Adware/Spyware (ADSPY) Software that displays advertising or software that sends the user's personal data to a third party, often without their knowledge or consent, and for this reason may be unwanted. 49 Avira AntiVir Premium Your AntiVir program recognizes "Adware/Spyware". If the option Adware/Spyware (ADSPY) is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if your AntiVir program detects adware or spyware. Unusual Runtime Packers (PCK) Files that have been compressed with an unusual runtime packer and that can therefore be classified as potentially suspicious. If the option Unusual runtime packers is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if your AntiVir program detects such packers. Double Extension Files (HEUR-DBLEXT) Executable files that hide their real file extension in a suspicious way. If the option Double Extension files (HEUR-DBLEXT) is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if your AntiVir program detects such files. Phishing Phishing, also known as brand spoofing is a clever form of data theft aimed at customers or potential customers of Internet service providers, banks, online banking services, registration authorities. When submitting your email address on the Internet, filling in online forms, accessing newsgroups or websites, your data can be stolen by "Internet crawling spiders" and then used without your permission to commit fraud or other crimes. If the option Phishing is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if your AntiVir program detects such behavior. Application (APPL) The term APPL refers to an application which may involve a risk when used or is of dubious origin. If the option Application (APPL) is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if your AntiVir program detects such behavior. 9. 2 Viruses and other malware Adware 50 Viruses and more Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. These advertisements usually cannot be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security. Backdoors A backdoor can gain access to a computer by bypassing the computer access security mechanisms. A program that is being executed in the background generally enables the attacker almost unlimited rights. User's personal data can be spied with the backdoor's help. . But are mainly used to install further computer viruses or worms on the relevant system. Boot viruses The boot or master boot sector of hard disks is mainly infected by boot sector viruses. [. . . ] The temporary variables (TEMP, TMP) for the currently registered user and for system variables (TEMP, TMP) are shown here with their relevant values. Use following directory If this option is enabled, the path displayed in the input box is used. The button opens a window in which you can select the required temporary path. Default The button restores the pre-defined directory for the temporary path. 11. 6. 7 Events Limit size of event database Limit maximum number of events to n entries If this option is enabled, the maximum number of events listed in the event database can be limited to a certain size; possible values: 100 to 10000 entries. If the number of entered entries is exceeded, the oldest entries are deleted. Delete events older than n day(s) If this option is enabled, events listed in the event database are deleted after a certain period of time; possible values: 1 to 90 days. This option is enabled as the default setting, with a value of 30 days. Do not limit size of event database (delete events manually) 96 Reference: Configuration options When this option has been activated, the size of the event database is not limited. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE AVIRA ANTIVIR PREMIUM 10




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual AVIRA ANTIVIR PREMIUM 10 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.