Ad-Aware Antivirus Overview

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Ad-Aware Antivirus Overview"

Transcription

1 Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day Trial Upgrading Ad-Aware Ad-Aware Free Pro Trial Antivirus + Activation Closing the Identity Monitoring Notice Closing the Activation Notice Using Ad-Aware Antivirus Application Interface Menu Bar Quick Access Toolbar Status Bar Information on Problems Detected Main Screen Configuring Settings Real-Time Protection Shop & Bank Safely Online Protection Identity Protection Advanced Firewall Application Rules Ports Rules Network Rules Gateway Rules Trusted Zones External Storage Scan Safe Networking Safe browsing... 50

2 : Ad-Aware Antivirus & Antispyware About Scans Running a Scan Quarantined Items Reports Scheduling Scans Creating Ignore List Updating Definitions Performance Settings Ad-Aware Antivirus Settings General Gaming Mode Notifications and Balloons How To Activate Ad-Aware Antivirus Update Ad-Aware Antivirus Upgrade Ad-Aware Antivirus Send Feedback Get Support Access User Guide Uninstall Ad-Aware Antivirus Copyright

3 : Ad-Aware Ad-Aware Antivirus Overview What is Ad-Aware Antivirus? Welcome to Ad-Aware Antivirus! Ad-Aware Antivirus is a security solution that allows you to combat stealthy online threats and the latest advancements by cyber criminals. Ad-Aware Antivirus protects you from malware that secretly takes control of your computer, resulting in aggressive advertising pop-ups, sluggish computer activity and even identity theft through stolen private information. Ad-Aware Antivirus allows you to root out hazardous content on your system, clearly identify the threat level, and gives you the ability to remove or block harmful applications and processes, so that your private information remains right where it should under your control. With Ad-Aware Antivirus, you can keep an eye on your credit file activity and monitor a potential fraud Ad-Aware Antivirus provides complete malware protection against viruses, spyware, trojans, rootkits, blended malware, hijackers, keyloggers, and other potential cyber threats, giving you the power to protect your online security and privacy so that you can use the Internet how, when, and where you want. The latest version of Ad-Aware (Ad-Aware 10) is available in three versions: Ad-Aware Plus, Ad-Aware Personal Security and Ad-Aware Pro Security Please follow the guidelines set forth in this most recent edition of the Manual to facilitate the work with Ad-Aware Antivirus. 3

4 : Ad-Aware Ad-Aware Antivirus Features Ad-Aware Antivirus is an easy-to-use and effective anti-malware and anti-virus Lavasoft product comprising highclass technologies which give you unrivalled protection against various kinds of viruses and malware. Learn about the Ad-Aware Antivirus key features: Antivirus + Anti Spyware (Free, Personal, Pro) Provides comprehensive anti-virus and anti-spyware protection, including: protection against blended malware, trojans, worms, backdoors, rootkits, hijackers, and invasive software like password stealers, monitoring tools, keyloggers and other applications that transmit private or personally identifiable information. Real-Time Protection (Free, Personal, Pro) Constantly watches the vulnerable areas of the computer and reacts to suspicious activity in real time. Monitors changes, deletion and/or modification of files and also monitors the execution and loading of programs and DLLs. Gaming Mode (Free, Personal, Pro) Suspends the security alerts, system scans and auto-updates without compromising the security, allowing you to work or play with no interruptions or strain on system resources. Safe Online Shopping and Banking (web filtering) (Personal, Pro) Real-time phishing protection against cyber criminals out to steal your credit card data, your passwords and banking info. External Storage Scan (Pro) Checks additional hard disks, USB and network storage devices for complete system coverage. Advanced Firewall (Pro) Shields your PC from hackers, unauthorized access, and hijackings. 4

5 : Ad-Aware Protection (Pro) Protects against -borne threats by scanning both the content and the attachment of all incoming and outgoing s against potentially malicious content. Safe Networking (Pro) Effectively filters network traffic, prevents malicious behavior, protects running processes and filters web content. Safe Browsing (Free, Personal, Pro) Constantly checks sites against a constantly updated list of reported malware infected sites. The list is updated every 5-20 minutes and provides real-time browsing protection against the latest web-based exploits, from back door Trojans to exploits and phishing sites. Identity Protection (Pro) Helps protect your personal information by actively monitoring your credit report and alerting you when critical changes to your records are detected. 5

6 : Ad-Aware System Requirements Your computer must meet the following system requirements in order to run the application effectively: Note: This product should not be installed on any type of storage media that may be inaccessible at times. This includes network drives, removable drives, hot-swappable drives, USB drives, and FireWire (IEEE 1394) drives that may be disconnected. Supported Operating Systems: Windows XP SP2+ (32- & 64-bit) Windows 2003 Server SP1+ (32- & 64-bit) Windows Vista, Vista SP1+ (32- & 64-bit) Windows 7 (32- & 64-bit) Windows Server (32- & 64-bit) Note: Installation is not supported on Windows 95, 98, ME, NT 4, Win 2000, XP with SP1 or older, Macintosh or Linux computers. 1 GHZ Computer with 512 MB of RAM (memory) and 300 MB of available free space on your hard drive. Miscellaneous: Microsoft Internet Explorer 7.0 or higher Internet access for definitions updates (Broadband recommended) Supported Clients (applies to Protection): Outlook Outlook Express 5.0+ Windows Mail on Vista SMTP/POP3 (Thunderbird, IncrediMail, Eudora, etc.) Note: SSL and TLS are supported in Microsoft Outlook and Microsoft Outlook Express only. 6

7 : Ad-Aware Getting Started Ad-Aware Install Ad-Aware is a full-fledged antivirus. Before you install Ad-Aware, we recommend that you disable or uninstall other security-related programs. You install the application in less than ten steps. Time to get started! Step 1 To start the installation, locate and double-click the downloaded file. Step 2 When the File Download dialog box appears, click the Save button. Step 3 Once the download is complete, go to the downloaded path and double-click the installation file to launch a setup wizard. Step 4 Follow the prompts within the installer to complete the installation of Ad-Aware Antivirus. 1. First, choose your preferred language and click the option of your choice. 7

