Docstoc

Data AntiVirus

Document Sample
Data AntiVirus Powered By Docstoc
					                     G Data AntiVirus


Table of Contents
First steps                        2

Installation                       3

After Installation                 5

SecurityCenter                     6

Virus protection                   8

Virus signatures                  10

Web protection                    11

Settings                          12

Useful information                20




                                    1
G Data AntiVirus

First steps
This fast start guide will help you install your new G Data Software and gives you a few practical, easy tips on how to use
it to protect your computer optimally. The following sections will give you additional help on installing, getting started with
and general questions about the program:

         Do you have further questions? You can consult the online help in
         the software at any time. Just press the F1 key while using the
         program or click on the Help button. The answers to many queries can
         also be found in the Online database for frequently asked questions
         (FAQ), which can be accessed in the Support section on the G Data
         website.


ServiceCenter
Installation and use of G Data Software is generally easy and self-explanatory. However, should you encounter a problem,
just contact our G Data ServiceCenter via the Internet.

         www.gdatasoftware.co.uk




2
                                                                                                                    Installation


Installation
For your software to function correctly the following minimum requirements must be met:

  Microsoft Windows 7 / Vista (32/64bit), 1 GB available memory,
  Microsoft Windows XP (SP2 or higher, 32bit), 512 MB available memory.

If your computer is brand new or has already been protected by antivirus software you can follow these instructions to
install your software. If however you believe that your computer is already infected by a virus it is recommended that you
carry out a boot scan before installing your G Data software. For more information read the section Boot scan prior to
installation.

Step 1
Besides the normal installation from a CD or DVD there are several other methods of installing the software:

  CD/DVD installation: To start the installation, insert the G Data software-CD or DVD. An installation window will
  automatically open.
  USB Stick installation: If you purchased the software on a USB stick, attach the USB stick to your computer. An
  installation window will automatically open.
  Software download: To start the installation of the software that was downloaded from the Internet, double-click the
  downloaded file. An installation window will automatically open.

Step 2
Click on the button Install. A wizard guides you through the installation of the software on your computer.


Step 3
During the installation product activation takes place.

  Enter new registration number: If you are installing your G Data software for the first time, select this option and
  enter your registration number that was provided with your product. Depending on the product you will find this number
  either on the back of your user manual, in the purchase confirmation email or in the CD envelope.

         By entering the registration number the product is activated and you will also receive an email containing your
         access data that can be used if you need to install your software again in the future. If problems are encountered
         while entering your registration number then check that all characters are entered correctly. The following
         characters are sometimes confused: "I" (as in India) is read as the figure "1" or the letter "l" (as in lima). The
         same applies to "B" and "8", "G" and 6, "O" and "0", "Z" and "2".

  Enter access data: If you have already activated your G Data software, then you should have already received your
  access data (username & password). When reinstalling your G Data software or installing the software to computers
  that are using a multi user license then enter the access data here.

         You will receive your access data per email only. This data is not delivered with the product. If you have misplaced
         or forgotten your access data click on the link Access data lost? A web site will open where you can enter your
         registration number. After entering the registration number your access data will be sent to the email address
         that you supplied during the registration process. If your email address has changed then contact our support.

  Test version: To acquaint yourself with the G Data software free of charge, you can use our test version for a limited
  period. Enter a valid email address and your name and you will be sent your access data per email.

  Activate later: If you would just like to assess our software you can install it without entering any data. If however you
  choose this method the software will not be able to update from the Internet and you will not have complete protection
  from malware. You can enter your registration number or access data at any time to be able to update your software.

         G Data software can only provide adequate protection if updates are downloaded daily. Using the software without
         activating it will not provide sufficient protection.

Step 4
You will have to restart your computer after installation after which your G Data software will be available for use.




                                                                                                                                3
G Data AntiVirus

        If the installation does not start: It is possible that the Autostart-
        function of your computer is disabled. If this is the case then the
        installation process will not start automatically after inserting the CD or
        USB stick and no window will open to install your G Data software.

           If instead the autoplay window opens, click on the option run
           AUTOSTRT.EXE.
           If no selection window appears then search on the G Data installation
           medium using Windows Explorer for the file Setup or Setup.exe
           and start this file.

        Using this method the installation window of your G Data software will
        appear and you can start the installation.




4
                                                                                  After Installation


After Installation
    To open your G Data software program interface, click on the icon on
    your desktop pictured here. To learn how to use the SecurityCenter,
    read the section: SecurityCenter

    G Data icon: Your G Data software will permanently protect your
    computer from viruses and malware. An icon appears in the taskbar at
    the bottom next to the clock, where you can see if protection is active.
    You can read which additional functions are available in the section
    entitled: What is the security icon for?

