Manuale d’uso / di manutenzione del prodotto BitDefender Antivirus 2010 del fabbricante Softwin
Vai alla pagina of 251
User's guide Copyright© 2009 BitDefender.
BitDefender Antivirus 2010 User's guide Published 2009.07.08 Copyright© 2009 BitDefender Legal Notice All rights reserved. No part of this book may be r eproduced or transmitted in any for m or .
Each man has his price Bob And yours was pretty low BitDefender Antivirus 2010.
T able of Contents End User Software License Agr eement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Pr eface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.6.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 6.7. Automatic Device Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 7.
14.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 14.2. Quick T asks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
19. Privacy Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 19.1. Privacy Control Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Integration into Windows and Third-P arty Softwar e . . . . . . . . 195 26. Integration into Windows Contextual Menu . . . . . . . . . . . . . . . . . . . . . . 196 26.1. Scan with BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
End User Softwar e License Agr eement IF Y OU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INST ALL THE SOFTW ARE. B Y SELECTING "I ACCEPT", "OK", "CONTINUE", ".
TERM OF LICENSE. The license granted hereunder shall commence on the purchasing date of BitDefender and shall expir e at the end of the period for which the license is pur chased. EXPIR A TION. The product will cease to perform its functions immediately upon expiration of the license.
CONDITIONS, INCL UDING, WITHOUT LIMIT A TION, THE IMPLIED W ARR ANTIES OF MER CHANT ABILITY, FITNESS FOR A P AR TICULAR PURPOSE, TITLE, NON INTERFERENCE, ACCUR ACY OF DA T A, ACCUR AC Y OF INFORMA TIO.
Y ou acknowledge and accept that BitDefender may pr ovide updates or additions to the pr ogram or pr oduct which automatically download to your computer . By accepting this Agreement, Y ou agree to upload the ex ecutable files for the purpose of being scanned by the BitDefender servers.
In the event of invalidity of any provision of this Agreement, the invalidity shall not affect the validity of the r emaining portions of this Agreement. BitDefender and BitDefender logos are trademarks of BITDEFENDER . All other trademarks used in the product or in associated materials are the pr operty of their respective owners.
P reface This guide is intended to all users who have chosen BitDefender Antivirus 2010 as a security solution for their personal computers. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to work under W indows.
Note The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic. Important This requir es your attention and is not recommended to skip over it. Usually, it provides non-critical but significant information.
3. R equest for Comments W e invite you to help us improve the book. W e have tested and verified all of the information to the best of our ability . Please write to tell us about any flaws you find in this book or how you think it could be impr oved, to help us provide you with the best documentation possible.
Installation and R emoval 1 BitDefender Antivirus 2010.
1. System R equirements Y ou may install BitDefender Antivirus 2010 only on computers running the following operating systems: ⚫ Windows XP (32/64 bit) with Service P ack 2 or higher ⚫ Windows Vis.
⚫ Y ahoo Messenger 8.5 ⚫ Windows Live Messenger 8 System R equirements 3 BitDefender Antivirus 2010.
2. Pr eparing for Installation Before you install BitDefender Antivirus 2010, complete these preparations to ensure the installation will go smoothly : ⚫ Mak e sure that the computer where you plan to install BitDefender meets the minimum system r equirements.
3. Installing BitDefender Y ou can install BitDefender from the BitDefender installation CD or using the installation file downloaded on your computer from the BitDefender website or from other authorized websites (for e xample, the website of a BitDefender partner or an online shop).
F ollow these steps to install BitDefender Antivirus 2010: 1. Click Next . Y ou can cancel installation anytime you want by clicking Cancel . BitDefender Antivirus 2010 alerts you if you have other antivirus products installed on your computer . Click Remove to uninstall the cor responding product.
⚫ T urn off Windows Defender - to turn off Windows Defender; this option appears only on Windows Vista. Click Install in order to begin the installation of the product. If not already installed, BitDefender will first install .NET F ramework 1.1. 6.
3.1.1. Step 1/2 - R egister BitDefender Antivirus 2010 R egistration BitDefender Antivirus 2010 comes with 30-day trial period. T o continue evaluating the pr oduct, select I want to evaluate BitDefender and click Next . T o register BitDefender Antivirus 2010: 1.
3.1.2. Step 2/2 - Create a BitDefender Account Account Creation If you do not want to cr eate a BitDefender account at the moment, select Register later and click Finish . Otherwise, pr oceed accor ding to your current situation: ⚫ “I do not have a BitDefender account” (p.
⚫ Re-type password - type in again the pr eviously specified passwor d. Note Once the account is activated, you can use the provided e-mail address and password to log in to your account at http://myaccount.bitdefender .com . 3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account.
3.2. Configuration W izard Once you have completed the registration wizard, a configuration wizar d will appear . This wizard helps you configur e the main BitDefender settings and user interface so that they suit your r equirements better .
Description Option Click here if this PC is used mainly for browsing and multimedia activities. T ypical Click her e if this PC is used primarily for gaming. Gamer Click here if you want to configure all the main settings of BitDefender . Custom Y ou can later r eset the usage profile fr om the product interface.
Click Next to continue. 3.2.3. Step 3 - Select User Interface User Interface View Modes Click the button that best describes your computer skills to select an appropriate user interface view mode. Y ou can choose to view the user interface under any of three modes, depending on your computer skills and on your previous experience with BitDefender .
Description Mode Y ou can fix issues separately and choose which issues to be monitor ed. Moreover, you can manage r emotely the BitDefender products installed on the computers in your household. Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender .
2. T ype the same administrative password in each of the edit fields. The password enables an administrator to manage this BitDefender product from another computer . Click Next to continue. 3.2.5. Step 5 - Select the T asks to Be R un T ask Selection Set BitDefender to perform important tasks for the security of your system.
Note If you later want to change the time when the scan is scheduled to run, follow these steps: 1. Open BitDefender and switch the user interface to Expert Mode. 2. Click Antivirus on the left-side menu. 3. Click the Virus Scan tab. 4. Right-click the System Scan task and select Schedule .
Click Finish to complete the wizar d. Y ou do not have to wait for the scan to complete. Note The scan will take a few minutes. When it is over, open the scan window and check the scan r esults to see if your system is clean. If viruses wer e detected during the scan, you should immediately open BitDefender and run a full system scan.
4. Upgrade Y ou can upgrade to BitDefender Antivirus 2010 if you are using BitDefender Antivirus 2010 beta or the 2008 or 2009 version. There are two ways to perfor m the upgrade: ⚫ Install BitDefender Antivirus 2010 dir ectly over the older version.
