background image

A V G  9  A nti V irus  © 2 0 1 0  C opyright A V G  T ec hnologies  C Z, s .r.o. A ll rights  res erved.

1 0 7

o

Fixed host

 - In this case, the program will always use the server

specified here. Please specify the address or name of your mail server.
The login name remains unchanged. For a name, you may use a domain
name (for example, pop.acme.com) as well as an IP address (for example,
123.45.67.89). If the mail server uses a non-standard port, you can
specify this port after the server name by using a colon as the delimiter
(for example, pop.acme.com:8200). The standard port for POP3
communication is 110.

·

Additional settings

 - specifies more detailed parameters:

o

Local port

 - specifies the port on which the communication from your

mail application should be expected. You must then specify in your mail
application this port as the port for POP3 communication.

o

Use APOP when available 

- this option provides more secure mail server

login. This makes sure that the 

E-mail Scanner

 uses an alternative

method of forwarding the user account password for login, sending the
password to the server not in an open, but in an encrypted format using
a variable chain received from the server. Naturally, this feature is
available only when the destination mail server supports it.

o

Connection

 - in the drop-down menu, you can specify which kind of

connection to use (regular/SSL/SSL default). If you choose SSL
connection, the data sent is encrypted without the risk of being traced
or monitored by a third party. This feature is also only available when the
destination mail server supports it.

·

E-mail client POP3 server settings

 - provides brief information on the

configuration settings required to correctly configure your e-mail client (so
that the  

E-mail Scanner

 will check all incoming mail). This is a summary

based on the corresponding parameters specified in this dialog and other
related dialogs.

·

E-mail client POP3 server activation 

- check/uncheck this item to activate

or deactivate the specified POP3 server 

Summary of Contents for 9 ANTI VIRUS

Page 1: ...rs This product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromi...

Page 2: ...nstallation Launch 15 5 2 License Agreement 15 5 3 Checking System Status 16 5 4 Select Installation Type 16 5 5 Activate your AVG License 17 5 6 Custom Installation Destination Folder 18 5 7 Custom I...

Page 3: ...irus Interface 35 8 2 Anti Spyware 35 8 2 1 Anti Spyware Principles 35 8 2 2 Anti Spyware Interface 37 8 3 Anti Rootkit 37 8 4 Remote Administration 38 8 5 E mail Scanner 38 8 5 1 E mail Scanner Princ...

Page 4: ...tatus 58 9 1 5 AVG News 58 9 1 6 News 58 9 1 7 AVG Info 58 9 1 8 Delete history 58 9 1 9 E mail Notifier 58 9 1 10 Weather Info 58 9 1 11 Facebook 58 9 1 12 VeriSign Identity Protection 68 9 2 AVG Sec...

Page 5: ...Resident Shield 110 10 11 1 Advanced Settings 110 10 11 2 Directory Exludes 110 10 11 3 Excluded Files 114 10 12 Cache Server 115 10 13 Anti Rootkit 116 10 14 Update 116 10 14 1 Proxy 116 10 14 2 Dial...

Page 6: ...145 11 7 1 Results Overview Tab 145 11 7 2 Infections Tab 145 11 7 3 Spyware Tab 145 11 7 4 Warnings Tab 145 11 7 5 Rootkits Tab 145 11 7 6 Information Tab 153 11 8 Virus Vault 155 12 AVG Updates 155...

Page 7: ...n completely re designed from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 9 Anti Virus product has a streamlin...

Page 8: ...l SP2 Windows XP Professional x64 Edition SP1 Windows Vista x86 and x64 all editions Windows 7 x86 and x64 all editions and possibly higher service packs for specific operating systems 2 2 Minimum Rec...

Page 9: ...ww avg com to check for a new installation file This way you can be sure to install the latest available version of AVG 9 Anti Virus We recommend you to try out our new AVG Download Manager tool that...

Page 10: ...is not suitable for downloading of network and SBS editions and only the following operating systems are supported Windows 2000 SP4 SRP roll up Windows XP Windows Vista and Windows 7 AVG Download Man...

Page 11: ...mpt to establish an Internet connection so that updates can be located You will not be allowed to advance the download process until the AVG Download Manager is able to complete the connectivity test...

