Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual AVIRA PREMIUM SECURITY SUITE. We hope that this AVIRA PREMIUM SECURITY SUITE user guide will be useful to you.
Lastmanuals help download the user guide AVIRA PREMIUM SECURITY SUITE.
You may also download the following manuals related to this product:
AVIRA PREMIUM SECURITY SUITE (1064 ko)
AVIRA PREMIUM SECURITY SUITE FIREWALL 07-2009 (3063 ko)
Manual abstract: user guide AVIRA PREMIUM SECURITY SUITE
Detailed instructions for use are in the User's Guide.
[. . . ] User Manual
Avira Premium Security Suite
www. avira. com
Trademarks and Copyright
Trademarks
AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand and product names are trademarks or registered trademarks of their respective owners. Protected trademarks are not marked as such in this manual. [. . . ] Unusual Runtime Compression Tools (PCK) Files that have been compressed with an unusual runtime compression tool and that can therefore be classified as possibly suspicious. Avira Premium Security Suite detects "Unusual runtime Compression Tools". If the option Unusual runtime Compression Tools is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if Avira Premium Security Suite detects such packers. Double Extension Files (HEUR-DBLEXT) Executable files that hide their real file extension in a suspicious way. This camouflage method is often used by malware.
Avira GmbH
Avira Premium Security Suite
59
Viruses and more Avira Premium Security Suite detects "Double Extension Files". If the option Double Extension files (HEUR-DBLEXT) is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if Avira Premium Security Suite detects such files. Phishing Phishing, also known as brand spoofing is a clever form of data theft aimed at customers or potential customers of Internet service providers, banks, online banking services, registration authorities. When submitting your email address on the Internet, filling in online forms, accessing newsgroups or websites, your data can be stolen by Internet crawling spiders and then used without your permission to commit fraud or other crimes. Avira Premium Security Suite detects "Phishing". If the option Phishing is enabled with a check mark in the configuration under Extended threat categories, you receive a corresponding alert if Avira Premium Security Suite detects such behavior. Application (APPL) The term APPL refers to an application which may involve a risk when used or is of dubious origin. Avira Premium Security Suite detects "Application (APPL)". If the option Application (APPL) is enabled with a check mark in the configuration under Extended threat categories , you receive a relevant alert if Avira Premium Security Suite detects such behavior.
10. 2 Viruses and other malware
Adware Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. These advertisements usually cannot be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security. Backdoors A backdoor can gain access to a computer by going around the computer access security mechanisms. A program that is being executed in the background generally enables the attacker almost unlimited rights. User's personal data can be spied with the backdoor's help, but are mainly used to install further computer viruses or worms on the relevant system. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security. Boot viruses The boot or master boot sector of hard disks is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more. . .
60
Avira Premium Security Suite
Avira GmbH
Viruses and more
Bot-Net A bot net is defined as a remote network of PCs (on the Internet), which is composed of bots that communicate with each other. [. . . ] The web server can be a server on the Internet or intranet. Standard The button resets the default address.
124
Avira Premium Security Suite
Avira GmbH
Reference: Configuration
Proxy
Proxy server
Do not use a proxy server If this option is enabled, your connection to the web server is not carried out via a proxy server. Use Windows system settings When the option is enabled, the current Windows system settings are used for the connection to the web server via a proxy server. Use the following proxy server If your web server connection is set up via a proxy server, you can enter the relevant information here. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE AVIRA PREMIUM SECURITY SUITE
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual AVIRA PREMIUM SECURITY SUITE will begin.