5. R epairing or R emoving BitDefender If you want to repair or remove BitDefender Antivirus 2010, follow the path from the W indows start menu: Start → Programs → BitDefender 2010 → Repair or Remove . Y ou will be requested to confirm your choice by clicking Next .
Getting Started 20 BitDefender Antivirus 2010.
6. Overview Once you have installed BitDefender your computer is protected. If you have not completed the configuration wizard , you must open BitDefender as soon as possible and fix the existing issues. Y ou may have to configure specific BitDefender components or take preventive actions to protect your computer and your data.
Description Mode Y ou can fix issues separately and choose which issues to be monitor ed. Moreover, you can manage r emotely the BitDefender products installed on the computers in your household. Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender .
Novice Mode The window is organized into three main sections: ⚫ Security Status informs you of the issues that affect your computer's security and helps you fix them. By clicking Fix All Issues , a wizard will help you easily remove any threats to your computer and data security .
▸ When the Gamer pr ofile is selected, the T urn On/Off Game Mode button allows you to enable/disable Game Mode . Game Mode temporarily modifies protection settings so as to minimize their impact on system performance. ⚫ Maintain Y our PC is where you can find additional tasks to pr otect your computer and data.
Intermediate Mode The Intermediate Mode window consists of five tabs. The following table briefly describes each tab. F or detailed information, please refer to the “Intermediate Mode” (p. 70) part of this user guide. Description T ab Displays the security status of your system and lets you reset the usage profile.
In the upper -right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of BitDefender . F or detailed information, please refer to “ Configuring Basic Settings ” (p.
Expert Mode On the left side of the window ther e is a menu containing all security modules. Each module has one or more tabs where you can configure the corr esponding security settings or perform security or administrative tasks. The following table briefly describes each module.
Description Module Allows you to postpone the BitDefender scheduled tasks while your laptop runs on batteries and also to eliminate all alerts and pop-ups when you are playing. Game/Laptop Mode Allows you to configure and manage several computers in your household.
T ray Icon ⚫ Show - opens the main interface of BitDefender . ⚫ Help - opens the help file, which e xplains in detail how to configur e and use BitDefender Antivirus 2010. ⚫ About - opens a window where you can see infor mation about BitDefender and where to look for help in case something une xpected appears.
Scan A ctivity Bar The gray bars (the File Zone ) show the number of scanned files per second, on a scale from 0 to 50. Note The Scan activity bar will notify you when r eal-time protection is disabled by displaying a red cross over the File Zone . 6.
4. Click OK to save and apply the changes. 6.5. BitDefender Manual Scan BitDefender Manual Scan lets you scan a specific folder or hard disk partition without having to create a scan task. This featur e was designed to be used when Windows is running in Safe Mode.
Scanning options. The scanning options ar e pre-configur ed for the best detection results. If infected files are detected, BitDefender will try to disinfect them (remove the malware code). If disinfection fails, the Antivirus Scan wizar d will allow you to specify other actions to be tak en on infected files.
While in Game Mode, you can see the letter G over the BitDefender icon. Using Game Mode By default, BitDefender automatically enters Game Mode when you start a game from the BitDefender's list of known games or when an application goes to full screen.
running on battery . While in Laptop Mode, scheduled scan tasks are not performed, as they r equire more system resources and, implicitly, incr ease power consumption. BitDefender detects when your laptop has switched to battery power and it automatically enters Laptop Mode.
If you accidentally disabled automatic device detection and you want to enable it, or if you want to configur e its settings, follow these steps: 1. Open BitDefender and switch the user interface to Expert Mode. 2. Go to Antivirus>V irus Scan . 3. In the list of scan tasks, locate the Device Detection Scan task.
7. F ixing Issues BitDefender uses an issue tracking system to detect and inform you about the issues that may affect the security of your computer and data. By default, it will monitor only a series of issues that are considered to be very important.
F ix All Issues Wizard The wizar d displays the list of existing security vulnerabilities on your computer . All curr ent issues are selected to be fixed. If there is an issue that you do not want to be fix ed, just select the corr esponding check box.
⚫ System vulnerabilities. BitDefender automatically checks your system for vulnerabilities and alerts you about them. System vulnerabilities include the following: ▸ weak passwords to Windows user accounts. ▸ outdated softwar e on your computer .
8. Configuring Basic Settings Y ou can configure the main product settings (including changing the user interface view mode) from the basic settings window . T o open it, do any of the following: ⚫ Open BitDefender and click the Settings button in the upper -right corner of the window .
8.1. User Interface Settings In this ar ea, you can switch the user interface view mode and reset the usage profile. Switching the user interface view mode. As described in section “ User Interface View Modes ” (p. 21) , there are three modes for displaying the user interface.
8.2. Security Settings In this area, you can enable or disable product settings that cover various aspects of computer and data security . The current status of a setting is indicated using one of these icons: Green circle with a check mark: The setting is enabled.
If you do not want a monitor ed setting that you disabled to be shown as an issue, you must configure the tracking system accordingly . Y ou can do that either in Intermediate Mode or in Expert Mode. ⚫ In Intermediate Mode, the tracking system can be configured from separate locations, based on settings categories.
Description Setting By enabling this option, you will receive information alerts. Product Notification Alerts The Scan Activity Bar is a small, transparent window indicating the progr ess of the BitDefender scanning Scan Activity Bar activity . For more information, please refer to “ Scan Activity Bar ” (p.
9. History and Events The View Logs link at the bottom of the BitDefender main window opens another window with the BitDefender history & events. This window offers you an overview of the security -related events. For instance, you can easily check if the update was successfully perfor med, if malwar e was found on your computer etc.
⚫ Update ⚫ Registration ⚫ Internet Log A list of events is available for each category . Each event comes with the following information: a short description, the action BitDefender took on it when it happened, and the date and time when it occur red.
10. R egistration and My Account BitDefender Antivirus 2010 comes with 30-day trial period. During the trial period, the product is fully functional and you can test it to see if it meets your expectations. Please note that, after 15 days of evaluation, the product will cease to update, unless you create a BitDefender account.
R egistration Y ou can see the BitDefender registration status, the curr ent license key and how many days are left until the license expires. T o register BitDefender Antivirus 2010: 1. T ype the license key in the edit field. Note Y ou can find your license key : ⚫ on the CD label.
10.2. Activating BitDefender T o activate BitDefender, you must create or sign in to a BitDefender account. If you did not register a BitDefender account during the initial registration wizard, you can do that as follows: ⚫ In Novice Mode, click Fix All Issues .
Important Y ou must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update. I do not have a BitDefender account T o successfully create a BitDefender account, follow these steps: 1.