Page 12: ...in the following data Server enter a valid proxy server name or IP address Port provide the respective port number Use proxy authentication if your proxy server requires authentication tick this check...

Page 13: ...r o A ll rights reserved 13 4 4 Downloading Installation Files Now you have provided all information needed for the AVG Download Manager to start the installation package download and launch the insta...

Page 14: ...description of what do at each step In the following we offer an explanation for each dialog window 5 1 Installation Launch The installation process starts with the Welcome to the AVG Setup Program w...

Page 15: ...agreement check box and pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately 5 3 Checkin...

Page 16: ...ication Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g to fit specific system requirements 5 5 Activate your AVG Lic...

Page 17: ...curity Toolbar dialog If custom installation was selected you will continue with the Destination Folder dialog 5 6 Custom Installation Destination Folder The Destination Folder dialog allows you to sp...

Page 18: ...an define which languages should be installed and further available for AVG user interface By default English is installed always and all other available languages can be installed optionally Unpack t...

Page 19: ...tion dialog you have marked the Remote administration item to be installed it is necessary to specify AVG DataCenter parameters Into the AVG DataCenter specification text field please provide the conn...

Page 20: ...ngs this component will be installed automatically into your Internet browser currently supported browsers are Microsoft Internet Explorer v 6 0 or higher and Mozilla Firefox v 3 0 or higher and to pr...

Page 21: ...t need to be closed in order to sucessfuly finish the installation process will be provided Press the Next button to confirm you agree to close down the respective applications and to continue to the...

Page 22: ...e time when the scheduled scan should be launched It is recommended to keep the default values Press the Next button to continue 5 13 AVG protection configuration is complete Now your AVG 9 Anti Virus...

Page 23: ...A V G 9 A nti V irus 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 23 security option Finally press the Finish button...

Page 24: ...ce the installation process is over you will invited via a new dialog window to optimize scanning We recommend to use this option and run the scanning optimization process by pressing the Optimize sca...

Page 25: ...include any fragments of viral code Most products react to it as if it were a virus though they typically report it with an obvious name such as EICAR AV Test You can download the EICAR virus from th...

Page 26: ...optimum performance Unless you have a real reason to do so do not change the AVG configuration Changes to settings should only be performed by an experienced user Some minor editing of AVG components...

Page 27: ...section of the window provides you with information on the current status of your AVG program details Quick Links left section of the window allow you to quickly access the most important and most fre...

Page 28: ...rview of all installed components and their status Anti Virus opens the default page of the Anti Virus component Anti Rootkit opens the default page of the Anti Rootkit component Anti Spyware opens th...

Page 29: ...define within the tree structure of your computer which files and folders should be scanned Scan file allows you to run an on demand test over a single file selected from the tree structure of your di...

Page 30: ...s database version system info license agreement and contact information of AVG Technologies CZ 7 2 Security Status Info The Security Status Info section is located in the upper part of the AVG main w...

Page 31: ...Overview use this link to switch from any currently opened AVG interface to the default one with an overview of all installed components see chapter Components Overview Computer scanner use this link...

Page 32: ...data being downloaded by a web browser details Resident Shield runs in the background and scans files as they are copied opened or saved details Update Manager controls all AVG updates details Single...

Page 33: ...tuation and you have deliberately decided to Ignore the component state An icon with an exclamation mark indicates a problem inactive component error status etc Double click the System Tray Icon to op...

Page 34: ...us can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected from v...

Page 35: ...r of the currently installed virus database version and this number increases with every virus base update There is just one operating button available within this component s interface Back press the...

Page 36: ...lso detects sleeping and non active malware i e malware that has been downloaded but not yet activated 8 2 2 Anti Spyware Interface The Anti Spyware component s interface provides a brief overview on...

Page 37: ...oncealing running processes from monitoring programs or hiding files or system data from the operating system 8 4 Remote Administration The Remote Administration component only displays in the user in...

Page 38: ...essages for e mail clients that AVG supports with a specific plug in i e Microsoft Outlook and The Bat Primarily it is to be used with e mail applications like Outlook Express Mozilla Incredimail etc...

