User guide

.................................................................................79Proxy server setup4.6.10
.................................................................................79Alerts and notifications4.6.11
.............................................................................80Message format4.6.11.1
.................................................................................80Submission of files for analysis4.6.12
.................................................................................81System updates4.6.13
........................................................................81User interface4.7
.................................................................................81Graphics4.7.1
.................................................................................82Alerts and notifications4.7.2
.............................................................................82Advanced setup4.7.2.1
.................................................................................82Hidden notification windows4.7.3
.................................................................................82Access setup4.7.4
.................................................................................83Program menu4.7.5
.................................................................................84Context menu4.7.6
.................................................................................84Gamer mode4.7.7
..................................................85
Advanced user5.
........................................................................85Profile manager5.1
........................................................................85Keyboard shortcuts5.2
........................................................................86Diagnostics5.3
........................................................................86Import and export settings5.4
........................................................................86Idle state detection5.5
........................................................................87ESET SysInspector5.6
.................................................................................87Introduction to ESET SysInspector5.6.1
.............................................................................87Starting ESET SysInspector5.6.1.1
.................................................................................88User Interface and application usage5.6.2
.............................................................................88Program Controls5.6.2.1
.............................................................................89Navigating in ESET SysInspector5.6.2.2
...............................................................................90Keyboard shortcuts5.6.2.2.1
.............................................................................91Compare5.6.2.3
.................................................................................92Command line parameters5.6.3
.................................................................................93Service Script5.6.4
.............................................................................93Generating Service script5.6.4.1
.............................................................................93Structure of the Service script5.6.4.2
.............................................................................96Executing Service scripts5.6.4.3
.................................................................................96FAQ5.6.5
.................................................................................97ESET SysInspector as part of ESET Smart Security5.6.6
........................................................................97ESET SysRescue5.7
.................................................................................98Minimum requirements5.7.1
.................................................................................98How to create rescue CD5.7.2
.................................................................................98Target selection5.7.3
.................................................................................99Settings5.7.4
.............................................................................99Folders5.7.4.1
.............................................................................99ESET Antivirus5.7.4.2
.............................................................................99Advanced settings5.7.4.3
.............................................................................100Internet protocol5.7.4.4
.............................................................................100Bootable USB device5.7.4.5
.............................................................................100Burn5.7.4.6
.................................................................................100Working with ESET SysRescue5.7.5
.............................................................................101Using ESET SysRescue5.7.5.1
........................................................................101Command Line5.8
..................................................103
Glossary6.
........................................................................103Types of infiltration6.1
.................................................................................103Viruses6.1.1
.................................................................................103Worms6.1.2
.................................................................................103Trojans6.1.3
.................................................................................104Rootkits6.1.4
.................................................................................104Adware6.1.5
.................................................................................104Spyware6.1.6
.................................................................................104Packers6.1.7
.................................................................................105Potentially unsafe applications6.1.8
.................................................................................105Potentially unwanted applications6.1.9
........................................................................105Types of remote attacks6.2
.................................................................................105DoS attacks6.2.1
.................................................................................105DNS Poisoning6.2.2
.................................................................................105Worm attacks6.2.3
.................................................................................106Port scanning6.2.4
.................................................................................106TCP desynchronization6.2.5
.................................................................................106SMB Relay6.2.6
.................................................................................106ICMP attacks6.2.7
........................................................................107Email6.3
.................................................................................107Advertisements6.3.1
.................................................................................107Hoaxes6.3.2
.................................................................................107Phishing6.3.3
.................................................................................108Recognizing spam scams6.3.4
.............................................................................108Rules6.3.4.1
.............................................................................108Whitelist6.3.4.2
.............................................................................108Blacklist6.3.4.3
.............................................................................109Server-side control6.3.4.4