Installation manual
...........................................................................90User Interface and application usage4.6.2
..........................................................................91Program Controls4.6.2.1
..........................................................................92Navigating in ESET SysInspector4.6.2.2
............................................................................93Keyboard shortcuts4.6.2.2.1
..........................................................................94Compare4.6.2.3
...........................................................................95Command line parameters4.6.3
...........................................................................95Service Script4.6.4
..........................................................................96Generating Service script4.6.4.1
..........................................................................96Structure of the Service script4.6.4.2
..........................................................................98Executing Service scripts4.6.4.3
...........................................................................98FAQ4.6.5
...........................................................................99ESET SysInspector as part of ESET Mail Security4.6.6
........................................................................100ESET SysRescue4.7
...........................................................................100Minimum requirements4.7.1
...........................................................................100How to create rescue CD4.7.2
...........................................................................101Target selection4.7.3
...........................................................................101Settings4.7.4
..........................................................................101Folders4.7.4.1
..........................................................................101ESET Antivirus4.7.4.2
..........................................................................102Advanced settings4.7.4.3
..........................................................................102Internet protocol4.7.4.4
..........................................................................102Bootable USB device4.7.4.5
..........................................................................102Burn4.7.4.6
...........................................................................103Working with ESET SysRescue4.7.5
..........................................................................103Using ESET SysRescue4.7.5.1
........................................................................103User interface options4.8
...........................................................................105Alerts and notifications4.8.1
...........................................................................106Disable GUI on Terminal Server4.8.2
........................................................................106Command Line4.9
........................................................................108Import and export settings4.10
........................................................................108ThreatSense.Net4.11
...........................................................................109Suspicious files4.11.1
...........................................................................110Statistics4.11.2
...........................................................................111Submission4.11.3
........................................................................112Remote administration4.12
........................................................................113Licenses4.13
..................................................114
Glossary5.
........................................................................114Types of infiltration5.1
...........................................................................114Viruses5.1.1
...........................................................................114Worms5.1.2
...........................................................................114Trojan horses5.1.3
...........................................................................115Rootkits5.1.4
...........................................................................115Adware5.1.5
...........................................................................115Spyware5.1.6
...........................................................................116Potentially unsafe applications5.1.7
...........................................................................116Potentially unwanted applications5.1.8
........................................................................116Email5.2
...........................................................................117Advertisements5.2.1
...........................................................................117Hoaxes5.2.2
...........................................................................117Phishing5.2.3
...........................................................................117Recognizing spam scams5.2.4
..........................................................................118Rules5.2.4.1
..........................................................................118Bayesian filter5.2.4.2
..........................................................................118Whitelist5.2.4.3
..........................................................................118Blacklist5.2.4.4
..........................................................................119Server-side control5.2.4.5