User manual

Table Of Contents
A V G Internet Security 201 2 © 2012 C opyright A V G Technologies C Z, s.r.o. A ll rights res erved. 18 8
This is a brief description of the most common examples of such objects:
Hidden files - the hidden files are by default not visible in Windows, and some viruses or
other threats may try to avoid their detection by storing files with this attribute. If AVG
Internet Security 2012 reports a hidden file which you suspect to be malicious, you can
move it to your Virus Vault.
Cookies - cookies are plain-text files which are used by websites to store user-specific
information, which is later used for loading custom website layout, pre-filling user name,
etc.
Suspicious registry keys - some malware stores its information in the Windows registry to
ensure it is loaded on startup or to extend its effect on the operating system.
12.7.5. Rootkits Tab
The Rootkits tab displays information on rootkits detected during anti-rootkit scanning included
within the Whole Computer Scan.
A rootkit is a program designed to take fundamental control of a computer system, without
authorization by the system's owners and legitimate managers. Access to the hardware is rarely
required as a rootkit is intended to seize control of the operating system running on the hardware.
Typically, rootkits act to obscure their presence on the system through subversion or evasion of
standard operating system security mechanisms. They are often also Trojans, thus fooling users
into believing they are safe to run on their systems. Techniques used to accomplish this can include
concealing running processes from monitoring programs, or hiding files or system data from the
operating system.
The structure of this tab is basically the same as the Infections tab or the Spyware tab.
12.7.6. Information Tab
The Information tab contains data on such "findings" that cannot be categorized as infections,
spyware, etc. They can neither be positively labeled as dangerous but they are still worth your
attention. The AVG Internet Security 2012 scan is able to detect files which may not be infected,
but are suspicious. These files are reported either as Warning, or as Information.
The severity Information can be reported for one of the following reasons:
Run-time packed - the file was packed with one of the less common run-time packers,
which may indicate an attempt to prevent scanning of such a file. However, not every report
of such a file indicates a virus.
Run-time packed recursive - similar to above, however less frequent amongst common
software. Such files are suspicious and their removal or submission for analysis should be
considered.
Password protected archive or document - password protected files can not be scanned
by AVG Internet Security 2012 (or generally any other anti-malware program).
Document with macros - the reported document contains macros, which may be
malicious.