Manuale d’uso / di manutenzione del prodotto Internet Security 2013 del fabbricante AVG
Vai alla pagina of 143
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 Doc um e n t r e v is i o n 2 013 .10 (30 .11 .20 12 ) C o p y r ight A V G Te c hno lo gie s C Z , s.r .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 Con t e n t s .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 1 . I n t ro duct i on T his us er manu al pr ov i de s c ompr eh ens iv e user do c umentation f or AVG I nte rne t S e c uri ty 20 13 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 2 . AV G Inst al la t i on Requ i reme n t s 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 3 . AV G Inst al la t i on Pr ocess T o ins t all A V G I n t e rne t S e curity 201 3 on y our c omputer , y ou ne ed t o ge t t he lates t ins t allati on f il e.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 3 . 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 3 . 3 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 C anc el - c lic k t o exi t t he s e t up pr oces s.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 Sets , k ee ps and prote ct s A VG S ec u re S ea rc.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 c an be ins t alled . If t he def au lt s e t t i ng s do no t s uit y ou, y ou c an re mov e/add s p ec ific c o m po ne nts .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 dia log win do w i nto an i c on v is ible on t he s y st em bar . T he dialog ap pea rs aga i n once t he i nst allat ion is c ompleted .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 4 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 5 I f AVG fa i l s to i de nt i fy the E I C A R te s t fil e a s a vi rus , you s ho ul d che ck the progra m conf i g ura t i on a ga i n! 4 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 6 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 7 allow s quic k ac c es s t o s cann ing an d upd at ing within AVG I nte rne t S e c uri ty 20 13 . Details > > 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 8 o C op y t o c lipb o ar d - Use t his l ink t o c opy t he l ic ense nu mber , and past e it wh ere nee ded .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 9 c od e us ed in t he pro duct : Li ce ns e A gre em ent - T he t ab of f er s t he f ull wo rd i ng of t he lic e ns e ag ree m en t betwe en y ou an d A V G T ec hno logies: 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 0 Scan fi l e.. . - A ll ow s y o u t o ru n an on -d emand t es t on a s in gle s peci f ic file. Clic k t his option t o ope n a ne w wind ow with t he t ree s tru c tur e of y our dis k .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 1 AV G pr od uc t ). R egis ter now / M y A cc oun t - Co nne c ts t o t he re gis t ra t ion pa ge of t he A V G w eb s it e (h t t p: / / w w w .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 2 N ote : AV G I ntern et S ecur it y 20 13 s tat us i nfor m ati on c a n als o b e ob t ained at an y t im e f rom t he s yst em t ray ic on .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 3 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 4 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 5 A ct i on s a cc e s s i bl e f rom AVG S ys te m Tr.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 6 A V G ga dge t controls I f nee de d, t he A VG gad .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 7 s olv e t he pro blem.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 8 6 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 2 9 (AntiV irus or A nti-R oo t k it ) : En abled / D i s abled - T he butt on may re mind y o u of a t ra f f ic li gh t , both in app ea ran c e and in f unct iona lit y .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 0 prote ction! D i a log controls T o s witc h betwe en both s ec t ion s of t he dialo g, y ou c an s i mply c l ic k an y wh ere i n t he re s p ec t iv e s erv ic e pan el.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 1 pa rt of t h dialo g. - Use t he gre en ar ro w in t he up pe r lef t s ec t ion of t he dialog t o get ba c k t o t he main us er i nter f ac e w it h t he c o m po nen t s ' ov er v i ew .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 2 En abled / D i s abled - T he butt on may re mind y o u of a t ra f f ic li gh t , both in app ea ran c e and in f unct iona lit y .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 3 ad dre s ses t o y o ur W h i t elis t (n ev er m ar k as s pam) an d B lac k l is t (a lw ay s mark as s pam) .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 4 20 13 ac t iv it ies pe rf orme d on y our c o m pu t er within a s peci f ied per iod of t im e an d i n t otal.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 5 A va i l a bl e Fi re w a l l m ode s Fire w all all.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 6 D i a log controls T he dialog pro v ide s an ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 7 6 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 8 C anc el - pre s s t his butt on t o s t op t he ru .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 3 9 7 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 0 D o Not Track - t he DN T s e rv ic e he lps y ou iden t i f y we bsi t es t hat are c ollec t ing data ab out y our online act i v it i es, and giv es y ou t he c hoic e t o allow or dis allow it .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 1 8 . AV G D o Not Tr a ck A V G Do Not Track help s y ou i de nt if y we bs it es t hat ar e c ollec t ing da t a abo ut y our online ac t iv it ies .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 2 c ollec t da t a ab ou t y o ur online ac t iv it y wh i le y o u ar e logg ed- in. E x amples of S oc ial bu t t ons i ncl ud e: Facebo ok S oc ial P lugin s , T w it t er B ut t on , Goog l e + 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 3 8 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 4 B l ock the foll owi ng - I n t his s e c tion y ou c an s e e a box wit h a l is t of k now n data c ollec t ion s er v ic e s t ha t c a n be c las s i f ied as A d Ne t wor k s .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 5 9 . AV G A dv a n ce d S et t i n gs T he adv a nc ed c o nf igur at ion dialo g of AVG I n t e rne t S e curity 201 3 ope ns in a new win do w named A dva nced A V G S et ting s .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 6 C on fir m y our s elec t ion by pr es s ing t he A .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 7 o U pdat e notifi ca ti ons (o n, b y de f ault ) - .