2. T ype the e-mail addr ess and the passwor d of your account in the cor responding fields. Note If you have forgotten your password, click Forgot your password? and follow the instructions. 3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account.
11. Wizar ds In order to make BitDefender very easy to use, several wizar ds help you carry out specific security tasks or configure more complex product settings. This chapter describes the wizards that may appear when you fix issues or perfor m specific tasks with BitDefender .
.
Actions Y ou can see the number of issues affecting your system. The infected objects are displayed in gr oups, based on the malware they ar e infected with. Click the link corr esponding to a thr eat to find out more infor mation about the infected objects.
Description Action to sear ch for and find such files on your computer, if any . Please note that these hidden files ar e not the files that you deliberately hide from Windows. They are the files hidden by special programs, known as rootkits. R ootkits are not malicious in nature.
Click Close to close the window . BitDefender Could Not Solve Some Issues In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection. However, ther e are issues that cannot be solved. In these cases, we recommend you to contact the BitDefender Support T eam at www .
W elcome Window If you want to skip over this window when running this wizar d in the future, select the Don't show this step the next time this wizard is run check bo x. Click Next . 11.2.2. Step 2/6 - Select T arget Here you can specify the files or folders to be scanned as well as the scan options.
Select T ar get Click Add T arget , select the files or folders that you want to scan and click OK . The paths to the selected locations will appear in the Scan T arget column. If you change your mind about the location, just click the Remove button next to it.
Description Option Only the files with the extensions specified by the user will be scanned. These e xtensions must be separated by ";". Scan user defined extensions only Click Next . 11.2.3. Step 3/6 - Select Actions Here you can specif y the scanner settings and the scan level.
Description Action Moves infected files into the quarantine. Quarantined files cannot be executed or opened; therefor e, the risk of getting infected disappears. Move files to Quarantine ⚫ Select the action to be tak en on the hidden (rootkits) files.
Custom Scan Level Specify the type of malware you want BitDefender to scan for by selecting the appropriate options: Description Option Scans for known viruses. Scan for viruses BitDefender detects incomplete virus bodies, too, thus r emoving any possible threat that could affect your system's security .
Click OK to close the window . Click Next . 11.2.4. Step 4/6 - Additional Settings Before scanning begins, additional options are available: Additional Settings ⚫ T o save the custom task you are creating for future use select the Show this task in Intermediate UI check box and enter a name for the task in the pr ovided edit field.
Scanning Note The scanning process may take a while, depending on the complexity of the scan. Y ou can click the scan progress icon in the system tray to open the scan window and see the scan progress.
Summary Y ou can see the results summary . If you want comprehensive information on the scanning pr ocess, click View Log to view the scan log. Important If requir ed, please restart your system in order to complete the cleaning process. Click Close to close the window .
11.3.1. Step 1/6 - Select V ulnerabilities to Check V ulnerabilities Click Next to check the system for the selected vulnerabilities. Wizar ds 64 BitDefender Antivirus 2010.
11.3.2. Step 2/6 - Checking for V ulnerabilities V ulnerability Check W ait for BitDefender to finish checking for vulnerabilities. Wizar ds 65 BitDefender Antivirus 2010.
11.3.3. Step 3/6 - Update Windows Windows Updates Y ou can see the list of critical and non-critical Windows updates that are not currently installed on your computer . Click Install All System Updates to install all the available updates. Click Next .
11.3.4. Step 4/6 - Update Applications Applications Y ou can see the list of applications check ed by BitDefender and if they are up to date. If an application is not up to date, click the pr ovided link to download the latest version.
11.3.5. Step 5/6 - Change W eak P asswords User P asswords Y ou can see the list of the Windows user accounts configured on your computer and the level of pr otection their password provides. A password can be strong (hard to guess) or weak (easy to crack by malicious people with specialized softwar e).
⚫ Change user password. Y ou must type the new password in the edit fields. Mak e sur e to infor m the user about the password change. Note F or a strong password, use a combination of uppercase and lowercase letters, numbers and special characters (such as # , $ or @ ).
Inter mediate Mode 70 BitDefender Antivirus 2010.
12. Dashboard The Dashboard tab provides information regarding the security status of your computer and allows you to fix pending issues. Dashboard The dashboar d consists of the following sections: ⚫ Overall Status - Indicates the number of issues affecting your computer and helps you fix them.
Click the name of a module to see more details about its status and to configur e status tracking for its components. ⚫ Usage Profile - Indicates the usage profile that is currently selected and off.
13. Antivirus BitDefender comes with an Antivirus module that helps you k eep your BitDefender up to date and your computer virus free. T o enter the Antivirus module, click the Antivirus tab.
Red circle with an exclamation mark: Issues affect the component. The sentences describing issues are written in red. Just click the Fix button corr esponding to a sentence to fix the reported issue. If an issue is not fixed on the spot, follow the wizard to fix it.
Description Issue The malware signatures of your BitDefender product are not being automatically updated on a regular basis. Automatic Update is disabled The malware signatures of your BitDefender product are outdated. The update has not been performed for x days 13.
Updating BitDefender In this window you can see the status of the update process. The update process is performed on the fly, meaning that the files to be updated are replaced pr ogressively . In this way, the update process will not affect product operation and, at the same time, all vulnerabilities will be excluded.
Description T ask Scans the entire system, except for archives. In the default configuration, it scans for all types of malwar e other than rootkits . System Scan Use this task to scan important curr ent user folders: My Documents , Desktop and StartUp .
14. Antiphishing BitDefender comes with an Antiphishing module which ensures that all web pages you access via Internet Explorer or F irefo x ar e safe.
The most common issue reported for this module is Antiphishing is disabled . This means Antiphishing is not enabled for any or some of the following supported applications: Internet Explorer, Mozilla F irefo x, Y ahoo! Messenger or W indows Live Messenger .
The update process is performed on the fly, meaning that the files to be updated are replaced pr ogressively . In this way, the update pr ocess will not affect pr oduct operation and, at the same time, all vulnerabilities will be excluded. If you want to close this window, just click Cancel .
15. V ulnerability BitDefender comes with a V ulnerability module that helps you keep crucial sof tware on your PC up-to -date. T o monitor and fix your system's vulnerabilities, click the V ulnerability tab.
Description Status BitDefender does not check for potential vulnerabilities regar ding missing W indows updates, application updates or weak passwords. V ulnerability Check is disabled BitDefender found missing Windows/application updates and/or weak passwords.
16. Network The Network module allows you to manage the BitDefender products installed on your home computers from a single computer . T o enter the Network module, click the Network tab. Network T o be able to manage the BitDefender products installed on your home computers, you must follow these steps: 1.
