Views
4 years ago

Nod-obalka US.cdr

Nod-obalka US.cdr

3 Table of Contents

3 Table of Contents Table of Contents.........................................................................................3 Introduction .........................................................................................................5 Installation of NOD32 Anti-virus System ........................................................7 Centralized Update...............................................................................................9 Application of NOD32 Program .....................................................................11 Environment and Control Elements of NOD32 .............................................13 Targets Tab..................................................................................................13 Add Directory Dialog Window ..................................................................14 Log Tab ........................................................................................................15 Actions Tab ..................................................................................................16 Network Tab................................................................................................18 Setup Tab .....................................................................................................20 Extension Editor..........................................................................................23 Virus Detected! Panel..................................................................................25 Use of the Amon Program...............................................................................27 Description of the Environment and Control Elements of the Amon Program.................................................30 Amon Main Panel .......................................................................................30 Targets Tab..................................................................................................32 Extension Editor..........................................................................................34 Methods Tab................................................................................................36 Actions Tab ..................................................................................................37 Exclude Tab .................................................................................................39

4 Adding to and Modification of an Item in the List of Objects Excluded from Scanning: ......................................40 Network Tab................................................................................................43 Security Tab.................................................................................................45 Virus Alert! Warning Panel........................................................................47 Information Window .................................................................................49 Use of NOD32DOS............................................................................................51 Use of NOD32 and NOD32DOS Programs from the Command Line..........54 Annexes .............................................................................................................55 NOD32 and NOD32DOS Command Line Switches .......................................56 General.........................................................................................................56 Detection......................................................................................................57 Heuristic analysis........................................................................................59 Protocol........................................................................................................59 Cleaning.......................................................................................................60 Test Scheduling...........................................................................................61 Network .......................................................................................................61 Heuristic Analysis Keyword List.......................................................................62 Some technical terms and their meaning ......................................................64 Register ...............................................................................................................67 Conclusion..........................................................................................................72 Contact us at:...............................................................................................72

PubTeX output 1999.06.17:0240
HP JFS 3.3 and HP OnLineJFS 3.3 Release Notes - Previous Directory
Configuring HP-UX For Peripherals - Previous Directory
PKOMP 89/5 Analysis of the Bouncing Ball Virus M S Olivier H W ...
The Programmer's Guide to TRSDOS Version 6 - Tim Mann's Home ...
Apple Mac OS 7.6.1 Software Update - New features and reinstallation procedures - Mac OS 7.6.1 Software Update - New features and reinstallation procedures