8 : Ad-Aware 2. With the dialog box displayed, choose the folder to install the Ad-Aware Antivirus application. The default destination folder is C:\Program Files\Ad-Aware Antivirus\ Note: To change the location, click the Change button. Select the Create a Desktop Shortcut check box if you want a program shortcut appear on your desktop. Once you have carefully read the Ad-Aware End User license agreement, make sure to select the I Accept this End-User License Agreement check box. To proceed to the next step, simply click the Next button to continue. 8

9 : Ad-Aware 9

10 : Ad-Aware 3. The Ad-Aware Security Toolbar is an additional download you can install for your browser. Just select the Install Ad-Aware Security Toolbar (recommended) option within the displayed dialog box. To proceed, click Next. 10

11 : Ad-Aware 4. You can see the progress of the Ad-Aware Antivirus installation process. 11

12 : Ad-Aware 5. Congratulations! The Ad-Aware Antivirus application has been successfully installed on your PC. 6. Click Finish to close the Ad-Aware Setup Wizard. 7. To complete the installation, you must restart your computer. With the dialog box displayed, accept the prompt. Click No if you want to restart later. Your computer restarts and Ad-Aware Antivirus is completely installed. 12

13 : Ad-Aware Using Ad-Aware Free 30 day Trial Once you have restarted your computer, you will notice that you now have a fully functional version of Ad-Aware Free. To start using your 30 days Free simply click on Start using Ad-Aware. After 30 days you will have to request a Free 1year license key by clicking on Info (top right) followed by Activate. 13

14 : Ad-Aware As you near the end of your 30-day trial, you will be prompted with the following notices: 2 day trial expiration notice: Once any of the above prompts are displayed, users can choose to preform one of the following actions: 1) Upgrade to Ad-Aware Pro 1, 2 or 3 year protection 2) Activate Ad-Aware Free Antivirus + 3) Close the prompt and continue enjoying Ad-Aware Free 30 day trial for the remainder of the trial period. 14

15 : Ad-Aware Upgrading Ad-Aware Clicking on the Upgrade Now link at the bottom left hand corner will lead you to Lavasoft s purchase page where you can choose the product, number of licenses and duration of the desired licenses you would like to purchase. Once this has been selected, all order information and license key activation information will be sent to your (check you junk, spam and bulk folder). Once you have received your license key you can activate your software by click on Info (top right hand corner) followed by Activate or you can simply click on the Activate Now at the bottom right you will be prompted with this screen where you can copy and paste the license key sent to you by . 15

16 : Ad-Aware 1) Copy and paste the license key you have received by into the designated field (as indicated above). 2) Click on the Activate button At this point, an activation status window will be displayed 16

17 : Ad-Aware If the activation is successful, Ad-Aware will display the following notice: If Ad-Aware s activation process has failed for whatever reason, the following notice will be displayed: If the process has failed, please select the Try Again option and follow the steps provided. Once Ad-Aware has successfully been activated, you will be able to continue enjoying all of its features. 17

18 : Ad-Aware Ad-Aware Free Pro Trial Antivirus + Activation If you have chosen to activate Ad-Aware Pro 30 day Free Trial than the following activation steps need to be taken in order to maintain your level of protection and to continue receiving definition and software updates: 1) Select the Info button at the top right hand side followed by Pro Trial. Once you have selected Pro Trial in the window above, the following activation window will be displayed: 18

19 : Ad-Aware 2) When the dialog box has been displayed, type your full name and address in the corresponding fields. Then make sure the check box for I have read and agree to Lavasoft Privacy Policy has been selected and click the Submit button to proceed. Note: If you want to receive our newsletter on relevant information about security threats as well as promotional offers from Lavasoft, select the Yes, sign-me to the Lavasoft newsletter check box. 3) Once you have completed submitting the registration form, an with your activation key will be sent to the address (check your junk, spam and bulk folders) In addition, you are presented with an option to change your address or resend an to the address you have indicated in the previous step. If you would like to resubmit new information, simply click on the link of your choice in the window displayed. 4) Once this is done, copy and paste the activation key you have received to your and paste it into the Paste Your Activation Key field (indicated above). Then proceed by clicking the Activate button. If you want to postpone activation, click Do it later. Once Ad-Aware Free Antivirus + has been successfully activated, the following window will be displayed: 19

20 : Ad-Aware At which point, your computer will be protected and you ll be able to continue enjoying all of Ad-Aware 10 Free Pro Antivirus + features and protection. If Ad-Aware Free Antivirus + returns a failed registration message than please select the Try Again option. 20

21 : Ad-Aware Closing the Identity Monitoring Notice Clicking on the X will close the window and will allow you to continue using Ad-Aware Pro, this window will appear once you start Ad-Aware again. To avoid being prompted for Identity Monitoring you can click on the no thanks in blue on the bottom left hand corner. To activate Identity Monitoring simply click on Activate Now in yellow on the bottom right hand corner. You can also activate Identity Monitoring from the quick access toolbar by clicking Activate. Closing the Activation Notice Closing the Activation notice (action 3) will simply close the window and allow you to continue using Ad-Aware Free for the remainder of your 30 day trial. Once the 30 days has expired, Ad-Aware will no longer update the definitions until you request a Free 1 year license key. Open your Ad-Aware Free software; on the home screen at the top right you will see 3 icons Home, Info and Options, click on Info followed by Pro trial. An with a 1 year Free key will be ed to you (always check your junk, spam and bulk folders). 21

22 : Ad-Aware Using Ad-Aware Antivirus Application Interface The Ad-Aware Antivirus application interface includes the following elements: Menu Bar Quick Access Toolbar Status Bar Main Screen Menu Bar The menu bar's purpose is to supply a common housing for the application menus (Home, Info, and Options) which provide access to the following functions: Home Info referring to the main screen activating the application activating the Free Pro Trial sending a feedback getting support opening the application user guide displaying the application information Options setting the application 22

23 : Ad-Aware Quick Access Toolbar The Quick Access Toolbar displays a selection of the more commonly used commands in Ad-Aware Antivirus in the top right-hand corner of the application: Scan View Quarantine Modify Protection Settings Update Definitions Status Bar The Status Bar reports the protection status of your PC based on how frequently the PC is scanned and how often malware definitions are updated. To easily and visually comprehend Ad-Aware s monitoring of your computer s security, the status bar changes colors reflecting the state of your computer s security. The following is an explanation of each computer status: Protected (Green) indicates the following: No threats are found. Threats found during a scan performed no later than three (3) days ago are cleaned. The Real-Time Protection and the Definitions are downloaded and up to date. The Protection and Advanced Firewall features are enabled. (Pro) At risk (Orange) indicates the following: 23

