Benutzeranleitung / Produktwartung AntiVirus 2013 des Produzenten AVG
Zur Seite of 121
A V G A nt i V i ru s 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o g ie s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 Doc u me n t r e v is i on 20 13.1 0 (3 0.11 .201 2) C o py r ight A V G Te chn olo gie s C Z , s .r.o . A ll rig ht s r e se rv e d.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 Con t en t s .. .. . .. .. .. .. .. .. .. .. .. .. .. . .. .. .. .. .. .. .. .. .. .. .. . .. .. .. .. .. .. .. .. .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 .. .. . .. .. .. .. .. .. .. .. .. .. .. . .. .. .. .. .. .. .. .. .. .. .. . .. .. .. .. .. .. .. .. .. .. .. . ..
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 .. .. .. .. ... .. .. .. .. ... .. .. .. .. ... .. .. .. .. ... .. .. .. .. .. ... .. .. .. .. ... .. .. .. .. ... .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 1 . I n trod u cti on T his u s er manu al pr ov ides c ompr eh en s iv e u s er do c umen t a t io n f or A VG A ntiV irus 20 13 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 2 . AV G Inst al l at i on R equ ireme n ts 2 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 3 . AV G Inst al l at i on Proc e s s T o in s tall AVG A ntiV i rus 20 13 on y o ur c ompu t er , y o u nee d to g et t he la t e s t ins tallat ion f i le .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 3 . 2 . W e l c ome: Li c en s e Ag r e emen t T he W el c om e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 3 . 3 . A c ti v ate you r l i c en s e I n t he A c tiva te Y o.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 C anc el - cl ic k t o ex it t h e s etup pr oces s i mmed iately ; AVG A n t i V irus 2 01 3 w i ll n ot be ins talled! B ac k - c lic k to g o one s tep back t o t he pr ev i o us s etup dialo g.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 c on f irm you wa nt to u s e t h e A VG Sec ur e S ea r c h en gine t h at c losely c o ope r ates wit h the Link Sc ann er S ur f S h ield f or y ou r maxi mum s ec u rity on li n e.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 2 H igh light an y it em i n t he C om ponent Select i on lis t , an d a b rief d esc ription of the re s pe c t iv e c omp on en t w i ll be dis pla y e d on t he rig ht s ide of this sec ti o n.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 3 3 . 7 . In stal l at i o n w as su c c ess f u l T he I n s ta.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 4 4 . Aft er I n sta l la t ion 4 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 5 I f A V G f a i ls t o ide ntify t he E I CA R te s t fil e a s a v i rus , you s houl d che ck the progra m configu ra t i on a ga i n! 4 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 6 5 . AV G Us e r I n t e r fa c e A VG A ntiV irus 20 13 ope ns.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 7 allow s q uic k ac ces s t o s c an nin g and up da t ing within AVG A n t i V irus 2 01 3 . D et a ils > > 5 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 8 o C op y t o c lipb oar d - U s e t his link to copy t he lic ense n umber , a nd pa s te it wh er e n eed ed . T his w ay y ou c an be s u re t he lic ense n umb er is e nter ed c or rect ly .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 9 c od e u s e d in the pr od uc t : Li c ens e A gree m e nt - T he tab of f er s t he f ull w or din g of the l ic e ns e agr eeme nt be t we en y ou a nd A VG T ec h no log ies : 5 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 0 Scan fi le.. . - Allows y ou t o r un an on -d emand t e s t on a si n gle spec if ic f ile. Clic k t his option t o ope n a ne w wind ow w i th the t r ee s t r uc ture of your dis k .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 1 as Buy now a nd A c ti v at e , allow i n g y ou to buy t he f ull v ersi o n o f t h e pr og ra m righ t aw ay .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 2 5 . 3 . Comp o n en t s Ove r vi e w I ns ta l led c o mpon e nts ove rview c an b e f oun d in a h oriz o nt a l s trip of blo c k s in the c en t ra l s ec tion of t h e main w ind ow .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 3 Li v eK i ve is de dic ated t o on line data back up on s e c ur ed serv er s .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 4 A VG S y s te m T ra y Icon di s p la y I n f ull c o l o r w it h no add ed elemen t s t h e ic on indic a t e s t h at all AVG A ntiV irus 2 01 3 c ompo nen t s ar e a c ti v e and f ully f un c t io na l.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 5 Tempo ra ri l y dis abl e A V G prote ct i on - the op t ion allow s y o u t o s w it c h o ff t h e entire p r otec ti o n s ecur ed by y ou r AVG Ant i Vi rus 201 3 at o nce.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 6 s c a n) . U pdat e now - cl ic k t h e Updat e n ow li n k t .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 7 The s ta te of any curre ntly op e n e d we b brows er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 8 6 . AV G C omp on e nt s 6 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 9 Enabl e d / D i s a bl ed - T he bu t ton may r emind y ou of a t r af f ic ligh t , bo t h i n app ea r an c e a nd in f unct ion alit y .