Page 39: ...infections detected in e mail messages since the last E mail Scanner launch Installed e mail protection information about a specific e mail protection plug in referring to your default installed e mai...

Page 40: ...guration is recommended for experienced users only Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do so do not change the AV...

Page 41: ...Result action performed with the detected object Detection time date and time the suspicious object was detected Object Type type of the detected object In the bottom part of the dialog under the lis...

Page 42: ...commend to always use copy paste method for any manipulation with the license number License type specifies the product type installed License expires this date determines the period of validity of yo...

Page 43: ...Shield contains list of websites URL addresses which are known to be dangerous When searching with Google Yahoo WebHledani Yandex Baidu Bing AOL AltaVista EarthLink Ask Seznam eBay Twitter Digg or Sl...

Page 44: ...ected threats to AVG mark this item to allow back reporting of exploits and bad sites found by users either via Safe Surf or Safe Search to feed the database collecting information on malicious activi...

Page 45: ...dual rating icon will display details about the particular link in question Information include additional details of the threat if any the IP address of the link and when the page was scanned by AVG...

Page 46: ...h a screen similar to Entering such web site is highly risky and it cannot be recommended 8 8 Online Shield 8 8 1 Online Shield Principles Online Shield is a type of a real time resident protection it...

Page 47: ...garding the scan of the website content The editing interface allows you to configure the following elementary options o Online Shield this option confirms that the Online Shield should perform scanni...

Page 48: ...code not yet described in the virus database see Anti Virus Principles Maximum file size to be scanned if included files are present in the displayed page you can also scan their content even before t...

Page 49: ...og Control buttons The control buttons available within the Online Shield interface are as follows Save changes press this button to save and apply any changes made in this dialog Cancel press this bu...

Page 50: ...alog Close click the button to close the warning dialog The suspect web page will not be opened and the threat detection will be logged in the list of Online Shield findings this overview of detected...

Page 51: ...ent Shield 8 9 1 Resident Shield Principles The Resident Shield component gives your computer continuous protection It scans every single file that is being opened saved or copied and guards the syste...

Page 52: ...tected infections should be treated removed o either automatically Remove all threats automatically o or only after the user s approval Ask me before removing threats This choice has no impact on the...

Page 53: ...encyclopedia where you can find detailed information on the detected infection if known The dialog provides the following buttons Show Hide details click the Show details button to open a new section...

Page 54: ...file name of the detected infection and details about the process running application during which the threat was detected The entire overview of all threats detected by Resident Shield can be found i...

Page 55: ...pdate Manager 8 10 1 Update Manager Principles No security software can guarantee true protection from various types of threats unless it is regularly updated Virus writers are always looking for new...

Page 56: ...en and at what time the database is scheduled to be updated again Basic component configuration In the bottom part of the dialog you can find the Update Manager settings section where you can perform...

Page 57: ...G configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the AVG con...

Page 58: ...r not you wish to install the component the component will be located in your web browser just under the address bar The AVG Security Toolbar consists of the following 9 1 1 AVG logo button This butto...

Page 59: ...cks the status of the AVG Active Surf Shield and AVG Search Shield components Total protection means that both these components are active Limited protection refers to the fact that only one of these...

Page 60: ...both news from the press and company press release In the right upper corner you can see two red control buttons the button opens the editing dialog where you can specify parameters of the AVG News bu...

Page 61: ...an be supplied o Button shows in this field you can select the respective news categories that you want to have displayed in your news overview within AVG Security Toolbar click this button to close t...

Page 62: ...e providing most important data on top threats virus removal recommendations AVG update information access to Virus database and more relevant info AVG News opens the web page providing the latest AVG...

Page 63: ...p down menu within the Other item at the moment you can use this option if your account is on Yahoo Mail or Hotmail If you are not sure what e mail server type your account uses try to find the inform...

Page 64: ...panel will be displayed again providing the weather information for the selected location Fahrenheit Celsius converter in the upper right hand corner of the info panel you can chose between the Fahre...

Page 65: ...allow the AVG Social Extension application This application functionality is essential for the toolbar Facebook connection therefore it is recommended to allow its functioning Press the Allow Status...

Page 66: ...logging to a site a security code in this case to verify an identity or to verify a transaction Recommended For detailed information on VeriSign Identity Protection please consult the VeriSign website...

