2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
● Command Line - the command used to start the process in the Windows
command line interface (cmd).
● Protocol - the IP protocol the rule applies to. You may see one of the following:
DescriptionProtocol
Includes all IP protocols.Any
Transmission Control Protocol - TCP enables two hosts to establish
a connection and exchange streams of data. TCP guarantees
TCP
delivery of data and also guarantees that packets will be delivered
in the same order in which they were sent.
User Datagram Protocol - UDP is an IP-based transport designed
for high performance. Games and other video-based applications
often use UDP.
UDP
Represents a specific IP protocol (other than TCP and UDP). You
can find the complete list of assigned IP protocol numbers at
www.iana.org/assignments/protocol-numbers.
A number
● Network Events - the network events the rule applies to. The following events
may be taken into account:
DescriptionEvent
Preliminary exchange of standard messages used by
connection-oriented protocols (such as TCP) to establish a
Connect
connection. With connection-oriented protocols, data traffic
between two computers occurs only after a connection is
established.
Flow of data between two computers.Traffic
State in which an application monitors the network awaiting to
establish a connection or to receive information from a peer
application.
Listen
● Local Ports - the ports on your computer the rule applies to.
● Remote Ports - the ports on the remote computers the rule applies to.
● Local - whether the rule applies only to computers in the local network.
● Action - whether the application is allowed or denied access to network or Internet
under the specified circumstances.
Firewall
100