⚫ Scan All - allows you to scan all managed computers at the same time. ⚫ Update All allows you to update all managed computers at the same time. ⚫ Register All allows you to register all managed computers at the same time. 16.1.1. Joining the BitDefender Network T o join the BitDefender home network, follow these steps: 1.
2. T ype the home management password and click OK . A new window will appear . Add Computer Y ou can see the list of computers in the network. The icon meaning is as follows: ⚫ Indicates an online computer with no BitDefender products installed. ⚫ Indicates an online computer with BitDefender installed.
Authenticate 5. T ype the home management password configured on the respective computer . 6. Click OK . If you have provided the correct password, the selected computer name will appear in the network map. Note Y ou can add up to five computers to the network map.
Network Map If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, BitDefender registration status).
Allows you to fix the issues that are affecting the security of this computer by following the F ix All Issues wizard. ⚫ View History/Events Allows you access to the History&Events module of the BitDefender product installed on this computer .
Enter P assword 2. Select a scan type. ⚫ System Scan - starts a full scan of your computer (archives excluded). ⚫ Deep System Scan - starts a full scan of your computer (archives included). ⚫ My Documents Scan - starts a quick scan of your documents and settings.
2. Click OK . 16.1.6. R egistering All Computers T o register all managed computers, follow these steps: 1. Click Register All . Y ou will be prompted to provide the local home management password. Enter P assword 2. Enter the key you want to r egister with.
Expert Mode 91 BitDefender Antivirus 2010.
17. General The General module pr ovides information on the BitDefender activity and the system. Here you can also change the overall behavior of BitDefender . 17.1. Dashboard T o see if any issues affect your computer, as well as product activity statistics and your r egistration status, go to General>Dashboard in Expert Mode.
17.1.1. Overall Status This is where you can find out the number of issues that are affecting the security of your computer . T o remove all threats, click Fix All Issues . This will start the F ix All Issues wizard. T o configure which modules will be track ed by BitDefender Antivirus 2010, click Configure Status T racking .
Description Issue A full system scan was started but not completed. The last system scan you started was aborted before it finished R eal-time protection is disabled and a system scan is over due. Antivirus is in a critical state ⚫ Update - BitDefender monitors if the malware signatur es ar e up-to-date.
Description Status Windows security updates ar e not being automatically installed as soon as they become available. Windows Automatic Updates are disabled A new version of the Application is available but not installed. Application (outdated) A user passwor d is easy to crack by malicious people with specialized software.
Description Item Indicates when your BitDefender pr oduct was last updated. Please perform regular updates in order to have a fully protected system. Last update Indicates the e-mail address that you .
General Settings Here you can set the overall behavior of BitDefender . By default, BitDefender is loaded at Windows startup and then runs minimized in the taskbar . 17.2.1. General Settings ⚫ Enable password protection for product settings - enables setting a password in order to protect the BitDefender configuration.
Enter passwor d T ype the password in the Password field, re-type it in the Retype password field and click OK . Once you have set the password, you will be asked for it whenever you want to change the BitDefender settings. The other system administrators (if any) will also have to provide this password in order to change the BitDefender settings.
⚫ Enable BitDefender Outbreak Detection - sends to the BitDefender Labs reports regar ding potential virus-outbreaks. The reports will contain no confidential data, such as your name, IP address or others, and will not be used for commercial purposes.
⚫ Go to - opens a window wher e the selected item is placed (the Registry for example). Note Depending on the selected item, the Go to button may not appear .
18. Antivirus BitDefender protects your computer from all kinds of malware (viruses, T rojans, spyware, r ootkits and so on). The protection BitDefender offers is divided into two categories: ⚫ R eal-time protection - prevents new malware threats fr om entering your system.
R eal-time Protection Y ou can see whether Real-time protection is enabled or disabled. If you want to change the R eal-time protection status, clear or select the corr esponding check bo x. Important T o prevent viruses from infecting your computer keep Real-time protection enabled.
Description Pr otection level Only programs and incoming mail messages are scanned for viruses. Besides the classical signature-based scan, the heuristic analysis is also used. The actions tak en on infected files are the following: disinfect file/move file to quarantine.
Shield Settings The scan options ar e organized as an expandable menu, very similar to those used for exploration in Windows. Click the bo x with "+" to open an option or the box with "-" to close an option. Note Y ou can observe that some scan options, although the "+" sign appears, cannot be opened.
Description Option .doc ; .dot ; .xls ; .ppt ; .wbk ; .wiz ; .pot ; .ppa ; .xla ; .xlt ; .vbs ; .vbe ; .mdb ; .rtf ; .htm ; .hta ; .html ; .xml ; .xtp ; .php ; .asp ; .js ; .shs ; .chm ; .lnk ; .pif ; .prc ; .url ; .smm ; .pdf ; .msi ; .ini ; .csc ; .
Description Option Moves infected files into the quarantine. Quarantined files cannot be ex ecuted or Move file to quarantine opened; therefor e, the risk of getting infected disappears. Select from the drop-down menu the second action to tak e on infected files, in case the first action fails.
Description Option Scans all incoming e-mail messages. Scan incoming e-mail Scans all outgoing e-mail messages. Scan outgoing e-mail ⚫ Scan web (HTTP) traffic - scans the http traffic. ⚫ Show warning when a virus is found - opens an alert window when a virus is found in a file or in an e-mail message.
BitDefender A VC Alert If you know and trust the detected application, click Allow . If you want to immediately close the application, click OK . Select the Rememeber this action for this application check bo x before making your choice and BitDefender will tak e the same action for the detected application in the future.
Important K eep the Active Virus Control enabled in order to be protected against unknown viruses. If you want to be alerted and prompted for action by Active V irus Control whenever an application tries to perform a possible malicious action, select the Ask me before taking an action check box.
⚫ Remove - remove an application fr om the list. ⚫ Edit - edit an application rule. 18.1.4. Disabling R eal-time Pr otection If you want to disable r eal-time protection, a war ning window will appear . Y ou must confirm your choice by selecting fr om the menu how long you want the real-time protection to be disabled.
Antiphishing White List Y ou can see the web sites that BitDefender does not currently check for phishing content. T o add a new web site to the white list, type its url address in the New address field and click Add . The white list should contain only web sites you fully trust.
There is a risk that a virus is already lodged in your system, before you even install BitDefender . This is why it's a very good idea to scan your computer for resident viruses after you've installed BitDefender . And it's definitely a good idea to fr equently scan your computer for viruses.