Page 67: ...numeric characters This identification is to be used while you register at any VIP member site where you have an online account Your VIP credential is unique to each installation of the AVG Security T...

Page 68: ...name password and the security code generated by AVG Security Toolbar 9 2 AVG Security Toolbar Options All AVG Security Toolbar parameters configuration is accessible directly within the AVG Security...

Page 69: ...Info Button the button offers information on AVG toolbar on current threats and the internet threat level opens the virus encyclopedia and provides more AVG products related news Delete History Butto...

Page 70: ...k boxes to assign AVG Security Toolbar functionality you want to use AVG Browser Security check this item to activate or switch off the AVG Search Shield and or AVG Active Surf Shield service Ratings...

Page 71: ...her the following options should be allowed Enable VIP for secure authentication mark this option to activate the VeriSign protection Always display the VeriSign button on the toolbar this option is o...

Page 72: ...again However if in the future you decide to change this settings and you will want to restore displaying the member site info for all VIP websites press the Restore Messaging button to get back to t...

Page 73: ...relevant websites Show Yahoo search box on new tabs in the browser this option is marked by default and having opened any new tab in your internet browser the page with a direct Yahoo search will be d...

Page 74: ...1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user interface and a few elementary options of the application s behavior Language selection In...

Page 75: ...be displayed you can define and specify your preferences by checking unchecking the following options Display system tray notifications by default this item is checked switched on and notifications ar...

Page 76: ...Gaming mode This AVG function is designed for full screen applications where possible AVG information ballons displayed e g when a scheduled scan is started would be disturbing they could minimize the...

Page 77: ...Conditions In the Ignore faulty components conditions dialog you can tick those components that you do not want to get informed about By default no component is selected in this list It means that if...

Page 78: ...rt any possible further error that might appear For this situation within the above dialog you can select components that may be in an error state or switched off and you do not wish to get informed a...

Page 79: ...e computer programs that were installed on purpose Some programs especially free ones include adware Such adware might be detected and reported by AVG as a potentially unwanted program If you wish to...

Page 80: ...deletes the selected item from the list of exceptions Add exception open an editing dialog where you can define parameters of the new exception to be created o File type the full path to the file that...

Page 81: ...le Online Shield option activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation Web Protection Instant Messaging...

Page 82: ...he content of archives possibly included in the www page to be displayed o Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for...

Page 83: ...uded files are present in the displayed page you can also scan their content even before these are downloaded to your computer However scanning of large files takes quite some time and the web page do...

Page 84: ...following three instant messaging programs are supported ICQ MSN and Yahoo tick the respective item for each of them if you want the Online Shield to verify the on line communication is virus free For...

Page 85: ...checked ahead the content of sites returned by the search engine Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known malicious s...

Page 86: ...tire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer environment Scan Specific Files or Folders standard predefined scan of selected areas of yo...

Page 87: ...default this parameter of the Anti Spyware component defines that cookies should be detected HTTP cookies are used for authenticating tracking and maintaining specific information about users such as...

Page 88: ...e will increase significantly during the scan and will slow down your other activities on the PC this option can be used when your computer is switched on but nobody is currently working on it On the...

Page 89: ...s Scans Scan Whole Computer Compared to Scan whole computer dialog the Shell extension scan dialog also includes the section named Other settings related to AVG User Interface where you can specify wh...

Page 90: ...ts reserved 90 All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders Note For a description of specific parameters...

Page 91: ...ault this scanning is switched off However it is crucial to scan removable devices for potential threats since these are a major source of infection To have this scanning ready and launched automatica...

Page 92: ...added schedules you can add a new schedule by mouse right click over the Scheduled scan item in the left navigation tree you can specify your own name and in that case the text field will be open for...

Page 93: ...the scan launch should be associated with Action based on computer startup Advanced schedule options This section allows you to define under which conditions the scan should should not be launched if...

Page 94: ...ure is available If the infected file cannot be healed automatically the infected object will be moved to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default check t...

Page 95: ...own within the Anti Rootkit component Further you should decide whether you want to have scanned All file types with the possibility of defining exceptions from scanning by providing a list of comma s...