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 0 D i a l og controls T o swit ch b etwe en both sec ti o ns of the dialo g, y ou c an s imply c lic k anywh er e in t h e re s pe c t iv e s e r v i ce p an el.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 1 - U s e t he gr een ar r ow in t he u ppe r lef t s e c t ion o f t h e d ialog t o get ba c k t o t h e m a i n u s e r int e rf ac e w it h t h e c ompo ne nt s ' o v erv iew .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 2 mean s t h at t he I den t ity P r ot e c t ion s ecurity s e r v i ce is ac t iv e a nd f ully fu nc ti o na l .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 3 D i a l og controls T o swit ch b etwe en both sec ti o ns of the dialo g, y ou c an s imply c lic k anywh er e in t h e re s pe c t iv e s e r v i ce p an el.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 4 D et ail s - Clic k t he bu t ton, an d a b rief d esc ription of the high lighted s er v ic e a pp ear s in t he b ot tom pa rt of th d ialog .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 5 C ontrol butt ons A nalyz e now ( dis play ed b efor e t he an.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 6 7 . AV G S e curit y Tool b a r A V G Security Tool bar i s a .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 7 D o N ot Tra ck - t he D N T s er v ic e h elps y ou iden t if y we bsi tes t ha t ar e c ollec ting data abo ut y o ur on line act iv iti e s , an d giv e s y o u t he c ho i c e t o a llow o r d is allow it .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 8 8 . AV G D o Not Tr a ck A V G D o Not Trac k h elp s you iden t if y w ebsit es t ha t a re c ollect ing da t a a bou t y ou r on line ac ti v it ies .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 9 c ollect d at a a bo ut y our on l ine act iv it y wh i le you are logg ed- i n . Ex amples of S o c ial butt on s i n c lud e: Facebo ok S o c ial P lugin s , T wit ter Butt on , Goo gle +1.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 0 8 . 3 . B l oc ki n g tr ac ki n g p r oc e sses W it h t he l.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 1 B l oc k t he fol lowi ng - I n this sec ti o n y ou can s ee a box with a lis t o f k n ow n data collec t ion s er v ic e s t h at c a n be c las si f i e d as A d Ne t wo rk s.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 2 9 . AV G A d v an ce d S e tt i n g s T he ad v anc e d c o nf i g ura t ion dialog of A V G Ant i V irus 20 13 ope ns in a n ew win do w named A dvanc ed A V G Sett i ngs .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 3 A new d ialog pop s -u p inf or ming y ou that in or de r to c.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 4 o U pdat e notificat i ons (on , b y d ef a ult) - de c ide wh.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 5 o A V G A dvis or not i ficat i ons ( on, b y d efault) - dec id e wh ethe r inf or mati o n up on AV G A d v i sor act iv iti e s s hou l d b e d is played in the s lide pan el on t he s y s tem tray.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 6 s it u ations wh en it might be dis tur bing (see als o t h e Gaming mode s ect ion of t he A d va nced s ett ings/ Appe ar ance c h apter in this doc u m en t ) .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 7 H ow to dis a bl e A V G prote ct i on T ic k the Tem poraril y dis abl e A VG prot ect i on c he c k bo x , an d c on f irm y o ur c h oic e b y pre s s ing t h e A pp ly bu t t on .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 8 I n t he R es id e n t S hiel d S et ting s dialo g y ou can a.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 9 Scan fi les ref err ed i n re gi s t ry ( on b y defau lt ) - .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 0 9 . 4 . 2 . A n ti -Rootki t I n t he A nt i - Root k i t s e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 1 9 . 4 . 3 . Cac h e Server T he Ca che S erv er Set ti ngs dia.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 2 9 . 5 . 1 . Emai l Sc an n er T he E mai l S c anne r dialog i.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 3 R eport P otent i all y Unw ant ed P rograms and S pywa re threa ts ( on b y defau lt ) - c he c k to a c ti v ate s c a nn i n g f or s pywar e as w ell as f or v iru s es.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 4 By de f ault, the c er t if i cat ion t ext consi s ts o f jus t a ba s ic in f or mati o n t ha t s tates N o v iru s f ou nd in this mes s a ge.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 5 T he A tt achment fil te r dia log allow s y o u t o s et up pa ra m e t e r s fo r email mes s a ge att achment s c a nning .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 6 I n t his dialog you c an s et up a new Em a il S cann er s e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 7 Type of l ogi n - def ines t h e met h od f or de t e r mining.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 8 SM TP S e rv er Na m e - in t h is f ield y ou can s pe c if y.