There are three categories of scan tasks: ⚫ System tasks - contains the list of default system tasks. The following tasks are available: Description Default T ask Scans the entir e system.
⚫ Delete - removes the selected task. Note Not available for system tasks. Y ou cannot r emove a system task. ⚫ Scan Now - runs the selected task, initiating an immediate scan . T o the left of each task you can see the Properties button, that allows you to configure the task and view the scan logs.
⚫ Clone task - duplicates the selected task. This is useful when cr eating new tasks, as you can modify the settings of the task duplicate. ⚫ Delete - deletes the selected task. Note Not available for system tasks. Y ou cannot r emove a system task.
Overview Here you can see information about the task (name, last run and schedule status) and set the scan settings. Choosing Scan L evel Y ou can easily configur e the scan settings by choosing the scan level. Drag the slider along the scale to set the appropriate scan level.
Description Pr otection level All files and archives are scanned for viruses and spywar e. Besides the classical signature-based scan, the heuristic analysis is also used. A series of general options for the scanning process are also available: ⚫ Run the task with Low priority.
The scan options ar e organized as an expandable menu, very similar to those used for exploration in Windows. Click the bo x with "+" to open an option or the box with "-" to close an option. The scan options are grouped into 3 categories: ⚫ Scan Level.
Description Option wbk ; wiz ; pot ; ppa ; xla ; xlt ; vbs ; vbe ; mdb ; rtf ; htm ; hta ; html ; xml ; xtp ; php ; asp ; js ; shs ; chm ; lnk ; pif ; prc ; url ; smm ; pdf ; msi ; ini ; csc ; cmd ; bas ; eml and nws . Only the files with the extensions specified by the user will be scanned.
Description Action No action will be tak en on infected files. These files will appear in the r eport file. T ake No Action R emove the malwar e code from the infected files detected. Disinfect files Deletes infected files immediately, without any warning.
Description Action Moves hidden files into the quarantine. Quarantined files cannot be ex ecuted or opened; therefor e, the risk of getting infected disappears. Move files to Quarantine Note Please note that these hidden files are not the files that you deliberately hide from Windows.
– Action to take when an encrypted suspect file is found. Select the action to be tak en on suspicious files that are encrypted using Windows. The following options are available: Description Action Only log the suspicious files that are encrypted using Windows.
Scan T arget Y ou can see the list of local, network and removable drives as well as the files or folders added previously, if any . All checked items will be scanned when running the task.
⚫ All Entries - to scan all drives, no matter if they are local, in the network or removable. Note If you want to scan your entir e computer, select the checkbo x corr esponding to All Entries . Click OK to save the changes and close the window . T o run the task, just click Scan .
Scheduling Scan T asks With complex tasks, the scanning process will tak e some time and it will work best if you close all other programs. That is why it is best for you to schedule such tasks when you are not using your computer and it has gone into the idle mode.
Click OK to save the changes and close the window . T o run the task, just click Scan . 18.2.5. Scanning F iles and F olders Before you initiate a scanning process, you should make sure that BitDefender is up to date with its malware signatures.
Immediate Scanning T o scan your computer or part of it you can run the default scan tasks or your own scan tasks. This is called immediate scanning. T o run a scan task, use one of the following methods: ⚫ double-click the desired scan task in the list.
Drag F ile Drop F ile The Antivirus Scan wizard will appear and guide you through the scanning process. Manual Scanning Manual scanning consists in dir ectly selecting the object to be scanned using the BitDefender Manual Scan option from the BitDefender program group in the Start Menu.
Manual Scanning Click Add F older , select the location you want to scan and click OK . If you want to scan multiple folders, repeat this action for each additional location. The paths to the selected locations will appear in the Scan T arget column. If you change your mind about the location, just click the Remove button next to it.
Scanning Y ou can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other). W ait for BitDefender to finish scanning. Note The scanning process may tak e a while, depending on the complexity of the scan.
Stopping or pausing the scan. Y ou can stop scanning anytime you want by clicking Stop&Y es . Y ou will go directly to the last step of the wizar d. T o temporarily stop the scanning process, just click P ause . Y ou will have to click Resume to r esume scanning.
Description Action R emoves the malware code from infected files. Disinfect Deletes detected files. Delete Moves detected files to quarantine. Quarantined files cannot be ex ecuted or opened; therefor e, the risk of getting infected disappears. Move to quarantine Changes the name of hidden files by appending .
Summary Y ou can see the results summary . If you want comprehensive information on the scanning pr ocess, click View log to view the scan log. Important If requir ed, please restart your system in order to complete the cleaning process. Click Close to close the window .
18.2.6. Viewing Scan Logs T o see the scan results after a task has run, right-click the task and select Logs . The following window will appear: Scan L ogs Here you can see the report files generated each time the task was e xecuted.
Scan L og Example The scan log contains detailed information about the logged scanning process, such as scanning options, the scanning target, the threats found and the actions tak en on these threats. 18.3. Objects Ex cluded from Scanning There are cases when you may need to exclude certain files from scanning.
Exceptions Y ou can see the objects (files, folders, extensions) that ar e ex cluded fr om scanning. F or each object you can see if it is ex cluded from on-access, on-demand scanning or both. Note The exceptions specified here will NOT apply for contextual scanning.
Y ou can click Discard to revert the changes made to the rule table, pr ovided that you have not saved them by clicking Apply . 18.3.1. Excluding P aths from Scanning T o e xclude paths from scanning, click the Add button. Y ou will be guided through the process of ex cluding paths from scanning by the configuration wizard that will appear .
Step 2/4 - Specify Excluded P aths Excluded P aths T o specify the paths to be excluded from scanning use either of the following methods: ⚫ Click Browse , select the file or folder that you want to be ex cluded from scanning and then click Add . ⚫ T ype the path that you want to be ex cluded fr om scanning in the edit field and click Add .
Step 3/4 - Select Scanning T ype Scanning T ype Y ou can see a table containing the paths to be e xcluded from scanning and the type of scanning they are excluded from. By default, the selected paths are ex cluded from both on-access and on-demand scanning.
Step 4/4 - Scan Excluded F iles Scan Ex cluded F iles It is highly recommended to scan the files in the specified paths to mak e sure that they are not infected. Select the check box to scan these files befor e excluding them fr om scanning. Click Finish .
Step 1/4 - Select Object T ype Object T ype Select the option of ex cluding extensions from scanning. Click Next . Antivirus 141 BitDefender Antivirus 2010.
Step 2/4 - Specify Excluded Extensions Excluded Extensions T o specify the extensions to be ex cluded from scanning use either of the following methods: ⚫ Select from the menu the extension that you want to be excluded from scanning and then click Add .
