1AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Document revision 85.3 (6.3.2009)Copyright AVG Technologi
10AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.3.AVG Installation OptionsAVG can be installed either fr
100AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.No personal data is sent to the server!11.5.4.Whitelist
101AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.be in plain text format, and the content must contain o
102AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.of addresses (you can also use copy and paste). Insert
103AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.6.Web ShieldThe Web Protection dialog allows you to
104AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.6.1.Web ProtectionIn the Web Protection dialog you c
105AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oPorts to be scanned - this field lists the standard ht
106AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In the Instant Messaging Shield dialog you can edit t
107AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Enable Safe Surf - (on by default): active (real-ti
108AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.8.1.Scan Whole ComputerThe Scan whole computer
109AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.blocked, or removed; Scan for cookies - this parame
11AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.4.AVG Download ManagerAVG Download Manager is a simple t
110AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Click the Set additional scan reports ... link to open
111AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The list of parameters is identical to those available
112AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.8.4.Removable Device ScanThe editing interface for
113AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Program update schedule Anti-Spam update schedule11.
114AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.of the computer or just a scan of selected files or fol
115AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.On the How to scan tab you will find a list of scanning
116AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.electronic shopping carts) Scan inside archives -
117AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Click the Additional scan settings ... to open a new Co
118AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.9.2.Virus Database Update ScheduleOn the Schedule
119AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.computer startup). Advanced schedule options - this s
12AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. If the test shows no connectivity, make sure you are r
120AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Next, give a name to the program update schedule you ar
121AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.9.4.Anti-Spam Update ScheduleOn the Schedule sett
122AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.based on computer startup). Advanced schedule options
123AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The E-mail Scanner dialog is divided into three secti
124AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.10.1.CertificationIn the Certification dialog you c
125AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.10.2.Mail FilteringThe Attachment filter dialog a
126AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.10.3.Logs and ResultsThe dialog opened via the Logs
127AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog (opened via Servers / POP3) you can set
128AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oFixed host - In this case, the program will always use
129AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog (opened via Servers / SMTP) you can se
13AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. If the check has been successful, press the Next butto
130AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.non-standard port, you can type this port behind the se
131AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.11.Resident ShieldThe Resident Shield component pe
132AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.also when they are being closed; this feature helps you
133AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.circumstances.11.11.2.ExceptionsThe Resident Shield - D
134AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Remove path – allows you to delete the path to a sele
135AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Full rootkit scan - scans all accessible disks exce
136AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Require confirmation from the user - you will be ask
137AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.13.1.ProxyThe proxy server is a stand-alone server o
138AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.respective dialog section) you have to specify the foll
139AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.13.2.Dial-upAll parameters optionally defined in the
14AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.If AVG Download Manager was not able to identify your Pr
140AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.13.3.UR LThe URL dialog offers a list of Internet ad
141AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.update files from your hard disk (by default, these fil
142AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.defined as secured, provide your username ... Password
143AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.Firewall SettingsThe Firewall configuration opens i
144AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.2.SecurityIn the Security settings dialog you can
145AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.should be displayed - it is recommended to have the cri
146AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.of displaying an information message12.4.LogsThe Logs d
147AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Refresh list - all logged parameters can be arranged
148AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.the selected profile configuration will be used by Fire
149AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.5.1.Profile InformationThe Profile information di
15AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.most: Full version - i.e. AVG Anti-Virus , AVG Anti-
150AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.5.2.Defined AdaptersThe Defined adapters dialog off
151AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.5.3.Defined NetworksThe Defined networks dialog o
152AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Within this dialog, you can specify the Network name,
153AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Mark as safe - by default, all networks are considere
154AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Within the dialog you can specify Service item name and
155AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.5.5.ApplicationsIn the Applications information di
156AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The dialog for defining new application's rule set
157AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Ask - any time th application attempts to communicate
158AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The dialog for editing an existing application's r
159AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.a path to its location on the disk Application action
16AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.AVG Installation ProcessTo install AVG on your compute
160AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Each detailed settings further specifies what Defined s
161AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oApplication basic information - name of application
162AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Allow for all - any communication attempt of the sy
163AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.AVG ScanningScanning is a crucial part of AVG 8.5 In
164AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. View Virus Vault - opens a new window with the Vir
165AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Scan configuration editingYou have the option of editin
166AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Scanning parameters - in the list of scanning parame
167AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Additional scan settings - the link opens a new Comp
168AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.scanning use the "!" parameter.Finally, to la
169AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Scanning parameters - in the list of scanning parame
17AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.2. License AgreementThe License Agreement dialog pr
170AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Additional scan settings - the link opens a new Comp
171AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Within Windows Explorer highlight the file (or folder
172AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The syntax of the command follows: avgscanx /parameter
173AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. /HEUR Use heuristic analyse /EXCLUDE
174AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. /PRIORITY Set scan priority /Low, Auto, High/
175AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Control buttons for the scan schedulingWithin the editi
176AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.5.1.Schedule SettingsIf you wish to schedule a new
177AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.launch. The timing can either be defined by the repeate
178AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.5.2.How to ScanOn the How to scan tab you will find
179AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Scan inside archives - (switched on, by default):
18AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.3. Checking System StatusHaving confirmed the license
180AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.of this dialog and switches back to the AVG scanning in
181AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Therefore if you wish to configure the test parameters
182AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. - red icon warns there was an infection detected durin
183AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.7.Scan Results DetailsIf in the Scan Results Overv
184AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.7.1.Results Overview TabOn the Scan results tab yo
185AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.7.2.Infections TabThe Infections tab is only displa
186AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oDeleted - the infected object was deletedoAdded to P
187AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Remove selected infections - use the button to move t
188AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.option in a specific scan settings)oHealed - the infect
189AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog you can find information on the location
19AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.4. Select Installation TypeThe Select Installation
190AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.7.6.Information TabThe Information tab contains da
191AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Path to file - full path to the original location of
192AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.14.AVG Updates14.1.Update LevelsAVG offers two update l
193AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Note: Before the AVG program update launch a system res
194AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.15.Event HistoryThe Event History dialog is accessible
195AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.16.FAQ and Technical SupportShould you have any problem
2AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Contents...
20AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.number is available (in the email), it is recommended to
21AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.6. Custom Installation - Destination FolderThe Des
22AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.7. Custom Installation - Component SelectionThe Co
23AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.8. AVG Security ToolbarIn the AVG Security Toolbar
24AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.9. Windows FirewallThe license number you have provid
25AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.10.Setup SummaryThe Setup Summary dialog provides an
26AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Note: Please make sure you have saved all your data befo
27AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Please wait until the installation is complete, then you
28AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.6.AVG First Run WizardWhen you first install AVG on your
29AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.6.2. Schedule regular scans and updatesIn the Schedu
3AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...
30AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In the Help us to identify new threats dialog decide whe
31AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.6.5. Update AVG protectionThe Update AVG protection
32AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Now your AVG 8.5 Internet Security has been configured;
33AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.7.Firewall Configuration WizardFirewall Configuration
34AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Small home or office networkIn this dialog please
35AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Complete scan - scan all local hard drives of your com
36AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.This way the profile list will get deactivated and you j
37AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.8.After Installation8.1. Product RegistrationHaving fin
38AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Try to download the eicar.com file, and save it on your
39AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.9.AVG User InterfaceAVG 8.5 Internet Security open with
4AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...
40AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Statistics (left bottom section of the window) provid
41AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. LinkScanner - opens the default page of the LinkScann
42AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.the tree structure of your disk Update - automatically
43AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.agreement, and contact information of AVG Technologies
44AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.9.3. Quick LinksQuick links (in the left section of t
45AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.9.4. Components OverviewThe Components Overview section
46AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. E-mail Scanner checks all incoming and outgoing mail
47AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.9.6. System Tray IconSystem Tray Icon (on your Windows
48AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.AVG Components10.1.Anti-Virus10.1.1.Anti-Virus Princ
49AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.1.2.Anti-Virus InterfaceThe Anti-Virus component&ap
5AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...
50AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.2.Anti-Spyware10.2.1.Anti-Spyware PrinciplesSpyware
51AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The Anti-Spyware component's interface provides a
52AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.3.2.Anti-Spam InterfaceIn the Anti-Spam component&a
53AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.4.Anti-Rootkit 10.4.1.Anti-Rootkit PrinciplesAnti-Ro
54AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.launched.In the bottom part of the dialog you can find t
55AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.5.1.ProcessesThe Processes dialog contains a list of
56AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.5.2.Network ConnectionsThe Network Connections dial
57AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The control buttons available are: Terminate Connectio
58AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.We strongly suggest not to delete any applications from
59AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.5.5.LSP ViewerThe LSP Viewer dialog shows a list o
6AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...
60AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.6.Firewall10.6.1.Firewall PrinciplesFirewall is a sy
61AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Use complete profiles with predefined rules, according
62AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oSmall home or office network – suitable for computers i
63AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.6.3.Firewall InterfaceThe Firewall component's
64AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oFirewall disabled - this option switches Firewall off
65AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.employ anti-spam filters etc, to reduce the risk.The E-m
66AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Installed e-mail protection - information about a spe
67AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.7.3.E-mail Scanner DetectionIn the E-mail Scanner
68AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.8.LicenseIn the Licence component interface you will
69AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Copy license number - press the button to insert the c
7AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...
70AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.9.2.Link Scanner InterfaceThe LinkScanner componen
71AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.AVG Security Toolbar warns you before you click on da
72AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.important to remember that exploited web pages can infec
73AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.find the elementary editing options of this component&ap
74AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.programs (executable programs that can operate as spywa
75AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.you want to control - currently AVG 8.5 Internet Securit
76AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.11.Resident Shield10.11.1.Resident Shield Principl
77AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Basic component configurationIn the bottom part of the d
78AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Cancel - press this button to return to the default AV
79AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The Resident Shield detection offers an overview of obj
8AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.1.IntroductionThis user manual provides comprehensive doc
80AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.12.Update Manager10.12.1.Update Manager Principles
81AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.functionality and its current status (Update manager is
82AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Cancel - press this button to return to the default AV
83AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Advanced - on this tab you can edit the AVG Security
84AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Yahoo! search. Enter a word or phrase into the search bo
85AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.AVG Advanced SettingsThe advanced configuration dialo
86AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.to restart the user interface; follow these steps: Sele
87AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.be displayed or suppressed;oDisplay components state cha
88AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.By default, no component is selected in this list. It me
89AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.3.Virus VaultThe Virus Vault maintenance dialog a
9AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.2.AVG Installation Requirements2.1. Operation Systems Sup
90AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.keep such a program on your computer, you can define it
91AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oFile - type the full path to the file that you want to
92AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.5.1.SettingsIn the Engine performance settings dialog
93AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Value 60-79 - Considered as a quite aggressive config
94AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.There are the following options to choose from: A spec
95AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog, please select the folder with the messag
96AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Note: In case of Microsoft Office Outlook, you will be p
97AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog, you can set filtering of the e-mail mess
98AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.5.2.PerformanceThe Engine performance settings dialog
99AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.only be done by expert users!11.5.3.RBLThe RBL item open
Commenti su questo manuale