3
.......................................................................................................... 23
7.1.1 File
.......................................................................................................... 23
7.1.2 Components
.......................................................................................................... 23
7.1.3 History
.......................................................................................................... 23
7.1.4 Tools
.......................................................................................................... 23
7.1.5 Help
.......................................................................................................... 26
7.2 Security Status Info
.......................................................................................................... 27
7.3 Quick Links
.......................................................................................................... 27
7.4 Components Overview
.......................................................................................................... 29
7.5 Statistics
.......................................................................................................... 29
7.6 System Tray Icon
........................................................................................................................ 30
8. AVG Components
.......................................................................................................... 30
8.1 Anti-Virus
.......................................................................................................... 30
8.1.1 Anti-Virus Principles
.......................................................................................................... 30
8.1.2 Anti-Virus Interface
.......................................................................................................... 32
8.2 Anti-Spyware
.......................................................................................................... 32
8.2.1 Anti-Spyware Principles
.......................................................................................................... 32
8.2.2 Anti-Spyware Interface
.......................................................................................................... 33
8.3 Anti-Rootkit
.......................................................................................................... 33
8.3.1 Anti-Rootkit Principles
.......................................................................................................... 33
8.3.2 Anti-Rootkit Interface
.......................................................................................................... 35
8.4 E-mail Scanner
.......................................................................................................... 35
8.4.1 E-mail Scanner Principles
.......................................................................................................... 35
8.4.2 E-mail Scanner Interface
.......................................................................................................... 35
8.4.3 E-mail Scanner Detection
.......................................................................................................... 39
8.5 License
.......................................................................................................... 40
8.6 Link Scanner
.......................................................................................................... 40
8.6.1 Link Scanner Principles
.......................................................................................................... 40
8.6.2 Link Scanner Interface
.......................................................................................................... 40
8.6.3 AVG Search-Shield
.......................................................................................................... 40
8.6.4 AVG Active Surf-Shield
.......................................................................................................... 43
8.7 Web Shield
.......................................................................................................... 43
8.7.1 Web Shield Principles
.......................................................................................................... 43
8.7.2 Web Shield Interface
.......................................................................................................... 43
8.7.3 Web Shield Detection
.......................................................................................................... 47
8.8 Resident Shield
.......................................................................................................... 47
8.8.1 Resident Shield Principles
.......................................................................................................... 47
8.8.2 Resident Shield Interface