24 : Ad-Aware Thread Definitions are unavailable or out of date. (Free) System scan date is too old or has been never performed. (Free) The Real-Time Protection feature is disabled. (Free) The Protection and Advanced Firewall features are disables. (Pro) To get detailed information, click Get more information or anywhere in the status bar. You can see the Problems Information dialog appear. Threats detected (Red) indicates that a scan has detected threats which are not removed yet. To see information on threats found, click the Show link. You can see the Scan History Report tab open. To get detailed information, click anywhere in the status bar. Doing so will prompt the Problems Information dialog box to appear. Information on Problems Detected The Problem Information screen is displayed to you each time the Status Bar is clicked on. Once the dialog box is displayed, you ll be able to see a list of detected problems. Three tabs are available: Current Problems, Ignored List, and Automatic List. 24

25 : Ad-Aware Current Problems Tab Selecting this tab will cause all the listed items within to be selected by default. If you do not want to apply any action to a problem, clear the corresponding check box. You can perform one of the following actions on the selected item(s): Fix Later, Fix All Now, or Cancel. Click the Cancel button to close the dialog. Click the Fix Later button to close the dialog box. Doing so will change the computer s status to Protected and you will not be reminded about these detected issues until the next time Ad-Aware is restarted. Click the Fix All Now button to start fixing the problems immediately. In addition, you can apply one of the following options to an item selected in the list: Fix this problem now (recommended), Always fix this problem automatically, Remind me later, or Ignore (not recommended). To set an option, point to the icon and then select the desired option within the displayed pop-up: If you select Fix this problem now (recommended), the problem is fixed by clicking the Fix All Now button. If you select Always fix this problem automatically, the item changes its icon to Problems list to the Automatic List. and moves from the Current If you select Remind me later, the problem check box will be cleared and you will be reminded about the problem the next time Ad-Aware is launched. If you select Ignore (not recommended), the problem check box is cleared. The item then changes its icon to and moves from the Current Problems list to the Ignored List. 25

26 : Ad-Aware Ignored List Tab When this tab is displayed, all the items are deselected by default. If you want to apply any action to a problem, select the corresponding check box. You can remove selected item(s) from the list or cancel the action. Click the Cancel button to close this dialog box. Click the Remove from Ignored List to return selected item(s) to the Current Problems list. 26

27 : Ad-Aware Automatic List Tab With the tab displayed, all the items are deselected by default. If you want to apply any action to a problem, select the corresponding check box. You can remove selected item(s) from the list or cancel the action. Click the Cancel button to close the dialog box. Click the Remove from Automatic List to return selected item(s) to the Current Problems list. 27

28 : Ad-Aware Main Screen In the main screen you can see: Basic Protection section (1), Advanced Protection section (2), Product Support section (3), Malware Removal section (4), Scan Now button (5), and Program Info section (6). To get to the main screen of the Ad-Aware Antivirus application: on the menu bar, click Home or on the breadcrumbs, click Main Configuring Settings You can set and configure all of the Ad-Aware Antivirus application features from one location the Protection Settings screen. Please perform one of the following actions to access the Protection Settings screen: or On the main screen, click the icon next to the feature you want to configure, or click the icon. On the quick access toolbar, click Modify. Note: Clicking Modify refers you to the last feature tab you have visited. 28

29 : Ad-Aware Real-Time Protection The Real-Time Protection feature provides automatic protection which monitors computer systems for suspicious activity such as malicious objects in real-time. When working on your computer, Real-Time Protection runs in the background without causing noticeable strain to your computer system. Warning: If Real-Time Protection is turned on, ensure that no other real-time protection software is running. Running another software which also has real time protection simultaneously with that of Ad-Aware s will cause the two programs to conflict which may adversely affect your system performance. To set and configure the Real-Time Protection feature, proceed through the steps listed below: 1. On the main screen, click the icon next to the Real-Time Protection feature, or click the icon. The Real- Time Protection tab opens. 2. Select the Enable check box to enable Real-Time Protection. 3. With the Suspicious Programs drop-down combo box, select an action you want to apply to a suspicious program detected: Allow, Block, Quarantine, or Prompt User. You can allow suspicious programs if you are aware of the program and know that the program is trusted one. You can block or quarantine, or both known risks. You can work with quarantined items at a later time. Do not select these actions to not be bothered by notifications. Known risks continue to be automatically quarantined. You can open Real-Time Protection Reports periodically to view a log of what Real-Time Protection has detected. You can be prompted when accessing a file which can potentially harm your computer. This means a file is scanned automatically when it is accessed. 4. Select the required check box(es) which correspond to the item(s) being monitored via Real-Time Protection. 5. Click Restore Defaults to reset settings to their default values. 29

30 : Ad-Aware Shop & Bank Safely Online The Shop & Bank Safely Online feature allows you to prevent malicious objects when you browse the Internet. You can inspect the whole HTTP traffic and block potential malware and suspicious activities. To set and configure the Shop & Bank Safely Online feature, proceed through the steps listed below: 1. On the main screen, click the icon next to the Shop & Bank Safely Online feature, or click the icon. The Shop & Bank Safely Online tab opens. 2. Select the Enable check box to enable the Shop & Bank Safely Online feature. 3. Select the Enable Bad Site Blocking check box to turn on the option of blocking web sites which may harm your computer. 30

31 : Ad-Aware Protection The Protection feature allows you to shield from malware, spam, viruses and phishing attempts filtering both inbound and outbound messages. Once Protection is on, your is automatically scanned behind the scenes. To set and configure the Protection feature, proceed through the steps listed below: 1. On the main screen, click the icon next to the Protection feature, or click the icon. The Protection tab opens. 2. Select the Enable check box to scan all incoming and outgoing s. 3. From the program list, select the corresponding check box to specify an client you use. 4. Select the Enable Anti-Phishing check box to enable anti-phishing. Once the feature is on, any you receive is being protected from the phishing scam. The application strips the known bad URL link from the Select the Quarantine a copy of original check box to save an original copy of the to the quarantine folder. You can open Protection Reports periodically to view a log of what Protection has detected. 6. Click Restore Defaults to reset settings to their default values. 31

