AVG avg 9 internet security Manuale Utente
A V G 9 I nternet Sec urity © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
5 3
not display dialogs asking you whether you want to allow or block
communication for unknown applications. In case an unknown application tries
to communicate over the network at that time, the
communication for unknown applications. In case an unknown application tries
to communicate over the network at that time, the
will allow or block
the attempt automatically according to settings in the current profile.
·
Firewall status:
o
Firewall enabled - select this option to allow communication to those
applications that are assigned as 'allowed' in the set of rules defined
within selected
applications that are assigned as 'allowed' in the set of rules defined
within selected
profile
o
Firewall disabled - this option switches
network traffic is allowed but not checked!
o
Emergency mode (block all internet traffic) - select this option to
block all traffic on every single network port;
block all traffic on every single network port;
all network traffic is stopped
Please note: The software vendor has set up all AVG components to give optimum
performance. Unless you have a real reason to do so, do not change the AVG
configuration. Any changes to settings should only be performed by an experienced
user. If you need to change Firewall configuration, select the system menu item
Tools/Firewall settings and edit the Firewall configuration in the newly opened
performance. Unless you have a real reason to do so, do not change the AVG
configuration. Any changes to settings should only be performed by an experienced
user. If you need to change Firewall configuration, select the system menu item
Tools/Firewall settings and edit the Firewall configuration in the newly opened
dialog.
Control buttons
·
used within installation process) called
where you
can specify the
·
Save changes - press this button to save and apply any changes made in this
dialog
dialog
·
Cancel - press this button to return to the default
components overview)
8.8. E-mail Scanner
One of the most common sources of viruses and trojans is via e-mail. Phishing and
spam make e-mail an even greater source of risks. Free e-mail accounts are more likely
to receive such malicious e-mails (as they rarely employ anti-spam technology), and
home users rely quite heavily on such e-mail. Also home users, surfing unknown sites
and filling in online forms with personal data (such as their e-mail address) increase
exposure to attacks via e-mail. Companies usually use corporate e-mail accounts and
employ anti-spam filters etc, to reduce the risk.
spam make e-mail an even greater source of risks. Free e-mail accounts are more likely
to receive such malicious e-mails (as they rarely employ anti-spam technology), and
home users rely quite heavily on such e-mail. Also home users, surfing unknown sites
and filling in online forms with personal data (such as their e-mail address) increase
exposure to attacks via e-mail. Companies usually use corporate e-mail accounts and
employ anti-spam filters etc, to reduce the risk.