Manuel d'utilisation / d'entretien du produit AntiVirus 2013 du fabricant AVG
Aller à la page of 121
A V G A nt i V i ru s 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o g ie s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 Doc u me n t r e v is i on 20 13.1 0 (3 0.11 .201 2) C o py r ight A V G Te chn olo gie s C Z , s .r.o . A ll rig ht s r e se rv e d.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 Con t en t s .. .. . .. .. .. .. .. .. .. .. .. .. .. . .. .. .. .. .. .. .. .. .. .. .. . .. .. .. .. .. .. .. .. .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 .. .. . .. .. .. .. .. .. .. .. .. .. .. . .. .. .. .. .. .. .. .. .. .. .. . .. .. .. .. .. .. .. .. .. .. .. . ..
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 .. .. .. .. ... .. .. .. .. ... .. .. .. .. ... .. .. .. .. ... .. .. .. .. .. ... .. .. .. .. ... .. .. .. .. ... .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 1 . I n trod u cti on T his u s er manu al pr ov ides c ompr eh en s iv e u s er do c umen t a t io n f or A VG A ntiV irus 20 13 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 2 . AV G Inst al l at i on R equ ireme n ts 2 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 3 . AV G Inst al l at i on Proc e s s T o in s tall AVG A ntiV i rus 20 13 on y o ur c ompu t er , y o u nee d to g et t he la t e s t ins tallat ion f i le .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 3 . 2 . W e l c ome: Li c en s e Ag r e emen t T he W el c om e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 3 . 3 . A c ti v ate you r l i c en s e I n t he A c tiva te Y o.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 C anc el - cl ic k t o ex it t h e s etup pr oces s i mmed iately ; AVG A n t i V irus 2 01 3 w i ll n ot be ins talled! B ac k - c lic k to g o one s tep back t o t he pr ev i o us s etup dialo g.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 c on f irm you wa nt to u s e t h e A VG Sec ur e S ea r c h en gine t h at c losely c o ope r ates wit h the Link Sc ann er S ur f S h ield f or y ou r maxi mum s ec u rity on li n e.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 2 H igh light an y it em i n t he C om ponent Select i on lis t , an d a b rief d esc ription of the re s pe c t iv e c omp on en t w i ll be dis pla y e d on t he rig ht s ide of this sec ti o n.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 3 3 . 7 . In stal l at i o n w as su c c ess f u l T he I n s ta.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 4 4 . Aft er I n sta l la t ion 4 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 5 I f A V G f a i ls t o ide ntify t he E I CA R te s t fil e a s a v i rus , you s houl d che ck the progra m configu ra t i on a ga i n! 4 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 6 5 . AV G Us e r I n t e r fa c e A VG A ntiV irus 20 13 ope ns.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 7 allow s q uic k ac ces s t o s c an nin g and up da t ing within AVG A n t i V irus 2 01 3 . D et a ils > > 5 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 8 o C op y t o c lipb oar d - U s e t his link to copy t he lic ense n umber , a nd pa s te it wh er e n eed ed . T his w ay y ou c an be s u re t he lic ense n umb er is e nter ed c or rect ly .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 9 c od e u s e d in the pr od uc t : Li c ens e A gree m e nt - T he tab of f er s t he f ull w or din g of the l ic e ns e agr eeme nt be t we en y ou a nd A VG T ec h no log ies : 5 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 0 Scan fi le.. . - Allows y ou t o r un an on -d emand t e s t on a si n gle spec if ic f ile. Clic k t his option t o ope n a ne w wind ow w i th the t r ee s t r uc ture of your dis k .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 1 as Buy now a nd A c ti v at e , allow i n g y ou to buy t he f ull v ersi o n o f t h e pr og ra m righ t aw ay .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 2 5 . 3 . Comp o n en t s Ove r vi e w I ns ta l led c o mpon e nts ove rview c an b e f oun d in a h oriz o nt a l s trip of blo c k s in the c en t ra l s ec tion of t h e main w ind ow .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 3 Li v eK i ve is de dic ated t o on line data back up on s e c ur ed serv er s .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 4 A VG S y s te m T ra y Icon di s p la y I n f ull c o l o r w it h no add ed elemen t s t h e ic on indic a t e s t h at all AVG A ntiV irus 2 01 3 c ompo nen t s ar e a c ti v e and f ully f un c t io na l.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 5 Tempo ra ri l y dis abl e A V G prote ct i on - the op t ion allow s y o u t o s w it c h o ff t h e entire p r otec ti o n s ecur ed by y ou r AVG Ant i Vi rus 201 3 at o nce.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 6 s c a n) . U pdat e now - cl ic k t h e Updat e n ow li n k t .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 7 The s ta te of any curre ntly op e n e d we b brows er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 8 6 . AV G C omp on e nt s 6 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 2 9 Enabl e d / D i s a bl ed - T he bu t ton may r emind y ou of a t r af f ic ligh t , bo t h i n app ea r an c e a nd in f unct ion alit y .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 0 D i a l og controls T o swit ch b etwe en both sec ti o ns of the dialo g, y ou c an s imply c lic k anywh er e in t h e re s pe c t iv e s e r v i ce p an el.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 1 - U s e t he gr een ar r ow in t he u ppe r lef t s e c t ion o f t h e d ialog t o get ba c k t o t h e m a i n u s e r int e rf ac e w it h t h e c ompo ne nt s ' o v erv iew .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 2 mean s t h at t he I den t ity P r ot e c t ion s ecurity s e r v i ce is ac t iv e a nd f ully fu nc ti o na l .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 3 D i a l og controls T o swit ch b etwe en both sec ti o ns of the dialo g, y ou c an s imply c lic k anywh er e in t h e re s pe c t iv e s e r v i ce p an el.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 4 D et ail s - Clic k t he bu t ton, an d a b rief d esc ription of the high lighted s er v ic e a pp ear s in t he b ot tom pa rt of th d ialog .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 5 C ontrol butt ons A nalyz e now ( dis play ed b efor e t he an.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 6 7 . AV G S e curit y Tool b a r A V G Security Tool bar i s a .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 7 D o N ot Tra ck - t he D N T s er v ic e h elps y ou iden t if y we bsi tes t ha t ar e c ollec ting data abo ut y o ur on line act iv iti e s , an d giv e s y o u t he c ho i c e t o a llow o r d is allow it .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 8 8 . AV G D o Not Tr a ck A V G D o Not Trac k h elp s you iden t if y w ebsit es t ha t a re c ollect ing da t a a bou t y ou r on line ac ti v it ies .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 3 9 c ollect d at a a bo ut y our on l ine act iv it y wh i le you are logg ed- i n . Ex amples of S o c ial butt on s i n c lud e: Facebo ok S o c ial P lugin s , T wit ter Butt on , Goo gle +1.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 0 8 . 3 . B l oc ki n g tr ac ki n g p r oc e sses W it h t he l.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 1 B l oc k t he fol lowi ng - I n this sec ti o n y ou can s ee a box with a lis t o f k n ow n data collec t ion s er v ic e s t h at c a n be c las si f i e d as A d Ne t wo rk s.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 2 9 . AV G A d v an ce d S e tt i n g s T he ad v anc e d c o nf i g ura t ion dialog of A V G Ant i V irus 20 13 ope ns in a n ew win do w named A dvanc ed A V G Sett i ngs .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 3 A new d ialog pop s -u p inf or ming y ou that in or de r to c.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 4 o U pdat e notificat i ons (on , b y d ef a ult) - de c ide wh.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 5 o A V G A dvis or not i ficat i ons ( on, b y d efault) - dec id e wh ethe r inf or mati o n up on AV G A d v i sor act iv iti e s s hou l d b e d is played in the s lide pan el on t he s y s tem tray.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 6 s it u ations wh en it might be dis tur bing (see als o t h e Gaming mode s ect ion of t he A d va nced s ett ings/ Appe ar ance c h apter in this doc u m en t ) .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 7 H ow to dis a bl e A V G prote ct i on T ic k the Tem poraril y dis abl e A VG prot ect i on c he c k bo x , an d c on f irm y o ur c h oic e b y pre s s ing t h e A pp ly bu t t on .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 8 I n t he R es id e n t S hiel d S et ting s dialo g y ou can a.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 4 9 Scan fi les ref err ed i n re gi s t ry ( on b y defau lt ) - .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 0 9 . 4 . 2 . A n ti -Rootki t I n t he A nt i - Root k i t s e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 1 9 . 4 . 3 . Cac h e Server T he Ca che S erv er Set ti ngs dia.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 2 9 . 5 . 1 . Emai l Sc an n er T he E mai l S c anne r dialog i.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 3 R eport P otent i all y Unw ant ed P rograms and S pywa re threa ts ( on b y defau lt ) - c he c k to a c ti v ate s c a nn i n g f or s pywar e as w ell as f or v iru s es.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 4 By de f ault, the c er t if i cat ion t ext consi s ts o f jus t a ba s ic in f or mati o n t ha t s tates N o v iru s f ou nd in this mes s a ge.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 5 T he A tt achment fil te r dia log allow s y o u t o s et up pa ra m e t e r s fo r email mes s a ge att achment s c a nning .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 6 I n t his dialog you c an s et up a new Em a il S cann er s e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 7 Type of l ogi n - def ines t h e met h od f or de t e r mining.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 8 SM TP S e rv er Na m e - in t h is f ield y ou can s pe c if y.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 5 9 I n t his dialog you c an s et up a new Em a il S cann er s e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 0 Type of l ogi n - def ines t h e met h od f or de t e r mining.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 1 ar e a c c e s s ed.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 2 I n t he W eb P rotec ti on dialog you c an e dit t h e c ompo nen t ' s conf igur ati o n re gar ding t he s c a n of the we bsi te c on t en t .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 3 ab s olutely s u re.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 4 A l wa ys p rompt ( on b y default ) - whe n a t hr ea t is de.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 5 Sca n s e tt i ngs T he S c an s et t i ngs s ec tion of f er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 6 c an not ge t infec ted w ill no t b e s cann ed , for ins tan.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 7 Al l p ara m e t e r s set up in this conf igu ra t ion dialo .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 8 T he li st o f pa rameter s is ide nt ic a l to those a v ailable f or t h e S c a n of the wh ole computer .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 6 9 9 . 8 . 4 . R emovab l e devi c e sc an T he ed it ing inter f.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 0 N ext , t he tex t f ield called Na m e ( dea c t iv ated f o r all d efault s c h ed ules ) st ates t he n ame a s s ign ed t o t his v e ry s c h ed ule b y t h e pr ogr am v e ndo r.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 1 ic on : A new AV G s y s tem t r ay ic o n t he n a pp ear s ( in f ull c o lor w ith a f lash ligh t ) inf or m ing a s c he du l e d s c an is ru nnin g.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 2 t h at increa s es y our c o mputer sec ur it y e v en more , h ow ev er it may b l o c k lega l pr ogr ams , and is t h er ef or e s w it c he d of f b y de fa ult .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 3 Se t a d ditio na l s ca n re ports C lic k the S et addition a l s c an report s .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 4 dia log t h e dis pla y ed t r ee s t r uct ur e a c ti v ates and you c an s pe c i f y t h e f olde rs t o be s c an ned .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 5 imm e diately af t er t h e I nt e r ne t c on ne c t ion is rest or ed.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 6 C he c k the Run t he updat e a gain as s oon as the I n t ern.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 7 t h e c ompu t er re gular ly , a t least o nce a d ay! Po s t.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 8 9 . 1 0.1. Pr oxy T he pr oxy s e r v er is a s t a nd -alo ne serv er or a s er v ic e ru nning on a PC t ha t g ua ran t ee s s af er conn ect ion t o the I ntern et .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 7 9 A utoma t i c c o nf i gura ti on I f y ou selec t au t omati .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 0 9 . 1 0.3. Man ag e T he Upda te m a nagement d ialog of f er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 1 T he c ha r t in the dialog dis p lay s a l is t of ex ceptions , if an y hav e bee n alr ea dy de f ined . Eac h it em has a c he c k bo x next to it .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 2 9 . 1 2. V i r u s V au l t T he V irus Vaul t mai nt enance d.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 3 9 . 1 3. A V G Sel f Pr otec t i o n T he A V G S elf P rote c.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 4 W it hin t h e dialog , the f ollow ing s ett ing op t ion s a.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 5 Mos t com mo n thre a ts N ow ada y s , t he r e ar e f ar more t hr eats o ut t he r e t ha n p lain v ir uses .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 6 9 . 1 5. Ig n or e err or stat u s I n t he I gnore error s ta.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 7 un i q ue att rib utes of t h e n etwo r k (s p eci fi cally t he M AC add re s s ) , an d w il l not dis p lay t he no t if ic ati o n ne x t t ime.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 8 1 0 . AV G S c an n i n g By de f ault, A V G Ant i V irus 20 .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 8 9 I n t he Scan Options dia log, y o u c a n s ee t hr ee main s.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 0 Sca n configura ti on e di t in g You c an ed it t he W hol e .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 1 t h e s c an ning f or s pywa r e as we ll as f or v ir us es.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 2 o C om pute r s hutdown optio ns - decide wh ether t h e c o m pu t er s ho uld be s hut d ow n au t omatic ally on c e the ru nning s c a nn ing p r oces s i s ov er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 3 t h e op t ion of h av ing a speci f ic f old er s c a nn ed w.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 4 H ea l / remove vi rus i nf ec ti on wi t hout as k i ng me ( on b y de f a ult ) : I f a v ir us is iden t if ied du rin g s c a nn i n g it c a n b e hea l e d au t o mati cally if a c ur e is av ailab le.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 5 o C om pute r s hutdown optio ns - decide wh ether t h e c o m pu t er s ho uld be s hut d ow n au t omatic ally on c e the ru nning s c a nn ing p r oces s i s ov er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 6 W arnin g: The s e s c an s ett ing s are iden t ic al to t he p ar ameters f o r a n ew ly de f in ed s c an - as desc rib ed in the AV G Sc an ning / S c an s c he duling / H ow t o S c a n c ha pter .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 7 av g s c anx f or 32 bit s OS av g s c ana f or 64 bit s OS Synta x of the c om ma nd T he s y ntax of the c ommand f ollows: av g s c anx / para m e t er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 8 / EX T Sc an t he s e e x t en s ion s / f or ex a mple E X T .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 9 9 / H I D D EN R ep ort f iles w it h hidde n e x tensi o ns / I.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 0 Lo c at ion On e ach tab y ou can s im p ly swit ch the &quo.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 1 C ontrols in the dia l og Save - S a v es all c ha ng es y ou hav e per f ormed on this t ab or on a ny other t a b o n t his dialog , a nd s w i tc he s b ac k t o t he Sc he duled s c an s ov er v iew .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 2 R eport enhanc ed s e t of P o t entiall y Unwa n t ed P rog.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 3 C om pute r s hutdown optio ns - decide wh ether t h e c o m pu t er s ho uld be s hut d ow n a ut o mat ic a lly on c e the ru nning s c an ning pr oc ess is o v er .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 4 C lic k the S et addition a l s c an report s .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 5 o C : P r og ram F iles o in 64- b it ve r s ion C : P ro gr.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 6 1 0. 5 . S c an Re su l t s T he S c an res ults overv i e w dia log pr ov id es a li st of re s ult s of a ll s o f ar pe rf or med s c an s .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 7 D i a l og controls Vi ew deta i l s - Clic k t he butt o n t o s ee d et a iled inf orma t ion ab ou t a selec ted s c an (h igh lighted in the c ha rt ab ov e) .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 8 1 1 . V irus V au l t Vi rus Vaul t is a saf e e nv iro nme nt f or the mana ge m e nt of s uspect / inf ec t e d o bject s detec ted dur ing A VG t e s ts .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 0 9 T he f ollowin g c o ntro l b utt on s ar e a c c es si b le f ro m t he Vi rus V ault int e rf ac e : R es tore - re mov es t he inf ec ted f i le ba c k t o it s o rigina l loc ation on y ou r d is k .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 0 1 2 . Hi s tory T he His tory s ect ion inc lud es in f or mat io n on all pa s t e v en t s ( s uc h as u pd at e s , s c an s , d et e c ti o ns, e t c.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 1 re m o v ed! Eac h ic on c an e i ther be s olid or cut i n .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 2 W it hin t h is w arn i n g d ialog you will f ind inf or ma.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 3 For ea c h de t e c ted obje c t t h e f ollow ing inf or ma.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 4 1 2. 3 . Emai l Pr otec t i o n d et ec t i o n T he E mai l.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 5 1 2. 4 . On l i n e S h i el d fi n d i n g s Onli ne Shi el.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 6 For ea c h de t e c ted obje c t t h e f ollow ing inf or ma.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 7 1 2. 5 . Even t h i s to r y l og T he E v ent hi s t o ry l.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 8 1 3 . AV G U pdate s N o s ec u rit y s of t w ar e c an g u.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 1 9 1 3. 3 . Up d ate l ev el s A VG A ntiV irus 20 13 of f ers .
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 2 0 1 4 . F A Q a n d Te c h ni ca l S u pp ort Shou ld y ou hav e any s a les or tec hn i cal trou ble w it h y our A V G Ant i Vi rus 201 3 ap plic ation, ther e a re s ev er al w ays t o ob t a in help.
A V G A n t i V i r us 2 0 1 3 © 2 0 1 2 C o p y ri g ht A V G T e c h no l o gi e s C Z , s .r. o . A l l ri g ht s re s e rv e d . 1 2 1 on re mov ing v ir uses , s pywar e, an d adv ic e on how to st ay pr otec ted. D i s c us s i on f orum : You can als o us e t h e A VG user s dis c uss ion f or um at htt p : // f or ums .
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté AVG AntiVirus 2013 c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du AVG AntiVirus 2013 - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation AVG AntiVirus 2013, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le AVG AntiVirus 2013 va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le AVG AntiVirus 2013, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du AVG AntiVirus 2013.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le AVG AntiVirus 2013. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei AVG AntiVirus 2013 ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.