Step 3/4 - Select Scanning T ype Scanning T ype Y ou can see a table containing the extensions to be ex cluded from scanning and the type of scanning they ar e ex cluded fr om. By default, the selected extensions are excluded from both on-access and on-demand scanning.
Step 4/4 - Select Scanning T ype Scanning T ype It is highly recommended to scan the files having the specified extensions to make sure that they ar e not infected. Click Finish . 18.4. Quarantine Ar ea BitDefender allows isolating the infected or suspicious files in a secur e ar ea, named quarantine.
Quarantine The Quarantine section displays all the files currently isolated in the Quarantine folder . For each quarantined file, you can see its name, the name of the detected virus, the path to its original location and the submission date. Note When a virus is in quarantine it cannot do any harm because it cannot be ex ecuted or read.
18.4.2. Configuring Quarantine Settings T o configure the quarantine settings, click Settings . A new window will appear . Quarantine Settings Using the quarantine settings, you can set BitDefender to automatically perform the following actions: Delete old files.
Automatically submit files. T o automatically submit quarantined files, check the cor responding option. Y ou must specify the frequency with which to submit files. Note By default, BitDefender will automatically submit quarantined files every 60 minutes.
19. Privacy Control BitDefender monitors dozens of potential “hotspots” in your system where spyware might act, and also checks any changes made to your system and softwar e.
⚫ Identity Control - protects your confidential data by filtering all outgoing web (HTTP), e-mail (SMTP) and instant messaging traffic according to the rules you create in the Identity section. ⚫ R egistry Control - asks for your per mission whenever a program tries to modify a r egistry entry in order to be ex ecuted at W indows start-up.
Y ou can create rules to protect any piece of infor mation you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multiuser support is provided so that users logging on to different Windows user accounts can configure and use their own identity protection rules.
Identity Contr ol If you want to use Identity Control, follow these steps: 1. Select the Enable Identity Control check bo x. 2. Create rules to protect your sensitive data. For more infor mation, please refer to “ Creating Identity Rules ” (p. 151) .
Step 1/4 - W elcome Window W elcome Window Click Next . Step 2/4 - Set R ule T ype and Data Set R ule T ype and Data Y ou must set the following parameters: Privacy Control 152 BitDefender Antivirus 2.
⚫ Rule Name - type the name of the rule in this edit field. ⚫ Rule T ype - choose the rule type (addr ess, name, cr edit card, PIN, SSN etc). ⚫ Rule Data - type the data you want to protect in this edit field. For example, if you want to protect your credit card number, type all or part of it here.
Y ou can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match. Specify the users for which the rule applies. ⚫ Only for me (current user) - the rule will apply only to your user account.
T o open the window where you can manage ex ceptions, click Exclusions . Exclusions T o add an e xception, follow these steps: 1. Click the Add button to add a new entry in the table. 2. Double-click Specify excluded item and provide the web site, the e-mail addr ess or the IM contact that you want to add as e xception.
Edit R ule Here you can change the name, description and parameters of the rule (type, data and traffic). Click OK to save the changes. 19.2.4. R ules Defined by Other Administrators When you ar e not the only user with administrative rights on your system, the other administrators can create identity rules of their own.
Registry Control keeps an eye on the Windows R egistry - this is again useful for detecting T rojan horses. It will alert you whenever a program will try to modify a registry entry in or der to be executed at Windows start-up. R egistry Alert Y ou can see the program that is trying to modify Windows R egistry .
R egistry Control Y ou can see the rules created so far listed in the table. T o delete a rule, select it and click the Delete button. 19.4. Cookie Contr ol Cookies are a very common occurr ence on the Internet. They are small files stor ed on your computer .
Cookie Alert Y ou can see the name of the application that is trying to send the cookie file. Click Y es or No and a rule will be cr eated, applied and listed in the rules table. This will help you to choose which websites you trust and which you don't.
Cookie Contr ol Y ou can see the rules created so far listed in the table. Important The rules are listed in order of their priority starting fr om the top, meaning the first rule has the highest priority . Drag&drop rules in order to change their priority .
Select A ddress, Action and Direction Y ou can set the parameters: ⚫ Domain address - type in the domain on which the rule should apply . ⚫ Action - select the action of the rule. Description Action The cookies on that domain will execute. Allow The cookies on that domain will not ex ecute.
19.5. Script Contr ol Scripts and other codes such as ActiveX controls and Java applets , which are used to create interactive web pages, can be programmed to have har mful effects.
Script Contr ol Y ou can see the rules created so far listed in the table. Important The rules are listed in order of their priority starting fr om the top, meaning the first rule has the highest priority . Drag&drop rules in order to change their priority .
Select A ddress and Action Y ou can set the parameters: ⚫ Domain address - type in the domain on which the rule should apply . ⚫ Action - select the action of the rule. Description Action The scripts on that domain will execute. Allow The scripts on that domain will not ex ecute.
20. V ulnerability An important step in protecting your computer against malicious persons and applications is to k eep up to date the operating system and the applications you regularly use.
Important T o be automatically notified about system or application vulnerabilities, keep the Automatic V ulnerability Checking enabled. 20.1.1. F ixing V ulnerabilities Depending on the issue, to fix a specific vulnerability pr oceed as follows: ⚫ If Windows updates are available, click Install in the Action column to install them.
Automatic V ulnerability Checking Settings Select the check box es corr esponding to the system vulnerabilities you want to be regularly check ed. ⚫ Critical Windows Updates ⚫ Regular Windows Upda.
21. Instant Messaging (IM) Encryption By default, BitDefender encrypts all your instant messaging chat sessions provided that: ⚫ Y our chat partner has a BitDefender version installed that supports IM Encryption and IM Encryption is enabled for the instant messaging application used for chatting.
Instant Messaging Encryption By default, IM Encryption is enabled for both Y ahoo Messenger and Windows Live (MSN) Messenger . Y ou can choose to disable IM Encryption for a specific chat application only or completely .
1. Click the Add button to open the configuration window . Adding Contacts 2. T ype in the edit field the user ID of your contact. 3. Select the instant messaging application associated with the contact.
22. Game / Laptop Mode The Game / Laptop Mode module allows you to configure the special operation modes of BitDefender: ⚫ Game Mode temporarily modifies the product settings so as to minimize the resour ce consumption when you play .
Game Mode At the top of the section, you can see the status of the Game Mode. Y ou can click T urn On Game Mode Mode or T urn Off Game Mode to change the curr ent status. 22.1.1. Configuring Automatic Game Mode Automatic Game Mode allows BitDefender to automatically enter Game Mode when a game is detected.