      Fast check: Is there a suspicious file on your computer? Do you
      want to scan a download for viruses? Fast check enables you to
      check a file or folder with ease and without having to run the G Data
      software. Just use your mouse to select the file or folder in e.g.
      Windows Explorer, right-click and select Check for viruses (G Data
      AntiVirus). The selected files will now be automatically scanned for
      viruses.

    G Data Shredder: If you chose to install the Shredder, a desktop icon
    will be available for this feature. Data that you move to the Shredder will
    be deleted in such a manner that it cannot be restored even with
    professional data recovery tools. Alternatively you can right-click a file
    and select Shredder. The Shredder is not available in the program
    version G Data AntiVirus.

    If your computer does not start normally after installation of the
    G Data software. If your computer does not start Microsoft Windows
    after installing your G Data software and rebooting, the reason could be
    that the G Data CD is still in the drive. This CD also serves as a boot
    CD that can start an alternative operating system before the installed
    operating system starts to enable a boot scan. Remove the CD from
    the drive and start your computer as usual. You can find further
    information about the Boot CD in the section: BootScan




                                                                                                   5
G Data AntiVirus

SecurityCenter
After installation your virus protection is active. You can access any of the additional features of the software by opening
the SecurityCenter. If any intervention is required you will be automatically informed by the relevant information in the
task bar of your computer. With just one click you can fix any problems regarding your G Data software to ensure full
protection of your computer. This can be achieved by means of the Security Status symbol.

         As long as a green tick is displayed next to the Security Status your
         system is protected.

         A red exclamation mark denotes that there are problems with your
         software and you should take immediate measures to ensure that your
         system is fully protected.

If you click on the button Correct, the software will suggest which measures you should take to ensure that your system
is fully protected. Select the displayed actions one after the other until the Security Status turns green. The button will
then become inactive and can only be used again if there is a degradation in your security status. After correcting any
reported problems the Security Center can be closed. The Security Status also reports the following additional
information:

         A yellow symbol indicates that intervention by the user is shortly
         required.

         If the placeholder symbol is displayed it means that the corresponding
         feature has not yet been activated.(e.g. Spam protection).

All features and settings that you see beneath Security Status symbol can be used if you would like to be actively
involved in the security of your system ( e.g. Virus protection or virus signatures) - but this is not a requirement! Decide for
yourself how involved you would like to get with the virus protection of your system. In the following sections you can see
which areas of your software are already optimally configured and which areas could be optimized. The following symbols
lead you to the corresponding security status area.

         Settings: Using this button in the top right-hand corner you can access
         the settings window where various areas of the software can be
         configured. The relevant feature can be selected and suitable settings
         can be configured. You can find more information in the section:
         Settings

To the right of the Settings symbol you will find additional functions by clicking on More:

         Display help: From within the software it is always possible to evoke
         the detailed help pages. Just press the F1 key or click on the help
         symbol depicted here.

         Logs: The software displays current logs for all executed actions (Virus
         check, Update, Update, Virus detection etc.).

         Create BootCD: The BootCD is a useful tool for removing viruses from
         a computer that is already infected. The use of the BootCD is
         recommended especially for those computers that had no virus
         protection before the G Data software was installed. You can read how
         to create and use a BootCD in the section: BootScan before
         installation.

         Features not available e.g. Creation of BootCD is not available?
         Possibly the option BootCD was not selected during installation of the
         G Data software. You can however install missing features by inserting
         the installation CD into the drive and repeating the installation and
         selecting the additional features.




6
                                                                                                               SecurityCenter

        Program Update: If a software update is available the software can be
        updated just as easily as the virus signatures per mouse click. If the
        information is displayed that an update is available then just click on
        the notification Program Update.
        If you have problems with Internet Update you can find detailed
        informationen in the section: Updates

        Info: Information about the program version is displayed here. The
        version number can be useful when talking to ServiceCenter
        personnel.


Licence
Beneath the Licence section on the left-hand side of the program interface you can see how long your licence is valid for.
Constant updates are more important for antivirus software than for any other type of software. Therefore the G Data
software will automatically remind you to renew your licence before it expires. The best way to renew your license is via
the Internet. - effortless and easy! You can find more information on what happens when your licence expires in the
section: What happens when my licence expires?


What happens when my license expires?
A few days before your licence expires, an information window appears in the task bar. If you click this, a dialogue window
opens in which you can easily extend your licence. Simply click on the Buy now button, enter your data and your virus
protection will be guaranteed again immediately. You will conveniently receive the invoice by mail a few days later.