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 8 t rying t o c on ne c t t o a ne t w or k , Firew all block s t he att empt an d dis plays a notificat ion.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 4 9 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 0 I n m os t c as es, i t is not nec es s ary t o dis .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 1 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 2 A s k m e before rem oving threa ts ( on b y default.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 3 I n t he Fi l es s ca n ned by the R es i dent S hi .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 4 Scan appl i cat i ons and S can dri vers ena ble y o u t o s pec if y i n detail wh at s hou l d be inc lude d in anti-r oo t k it s c ann i ng .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 5 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 6 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 7 R eport P ote nti all y Unwa nte d P rograms and S pywa re thre ats ( o n b y de f au l t ) - c heck t o ac t iv ate s c ann i ng fo r s p y w ar e as w ell as f or v iru s e s .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 8 By def ault , t he c e rt if ic a t i on t ext c o ns is ts of jus t a bas ic inf or mat ion t ha t s t ates No vir us f oun d in t his mes s age .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 5 9 T he A t ta chm ent fil ter dialo g allow s y ou t o s et up par ameters f or email mes s age att ac hmen t s cann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 0 I n t his dialog y ou c an s et up a ne w E mail S c.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 1 Type of l ogi n - de f ines t he m ethod f or deter .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 2 SM TP S erve r Na m e - i n t his f i eld y ou c an .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 3 I n t his dialog y ou c an s et up a ne w E mail S c.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 4 Type of l ogi n - de f ines t he m ethod f or deter .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 5 I n t he A nt i -Sp am s et tings dialog y o u c an c heck /un c heck t he Tu rn on A n ti-Spam p rote ct i on c heck b ox t o allow / pr ohibit t he anti-s pa m s c ann ing of email c ommunic ation.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 6 T he E ngi ne perf orm ance s et tin gs dialo g ( li.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 7 T he W hi t eli s t i t em ope ns a dialo g named A .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 8 T he Black l i s t it em ope ns a dialog with a glob al li s t of block ed s e nde r email add re s ses an d domain names w ho s e m es s ag es w i ll alwa y s be m ar k ed as s pam.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 6 9 res pect i ve option di rec tly i n the us er i nter fa ce.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 0 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 1 I n t he W eb P rote ct i on dia log y ou c an edit t he c ompon ent's c o nf igur at ion re gar ding t he s c an of t he w eb s it e c on t en t .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 2 ab s o l utely s ure .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 3 A l way s prom pt ( on b y default ) - w hen a t hr .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 4 Sca n s e tt i ngs T he S can s et ti ngs s ec t ion.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 5 c an no t ge t i nfec t ed w i ll not b e s c ann ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 6 Al l par ameters s et up in t his c o nf igur at ion.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 7 T he li s t of pa ra m eter s is iden t i c al t o t hose av ailab le f or t he S c an of t he wh ole c omputer .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 8 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 7 9 N ext , t he t ex t f i eld c alled Na m e ( d eact i v at ed f or all default s c h edu les ) s t at es t he name as s igne d t o t his v ery s c hed ule by t he pr og ram v en dor .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 0 ic on : A new A V G s y s tem t ra y ic on t hen app ea rs ( in f ull c olor w it h a f las h light ) inf or mi ng a s c hed uled s c a n is ru nnin g.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 1 t ha t i ncrea s e s y our c omputer s ec ur i t y ev en m or e, ho wev e r it m ay bloc k lega l pr ogr ams , and is t he ref ore s w it c h ed of f by de f ault.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 2 Se t a ddi t i ona l s ca n re ports C lic k t he S et addi tion al s ca n report s .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 3 dia log t he dis played t re e s t ruct ure ac t iv ates an d y ou c an s peci f y t he f older s t o be s c ann ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 4 imm ed iately af t er t he I ntern et c onn ec t ion is re s t or ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 5 C he c k t he Run t he up dat e aga i n as s oo n as.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 6 T his s e c tion allow s y ou t o de f ine und er w .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 7 R es ta rt i m m edi at el y - t he c omputer will b.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 8 9 . 1 0 .1. Pro xy T he pr oxy s erv e r is a s tan d- alone s e rv er or a s erv ic e run ning on a P C t hat gu ar antees s af er c onn ec t ion t o t he I ntern et .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 8 9 A utoma tic configura t i on I f y o u s elect autom.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 0 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 1 T he c har t i n t he dialo g dis play s a l is t of ex c ep t ions, i f an y hav e be en alre ad y de f ined .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 2 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 3 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 4 W ithin t he dialog , t he f ollowin g s et t ing op.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 5 Mos t com m on thre a ts N ow ada y s, t her e are fa r m or e t hr eats out t her e t han plain v iru s es .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 6 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 7 un i qu e att ribu t es of t he ne t w or k (speci f ic ally t he M A C add re s s) , and w ill no t dis play t he no t i f ic a t i on nex t t ime.