Note If you do not want BitDefender to automatically enter Game Mode, clear the Automatic Game Mode check box. 22.1.2. Managing the Game List BitDefender automatically enters Game Mode when you start an application fr om the game list. T o view and manage the game list, click Manage Games .
Adding or Editing Games When you add or edit an entry from the game list, the following window will appear: Add Game Click Browse to select the application or type the full path to the application in the edit field. If you do not want to automatically enter Game Mode when the selected application is started, select Disable .
Advanced Settings 2. Under the Use HotKey option, set the desired hotk ey : ⚫ Choose the modifier k eys you want to use by checking one the following: Control k ey ( Ctrl ), Shift k ey ( Shift ) or Alternate k ey ( Alt ). ⚫ In the edit field, type the letter corresponding to the regular k ey you want to use.
Laptop Mode Y ou can see whether Laptop Mode is enabled or not. If Laptop Mode is enabled, BitDefender will apply the configur ed settings while the laptop is running on battery .
23. Home Network The Network module allows you to manage the BitDefender products installed on your home computers from a single computer . Network Map T o be able to manage the BitDefender products installed on your home computers, you must follow these steps: 1.
Configure P assword 2. T ype the same password in each of the edit fields. 3. Click OK . Y ou can see the computer name appearing in the network map. 23.
Add Computer Y ou can see the list of computers in the network. The icon meaning is as follows: ⚫ Indicates an online computer with no BitDefender products installed. ⚫ Indicates an online computer with BitDefender installed. ⚫ Indicates an offline computer with BitDefender installed.
Authenticate 5. T ype the home management password configured on the respective computer . 6. Click OK . If you have provided the correct password, the selected computer name will appear in the network map. Note Y ou can add up to five computers to the network map.
Network Map If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, BitDefender registration status). If you click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer .
⚫ Fix all issues on this PC Allows you to fix the issues that are affecting the security of this computer by following the F ix All Issues wizard. ⚫ View History/Events Allows you access to the History&Events module of the BitDefender product installed on this computer .
24. Update New malware is found and identified every day . This is why it is very important to k eep BitDefender up to date with the latest malware signatures. If you are connected to the Internet thr ough broadband or DSL, BitDefender tak es care of this itself .
Automatic Update Here you can see when the last check for updates and the last update were performed, as well as information about the last update performed (if successful or the errors that occurred). Also, information about the current engine version and the number of signatures is displayed.
The Update module will connect to the BitDefender update server and will verif y if any update is available. If an update was detected, depending on the options set in the Manual Update Settings section, you will be asked to confirm the update or the update will be made automatically .
Update Settings The update settings are grouped into 4 categories ( Update Location Settings , Automatic Update Settings , Manual Update Settings and Advanced Settings ). Each category will be described separately . 24.2.1. Setting Update Locations T o set the update locations, use the options from the Update Location Settings category .
Note W e recommend you to set as primary update location the local mirr or and to leave the alternate update location unchanged, as a fail-safe plan in case the local mirr or becomes unavailable. In case the company uses a pro xy server to connect to the Internet, check Use proxy and then click Proxy Settings to configure the pro xy settings.
Note If BitDefender is updated while a scan is in progress, the scan process will be aborted. ⚫ Don't update if game mode is on - BitDefender will not update if the game mode is tur ned on. In this way, you can minimize the product’s influence on system performance during games.
on to that account. If the pr oxy server r equires a user name and a password, you must specif y them in the corr esponding fields. ⚫ Default Browser Proxy - pr o xy settings of the cur rent user, extracted from the default browser . If the pro xy server requires a username and a password, you must specif y them in the corr esponding fields.
25. R egistration T o find complete information on your BitDefender product and the registration status, go to Registration in Expert Mode. R egistration This section displays: ⚫ Product Information : the BitDefender product and version.
R egistration Y ou can see the BitDefender registration status, the curr ent license key and how many days are left until the license expires. T o register BitDefender Antivirus 2010: 1. T ype the license key in the edit field. Note Y ou can find your license key : ⚫ on the CD label.
Important Y ou must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update. If you have not yet cr eated a BitDefender account, click Activate Product to open the account registration window .
⚫ P assword - type in a passwor d for your BitDefender account. The password must be between 6 and 16 characters long. ⚫ Re-type password - type in again the pr eviously specified passwor d. Note Once the account is activated, you can use the provided e-mail address and password to log in to your account at http://myaccount.
4. Click Sign in . 5. Click Finish to complete the wizard. R egistration 194 BitDefender Antivirus 2010.
Integration into Windows and Third-P arty Sof twar e 195 BitDefender Antivirus 2010.
26. Integration into W indows Contextual Menu The W indows contextual menu appears whenever you right-click a file or folder on your computer or objects on your desktop. Windows Contextual Menu BitDefender integrates into the Windows contextual menu to help you easily scan files for viruses.
5. Click Custom and configure the scanning options as needed. T o find out what an option does, k eep the mouse over it and r ead the description displayed at the bottom of the window . 6. Click OK to save the changes. 7. Click OK to confirm and apply the new scanning options.
27. Integration into W eb Browsers BitDefender protects you against phishing attempts when you are surfing the Internet. It scans the accessed web sites and alerts you if there are any phishing threats. A White List of web sites that will not be scanned by BitDefender can be configured.
▸ Ask before adding to whitelist - prompts you befor e adding a web site to the White List. ⚫ Add to White List - adds the curr ent web site to the White List. Note Adding a site to the White List means that BitDefender will not scan the site for phishing attempts anymore.
⚫ Help - opens the help file. ⚫ About - opens a window where you can see information about BitDefender and where to look for help in case something unexpected appears.
28. Integration into Instant Messenger Pr ograms BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations through Y ahoo Messenger and MSN Messenger .
How T o 202 BitDefender Antivirus 2010.
29. How to Scan F iles and F olders Scanning is easy and flexible with BitDefender . There ar e 4 ways to set BitDefender to scan files and folders for viruses and other malwar e: ⚫ Using W indows C.
R unning Scan T asks in Intermediate Mode In Inter mediate Mode, you can run a number of pre-configur ed scan tasks. Y ou can also configure and run custom scan tasks to scan specific locations on your computer using custom scanning options. Follow these steps to run a scan task in Intermediate Mode: 1.
2. Click the Virus Scan tab. Here you can find a number of default scan tasks and you can create your own scan tasks. These ar e the default scan tasks that you can use: Description Default T ask Scans the entire system.