        This notification only appears after your license has expired in the first year. Hereafter your G Data license will be
        automatically renewed. You can however cancel your subscription with giving reason at any time.


How do I receive additional/extended licences?
It is possible to extend your number of licenses or to upgrade to a product with more features. If you click on the entry
Extend licences in the SecurityCenter you will be taken directly to our online shop on our website.

CPU load
In the securityCenter on the left hand side beneath CPU load there are 2 charts displaying the CPU load and the system
load. Beneath the tiltle G Data you can see the current load the G Data software is placing on your computer. The total
current load on your computer is displayed under the System header. During virus checks the system load caused by the
G Data software can be very high; however, under normal use your G Data software should only use very little processing
power.

If your computer is responding more slowly than usual, you can see at a glance if the G Data software is carrying out a
detailed scan or if your computer is being slowed down by something other than a virus check

        The pre-configured setting for your G Data software is to only scan your computer when you are not actively using
        it. Similar to a screen saver the virus check only runs when it will not be interfering with your work. The virus
        protection offered by the virus monitor is of course always active.

          Virus check: A regular check of your computer for viruses that may be resident.

          Virus monitor: The constant protection of your computer from malware.




                                                                                                                                 7
G Data AntiVirus

Virus protection
In this area you can see when your computer was last checked for viruses and if your virus monitor is actively protecting
you.

Last virus check:This is where you can see when your computer was last fully checked for viruses. If this entry is
highlighted in red, you should run a virus check as soon as possible. To do so, click on the entry and start the checking
process by pressing the Check computer now button. After the scan, the entry is highlighted in green, meaning that the
virus check has recently been performed.

        For information about how a virus check is executed and what to do if
        you actually find a virus, read the section What happens during a
        virus check.

Virus monitor
The virus monitor should always be active. If you would like to switch off the monitor or would like to change the settings,
click the entry Disable virus monitor.

        Virus check & Virus monitor: Both functions offer virus protection but
        function in different ways.

           The virus monitor checks your computer continually for viruses. It
           checks file read and write operations and as soon as a program tries
           to run or distribute malware it will be prevented from doing so. The
           virus monitor is your most important protection. It should never be
           disabled.

           The virus check is additional protection. It checks whether viruses
           are already present on your system. A virus check will also find
           viruses that were copied to your computer before the G Data software
           was installed or were copied while the virus monitor was disabled. A
           virus check should be carried out regularly. The best time for this is
           when your computer does not have a high load.

Drop-down menu
If you click on the heading Virus protection a drop-down menu of available options is displayed that can be selected
according to the action that you would like to carry out.

        Check computer: If you would like to check your computer
        independently from the automatic virus check (e.g. You have a
        suspicion that your computer is infected) then click on Check
        computer. Your computer will immediately be checked for viruses.
        Read the section: What happens during a virus check.

        Memory and startup: All running processes and program libraries will
        be checked and malware can be removed directly from memory and the
        autostart area. Active viruses can be directly removed without having
        to scan the complete hard disk. As this check can be run fairly quickly
        it is recommended to include it in a regular automatic check. This
        function is however not a substitute for a regular virus check but
        compliments a full check.

        Check directories/files: Selected drives, folders or files will be
        checked for virus infections. If this action is selected a window for
        selecting folders and files will open. Selected files or complete folders
        can be checked for viruses.
        In the directory tree folders can be opened or closed by clicking on the
        plus sign. Their content will be displayed and every file or folder that
        has a tick set will be checked by the software. If not all files in a folder
        are to be checked then a gray tick will be displayed.




8
                                                                             Virus protection




Check removable media: This function checks CD-ROMs, DVD-
ROMs, memory cards or USB sticks for viruses. If this action is
selected all removable media that are connected to the computer, all
inserted CDs, USB hard disks and USB sticks will be checked. The
software cannot however remove viruses from medium that are read
only and it will only log these occurrences.

Check for rootkits: Rootkits try to avoid detection by traditional
detection methods.With this function rootkits can be targeted without
having to check the complete hard disk and stored data.

Disable idle scan: The virus monitor permanently protects the system
from viruses, whereas the idle scan is an intelligent virus check that
regularly checks the files on the computer for any resident viruses. It
works on the same principle as a screen saver and only scans the
system when a certain period of inactivity has been recorded.It stops
scanning as soon as any user or increased system activity is detected
to provide optimal performance.
Your computer is of course still protected from viruses by the virus
monitor even when the idle scan is disabled. This can be useful if for
example you would like to manually start a virus scan.

