ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 User's Guide Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 124
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
.................................................................................87ESET Live Grid4.6.6
.............................................................................87Suspicious files4.6.6.1
.................................................................................88Running processes4.6.7
.................................................................................89Network connections4.6.8
.................................................................................91Quarantine4.6.9
.................................................................................92Submission of files for analysis4.6.10
.................................................................................92Alerts and notifications4.6.11
.............................................................................93Message format4.6.11.1
.................................................................................93System updates4.6.12
.................................................................................94Diagnostics4.6.13
.................................................................................94Licenses4.6.14
.................................................................................95Remote administration4.6.15
........................................................................96User interface4.7
.................................................................................96Graphics4.7.1
.................................................................................97Alerts and notifications4.7.2
.............................................................................98Advanced setup4.7.2.1
.................................................................................98Hidden notification windows4.7.3
.................................................................................99Access setup4.7.4
.................................................................................100Program menu4.7.5
.................................................................................101Context menu4.7.6
.................................................................................101Presentation mode4.7.7
..................................................102
Advanced user5.
........................................................................102Proxy server setup5.1
........................................................................102Import and export settings5.2
........................................................................103Keyboard shortcuts5.3
........................................................................103Command Line5.4
........................................................................104ESET SysInspector5.5
.................................................................................104Introduction to ESET SysInspector5.5.1
.............................................................................105Starting ESET SysInspector5.5.1.1
.................................................................................105User Interface and application usage5.5.2
.............................................................................105Program Controls5.5.2.1
.............................................................................106Navigating in ESET SysInspector5.5.2.2
...............................................................................107Keyboard shortcuts5.5.2.2.1
.............................................................................108Compare5.5.2.3
.................................................................................109Command line parameters5.5.3
.................................................................................110Service Script5.5.4
.............................................................................110Generating Service script5.5.4.1
.............................................................................110Structure of the Service script5.5.4.2
.............................................................................113Executing Service scripts5.5.4.3
.................................................................................113FAQ5.5.5
.................................................................................114
ESET SysInspector as part of ESET Endpoint
Security
5.5.6
........................................................................114ESET SysRescue5.6
.................................................................................115Minimum requirements5.6.1
.................................................................................115How to create rescue CD5.6.2
.................................................................................115Target selection5.6.3
.................................................................................115Settings5.6.4
.............................................................................116Folders5.6.4.1
.............................................................................116ESET Antivirus5.6.4.2
.............................................................................116Advanced settings5.6.4.3
.............................................................................116Internet protocol5.6.4.4
.............................................................................117Bootable USB device5.6.4.5
.............................................................................117Burn5.6.4.6
.................................................................................117Working with ESET SysRescue5.6.5
.............................................................................117Using ESET SysRescue5.6.5.1
..................................................118
Glossary6.
........................................................................118Types of infiltration6.1
.................................................................................118Viruses6.1.1
.................................................................................118Worms6.1.2
.................................................................................118Trojans6.1.3
.................................................................................119Rootkits6.1.4
.................................................................................119Adware6.1.5
.................................................................................119Spyware6.1.6
.................................................................................119Potentially unsafe applications6.1.7
.................................................................................120Potentially unwanted applications6.1.8
........................................................................120Types of remote attacks6.2
.................................................................................120DoS attacks6.2.1
.................................................................................120DNS Poisoning6.2.2
.................................................................................120Worm attacks6.2.3
.................................................................................120Port scanning6.2.4
.................................................................................121TCP desynchronization6.2.5
.................................................................................121SMB Relay6.2.6
.................................................................................121ICMP attacks6.2.7
........................................................................122Email6.3
.................................................................................122Advertisements6.3.1
.................................................................................122Hoaxes6.3.2
.................................................................................122Phishing6.3.3
.................................................................................123Recognizing spam scams6.3.4
.............................................................................123Rules6.3.4.1
.............................................................................123Whitelist6.3.4.2
.............................................................................123Blacklist6.3.4.3
.............................................................................124Server-side control6.3.4.4
Page view 3
1 2 3 4 5 6 7 8 9 ... 123 124

Comments to this Manuals

No comments