Page 96: ...tional scan reports link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported Click the Additional scan settings to o...

Page 97: ...t to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bottom part...

Page 98: ...in this dialog you can set up some detailed parameters of the virus database update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this very...

Page 99: ...et connection is restored Once the scheduled update is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provided that...

Page 100: ...ld not be launched if the computer is in low power mode or switched off completely Other update settings Check the Run the update again as soon as the Internet connection is available option to make s...

Page 101: ...ded to the end of each message to state that it contains no viruses The text can be adjusted in the Certification dialog o If the certification text should be only added to messages with attachments T...

Page 102: ...ves attached to e mail messages E mail attachments reporting in this section you can set additional reports about potentially dangerous or suspicious files Please note that no warning dialog will be d...

Page 103: ...essage If such a message is identified during scanning define whether the detected infectious object should be moved to the Virus Vault 10 10 1 Certification In the Certification dialog you can specif...

Page 104: ...off If you decide to activate it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments that s...

Page 105: ...mation daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lower level logging elementary connection...

Page 106: ...er this field is deactivated Type of login defines the method for determining the mail server used for incoming mail o Automatic Login will be carried out automatically according to your e mail client...

Page 107: ...secure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open but in...

Page 108: ...ld is deactivated Relay Host defines the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settings o Fi...

Page 109: ...ar SSL SSL default If you choose SSL connection the data sent is encrypted without the risk of being traced or monitored by a third party This feature is available only when the destination mail serve...

Page 110: ...es that cookies should be detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their...

Page 111: ...ing opened and also when they are being closed this feature helps you protect your computer against some types of sophisticated virus Scan boot sector of removable media switched on by default Use Heu...

Page 112: ...ld Directory Excludes dialog offers the possibility of defining folders that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding any direc...

Page 113: ...at should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding any files The dialog provides the following control buttons Add specify files to be...

Page 114: ...g scanning are skipped The settings dialog offers two options Caching enabled on by default uncheck the box to switch off the Cache Server and empty the cache memory Please note that scanning might sl...

Page 115: ...m the Anti Rootkit component s interface Mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit...

Page 116: ...ted since this way AVG can secure the maximum safety level Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly at least daily If...

Page 117: ...is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible via Start All Prog...

Page 118: ...first item of the Update settings Proxy dialog you have to select from the combo box menu whether you want to Use proxy Do not use proxy server default settings Try connection using proxy and if it f...

Page 119: ...authentication option to verify that your user name and password are valid for connecting to the Internet via the proxy server Automatic configuration If you select automatic configuration mark the A...

Page 120: ...ialog s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open this conne...

Page 121: ...nloaded The list and its items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can edit the...

Page 122: ...temporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version press th...

Page 123: ...talled Port provide the number of the port on which the AVG client communicates with the AVG Admin Server port number 4158 is considered as default if you use this port number you do not have to speci...

Page 124: ...V G 9 A nti V irus 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 124 Note For a detailed description on remote administration please consult the AVG Network Edition documentation...

Page 125: ...ck this link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefined scans three types of scans defined by the software vendor are ready to be used i...

Page 126: ...ind two types of scanning predefined by the software vendor 11 2 1 Scan Whole Computer Scan whole computer scans your entire computer for possible infections and or potentially unwanted programs This...

Page 127: ...ion editing You have the option of editing the predefined default settings of the Scan of the whole computer Press the Change scan settings link to get to the Change scan settings for Scan whole compu...

Page 128: ...further you should decide whether you want to have scanned All file types with the possibility of defining exceptions from scanning by providing a list of comma separated file extensions that should n...

Page 129: ...he default configuration to be used for all further scans of the whole computer 11 2 2 Scan Specific Files or Folders Scan specific files or folders scans only those areas of your computer that you ha...

Page 130: ...lly identical to the scan of a whole computer Scan configuration editing You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change scan s...

Page 131: ...ans Scan Specific Files or Folders Additional scan settings the link opens a new Additional scan settings dialog where you can specify the following parameters o Computer shutdown options decide wheth...

Page 132: ...ous and should be scanned at all times Scan process priority you can use the slider to change the scanning process priority By default the priority is set to medium level Automatic scan that optimizes...