Disable virus monitor: The virus monitor can be disabled or enabled
if required. This can be necessary when large amounts of data are
copied from one location to another or hard disk intensive computer
processes ( e.g. copying DVDs) are running. The virus monitor should
only be disabled for as long as necessary. During this time make sure
that the PC is not connected to the Internet or that there is no access
to new unchecked files. (e.g. CDs, DVDs, memory cards or USB
sticks).

Quarantine: The quarantine is a protected area within the software in
which infected files are encrypted and stored. This prevents the virus
from being transmitted to other files. For additional information read the
section: How does the quarantine work?

Settings: This button is used to access the basis settings. For more
information read the section: Settings - AntiVirus




                                                                                            9
G Data AntiVirus

Virus signatures
In this area information on program updates is displayed.


Last update
The information is displayed as to when the computer last received updates from the Internet. If this entry is marked red,
virus signatures should be updated as soon as possible. Click on the entry and select Update virus signatures.


Next update
This entry informs when the next update will take place.

        Virus signatures: Viruses and other malware can be recognized by certain characteristics. Your G Data software
        also has features that enable it to detect viruses based on their behaviour. Using virus signatures is the easiest
        and fastest method of protecting against viruses. Only regular updating of these signatures via the G Data
        databases on the Internet provides you with effective virus protection.


Dropdown menu
By clicking on the title Virus signatures directly, a choice of actions will appear that can be performed.

        Update virus signatures: Normally virus signatures will be
        automatically updated. Click this button if an update is to be performed
        immediately.

        Disable automatic updates: If it is not wished that the G Data
        software automatically updates the virus signatures, this option must
        be selected. Disabling automatic updates presents a high security risk
        and should only be done in exceptional circumstances.

        Settings: Use this button to access the basic settings when required.
        More information can be found in the section: Settings - AntiVirus




10
                                                                                                            Web protection


Web protection
 The web protection module protects the user from threats while surfing the web or downloading files and removes them if
necessary. It is a supplement for the antivirus monitor and blocks access to infected websites and file downloads before
they even get downloaded.

        If a website is recognized as being malicious, a warning will be displayed in your browser and the website will be
        blocked.


Selection
When clicking Web protection the following options are available:

        Define exceptions: The web protection module will prevent the user
        from accessing fraudulent or infected websites. In some rare cases,
        however, a website may not be displayed properly, even though it
        comes from a safe source. In these cases the affected website can be
        whitelisted. A whitelisted website will not be checked by the web
        protection.
        See Define exceptions for more instructions.
        Whitelist: Selection of objects (e.g. websites) that are considered to
        be safe by the user.

        Disable web protection: A slight advantage in speed may be
        achieved if web protection is disabled during e.g. large file downloads.
        Your computer is still protected by the antivirus monitor; it is not
        recommended, though, to disable web protection, unless it is
        absolutely necessary.

        Settings: More configuration options are available in 'Settings'.
        See 'Settings - Web protection' for more information.




                                                                                                                             11
G Data AntiVirus

Settings
This chapter describes all Settings for each individual module of the software. As the optimum default configuration is
already selected when the software is installed, changes to any settings are usually unnecessary.


AntiVirus
This chapter describes all settings available for virus protection.



Monitor
In this chapter all settings for the virus monitor are described. Usually changes to these settings are not required.

     Monitor status: Enable / disable the virus monitor.
     Use engines: The software operates with two separate and independent virus scanning units, also referred to as
     engines. Each engine on its own offers good virus protection, but it is the combination of two virus scanners which
     offers the best results. On older systems performance can be improved by disabling one of the two engines, but it is
     recommended to keep the default setting Both engines.
     Infected files: In case a virus is found in a file, the default settings will ask what action to perform. If the same action
     should be performed for all infected files, the desired action can be specified here.
     The setting Disinfect (if not possible: quarantine) offers maximum security for any data.
     Infected archives: Here a reaction to infected archives (e.g. files with a RAR, ZIP or PST extension) can be defined.
     Note that archives can be damaged when being moved to quarantine. This could render the archive unusable when
     moving it back from quarantine. Therefore it is recommended to make this decision for each individual archive and keep
     the setting Query desired action.
     System protection: When behavior monitoring is enabled, all activity on the system will be monitored independent from
     the virus monitor. This covers viruses for which no signature is available yet. The behavior monitor pays special attention
     to startup changes and modifications of the hosts file.

Exceptions
Certain files, directories or entire volumes can be excluded from checking by the virus monitor by clicking Exceptions....
This can significantly improve the overall performance, but should be used with caution.

     1     Click Exceptions....


     2     Click New... in the Monitor exceptions window.


     3     Select type of exception (drive, directory or file).


     4     Select a directory or drive to exclude. To exclude individual files, enter
           the file name in the appropriate field at the bottom of the window.
           Wildcards may also be used.