32 : Ad-Aware Identity Protection *US Citizens only* Identity Monitoring helps you protect personal information by actively monitoring your credit report and alerting you when critical changes to your records are detected. To activate the Identity Monitoring feature click on Activate on the Quick Access Toolbar to access the screen below. You can simply register yourself to enable to Identity Protection. 32

33 : Ad-Aware If you already have an Identity Monitoring account you can click on If you have previously activated Identity Monitoring, click here to re-activate. You will be prompted with the screen below where you will have to input your , zip code and the last 4 digits of you SSN (social security number) and click Re-Activate. If you would like Ad-Aware to remember your Identity Monitoring credentials simple check the check box Remember me on this computer. 33

34 : Ad-Aware Advanced Firewall Our two-way firewall complements and enhances the protection offered by your typical router and provides more robust security by monitoring which applications are attempting to send data out (outgoing traffic). To set the Advanced Firewall feature and configure its general settings, proceed through the steps listed below: 1. On the main screen, click the icon next to the Advanced Firewall feature, or click the icon. The Advanced Firewall (General) tab opens. 2. Select the Enable check box to enable the firewall. 3. Set the additional features by selecting the required check box: Enable Intrusion Detection System (IDS) Log packets going to unopened ports Enable Boot Time Protection 4. Click the Stop All Traffic button to block the HTTP traffic on your PC. Click Resume All Traffic to allow filtering incoming and outgoing traffic based on the firewall settings. 5. Click Reset to Defaults to reset your firewall to the recommended settings. With the dialog displayed, select a mode radio button to reset the firewall settings to. In addition, you can select Delete all user defined firewall rules to reset all personal firewall rules to default. 34

35 : Ad-Aware Note: Simple Mode is recommended for most users who simply want basic firewall protection. All you need to do is keeping the firewall enabled in the Simple Mode which is default. Once the Simple Mode is enabled, the firewall allows the outgoing traffic and blocks any incoming traffic. In addition, you can still make changes and create rules, as needed. Learning Mode, which better suit more experienced users, frequently prompts you to take an action on activity by applications and for certain Operating System actions. By creating or modifying a rule, you can remember any action to the prompts and further apply it to this activity. Learning Mode implies an advanced setting. If you are not well experienced working with firewalls, set the firewall to the Simple Mode. To configure the Advanced Firewall settings, visit the other tabs of the Advanced Firewall screen: Application Rules Ports Rules Network Rules Gateway Rules Zones 35

36 : Ad-Aware Application Rules Use the Application Rules tab to create an application rule to allow/block traffic for that application. The rule can be configured to specify a program. You can Edit or Delete a rule you have Added. To edit or delete a rule, first, you need select it in the list. Note: You are allowed to edit default rules, not delete them. To add an application rule, proceed through the steps listed below: 1. On the Application Rules tab, click the Add button. 2. With the dialog displayed, indicate the application s path and set an action (Allow, Block, or Ask) to be applied on the following zones: Trusted Inbound, Trusted Outbound, Untrusted Inbound, and Untrusted Outbound. 36

37 : Ad-Aware 3. Once you are done, click Ok. To edit an application rule, proceed through the steps listed below: 1. On the Application Rules tab, click the Edit button. 2. With the dialog displayed, modify the following settings as needed: Application s path Actions (Allow, Block, or Ask) to be applied on the following zones: Trusted Inbound, Trusted Outbound, Untrusted Inbound, and Untrusted Outbound. 37

38 : Ad-Aware 3. Once you are done, click Ok. To delete an application rule, select it from the list and click the Delete button. 38

39 : Ad-Aware Ports Rules Use the Ports Rules tab to create a port rule and configure it for opening/closing a port. You can perform the following actions to a rule: Add, Edit, or Delete. To act on a rule, first, you need select it in the list. To add a port rule, proceed through the steps listed below: 1. On the Ports Rules tab, click the Add button. The Add a Port Rule dialog displays: 39

40 : Ad-Aware 2. Type a Name for the port rule. 3. Type manually the Application, or click Browse to locate the application. 4. Select a Port Number from the drop-down list box. 5. Select a Protocol from the drop-down list box. 6. From the drop-down combo box, select an action (Allow, Block, or Ask) for the rule. 7. From the drop-down combo box, select a direction (Both, In, or Out) for the rule. 8. Once you are done, click Ok. To edit a port rule, proceed through the steps listed below: 1. On the Ports Rules tab, click the Add button. 2. With the dialog displayed, make the needed modifications. Note: The dialog fields vary for Port and Advanced rules. If you want to edit an Advanced rule, go to Advanced rule. 3. Once you are done, click Ok. To delete a port rule, select it from the list and click the Delete button. In addition, you can add an Advanced rule. Advanced rules apply to a specific application and include one or a combination of protocol, local and remote ports, and direction of traffic. Adding the advanced rules, you specify an action for the Firewall to be taken for network activity that matches the advanced rule. To add an Advanced rule, proceed through the steps listed below: 1. On the Ports Rules tab, click the Add Advanced button. The Add an Advanced Rule dialog displays: 40

41 : Ad-Aware 2. Type a Rule Name for the advanced exception. 3. Type manually the Application, or click Browse to locate the application. 4. From the drop-down combo box, select an action (Allow, Block, or Ask) for the rule. 5. From the drop-down combo box, select a direction (Both, In, or Out) for the rule. 6. Under For Protocols, click Add. With the Add a Port dialog box displayed, select a port from the dropdown combo box: ICMP, IGMP, TCP, or UDP. 7. Enter one or more Local or Remote Ports. Under For Local Ports or For Remote Ports or both, click Add. The Add a Port dialog box displays where you can enter a single port (Beginning Port) or a port range. Under the Beginning Port area, select a port from the drop-down combo box. Once you are done, you can see a port number displayed in the Port Number field and its description displayed in the Description field. You can also manually type the port number. To enter a port range, under the Ending Port area, select a port from the drop-down combo box. Once you are done, you can see a port number displayed in the Port Number field and its description displayed in the Description field. 41