5. Click Continue to start the scan. 6. F ollow the Antivirus Scan wizard to complete the scan. What is Safe Mode? Safe Mode is a special way to start W indows, used mainly to troubleshoot problems affecting normal operation of Windows. Such problems range from conflicting drivers to viruses preventing Windows from starting normally .
30. How to Schedule Computer Scan Scanning your computer periodically is a best practice to k eep your computer free from malware. BitDefender allows you to schedule scan tasks so that you can automatically scan your computer . T o schedule BitDefender to scan your computer, follow these steps: 1.
4. Right-click the desir ed scan task and select Schedule . A new window will appear . 5. Schedule the task to run as needed: ⚫ T o run the scan task one-time only, select Once and specify the start date and time. ⚫ T o run the scan task after the system startup, select On system startup .
T r oubleshooting and Getting Help 209 BitDefender Antivirus 2010.
.
Description&Solution Err or 2. R un the uninstall tool using administrator privileges. 3. R estart your computer . 4. Start the setup wizard again to install BitDefender . Y ou ar e trying to install BitDefender on an unsupported operating system.
1. Clean up the system after the failed installation. If the installation fails, some BitDefender registry keys and files may remain in your system. Such remainders may prevent a new installation of BitDefender . They may also affect system perfor mance and stability .
⚫ temporary communication errors between the BitDefender services. ⚫ some of the BitDefender services are stopped. ⚫ other security solutions running on your computer at the same time with BitDefender . ⚫ viruses on your system affect the normal operation of BitDefender .
If this information was not helpful, you can contact BitDefender for support as described in section “ Support ” (p. 215) . T roubleshooting 214 BitDefender Antivirus 2010.
32. Support As a valued provider, BitDefender strives to provide its customers with an unparalleled level of fast and accurate support. The BitDefender Knowledge Base provides you with articles that contain solutions to most of your problems and questions related to BitDefender .
32.3. Contact Infor mation Efficient communication is the k ey to a successful business. During the past 10 years BITDEFENDER has established an unquestionable reputation by constantly striving for better communication so as to exceed the expectations of our clients and partners.
Deutschland Office: +49 2301 91 84 222 Sales: vertrieb@bitdefender .de T echnical support: http://kb.bitdefender .de W eb: http://www .bitdefender .de UK and Ireland Business Centr e 10 Queen Street Newcastle, Staffor dshire ST5 1ED E-mail: info@bitdefender .
BitDefender R escue CD 218 BitDefender Antivirus 2010.
33. Overview BitDefender Antivirus 2010 comes with a bootable CD (BitDefender R escue CD) capable to scan and disinfect all e xisting har d drives before your operating system starts. Y ou should use BitDefender R escue CD any time your operating system is not working properly because of virus infections.
33.2. Included Sof tware BitDefender R escue CD includes the following softwar e packages. Xedit This is a text file editor . Vim This is a powerful text file editor, containing syntax highlighting, a GUI, and much mor e. F or mor e information, please refer to the V im homepage .
F or mor e information, please refer to the Nessus homepage . Iptraf Iptraf is an IP Network Monitoring Software. F or mor e information, please refer to the Iptraf homepage . Iftop Iftop displays bandwidth usage on an interface. F or mor e information, please refer to the Iftop homepage .
34. BitDefender R escue CD Howto This chapter contains information on how to start and stop the BitDefender R escue CD, scan your computer for malware as well as save data fr om your compromised Windows PC to a removable device.
The Desktop 34.2. Stop BitDefender R escue CD Choose "EXIT" Y ou can safely shut down your computer by selecting Exit from the BitDefender R escue CD contextual menu (right-click to open it) or by issuing the halt command in a terminal.
W ait for this message when shutting down 34.3. How do I perfor m an antivirus scan? A wizard will appear when the boot process has finished and allow you to full scan your computer . All you have to do is click the Start button. Note If your screen resolution isn't high enough, you will be asked to start scanning in text-mode.
1. Double click the ST AR T SCANNER icon on the Desktop. This will launch the BitDefender Scanner for Unices . 2. Click Scanner , a new window will appear . 3. Select the directory you wish to scan and click Open to start scanning using the same wizard that appeared when you first booted.
Description Connection Select this type of connection when you are using a local area network (L AN) to access the Inter net. It is also suitable for wir eless connections.
Update Signatur es 2. Do one of the following: ▸ Select Cumulative to install signatur es alr eady saved on your hard disk by browsing your computer and loading the cumulative.zip file. ▸ Select Update to immediately connect to the internet and download the latest virus signatures.
6. Pr ess F2 to save the curr ent file, confirm saving, and then press F10 to close it. 7. T ype the command: bdscan update . 34.6. How do I save my data? Let's assume that you cannot start your W indows PC due to some unknown issues. At the same time, you desperately need to access some important data fr om your computer .
Desktop Scr een 3. Double-click the partition where the data you want to save is located (e.g. [sda3] ). Note When working with BitDefender Rescue CD, you will deal with Linux-type partition names. So, [sda1] will probably correspond to the (C:) Windows-type partition, [sda3] to (F:) , and [sdb1] to the memory stick.
Saving Data 6. T ype /media/sdb1/ into the corr esponding te xtbox and click Copy . Please be awar e that depending on your computer configuration it might be sda1 instead of sdb1 .
Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsof t Internet Explorer to mak e interactive W eb pages that look and behave like computer programs, rather than static pages.
Internet Explor er . Both of these are graphical browsers, which means that they can display graphics as well as text. In addition, most modern browsers can present multimedia information, including sound and video, though they requir e plug-ins for some formats.
Filename extension The portion of a filename, following the final point, which indicates the kind of data stor ed in the file. Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS. They ar e usually from one to three letters (some sad old OSes support no more than thr ee).
exists on tapes or disks. Every computer comes with a certain amount of physical memory, usually referr ed to as main memory or RAM. Non-heuristic This method of scanning relies on specific virus signatures. The advantage of the non-heuristic scan is that it is not fooled by what might seem to be a virus, and does not generate false alar ms.
Report file A file that lists actions that have occurred. BitDefender maintains a report file listing the path scanned, the folders, the number of archives and files scanned, how many infected and suspicious files were found. Rootkit A rootkit is a set of software tools which offer administrator -level access to a system.
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il Softwin BitDefender Antivirus 2010 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del Softwin BitDefender Antivirus 2010 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso Softwin BitDefender Antivirus 2010 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul Softwin BitDefender Antivirus 2010 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il Softwin BitDefender Antivirus 2010, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del Softwin BitDefender Antivirus 2010.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il Softwin BitDefender Antivirus 2010. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo Softwin BitDefender Antivirus 2010 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.