           Wildcards work as follows:
              The question mark (?) represents any single character.
              The asterisk (*) represents one or multiple characters.
           For instance, in order to protect all files with the file extension ".sav,
           enter *.sav. In order to protect a special selection of files with
           sequential file names (e.g., text1.doc, text2.doc, text3.doc), enter
           text?.doc for example.

This can be repeated as often as needed to add more exceptions. Existing exceptions can be edited or deleted.

Advanced
This section covers additional options for the virus monitor. Usually changes to these settings are not required.




12
                                                                                                                         Settings

  Mode: Specify whether files should be checked only when reading them, when both reading and writing them or if they
  only should be checked on execution. If a file is checked when writing it, the virus monitor will find any infections of a file
  caused by an unknown process. The option 'Only check read access' will check files only when they are read by a
  program, but not when writing it. "Only check on execution' will only check those files that are loaded into the
  computer's memory for execution.
  Check network access: If a computer is connected to unprotected systems (e.g. somebody's notebook which has no
  adequate virus protection) it is recommended to check network access to ensure that no malware is transmitted over
  the network into the computer. This option is obsolete if the system operates without any network connections or if
  proper virus protection is in place all over the network. In the latter case disabling this options can improve network
  performance significantly as files are not unnecessarily double-checked.
  Heuristics: This type of analysis is not based on the virus signatures that are downloaded regularly, but on typical
  features of a virus. This adds some extra security, but may in some rare cases produce false positive virus detections.
  Check archives: Checking packed files in archives (those usually have file extensions like *.zip, *.rar or *.pst) for
  viruses is a very time consuming process and can be disabled if the virus monitor is enabled on the system anyway. To
  improve performance the size of archives that are to be checked by the virus monitor can be limited.
  Check email archives: As the software already checks incoming and outgoing emails, it is generally recommended to
  disable this option. Otherwise scanning an email archive may take up to several minutes, depending on the size of the
  archive.
  Check system areas during system start: In general, system areas (for example boot sectors) in your computer
  should not be excluded from virus checks. You can specify here whether you want to run a check on system start-up or
  during a media exchange (e.g., new CD-ROM). Generally you should have at least one of these two functions activated
  .
  Check system areas on media exchange: In general, system areas (for example boot sectors) in your computer
  should not be excluded from virus checks. You can specify here whether whether you want to run a check on system
  start-up or during a media exchange(e.g., new CD-ROM or similar). Generally you should have at least one of these
  two functions activated.

  Check for dialers / spyware / adware / riskware: You can use the G Data software to check your system for dialers
  and other malware programs (spyware, adware, riskware). These are e.g. programs that establish expensive,
  unwanted Internet connections, the potential financial damage of which is no less significant than that of a virus. They
  may for example secretly record your surfing habits or even all key strokes (including your passwords) and forward
  these to third parties via the Internet at the earliest opportunity

  Only check new and updated files: If this option is enabled, only those files that have recently been modified will be
  checked. This adds a lot of performance and is safe at the same time.


Manual virus check
This section covers all available settings for manual virus scans. Usually changes to these settings are not required.

  Use engines: The software operates with two separate and independent virus scanning units, also referred to as
  engines. Each engine on its own offers good virus protection, but it is the combination of two virus scanners which
  offers the best results. On older systems performance can be improved by disabling one of the two engines, but it is
  recommended to keep the default setting Both engines.

  Infected files: In case a virus is found in a file, the default settings will ask what action to perform. If the same action
  should be performed for all infected files, the desired action can be specified here.
  The setting Disinfect (if not possible: quarantine) offers maximum security for any data.
  Infected archives: Here you can specify a reaction to infected archives. (e.g. files with a RAR, ZIP or PST extension)
  Note that archives can be damaged when being moved to quarantine. This could render the archive unusable when
  moving it back from quarantine. Therefore it is recommended to make this decision for each individual archive and keep
  the setting Query desired action.
  Pause the virus check at times of high system load: It is recommended to only run virus scans while the computer
  is not in use. If, however, the computer needs to be in use during a virus scan, the virus scan is paused so the
  computer's full performance is available. As soon as the user is idle again, the scan will be resumed.

Exceptions
Certain files, directories or entire volumes can be excluded from virus scans by clicking Exceptions....
This can significantly improve overall scan times, but should be used with caution.




                                                                                                                                 13
G Data AntiVirus

     1     Click Exceptions....


     2     Click New... in the Exceptions for on-demand scan window.


     3     Select type of exception (drive, directory or file).


     4     Select a directory or drive to exclude. To exclude individual files, enter
           the file name in the appropriate field at the bottom of the window.
           Wildcards may also be used.