42 : Ad-Aware Once completed, click OK. Your changes are saved and the Add a Port dialog box closes. You are referred back to the Add an Advanced Rule dialog box, where the port or port range is displayed. As a result, with an allowed action, this port range is allowed past the firewall. 8. Click OK to add your advanced rule. The Add an Advanced Rule dialog box closes. The newly created advanced rule displays in the table on the Ports Rules tab. To delete an advanced rule, select it from the list on the Ports Rules tab and click the Delete button. 42

43 : Ad-Aware Network Rules Use the Network Rules tab to configure existing network rules to tell firewall what action to take for a network activity that matches the network rule. To edit a rule, first, select it in the list and then click Edit. With the dialog displayed, select an action (Allow, Block, or Ask) to be applied on the following zones: Trusted Inbound, Trusted Outbound, Untrusted Inbound, and Untrusted Outbound. Once you are done, click Ok. 43

44 : Ad-Aware Gateway Rules Use the Gateway Rules tab to create a gateway rule to ignore a specified MAC addresses by the firewall. The rule can be configured to specify a gateway. You can Edit or Delete a rule you have Added. To edit or delete a rule, first, you need select it in the list. To add a gateway rule, proceed through the steps listed below: 1. On the Gateway Rules tab, click the Add button. The Add a Gateway dialog displays: 2. Type a descriptive Name for a gateway rule. 44

45 : Ad-Aware 3. Type a Description for a gateway rule. 4. Type MAC Address. 5. Once you are done, click Ok. To edit a gateway rule, on the Gateway Rules tab, click the Edit button. With the Edit a Gateway dialog displayed, modify settings, as needed, and then click Ok. To delete a gateway rule, select it from the list on the Gateway Rules tab, and then click the Delete button. 45

46 : Ad-Aware Trusted Zones Use the Zones tab to add or edit, or both a trusted zone. A trusted zone is typically a home, or work network, or a specific computer, or a range of IP address. To add a network zone, proceed through the steps listed below: 1. On the Zones tab, click the Add button. The Add a Network Zone dialog displays: 2. Specify a Zone (Trusted, Untrusted) form the drop-down combo box. 3. Type a descriptive Name. 4. Select an Adapter form the drop-down combo box. 46

47 : Ad-Aware Note: Ad-Aware Antivirus automatically scans your network adapters. They are displayed in this drop-down combo box. You can select Any which applies to any adapter your computer encounters. 5. Under Address Type, select one of the following options: IP address Address range Network 6. Type IP Address. 7. Once you are done, click Ok. To edit a network zone, on the Zones tab, select a zone in the list, and then click the Edit button. With the Edit a Network Zone dialog displayed, modify settings, as needed, and then click Ok. To delete a network zone, select it from the list on the Gateway Rules tab, and then click the Delete button. 47

48 : Ad-Aware External Storage Scan The External Storage Scan feature allows you to shield from malware, spam, viruses and phishing attempts filtering both inbound and outbound messages. Once Protection is on, your is automatically scanned behind the scenes. To set the External Storage Scan feature, proceed through the steps listed below: 1. On the main screen, click the icon next to the External Storage Scan feature, or click the icon. The External Storage Scan tab opens. 2. Select the Enable check box to scan an external storage drive. 48

49 : Ad-Aware Safe Networking Safe Networking is a security feature that monitors the system activities for malicious activity. Its main function is to identify malicious activity, log information about activity, attempt to block activity, and report activity. The Safe Networking feature allows you to protect your system against targeted attacks and keep your system patched as quickly as new vulnerabilities are identified. To set the Safe Networking feature, proceed through the steps listed below: 1. On the main screen, click the icon next to the Safe Networking feature, or click the icon. The Safe Networking tab opens. 2. Select the Enable check box to protect processes against risky actions. 49

50 : Ad-Aware Safe browsing The Safe Browsing feature protects you while you browse the web. Every URL is carefully scanned in real-time against a constantly updated list of suspected malware and phishing sites. If you click on a dangerous link while browsing the web or while reading an , Ad-Aware Safe Browsing will immediately warn you of the site's risk status, this is a security feature that scans for known bad URL s and websites. This is a great way to protect yourself from the newest malware being distributed. The Safe Browsing module constantly checks sites against a constantly updated list of reported malware infected sites. The list is updated every 5-20 minutes and provides real-time browsing protection against the latest web-based exploits, from back door Trojans to exploits and phishing sites. To set the Safe Browsing feature, proceed through the steps listed below: On the main screen, click the icon next to the Safe Networking feature, or click the icon. The Safe Browsing tab opens. 2. Select the Enable Safe Browsing mode to protect against bad URL s and websites. 50

51 : Ad-Aware Antivirus & Antispyware About Scans Scanning is considered to be a process of reading drives on your PC to detect threats with further quarantining or removing those treats. You can specify areas or files or both to be scanned on your computer manually or automatically. The following scopes of a scan process are supported by the Ad-Aware Antivirus application: Quick Scan A Quick Scan is the fastest and easiest way to scan commonly affected areas of your computer. It saves your time in detecting active malware by taking just a fraction of the system resources needed by a regular virus scan. Full Scan A Full Scan performs a thorough scan process on your computer checking all its areas. Custom Scan A Custom Scan is a network audit based on parameters, which you configure: running processes, registry files, cookies, and particular drives and folders, etc. You can run: Running a Scan quick scan full scan custom scan right-click scan To perform a Quick Scan, proceed through the steps listed below: 1. On the main screen, click Scan Now, or click the icon next to the Antivirus &Antispyware feature, or click the icon. Alternatively, on the Quick Access Toolbar, click Scan. 2. With the scan screen displayed, click the Quick Scan tab. 3. Click Scan. To perform a Full Scan, proceed through the steps listed below: 1. On the main screen, click Scan Now, or click the icon next to the Antivirus &Antispyware feature, or click the icon. Alternatively, on the Quick Access Toolbar, click Scan. 2. With the scan screen displayed, click the Full Scan tab. 3. Click Scan. To perform a Custom Scan, proceed through the steps listed below: 51

