User manual
64
AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.
o
Firewall disabled - this option switches Firewall off completely, all
network traffic is allowed but not checked!
o
Emergency mode (block all internet traffic) - select this option to
block all traffic on every single network port; Firewall is still running but
all network traffic is stopped
Enable gaming mode - Check this option to ensure that when running
full-screen applications (games, PowerPoint presentations etc.), the Firewall
will not display dialogs asking you whether you want to allow or block
communication for unknown applications. In case an unknown application tries
to communicate over the network at that time, the Firewall will allow or block
the attempt automatically according to settings in the current profile.
Please note: The software vendor has set up all AVG components to give optimum
performance. Unless you have a real reason to do so, do not change the AVG
configuration. Any changes to settings should only be performed by an experienced
user. If you need to change Firewall configuration, select the system menu item
File / Firewall settings and edit the Firewall configuration in the newly opened
Firewall Settings dialog.
Control buttons available are:
Configuration wizard - press the button to launch the Firewall
configuration wizard that will lead you step by step through the Firewall
component configuration
Save changes - press this button to save and apply any changes made in this
dialog
Cancel - press this button to return to the default AVG user interface (
components overview)
10.7.E-mail Scanner
10.7.1.E-mail Scanner Principles
One of the most common sources of viruses and trojans is via e-mail. Phishing and
spam make e-mail an even greater source of risks. Free e-mail accounts are more likely
to receive such malicious e-mails (as they rarely employ anti-spam technology), and
home users rely quite heavily on such e-mail. Also home users, surfing unknown sites
and filling in online forms with personal data (such as their e-mail address) increase
exposure to attacks via e-mail. Companies usually use corporate e-mail accounts and