           Wildcards work as follows:
             The question mark (?) represents any single character.
             The asterisk (*) represents one or multiple characters.
           For instance, in order to protect all files with the file extension ".sav,
           enter *.sav. In order to protect a special selection of files with
           sequential file names (e.g., text1.doc, text2.doc, text3.doc), enter
           text?.doc for example.

This can be repeated as often as needed to add more exceptions. Existing exceptions can be edited or deleted.

           Apply exceptions to idle scan: As opposed to the manual virus scan during which the whole system is scanned
           for viruses, the idle scan is an intelligent solution that constantly checks all files for any infections. The idle scan,
           like a screensaver, only starts if the computer is idle and is paused instantly once the user starts interacting with
           the system again. Enabling this option applies the same exceptions to the idle scan that have been set for
           manual virus scans.

Advanced...
This section covers additional options for the virus monitor. Usually changes to these settings are not required.

     File types: This drop-down menu allows the user to specify what file type are to be checked during a manual virus
     scan. Selecting Program files and documents only can improve scan times.
     Heuristics: This type of analysis is not based on the virus signatures that are downloaded regularly, but on typical
     features of a virus. This adds some extra security, but may in some rare cases produce false positive virus detections.

     Check archives: Checking packed files in archives (those usually have file extensions like *.zip, *.rar or *.pst) for
     viruses is a very time consuming process and can be disabled if the virus monitor is enabled on the system anyway. To
     improve performance the size of archives that are to be checked by the virus monitor can be limited.

     Check email archives: Enables scanning email archives
     Check system areas: In general, system areas (for example boot sectors) in your computer should not be excluded
     from virus checks.
     Check for dialers / spyware / adware / riskware: You can use the G Data software to check your system for dialers
     and other malware programs (spyware, adware, riskware). These are e.g. programs that establish expensive,
     unwanted Internet connections, the potential financial damage of which is no less significant than that of a virus. They
     may for example secretly record your surfing habits or even all key strokes (including your passwords) and forward
     these to third parties via the Internet at the earliest opportunity

     Check for rootkits: rootkits attempt evade conventional virus detection methods. Additional monitoring for this type of
     malware is recommended.
     Only check new and updated files: If this option is enabled, only those files that have recently been modified will be
     checked. This adds a lot of performance and is safe at the same time.

     Generate log: By checking the Generate log box, you can specify that the software creates a log of the virus check
     process. This log can be viewed in the the SecurityCenter under More > Logs




14
                                                                                                                       Settings

Updates
This section covers all settings that are required to enable automatic updates. The access data (User name and
Password) that has been sent to the supplied email address needs to be entered here. This is required to authenticate
against the G Data update server.

        If the license has just been purchased, select Register with server.... Changes to Internet settings are only
        required if a proxy server is in use or the region the system is located in requires changing. Version check should
        only be disabled temporarily to address update issues with the virus signatures.


Update virus signatures automatically
If automatic updates are undesirable, automatic virus signature updates can be disabled. Note that this poses a security
risk - it is not recommended to disable automatic updates. The update interval can be customized. If the system is not
permanently connected to the Internet, setting the update interval to On Internet connection may be more suitable.

        Create log: When enabling this option, all virus signature updates will be written to the software's log. The logs
        can be viewed in the SecurityCenter under More > Logs.... Apart from logs on
        Internet updates, other information such as virus reports and other actions performed by the software can be found
        there.



Register with server
This section covers all information about registering the software. Registering the software requires a registration
number. Depending on your type of product this number is located on the back of the printed manual, the order
confirmation or on the CD sleeve. To activate the product, enter the registration number and your other details.

        The product will be activated when entering the registration number.

When clicking Login, a set of access data is automatically generated by the update server. A dialog window will be
displayed if registration has been completed successfully. Close this dialog.

        NOTE: The access data created during the registration process will also be sent to the email address provided
        during the registration process, for your records.

The access data will automatically be entered into the appropriate fields within the software. Internet updates can be
performed as soon as the access data is entered. .

        Unable to register with the update server? Check if an Internet connection is available. If surfing the web is
        possible (with e.g. Internet Explorer), check whether the Internet connection is established via a proxy server. In
        case a proxy server is used, go to Internet settings. Check the tick box Use proxy server and enter the
        required data. Overall Internet connectivity issues are likely to be caused by the Internet connection itself rather
        than the proxy server data.



Internet settings
Check the tick box Use proxy server if a proxy server is used to establish a connection to the Internet. These settings
should only be changed in case of an issue during registration or virus signature updated. Contact your network
administrator or ISP for the required proxy address and login data if authorization is required.