52 : Ad-Aware 1. On the main screen, click Scan Now, or click the icon next to the Antivirus &Antispyware feature, or click the icon. Alternatively, on the Quick Access Toolbar, click Scan. 2. With the scan screen displayed, click the Custom Scan tab. Afterwards, select scan option and paths, as needed. Note: Once you select a drives and folders to scan option, you can specify drives and folders to be scanned with the box displayed. 3. Click Scan. You can right-click one or more files or folders from Windows Explorer to run a scan. Your selected scan begins to run. A scan progress screen displays. You can view the progress of the scan, pause the scan by clicking the Pause button, or cancel it by clicking the Stop button. After the scan is performed, Ad-Aware Antivirus opens with your scan results. If risks are found, the Scan Results screen displays the detected risks under the Summary tab with the recommended clean actions (Quarantine, Ignore, Delete, and Disinfect). 52

53 : Ad-Aware To get more info on a risk detected, double-click it. The Threat Info dialog box displays: To apply an action to a treat, select the option of your choice from a column (Quarantine, Ignore, Delete, or Disinfect) next to this threat. To apply an action to all treats, select it from the drop-down combo box. Click the Clean button to start cleaning the risks based on the set action. Once the risks are cleaned, the Details screen displays the details and summary of the scan. Your computer is now clean of viruses and malware. 53

54 : Ad-Aware To see the details where the threat was found with the path double click and all threats found will be detailed. You can then choose to Quarantine, Ignore, Delete, and Disinfect. If the scan reveals no risks, the Detailed Report screen displays at once. 54

55 : Ad-Aware With the Detailed Report screen, you can perform the following by clicking the corresponding command button: View Reports; Scan Again to run the scan of the scope you have recently selected; New Scan to run the scan of a different scope. 55

56 : Ad-Aware Quarantined Items The Quarantine contains potentially harmful items detected by the Ad-Aware Antivirus application which you can further remove from your computer. It is a safe place for storing malware or infected files that could not be disinfected. You have an option to restore a quarantined item back to your computer in its original location as well as permanently remove the risks from Quarantine. To access the quarantined items, proceed through the steps listed below: 1. On the main screen, click Scan Now, or click the icon next to the Antivirus &Antispyware feature, or click the icon. Alternatively, on the Quick Access Toolbar, click Scan. 2. With the scan screen displayed, click the Quarantine tab. To restore a risk from the quarantine list, select the risk(s) and click the Restore button. To delete a quarantined item from your computer, select the risk you wish to delete and click Delete from Selected. The item is permanently removed from your computer. To get more info on a threat, double-click it. The Threat Info dialog-box displays: 56

57 : Ad-Aware 57

58 : Ad-Aware Reports Any action, which occurs in Ad-Aware Antivirus includes scan, Real-Time and Protection, is recorded as a history. You can view and delete the history. By default, the history is stored for 15 days. Within the 15 day period you can manually delete an action from the history. On the 16th day, the history is automatically deleted. The history is presented by the following reports: Scan History Reports Real-Time Protection Reports Protection Reports The Scan History Reports tab contains a list of scans you have run. You can delete a selected report from the history. Select a check box next to this report, and then click the Delete Selected button. To delete all reports from the history, click the Delete All button. If the history contains a report of the scan for which results no clean action has been applied, it is red highlighted. Click the report and then click the Clean button to start cleaning the risks. To view detailed information on a scan report, double click it. The Detailed Report dialog box displays: 58

59 : Ad-Aware The Real-Time Protection Reports and Protection Reports tabs contain a list of risk items detected by the Real-Time Protection and Protection features respectively. You can delete all items from the history both for Real-Time Protection Reports and Protection Reports by clicking the Delete All button. : 59

60 : Ad-Aware Scheduling Scans You can schedule the scan process to run it periodically. It is very useful to keep your computer free from malware on a regular basis. To access the Schedule screen and configure the schedule options, proceed through the steps listed below: 1. On the main screen, click Scan Now, or click the icon next to the Antivirus &Antispyware feature, or click the icon. Alternatively, on the Quick Access Toolbar, click Scan. 2. With the scan screen displayed, click the Schedule tab. The Schedule screen displays: 3. Select the Automatically scan my computer check box. With that, you can set one of the following options: Scan my computer on startup; Scan my computer with the following schedule. Setting the Scan my computer with the following schedule option enables you to specify the scheduling parameters listed below: Frequency period to scan computer (Daily, Weekly, and Monthly) Scan type (Quick, Full, and Custom) Scan time Click the Restore Defaults button to restore the default scheduling parameters. 60

61 : Ad-Aware Creating Ignore List Create your Ignore List of files if you do not want them to be detected while the scan process. To access the Ignore List screen, proceed through the steps listed below: 1. On the main screen, click Scan Now, or click the icon next to the Antivirus &Antispyware feature, or click the icon. Alternatively, on the Quick Access Toolbar, click Scan. 2. With the scan screen displayed, click the Ignore List tab. The Ignore List screen displays: 3. To add an item to the list, click Add. With the Open dialog box displayed, select the file you want to add to the ignore list, and then click Open. 4. To remove an item from the list, select it and click Remove. The item is excluded from the scanning process. 61

62 : Ad-Aware Updating Definitions Ad-Aware Antivirus continuously updates definitions to protect you from all sorts of malware. It's important to keep Ad-Aware Antivirus updated regularly. Please ensure that if you are using the Free 30 day trial to request your Free 1 year license key by going to the home screen of Ad-Aware at the top right clicking on Info followed by Pro Trial. An will be sent to you with the license key (always check your junk, spam and bulk folders). To enable the Definitions Update feature, proceed through the steps listed below: 1. On the main screen, click Scan Now, or click the icon next to the Antivirus &Antispyware feature, or click the icon. Alternatively, on the Quick Access Toolbar, click Scan. 2. With the scan screen displayed, click the Definitions Update tab. The Definitions Update screen displays: 3. Select the Enable check box to enable the automatic threat definition updates. In addition, you can specify the frequency period. Use the Check for new threats definitions every drop-down combo box to set the update frequency from 1 hour to 24 hours. 4. To update threat definitions manually, click Check for updates. 5. Click the Restore Defaults button to restore the default parameters. 62

