2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
Events
An action or occurrence detected by a program. Events can be user actions,
such as clicking a mouse button or pressing a key, or system occurrences, such
as running out of memory.
False positive
Occurs when a scanner identifies a file as infected when in fact it is not.
Filename extension
The portion of a filename, following the final point, which indicates the kind of
data stored in the file.
Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS.
They are usually from one to three letters (some sad old OSes support no more
than three). Examples include "c" for C source code, "ps" for PostScript, "txt"
for arbitrary text.
Heuristic
A rule-based method of identifying new viruses. This method of scanning does
not rely on specific virus signatures. The advantage of the heuristic scan is that
it is not fooled by a new variant of an existing virus. However, it might
occasionally report suspicious code in normal programs, generating the so-called
"false positive".
IP
Internet Protocol - A routable protocol in the TCP/IP protocol suite that is
responsible for IP addressing, routing, and the fragmentation and reassembly
of IP packets.
Java applet
A Java program which is designed to run only on a web page. To use an applet
on a web page, you would specify the name of the applet and the size (length
and width, in pixels) that the applet can utilize. When the web page is accessed,
the browser downloads the applet from a server and runs it on the user's
machine (the client). Applets differ from applications in that they are governed
by a strict security protocol.
For example, even though applets run on the client, they cannot read or write
data onto the client's machine. Additionally, applets are further restricted so
that they can only read and write data from the same domain that they are
served from.
Macro virus
A type of computer virus that is encoded as a macro embedded in a document.
Many applications, such as Microsoft Word and Excel, support powerful macro
languages.
Glossary
178