        Proxy server: A proxy server collects requests for networks and distributes them to all clients connected to the
        proxy server. If the system is used within a company network, chances are that a proxy server is used to connect
        to the web. The first thing that should be checked in case virus signature updates do not work properly is whether
        you can connect to the web at all using your Internet browser. Overall Internet connectivity issues are likely to be
        caused by the Internet connection itself rather than the proxy server data.




                                                                                                                               15
G Data AntiVirus

Web protection
The following settings can be made:

     Process Internet content (HTTP): All HTTP web content is checked for viruses while browsing the web. Infected
     websites will not be displayed.
     To enable this option, check Process Internet content (HTTP).

           If Internet content should not be processed, the virus monitor will go into action if infected files are downloaded
           and executed. The system will still be protected without G Data processing the Internet content, if the virus
           monitor is enabled.

           Web protection can be disabled for trusted websites if they come from a safe source. See Define exceptions for
           instructions.
           More settings for processing Internet content are available under Advanced.... o add websites to the whitelist, G
           Data plugins for Mozilla Firefox and Microsoft Internet Explorer are available. These are installed automatically
           when you install the software.

     Phishing protection: Directing unsuspecting users to fake websites of a specific bank or online shop to get hold of
     personal data is referred to as phishing. Protection from this type of attack is based on a powerful cloud technology
     which compares any web address (URL) against a constantly updated and maintained database on the web. No
     signature updates are required for phishing protection. Enabling phishing protection is strongly recommended.
     Submit URLs of infected websites to G Data Security Labs: When enabling this function, every URL of an infected
     website will be transmitted automatically to G Data Security Labs. This data is not personalized and cannot be traced
     back to an individual user or machine. Using this feature optimizes web protection for all G Data users.
     Process instant messaging content: As viruses and other malware can also be distributed via instant messaging
     applications as well, G Data can prevent any harmful content from being downloaded and displayed. If the preferred
     instant messaging software does not use any standard ports, the ports must be entered under Advanced....
     Embed into instant messaging application: If Microsoft Messenger or Trillian are used as instant messaging
     application, enabling this option will place an item in the context menu which allows the user to scan any suspicious
     files directly.


Define exceptions
Proceed as follows to add a website to the whitelist:

     1     Click Define exceptions to open the whitelist window.
           All whitelisted websites will be displayed here.

     2     To add a new website to the whitelist, click New.... Enter the URL of
           the trusted website (e.g. www.example.com). A description can be
           added as well.

     3     Click OK to confirm adding the website to the whitelist.


           To remove a website from the whitelist, highlight it in the whitelist window and click Delete.



Advanced
In this section the server port used for internet traffic can be specified. Usually changing this setting is not required and the
default setting (port 80) can be kept.

     Avoid browser timeout: As all data from the web is processed by the software prior to displaying it in the browser, it
     may occur that a timeout error is displayed by the browser because it has not received the data in time. Processing the
     data before handing it over to the browser takes its time, depending on the amount of data to be processed. By enabling
     this option, these timeout errors are suppressed to give the software enough time to process all dat and hand it over to
     the browser.

     Size limit for downloads: This option prevents large files from being scanned by the HTTP filter. Large files will be
     scanned by the virus monitor. Limiting the size of files scanned by the web protection module, prevents delays while
     surfing the web.



16
                                                                                                                     Settings

Email check
This feature scans all incoming and outgoing emails for viruses. That way, potential virus infections can be prevented
effectively. The software can delete infected attachments directly or attempt to repair infected files.

        In Microsoft Outlook Email checking is implemented through a dedicated plug-in. This offers the same
        protection as the port-based POP3/IMAP protection which is part of the AntiVirus settings. After installing the
        plug-in, the option Scan folder for viruses will be available in the Extras menu in Outlook. Individual email folders
        can be scanned for viruses with this option.


Incoming emails
  In case of an infection: This option specifies a reaction to infected emails. Depending on the purpose of use of the
  system, different settings might be suitable. In most cases the default setting Disinfect (if not possible: delete
  attachment/text) is recommended.
  Check received emails: Enabling this option will have all emails checked that reach the system while it is in use and
  connected to the Internet.
  Check unread emails on program start-up (Microsoft Outlook only): This poption serves the purpose of checking
  emails that have remained unread in the email inbox and its subfolders. Email checking will take place as soon as
  Outlook is launched.
  Attach report to received infected emails: A virus warning will be inserted into an infected email's reference line and
  the following text will be inserted into the email body: Warning! This email contains the following virus, followed by
  the name of the virus and information about whether the virus has been deleted or whether the infected file could be
  repaired.


