AVG anti-virus free edition 2011 Manual Do Utilizador
A V G A nti- V irus Free E dition 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
1 3 5
the respective finding severity on a four-levels scale from unobjectionable (
) up to very dangerous (
) will be provided in this section; and the
information on the infection type (based on their infective level - all listed
objects can be positively or potentially infected)
objects can be positively or potentially infected)
·
Virus Name - specifies the name of the detected infection according to the
·
Path to file - full path to the original location of the detected infectious file
·
Original object name - all detected objects listed in the chart have been
labeled with the standard name given by AVG during the scanning process. In
case the object had a specific original name that is known (e.g. a name of an
e-mail attachment that does not respond to the actual content of the
attachment), it will be provided in this column.
labeled with the standard name given by AVG during the scanning process. In
case the object had a specific original name that is known (e.g. a name of an
e-mail attachment that does not respond to the actual content of the
attachment), it will be provided in this column.
·
Date of storage - date and time the suspected file was detected and
removed to the Virus Vault
removed to the Virus Vault
Control buttons
The following control buttons are accessible from the Virus Vault interface:
·
Restore - removes the infected file back to its original location on your disk
·
Restore As - in case you decide to move the detected infectious object from
the Virus Vault to a selected folder, use this button The suspicious and
detected object will be saved with its original name. If the original name is not
known, the standard name will be used.
the Virus Vault to a selected folder, use this button The suspicious and
detected object will be saved with its original name. If the original name is not
known, the standard name will be used.
·
Details - this button only applies to threats detected by Identity Protection.
Upon clicking, it displays synoptic overview of the threat details (what files/
processes have been affected, characteristics of the process etc.). Please
note that for all other items than detected by IDP, this button is greyed out
and inactive!
Upon clicking, it displays synoptic overview of the threat details (what files/
processes have been affected, characteristics of the process etc.). Please
note that for all other items than detected by IDP, this button is greyed out
and inactive!