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 8 1 0 . Firew a l l S e t t i ngs T he Fi r ew all c onf igu ra t i on ope ns i n a ne w wind ow wh er e i n s ev er al dialog s y ou c an s e t up adv a nced pa rameter s f or t he c ompo ne nt.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 9 9 Fire w all allow s y o u t o def ine s p ec ific s e c u rit y ru les ba s ed on w he t he r y ou r c omputer i s loc ated i n a domain , is a s t and alo ne c ompu t er , or ev en a no t eb ook .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 0 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 1 m odi fy the s ett i ngs ! C ontrol butt ons T he li s t c an be edited us ing t he f ollow i ng c o nt ro l bu t t ons : A dd - op en s an empty dialog f or de fin ing ne w ap plic ati on rule s .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 2 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 3 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 4 Ed i t net work - op ens t he Ne tw ork propert i .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 5 A ction - T his c olumn dis plays an ic on f or t .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 6 re s pec t iv e log ac t ion , user name , P I D, .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 7 C ontrol butt ons R ef res h l i s t - all logg ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 8 1 1 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 0 9 I n t he S can Options dialog , y o u c an s ee t .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 0 Sca n configu ra ti on e ditin g You c a n ed i t .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 1 t he s cann ing f or s py wa re as w ell as f or v iru s es .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 2 o C om puter s hutdown op t i ons - deci de whe t her t he c omputer s h ould be s hut do wn au t omat ic ally on c e t he run ning s c ann ing pr oc es s is ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 3 t he opti on of hav ing a s pecific fo lder s cann.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 4 H ea l / rem ove virus i nfec tio n without as k ing m e (o n b y de f ault) : I f a v irus i s iden t i f ied dur ing s c ann i ng i t c an be he ale d automati c ally i f a c u re is av ailable .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 5 o C om puter s hutdown op t i ons - deci de whe t her t he c omputer s h ould be s hut do wn au t omat ic ally on c e t he run ning s c ann ing pr oc es s is ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 6 W a rni ng : The s e s can s e t t i ng s ar e ide.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 7 av g s ca nx f or 32 bits OS av g s ca na f or 64 bits OS Synta x of the com m a nd T he s y n t ax of t he c ommand f ollow s : av g s ca nx / para m et er .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 8 / EX T Sc a n t he s e ex t ensi on s / f or ex am.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 1 9 / H I DD E N R ep ort f i les w it h hidde n ext e.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 0 Lo c a t i on On ea c h t ab y o u c an s im ply s.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 1 C ontrols i n the di a lo g Save - S av es all c h.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 2 R eport enhance d s et of P o te ntial l y Unwa n .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 3 C om puter s hutdown op t i ons - deci de whe t her t he c omputer s h ould be s hut do wn automati c ally on c e t he ru nn ing s c ann ing pr oc es s is ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 4 C lic k t he S et addi tion al s ca n report s .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 5 o C : P r og ra m Files o in 64- b it v er s i o.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 6 1 1.5. S c an Resu l ts T he S can res ul ts ove rvi ew dialo g pr ov ide s a l is t of re s ult s of all s o fa r per f or m ed s cans .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 7 D i a log controls Vi ew det ai l s - Clic k t he bu t t on t o s ee detailed inf or m ation abo ut a s e l ect ed s c a n (h i gh l igh t ed in t he c ha rt ab ov e) .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 8 1 2 . V i rus V a u l t Vi rus V aul t is a s a f e env iro nment f or t he mana gemen t of s us pect / inf ec t ed ob jec t s detect ed dur i ng A V G t est s .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 2 9 C ontrol butt ons T he f ollowin g c ontro l butt .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 0 1 3 . Hi st or y T he His tory s ec t ion inc lude s inf or mati on on all pas t ev e nts (suc h as upd at es, s cans, detec t ions, et c .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 1 - re d ic on wa rns t her e w as an i nf ec t ion .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 2 W ithin t his wa rn i ng dialog y o u will f ind i.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 3 For each de t ect ed obje c t t he f ollow ing inf.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 4 1 3.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 5 1 3.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 6 For each de t ect ed obje c t t he f ollow ing inf.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 7 1 3.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 8 1 3.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 3 9 C ontrol butt ons R ef res h l i s t - all logg ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 0 1 4 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 1 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 2 1 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 3 © 2 0 1 2 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 4 3 on remov ing v iru s e s , s py wa re, an d adv ic e on how t o s tay pr ot ect ed. D i s cus s i on f orum : Y ou c an als o us e t he A V G users dis c u s sion f or um at htt p:/ / f or ums .
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il AVG Internet Security 2013 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del AVG Internet Security 2013 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso AVG Internet Security 2013 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul AVG Internet Security 2013 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il AVG Internet Security 2013, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del AVG Internet Security 2013.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il AVG Internet Security 2013. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo AVG Internet Security 2013 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.