63 : Ad-Aware Performance Settings The Ad-Aware Antivirus application allows you to specify the performance level for each type of the scan process. To access the Performance Settings screen, proceed through the steps listed below: 1. On the main screen, click Scan Now, or click the icon next to the Antivirus &Antispyware feature, or click the icon. Alternatively, on the Quick Access Toolbar, click Scan. 2. With the scan screen displayed, click the Performance Settings tab. The Performance Settings screen displays: 3. Move the slider up or down to set the required performance level for each scope of scan. 63

64 : Ad-Aware Ad-Aware Antivirus Settings You can set and configure all of the Ad-Aware Antivirus application settings from the following location the Options screen. To access the Options screen, on the menu bar, click Options. Here you can configure the following settings: General Update Gaming Mode Live Support General Start configuring application options from the General tab. You are referred to the General tab when accessing the Options screen. 1. Specify the application interface language from the drop-down combo box. 2. Set a Close Button action by selecting one of the following: Close Lavasoft Ad-Aware; Auto-hide to the System Tray. 3. Set a Minimize Button action by selecting one of the following: Minimize to the Taskbar; Auto-hide to the System Tray. Click Change License to activate the program. Click Renew License to upgrade the program. You can view the application current version, license and expiry date under the License and Activation area. 64

65 : Ad-Aware Gaming Mode If you do not want to receive any pop-up notifications about threats available, etc. while playing a game, activate the Gaming Mode. To enable the Gaming Mode, proceed through the steps listed below: 1. On the menu bar, click Options. With the screen displayed, click the Gaming Mode tab. 2. Select the Enable check box. Notifications and Balloons To keep you informed about the Ad-Aware Antivirus program s activity, notifications as well as balloons display for the following events: 1. Threats are detected. 2. The program is minimized to the tray or closed. 3. Real-Time Protection and Advanced Firewall features are disabled. 65

66 : Ad-Aware How To Activate Ad-Aware Antivirus You have two options to activate Ad-Aware Antivirus. You can activate your product once you have purchased the Ad-Aware Antivirus program (for more details, see here. If you have not yet activated Ad-Aware Antivirus, you can do so at any time by proceeding through the steps below: 1. On the menu bar, click Info, and then click Activate. 2. With the dialog box displayed, enter your activation key and then click the Activate button. Update Ad-Aware Antivirus To update the program, proceed through the steps listed below: 1. On the menu bar, click Options, and then click the Update tab. 2. Select the Enable check box to update for a new version of the program automatically. Note: If a new version of the application is available on our server, you are prompted to update the program. Accept the prompt and click Download Now. 3. Click Check for new version to ensure that you have the latest version of the program. If you have a previous version installed, you are prompted to update the application. Upgrade Ad-Aware Antivirus At Lavasoft, we believe that every computer user must have the power to control their individual privacy and security when they use the Internet. That is why we offer Ad-Aware Free, a proactive malware removal tool that allows users to combat today s toughest cyber threats. Ad-Aware Free features real-time anti-malware protection, rootkit protection, and community-driven initiatives to ensure that you have the power to protect yourself online. 66

67 : Ad-Aware Ad-Aware Personal Security is a paid upgrade of our Ad-Aware Free Antivirus+ version and builds upon the malware protection offered in our free product. Ad-Aware Personal Security adds a powerful web-filter that protects users against phishing attacks and online scams. Ad-Aware Pro Security is a paid upgrade of our Ad-Aware Free Antivirus+ version and provides a complete line-ofdefense against the most extreme forms of malware and cyber threats. It adds a powerful two-way firewall, an protection engine, safe online shopping and banking, advanced web protection as well as our most advanced detection and threat blocking algorithms. To take advantages of using the full functionality of the product, we propose to upgrade the program. All you have to do is buy an upgrade key from Lavasoft: On the General tab, click Renew License. or On the main screen, click Upgrade under the Program Info section. Ad-Aware Antivirus Upgrade Choices Ad-Aware Free Upgrade to Ad-Aware Personal Security Upgrade to Ad-Aware Pro Security Antivirus + Anti Spyware Real-Time Protection Gaming Mode Safe Browsing Identity Protection Safe Online Shopping + + and Banking External Storage + Scan Advanced Firewall + Protection + Identity Protection + Safe Networking + 67

68 : Ad-Aware Send Feedback To send a feedback, proceed through the steps listed below: 1. On the menu bar, click Info, and then click Feedback. 2. With the dialog displayed, type your Name and , and Write here your message. 3. Select the Send log files check box, if required. 4. Once you are done, click Send Feedback. Get Support To get a technical support assistance: On the menu bar, click Info, and then click Support. Or alternatively, proceed through the steps listed below: or 1. On the menu bar, click Options, and then click the Live Support tab. 2. With the Live Support screen displayed, click the Chat Now button. On the main screen, click anywhere in the Product Support section. Access User Guide To access a user guide: On the menu bar, click Info, and then click User Guide. Uninstall Ad-Aware Antivirus You have two options to uninstall Ad-Aware Antivirus successfully: OPTION 1 ADD/REMOVE PROGRAMS To uninstall Ad-Aware Antivirus, first make sure the application is closed. 1. Click the Start button on your computer (left-hand side of the screen). 2. Click Control Panel in the Start Menu. 3. Double-click Add or Remove Programs and find Ad-Aware Antivirus on the list of programs installed on the computer. Note: The programs installed are typically listed in an alphabetical order. 4. Click Ad-Aware Antivirus and then click Change. 5. With the dialog box displayed, click Next to proceed. 68

69 : Ad-Aware 6. On the next screen, select the Remove radio button, and then click Next. 7. Confirm your decision to remove the program form your system by clicking Remove. 69

70 : Ad-Aware 8. Specify the application uninstallation settings: select or deselect the required check box(es) as needed. Once you are done, click Next. 9. You can see the uninstalling process in progress. 70

71 : Ad-Aware 10. To complete the uninstalling process, click Finish. OPTION 2 AD-AWARE ANTIVIRUS UNINSTALL To uninstall Ad-Aware Antivirus first make sure the application is closed. 1. Click the Start button on your computer (left-hand side of the screen). 2. Click All Programs in the Start Menu. 71

Product Information. Ad-Aware Features. Welcome to Ad-Aware 11!