Page 133: ...the file or folder you want to check Right click your mouse over the object to open the context menu Select the Scan with AVG option to have the file scanned with AVG 11 4 Command Line Scanning Within...

Page 134: ...eas of the computer should be scanned For a more detailed explanation of the options see the command line parameters overview To run the scan press Enter During scanning you can stop the process by Ct...

Page 135: ...ORT Report to file file name REPAPPEND Append to the report file REPOK Report uninfected files as OK NOBREAK Do not allow CTRL BREAK to abort BOOT Enable MBR BOOT check PROC Scan active processes PUP...

Page 136: ...unch the scan You should launch the Scan whole computer regularly at least once a week However if possible launch the scan of your entire computer daily as set up in the scan schedule default configur...

Page 137: ...selected test are already specified in here and can be edited Delete scan schedule this button is also active if you have already previously selected an existing test from the list of scheduled tests...

Page 138: ...can etc Also it is not necessary to specify in the scan s name whether it is the scan of the whole of the computer or just a scan of selected files or folders your own scans will always be a specific...

Page 139: ...alog 11 5 2 How to Scan On the How to scan tab you will find a list of scanning parameters that can be optionally switched on off By default most parameters are switched on and the functionality will...

Page 140: ...kies should be detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic...

Page 141: ...ptionally you can decide you want to Scan files without extension this option is on by default and it is recommended that you keep it so unless you have a real reason to change it Files with no extens...

Page 142: ...on all tabs press the button to save them only after you have specified all your requirements Cancel cancels any changes you have performed on this tab or on any other tab of this dialog and switches...

Page 143: ...er My Documents o for Windows Vista 7 C Users user Documents Shared Documents o for Win XP C Documents and Settings All Users Documents o for Windows Vista 7 C Users Public Documents Windows folder C...

Page 144: ...b of this dialog and switches back to the AVG scanning interface default dialog 11 6 Scan Results Overview The Scan results overview dialog is accessible from the AVG scanning interface via the Scan h...

Page 145: ...ber of detected suspicious objects Rootkits number of detected rootkits Scan log information information relating to the scanning course and result typically on its finalization or interruption Contro...

Page 146: ...ied as any of the above categories then the tab provides a warning message on the finding Also you will find here information on objects that could not be scanned e g password protected archives 11 7...

Page 147: ...wing information File full path to the original location of the infected object Infections name of the detected virus for details on specific viruses please consult the Virus Encyclopedia online Resul...

Page 148: ...finish the action the infected object cannot be removed to remove it completely you have to restart your computer Control buttons There are three control buttons available in this dialog View details...

Page 149: ...ginal location of the infected object Infections name of the detected spyware for details on specific viruses please consult the Virus Encyclopedia online Result defines the current status of the obje...

Page 150: ...u have to restart your computer Control buttons There are three control buttons available in this dialog View details the button opens a new dialog window named Detailed object information In this dia...

Page 151: ...ted on your computer If there are only Warnings detected by an AVG test no action is necessary This is a brief description of the most common examples of such objects Hidden files The hidden files are...

Page 152: ...but they are still worth your attention AVG scan is able to detect files which may not be infected but are suspicious These files are reported either as Warning or as Information The severity Informa...

Page 153: ...d the file any more in its original location Should you find out the file absence causes problems you can send the file in question to analysis or restore it to the original location The Virus vault i...

Page 154: ...n on your disk Restore As in case you decide to move the detected infectious object from the Virus Vault to a selected folder use this button The suspicious and detected object will be saved with its...

Page 155: ...various program changes fixes and improvements When scheduling an update it is possible to select which priority level should be downloaded and applied Note If a time coincidence of a scheduled progra...

Page 156: ...its graphical representation as well as in an overview of relevant statistic parameters update file size received data download speed elapsed time Note Before the AVG program update launch a system r...

Page 157: ...s that occurred during AVG 9 Anti Virus operation Event History records the following types of events Information about updates of the AVG application Scanning start end or stop including automaticall...

Page 158: ...t Should you have any problems with your AVG either business or technical please refer to the FAQ section of AVG website http www avg com If you do not succeed in finding help this way contact the tec...

Reviews: