TrustPort Antivirus 2015 manual

TrustPort Antivirus 2015
7 · 1
PDF manual
 · 199 pages
English
manualTrustPort Antivirus 2015
12
are more exceptions indeed - for example the macrovirus Melissa uses e-mail for its spread)
and needs no "host".
Funny programs - It is perhaps a strange category among the other malicious codes, but it
belongs here. Most of the funny programs behave in a way that they are impossible to quit
correctly and hard restart is unavoidable. It may cause fairly serious problems to machines that
should run non-stop. That is why antivirus programs are often set to detect these undesirable
codes.
Therefore viruses and other malicious programs are detected by antivirus programs. When operating
computers, the following problems can be met frequently:
Programming errors - In spite of the fact that programmers do their best to test and check
their work, sometimes an error or omission occurs. The more complicated and complex
software, the higher probability of an error, of course. That is why sometimes a computer
program disobeys its owner without any obvious reason. It can be due to a virus, but not
necessarily.
Software or hardware collision - Yes, it is like that. Even computer programs compete with
each other for the free system resources or battle against the lack of capacity (for example,
free disk space). Apart from the fact that the most hardware, despite the one hundred percent
compatibility declared, is much less compatible. These breakdowns are often adjudicated to the
effects of malicious codes (according to the motto "the reason is unknown, there must be some
virus behind it").
Hardware failures - Another very often "defect" that we can come across in the world of
information technologies. Harddisk failures may lead to irrevocable loss of data (backup, backup
and once more backup!), but it is not always the consequence of a malicious code attack.
Moreover, viruses are not able to damage the hardware physically (even if they can "simulate"
its defect). So if you see some strange colors on the screen, first check the graphic card and its
functionality - sooner than you start to revile the virus authors or the antivirus software
developers.
Software damages - A software damage (being a typical sign of computer viruses) can be
caused by many other ways. For example an incorrect program can terminate (for example due
to short-term power cut) during saving data file. Not every data or software damage is a result
of a work of a computer virus. But it is convenient to be cautious so scan the computer properly
and try to find the source of problems at any rate. At least in order to avoid the same situation
in the future.
False alarms - The illness of all antivirus programs. Despite there are less and less false alarms
(situations, when the scanning program classifies a clean file or area as infected or suspicious),
they will never disappear. "False alarms" are sort of the tax on security, when the antivirus
software developers try to reach the optimal price/performance ratio (in this case it is more the
scanning quickness/user's security ratio).

2.2 Computer viruses classification

Computer viruses and malicious codes in general can be divided with respect to various aspects and
attributes. The attempt to classify codes according to some attributes is not easy at all and in practice,
one can come across codes that combine properties of several categories. Well, there is not everything
only black or white in the real world.
We point out that the computer viruses field is developing very dynamically and that some following
categories belong to the museum at this moment - nevertheless, we list them all for completeness sake.
According to the visible symptoms:

Viruses without symptoms

The most of malicious codes try to show themselves as little as possible - at least in the way
that the attacked user doesn't notice them. The reason is quite simple: any evidence causes the
revelation and the user starts to fight against the malicious code and if she or he does it a little
adroitly, she or he will usually win. This is just the reason why programmers intend to restrict
these symptoms to absolutely unavoidable minimum.

Viruses with a graphic exhibition

If an author of a malicious code decides to involve some exhibition, it is usually the graphic one.
It may be displaying some message on the screen (stop testing products on animals, stop
wildwood felling etc.) or it can modify the desktop. Often programmers take advantage of
graphic exhibition for hiding the virus presence in the computer. It can concern for example
showing some prepared pictures that look like operating system alarm when executing the

Manual

View the manual for the TrustPort Antivirus 2015 here, for free. This manual comes under the category photo/video software and has been rated by 1 people with an average of a 7. This manual is available in the following languages: English. Do you have a question about the TrustPort Antivirus 2015 or do you need help? Ask your question here

Index

Need help?

Do you have a question about the TrustPort and is the answer not in the manual?

  • Receive updates on solutions
  • Get answers to your question

Question and answer

Number of questions: 0

TrustPort Antivirus 2015 specifications

Below you will find the product specifications and the manual specifications of the TrustPort Antivirus 2015.

General
BrandTrustPort
ModelAntivirus 2015
Productphoto/video software
LanguageEnglish
FiletypeUser manual (PDF)

Frequently Asked Questions

Can't find the answer to your question in the manual? You may find the answer to your question in the FAQs about the TrustPort Antivirus 2015 below.

Is the manual of the TrustPort Antivirus 2015 available in English?

Yes, the manual of the TrustPort Antivirus 2015 is available in English .

Is your question not listed? Ask your question here

No results