User Manual
Table Of Contents
- Bitdefender Antivirus Plus
- Table of Contents
- Installation
- Getting started
- How to
- 8. Installation
- 8.1. How do I install Bitdefender on a second computer?
- 8.2. How can I reinstall Bitdefender?
- 8.3. Where can I download my Bitdefender product from?
- 8.4. How can I change the language of my Bitdefender product?
- 8.5. How do I use my Bitdefender subscription after a Windows upgrade?
- 8.6. How can I upgrade to the latest Bitdefender version?
- 9. Subscriptions
- 10. Bitdefender Central
- 11. Scanning with Bitdefender
- 11.1. How do I scan a file or a folder?
- 11.2. How do I scan my system?
- 11.3. How do I schedule a scan?
- 11.4. How do I create a custom scan task?
- 11.5. How do I except a folder from being scanned?
- 11.6. What to do when Bitdefender detected a clean file as infected?
- 11.7. How do I check what threats Bitdefender detected?
- 12. Privacy protection
- 13. Useful Information
- 13.1. How do I test my security solution?
- 13.2. How do I remove Bitdefender?
- 13.3. How do I remove Bitdefender VPN?
- 13.4. How do I automatically shut down the computer after the scan is over?
- 13.5. How do I configure Bitdefender to use a proxy internet connection?
- 13.6. Am I using a 32 bit or a 64 bit version of Windows?
- 13.7. How do I display hidden objects in Windows?
- 13.8. How do I remove other security solutions?
- 13.9. How do I restart in Safe Mode?
- 8. Installation
- Managing your security
- 14. Antivirus protection
- 15. Advanced Threat Defense
- 16. Online Threat Prevention
- 17. Vulnerability
- 18. Safe Files
- 19. Ransomware Remediation
- 20. Password Manager protection for your credentials
- 21. VPN
- 22. Safepay security for online transactions
- 23. Data Protection
- 24. USB Immunizer
- System optimization
- Troubleshooting
- 26. Solving common issues
- 26.1. My system appears to be slow
- 26.2. Scan doesn't start
- 26.3. I can no longer use an app
- 26.4. What to do when Bitdefender blocks a safe website or online app
- 26.5. What to do if Bitdefender detects a safe app as ransomware
- 26.6. How to update Bitdefender on a slow internet connection
- 26.7. Bitdefender services are not responding
- 26.8. The Autofill feature in my Wallet doesn't work
- 26.9. Bitdefender removal failed
- 26.10. My system doesn't boot up after installing Bitdefender
- 27. Removing threats from your system
- 27.1. Bitdefender Rescue Mode (Rescue Environment in Windows 10)
- 27.2. What to do when Bitdefender finds threats on your computer?
- 27.3. How do I clean a threat in an archive?
- 27.4. How do I clean a threat in an email archive?
- 27.5. What to do if I suspect a file as being dangerous?
- 27.6. What are the password-protected files in the scan log?
- 27.7. What are the skipped items in the scan log?
- 27.8. What are the over-compressed files in the scan log?
- 27.9. Why did Bitdefender automatically delete an infected file?
- 26. Solving common issues
- Contact us
- Glossary

Script
Another term for macro or batch file, a script is a list of commands that
can be executed without user interaction.
Spam
Electronic junk mail or junk newsgroup postings. Generally known as
any unsolicited email.
Spyware
Any software that covertly gathers user information through the user's
internet connection without his or her knowledge, usually for advertising
purposes. Spyware apps are typically bundled as a hidden component
of freeware or shareware programs that can be downloaded from the
internet; however, it should be noted that the majority of shareware and
freeware apps do not come with spyware. Once installed, the spyware
monitors user activity on the internet and transmits that information in
the background to someone else. Spyware can also gather information
about email addresses and even passwords and credit card numbers.
Spyware's similarity to a Trojan horse threat is the fact that users
unwittingly install the product when they install something else. A
common way to become a victim of spyware is to download certain
peer-to-peer file swapping products that are available today.
Aside from the questions of ethics and privacy, spyware steals from the
user by using the computer's memory resources and also by eating
bandwidth as it sends information back to the spyware's home base via
the user's internet connection. Because spyware is using memory and
system resources, the apps running in the background can lead to system
crashes or general system instability.
Startup items
Any files placed in this folder will open when the computer starts. For
example, a startup screen, a sound file to be played when the computer
first starts, a reminder calendar, or apps can be startup items. Normally,
an alias of a file is placed in this folder rather than the file itself.
Subscription
Purchase agreement that gives the user the right to use a particular
product or service on a specific number of devices and for a certain
Glossary 169
Bitdefender Antivirus Plus










