TrustPort Internet Security 2015 manual

TrustPort Internet Security 2015
7.4 · 1
PDF manual
 · 199 pages
English
manualTrustPort Internet Security 2015
11

1.3 What is new in this version

TrustPort Antivirus 2015
Enhancement to the proprietary TrustPort scanning engine
Boot CD creation in Windows8 OS
A new program GUI interface like Windows 8: a new graphical style, a new design, colours
unification, icon unification, new animations
An improved and lighter updating system
New firewall with more user profiles - Home, Work, Public networks with individual
automatically defined firewall rules and configuration for more network adapters «
Support of Android and iOS applications - Portunes, Skytale «

2 Introduction to the antivirus protection

In this part of the manual we will try to introduce you the mystique of antivirus problems. We will give
you the basic information step by step in five chapters. You should know the information for proper
using of your antivirus program and you should extract the basic set of pieces of information to
understand better how this antivirus software works, what is and what is not dangerous to change in its
settings and why.
What is a computer virus and what is not
Computer viruses classification
Ten commandments of antivirus protection
Which extensions are (un)safe
Antivirus protection glossary

2.1 What is a computer virus and what is not

Computers are threatened not only by viruses but also by other malicious codes. Antivirus programs
detect most of them. But there often appear different phenomena in computers that cannot be classified
as malicious codes - malware (malicious/malign software).
Computer virus - It is a piece of a program code that is able to make copies of itself through the
host application more than once. In a plain language: Virus is a computer program that spreads
without letting know the user sitting at the computer. It has no other property. It does not need
to do harm, it does not need to call anybody's attention to itself, which are examples of extra
symptoms that their authors add for various reasons.
Trojan horse - It is in fact any computer program, which on one hand does what the user is
expecting it to do, but on the other hand does something that the user has no notion of and
that she or he probably would not agree with. Let us give you an example: some dubious
software downloaded from Internet - when you execute it, you can take pleasure in watching a
beautiful African dancer, but the same program can be sending files from your computer at the
moment (and we certainly do not need to emphasize that it makes no difference between
private data and less private data - it is just a dull program) or encrypting some data and
consequently asking for a kickback for the code.
Backdoors - As the name of this software suggests, these are applications that "open" the
computer (without warning the user) for the attackers, who are interested in the data stored on
it or in your computer as a tool for their future attacks. More than a type, this is a software
property. Genuine backdoors occur very seldom, more likely they are combined with another
application type, for example Trojan horses or computer viruses.
E-mail worms - It is a slight exaggeration to say that it is a computer virus that uses e-mail
services for its spread. But it is not as simple as that. While a computer virus needs host
applications for its spread (with the exception of so-called accompanying viruses, which adopt
the name of exe files, but they have the com extension and "presume" on the fact that this
extension is preferred by operating systems), an e-mail worm is generally malicious itself (there

Manual

View the manual for the TrustPort Internet Security 2015 here, for free. This manual comes under the category photo/video software and has been rated by 1 people with an average of a 7.4. This manual is available in the following languages: English. Do you have a question about the TrustPort Internet Security 2015 or do you need help? Ask your question here

Index

Need help?

Do you have a question about the TrustPort and is the answer not in the manual?

  • Receive updates on solutions
  • Get answers to your question

Question and answer

Number of questions: 0

TrustPort Internet Security 2015 specifications

Below you will find the product specifications and the manual specifications of the TrustPort Internet Security 2015.

General
BrandTrustPort
ModelInternet Security 2015
Productphoto/video software
LanguageEnglish
FiletypeUser manual (PDF)

Frequently Asked Questions

Can't find the answer to your question in the manual? You may find the answer to your question in the FAQs about the TrustPort Internet Security 2015 below.

Is the manual of the TrustPort Internet Security 2015 available in English?

Yes, the manual of the TrustPort Internet Security 2015 is available in English .

Is your question not listed? Ask your question here

No results