Product Information. Ad-Aware Features. Welcome to Ad-Aware 11! Table of Contents Product Information... 4 Ad-Aware Features... 4 System Requirements... 5 Copyright... 6 Installation and Uninstallation... 7 Ad-Aware Install... 7 Ad-Aware Uninstall...20 Ad-Aware Overview...24

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against

More information

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Keeping Windows 8.1 safe and secure

Keeping Windows 8.1 safe and secure Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

User Guide for Mac OS X

User Guide for Mac OS X User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

ESET SMART SECURITY 7

ESET SMART SECURITY 7 ESET SMART SECURITY 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET Smart Security

More information

www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved.

www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Internet Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

ESET SMART SECURITY 8

ESET SMART SECURITY 8 ESET SMART SECURITY 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET Smart Security

More information

All Rights Reserved. Copyright 2006

All Rights Reserved. Copyright 2006 All Rights Reserved Copyright 2006 The use, disclosure, modification, transfer, or transmittal of this work for any purpose, in any form, or by any means, without the written permission of the copyright

More information

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Pro Security

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Pro Security ABOUT LAVASOFT Company Overview Lavasoft is the original anti-malware company, creating award-winning, free security and privacy software since 1999. Born of the belief that online security should be available

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Bitdefender Total Security 2015 User's Guide

Bitdefender Total Security 2015 User's Guide USER'S GUIDE Bitdefender Total Security 2015 User's Guide Publication date 11/17/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

User Guide for the Identity Shield

User Guide for the Identity Shield User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and

More information

www.agnitum.com User Guide Copyright (ñ) 2007 Agnitum Ltd. All rights reserved.

www.agnitum.com User Guide Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. www.agnitum.com User Guide Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. Abstract This is the complete and detailed reference to the Outpost Security Suite Pro software. For an entry-level guide,

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Printed Documentation

Printed Documentation Printed Documentation Table of Contents K7AntiVirus Premium...1 K7AntiVirus Premium Help... 1 Feature Summary... 2 Online Help Conventions... 3 Managing the Alerts... 9 Configuring Alerts... 9 Backing

More information

Remote Drive PC Client software User Guide

Remote Drive PC Client software User Guide Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0.

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0. User Guide for the Essentials Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Essentials Edition

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Total Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Faronics Anti-Virus User Guide

Faronics Anti-Virus User Guide 1 2 Last modified: September, 2015 1999-2015 Faronics Corporation. All rights reserved. Faronics, Deep Freeze, Faronics Core Console, Faronics Anti-Executable, Faronics Anti-Virus, Faronics Device Filter,

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

VirtualXP Users Guide

VirtualXP Users Guide VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter

More information

www.agnitum.com User Guide Copyright 2010 Agnitum Ltd. All rights reserved.

www.agnitum.com User Guide Copyright 2010 Agnitum Ltd. All rights reserved. www.agnitum.com User Guide Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This is the complete and detailed reference to the Outpost Firewall Pro software. For an entry-level guide, please see

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

AVG AntiVirus Free Edition

AVG AntiVirus Free Edition AVG AntiVirus Free Edition User Manual Document revision AVG.06 (16.10.2015 ) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

Vodafone Text Centre User Guide for Microsoft Outlook

Vodafone Text Centre User Guide for Microsoft Outlook Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message

More information

BULLGUARD BAckUp GUIDE

BULLGUARD BAckUp GUIDE BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running

More information

Personal Firewall 3.0. Software Manual

Personal Firewall 3.0. Software Manual Personal Firewall 3.0 Software Manual T A B L E O F C O N T E N T S 1 Welcome to Lavasoft Personal Firewall! 1 1.1 System Requirements 1 1.2 Installing Lavasoft Personal Firewall 2 2 User Interface and

More information

Connecting Windows 7 to the network

Connecting Windows 7 to the network Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Kaspersky Endpoint Security 10 for Windows Administrator's Guide Kaspersky Endpoint Security 10 for Windows Administrator's Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product! We hope that you will find this documentation

More information

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should

More information

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010 OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010 What is Trend Micro OfficeScan? Trend Micro OfficeScan Corporate Edition protects campus networks from viruses, Trojans, worms, Web-based

More information

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets

More information

How to set up popular firewalls to work with Web CEO

How to set up popular firewalls to work with Web CEO How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Comodo LoginPro Software Version 1.5

Comodo LoginPro Software Version 1.5 Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated

More information

Acronis AntiVirus 2010 User's Guide

Acronis AntiVirus 2010 User's Guide User's Guide Acronis AntiVirus 2010 User's Guide Published 2010.02.02 Copyright 2010 Acronis Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Sophos Endpoint Security and Control Help

Sophos Endpoint Security and Control Help Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos

More information

Driver Updater Manual

Driver Updater Manual Driver Updater Manual Keep your drivers up-to-date! Improve your system performance and stability by keeping your drivers updated. Automatically find, update and fix the drivers on your computer and turn

More information

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products

More information

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera Faqs > Spam Monitor General Q1. What is Spam Monitor? Ans.: Spam Monitor is an easy-to-use spam filter that detects and isolates unsolicited junk mail sent to your mailbox. Designed for computer users,

More information

Comodo Antivirus for Linux Software Version 1.0

Comodo Antivirus for Linux Software Version 1.0 Comodo Antivirus for Linux Software Version 1.0 User Guide Guide Version 1.0.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus for

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

AVG Internet Security

AVG Internet Security AVG Internet Security User Manual Document revision AVG.07 (16.10.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Mercy s Remote Access Instructions

Mercy s Remote Access Instructions Mercy s Remote Access Instructions ~~~~~~~~~~~~~~ Section A Windows 2000 / XP ~~~~~~~~~~~~~~ I. Install Meditech............................... A1 II. Install VPN Client............................. A3

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

contents 1. ESET Smart Security...4 2. Installation...5 3. Beginner s guide...9 4. Work with ESET Smart Security...12

contents 1. ESET Smart Security...4 2. Installation...5 3. Beginner s guide...9 4. Work with ESET Smart Security...12 Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware ESET Personal Firewall ESET Antispam New generation of NOD32 technology User Guide we protect your digital worlds contents 1. ESET Smart

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files

More information

ESET NOD32 ANTIVIRUS 7

ESET NOD32 ANTIVIRUS 7 ESET NOD32 ANTIVIRUS 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information