AVG Anti-Virus 8.5 - 3 lic. - 2 year AAV8N24BCZS003 Manual De Usuario
Los códigos de productos
AAV8N24BCZS003
44
AVG 8.5 Anti-Virus © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.
The Anti-Spyware component 's interface provides a brief overview on t he
component 's funct ionality, informat ion on t he component's current status (Anti-
Spyware component is active.), and some Anti-Spyware st at ist ic s:
component 's funct ionality, informat ion on t he component's current status (Anti-
Spyware component is active.), and some Anti-Spyware st at ist ic s:
Spyware definitions - number provides t he count of spyware samples defined
in t he lat est spyware dat abase version
Latest database update - specifies when and at what t ime t he spyware
dat abase was updated
Database version - defines t he number of t he lat est spyware dat abase
version; and t his number increases wit h every virus base update
There is just one operating but t on available within t his component 's interface (Back) -
press t he but t on t o ret urn t o t he default
press t he but t on t o ret urn t o t he default
Please note: The software vendor has set up all AVG components to give optimum
performance. Unless you have a real reason to do so, do not change the AVG
configuration. Any changes to settings should only be performed by an experienced
user. If you need to change AVG configuration, select the system menu item Tools /
Advanced settings and edit the AVG configuration in the newly opened
performance. Unless you have a real reason to do so, do not change the AVG
configuration. Any changes to settings should only be performed by an experienced
user. If you need to change AVG configuration, select the system menu item Tools /
Advanced settings and edit the AVG configuration in the newly opened
dialog.
9.3. Anti-Rootkit
9.3.1. Anti-Rootkit Principles
Anti-Rootkit is a specialized t ool detect ing and effect ively removing dangerous
rootkits, i.e. programs and t echnologies t hat can camouflage t he presence of malicious
soft ware on your comput er.
rootkits, i.e. programs and t echnologies t hat can camouflage t he presence of malicious
soft ware on your comput er.
A rootkit is a program designed t o t ake fundament al control of a comput er syst em,
wit hout aut horization by t he system's owners and legitimate managers. Access t o t he
hardware is rarely required as a root kit is int ended t o seize cont rol of t he operating
system running on t he hardware. Typically, root kit s act t o obscure t heir presence on
t he system t hrough subversion or evasion of standard operating system securit y
mechanisms. Oft en, t hey are also Trojans as well, t hus fooling users int o believing
t hey are safe t o run on t heir systems. Techniques used t o accomplish t his can include
concealing running processes from monit oring programs, or hiding files or syst em data
from t he operat ing syst em.
wit hout aut horization by t he system's owners and legitimate managers. Access t o t he
hardware is rarely required as a root kit is int ended t o seize cont rol of t he operating
system running on t he hardware. Typically, root kit s act t o obscure t heir presence on
t he system t hrough subversion or evasion of standard operating system securit y
mechanisms. Oft en, t hey are also Trojans as well, t hus fooling users int o believing
t hey are safe t o run on t heir systems. Techniques used t o accomplish t his can include
concealing running processes from monit oring programs, or hiding files or syst em data
from t he operat ing syst em.