AVG 9 Internet Security © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
3
.......................................................................................................... 30
6.5 Eicar Test
.......................................................................................................... 31
6.6 AVG Default Configuration
........................................................................................................................ 32
7. AVG User Interface
.......................................................................................................... 33
7.1 System Menu
.......................................................................................................... 33
7.1.1 File
.......................................................................................................... 33
7.1.2 Components
.......................................................................................................... 33
7.1.3 History
.......................................................................................................... 33
7.1.4 Tools
.......................................................................................................... 33
7.1.5 Help
.......................................................................................................... 36
7.2 Security Status Info
.......................................................................................................... 37
7.3 Quick Links
.......................................................................................................... 37
7.4 Components Overview
.......................................................................................................... 39
7.5 Statistics
.......................................................................................................... 39
7.6 System Tray Icon
........................................................................................................................ 41
8. AVG Components
.......................................................................................................... 41
8.1 Anti-Virus
.......................................................................................................... 41
8.1.1 Anti-Virus Principles
.......................................................................................................... 41
8.1.2 Anti-Virus Interface
.......................................................................................................... 43
8.2 Anti-Spyware
.......................................................................................................... 43
8.2.1 Anti-Spyware Principles
.......................................................................................................... 43
8.2.2 Anti-Spyware Interface
.......................................................................................................... 45
8.3 Anti-Spam
.......................................................................................................... 45
8.3.1 Anti-Spam Principles
.......................................................................................................... 45
8.3.2 Anti-Spam Interface
.......................................................................................................... 47
8.4 Anti-Rootkit
.......................................................................................................... 47
8.4.1 Anti-Rootkit Principles
.......................................................................................................... 47
8.4.2 Anti-Rootkit Interface
.......................................................................................................... 48
8.5 System Tools
.......................................................................................................... 48
8.5.1 Processes
.......................................................................................................... 48
8.5.2 Network Connections
.......................................................................................................... 48
8.5.3 Autostart
.......................................................................................................... 48
8.5.4 Browser Extensions
.......................................................................................................... 48
8.5.5 LSP Viewer
.......................................................................................................... 55
8.6 Firewall
.......................................................................................................... 55
8.6.1 Firewall Principles
.......................................................................................................... 55
8.6.2 Firewall Profiles