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 9 I n t his dialog you c an s et up a new Em a il S cann er s e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 0 Type of l ogi n - def ines t h e met h od f or de t e r mining.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 1 ar e a c c e s s ed.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 2 I n t he W eb P rotec ti on dialog you c an e dit t h e c ompo nen t ' s conf igur ati o n re gar ding t he s c a n of the we bsi te c on t en t .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 3 ab s olutely s u re.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 4 A l wa ys p rompt ( on b y default ) - whe n a t hr ea t is de.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 5 Sca n s e tt i ngs T he S c an s et t i ngs s ec tion of f er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 6 c an not ge t infec ted w ill no t b e s cann ed , for ins tan.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 7 Al l p ara m e t e r s set up in this conf igu ra t ion dialo .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 8 T he li st o f pa rameter s is ide nt ic a l to those a v ailable f or t h e S c a n of the wh ole computer .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 9 9 . 8 . 4 . R emovab l e devi c e sc an T he ed it ing inter f.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 0 N ext , t he tex t f ield called Na m e ( dea c t iv ated f o r all d efault s c h ed ules ) st ates t he n ame a s s ign ed t o t his v e ry s c h ed ule b y t h e pr ogr am v e ndo r.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 1 ic on : A new AV G s y s tem t r ay ic o n t he n a pp ear s ( in f ull c o lor w ith a f lash ligh t ) inf or m ing a s c he du l e d s c an is ru nnin g.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 2 t h at increa s es y our c o mputer sec ur it y e v en more , h ow ev er it may b l o c k lega l pr ogr ams , and is t h er ef or e s w it c he d of f b y de fa ult .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 3 Se t a d ditio na l s ca n re ports C lic k the S et addition a l s c an report s .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 4 dia log t h e dis pla y ed t r ee s t r uct ur e a c ti v ates and you c an s pe c i f y t h e f olde rs t o be s c an ned .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 5 imm e diately af t er t h e I nt e r ne t c on ne c t ion is rest or ed.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 6 C he c k the Run t he updat e a gain as s oon as the I n t ern.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 7 t h e c ompu t er re gular ly , a t least o nce a d ay! Po s t.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 8 9 . 1 0.1. Pr oxy T he pr oxy s e r v er is a s t a nd -alo ne serv er or a s er v ic e ru nning on a PC t ha t g ua ran t ee s s af er conn ect ion t o the I ntern et .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 9 A utoma t i c c o nf i gura ti on I f y ou selec t au t omati .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 0 9 . 1 0.3. Man ag e T he Upda te m a nagement d ialog of f er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 1 T he c ha r t in the dialog dis p lay s a l is t of ex ceptions , if an y hav e bee n alr ea dy de f ined . Eac h it em has a c he c k bo x next to it .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 2 9 . 1 2. V i r u s V au l t T he V irus Vaul t mai nt enance d.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 3 9 . 1 3. A V G Sel f Pr otec t i o n T he A V G S elf P rote c.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 4 W it hin t h e dialog , the f ollow ing s ett ing op t ion s a.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 5 Mos t com mo n thre a ts N ow ada y s , t he r e ar e f ar more t hr eats o ut t he r e t ha n p lain v ir uses .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 6 9 . 1 5. Ig n or e err or stat u s I n t he I gnore error s ta.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 7 un i q ue att rib utes of t h e n etwo r k (s p eci fi cally t he M AC add re s s ) , an d w il l not dis p lay t he no t if ic ati o n ne x t t ime.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 8 1 0 . AV G S c an n i n g By de f ault, A V G Ant i V irus 20 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 9 I n t he Scan Options dia log, y o u c a n s ee t hr ee main s.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 0 Sca n configura ti on e di t in g You c an ed it t he W hol e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 1 t h e s c an ning f or s pywa r e as we ll as f or v ir us es.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 2 o C om pute r s hutdown optio ns - decide wh ether t h e c o m pu t er s ho uld be s hut d ow n au t omatic ally on c e the ru nning s c a nn ing p r oces s i s ov er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 3 t h e op t ion of h av ing a speci f ic f old er s c a nn ed w.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 4 H ea l / remove vi rus i nf ec ti on wi t hout as k i ng me ( on b y de f a ult ) : I f a v ir us is iden t if ied du rin g s c a nn i n g it c a n b e hea l e d au t o mati cally if a c ur e is av ailab le.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 5 o C om pute r s hutdown optio ns - decide wh ether t h e c o m pu t er s ho uld be s hut d ow n au t omatic ally on c e the ru nning s c a nn ing p r oces s i s ov er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 6 W arnin g: The s e s c an s ett ing s are iden t ic al to t he p ar ameters f o r a n ew ly de f in ed s c an - as desc rib ed in the AV G Sc an ning / S c an s c he duling / H ow t o S c a n c ha pter .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 7 av g s c anx f or 32 bit s OS av g s c ana f or 64 bit s OS Synta x of the c om ma nd T he s y ntax of the c ommand f ollows: av g s c anx / para m e t er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 8 / EX T Sc an t he s e e x t en s ion s / f or ex a mple E X T .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 9 / H I D D EN R ep ort f iles w it h hidde n e x tensi o ns / I.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 0 Lo c at ion On e ach tab y ou can s im p ly swit ch the &quo.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 1 C ontrols in the dia l og Save - S a v es all c ha ng es y ou hav e per f ormed on this t ab or on a ny other t a b o n t his dialog , a nd s w i tc he s b ac k t o t he Sc he duled s c an s ov er v iew .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 2 R eport enhanc ed s e t of P o t entiall y Unwa n t ed P rog.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 3 C om pute r s hutdown optio ns - decide wh ether t h e c o m pu t er s ho uld be s hut d ow n a ut o mat ic a lly on c e the ru nning s c an ning pr oc ess is o v er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 4 C lic k the S et addition a l s c an report s .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 5 o C : P r og ram F iles o in 64- b it ve r s ion C : P ro gr.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 6 1 0. 5 . S c an Re su l t s T he S c an res ults overv i e w dia log pr ov id es a li st of re s ult s of a ll s o f ar pe rf or med s c an s .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 7 D i a l og controls Vi ew deta i l s - Clic k t he butt o n t o s ee d et a iled inf orma t ion ab ou t a selec ted s c an (h igh lighted in the c ha rt ab ov e) .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 8 1 1 . V irus V au l t Vi rus Vaul t is a saf e e nv iro nme nt f or the mana ge m e nt of s uspect / inf ec t e d o bject s detec ted dur ing A VG t e s ts .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 9 T he f ollowin g c o ntro l b utt on s ar e a c c es si b le f ro m t he Vi rus V ault int e rf ac e : R es tore - re mov es t he inf ec ted f i le ba c k t o it s o rigina l loc ation on y ou r d is k .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 0 1 2 . Hi s tory T he His tory s ect ion inc lud es in f or mat io n on all pa s t e v en t s ( s uc h as u pd at e s , s c an s , d et e c ti o ns, e t c.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 1 re m o v ed! Eac h ic on c an e i ther be s olid or cut i n .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 2 W it hin t h is w arn i n g d ialog you will f ind inf or ma.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 3 For ea c h de t e c ted obje c t t h e f ollow ing inf or ma.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 4 1 2. 3 . Emai l Pr otec t i o n d et ec t i o n T he E mai l.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 5 1 2. 4 . On l i n e S h i el d fi n d i n g s Onli ne Shi el.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 6 For ea c h de t e c ted obje c t t h e f ollow ing inf or ma.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 7 1 2. 5 . Even t h i s to r y l og T he E v ent hi s t o ry l.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 8 1 3 . AV G U pdate s N o s ec u rit y s of t w ar e c an g u.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 9 1 3. 3 . Up d ate l ev el s A VG A ntiV irus 20 13 of f ers .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 2 0 1 4 . F A Q a n d Te c h ni ca l S u pp ort Shou ld y ou hav e any s a les or tec hn i cal trou ble w it h y our A V G Ant i Vi rus 201 3 ap plic ation, ther e a re s ev er al w ays t o ob t a in help.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 2 1 on re mov ing v ir uses , s pywar e, an d adv ic e on how to st ay pr otec ted. D i s c us s i on f orum : You can als o us e t h e A VG user s dis c uss ion f or um at htt p : // f or ums .
Ein wichtiger Punkt beim Kauf des Geräts AVG AntiVirus 2013 (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie AVG AntiVirus 2013 noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für AVG AntiVirus 2013 - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von AVG AntiVirus 2013 reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über AVG AntiVirus 2013 erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon AVG AntiVirus 2013 besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von AVG AntiVirus 2013 verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit AVG AntiVirus 2013. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei AVG AntiVirus 2013 gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.