Outgoing emails
  Check emails before sending: To prevent the user from inadvertedly sending out viruses via email, outgoing emails
  can be scanned for viruses before they are sent out. If an attempt is made to (inadvertedly) send a virus via email, the
  following message will be displayed: The email [reference line] contains the following virus: [virus name]. The
  email cannot be sent.


Scan options
  Use engines: The software operates with two separate and independent virus scanning units,
  also referred to as engines. The combination of both engines offers the best virus detection rates.
  OutbreakShield: A checksum is created for each email that is received. These checksums are compared against a
  constantly updated anti spam blacklist. This technology enables OutbreakShield to filter out bulk and virus emails even
  before signatures are available. OutbreakShield establishes an internet connection to request information on current
  spam outbreaks and their distribution patterns, thus closing the gap between the beginning of a spam outbreak and the
  release of special virus signatures for those emails. The OutbreakShield is embedded in the email virus scanner.


Advanced
If nonstandard ports are used in the default email application, the port numbers for incoming and outgoing emails can be
entered here. When clicking the Default button next to a port number, the default port will be restored. Multiple ports can
be specified; use a comma to separate those multiple ports.

Microsoft Outlook is protected by an integrated plug-in which enables the user to check folders and individual emails
directly in Outlook. To check an email or a folder for viruses in Outlook, go to Extras > Scan folder for viruses.

As the software processes emails before they get transferred into the email program, emails with large attachments or if a
low-bandwidth internet connection is available may cause the email program to display an error message. By enabling the
option Avoid mail server timeout these error messages are suppressed so the virus scanner has sufficient time to
transfer the data.




                                                                                                                              17
G Data AntiVirus

Automatic virus checks
This chapter describes all settings associated with scheduled scan jobs for either the entire system or specific areas of
the system. The idle scan can also be enabled or disabled in this section.

           Different scanning modes: In most cases it is sufficient to scan the system using the idle scan. Via the
           New... button automated scan jobs for different areas of the system can be created. One possible scenario would
           be to run a daily scan on the Downloads folder, whereas other, more static areas such as a music collection are
           scanned less frequently.



General
In this section a name can be assigned to the new scan job. In order to be able to make a better distinction between
individual scan jobs, self-explanatory names are recommended, e.g. Local hard drives (weekly scan) or Archives
(monthly scan).

The option Switch of computer when the job is finished powers the system down automatically once the virus scan is
completed. This setting can be applied if the scan job is scheduled to take place at night.

Job: Each individual task that specifies a scheduled action on any part of the system is referred to as a job.



Analysis scope
In this section the scope of a scheduled scan job can be specified. Here you can define whether the virus check should be
run on the Local hard drives, whether memory and startup should be scanned, or whether only certain directories
and files should be included in the scan job. If this is the case, use the Selection... button to specify the directories.

           Directory and file selection: By clicking the + symbols, single directories can be opened and its contents
           displayed. To select a directory for scanning, check the tick box next to it. If not all files and directories within a
           folder are selected, the tick will be grey.




Scheduling
In this section the job can be scheduled. Under Run the interval can be specified; Time allows for setting a specific time
when the scan job should take place. If the option On system start-up is selected, the scan job will run each time the
system is rebooted.

     Run job automatically on next system startup if the system was powered down at the scheduled time: If this
     option is activated the job will be run the next time the system is booted up.

     Do not run on batteries: This option is available on portable computers only. In order not to drain the system's battery,
     the job can be skipped by enabling this option. In this case the scan job will only be run if the system is running in AC
     mode.



Scan settings
In this section all settings for a scan job can be defined.

     Use engines: The software operates with two separate and independent virus scanning units, also referred to as
     engines. Each engine on its own offers good virus protection, but it is the combination of two virus scanners which
     offers the best results. On older systems performance can be improved by disabling one of the two engines, but it is
     recommended to keep the default setting Both engines.

     Infected files: In case a virus is found in a file, the default settings will ask what action to perform. If the same action
     should be performed for all infected files, the desired action can be specified here.
     The setting Disinfect (if not possible: quarantine) offers maximum security for any data.




18
                                                                                                                    Settings

  Infected archives: Here a reaction to infected archives (e.g. files with a RAR, ZIP or PST extension) can be specified.
  Note that archives can be damaged when being moved to quarantine. This could render the archive unusable when
  moving it back from quarantine. Therefore it is recommended to make this decision for each individual archive and keep
  the setting Query desired action.



Advanced...
This section covers additional options for the virus scan. Usually changes to these settings are not required.

  File types: This drop-down menu allows the user to specify what file type are to be checked during a manual virus
  scan. Selecting Program files and documents only can improve scan times.
  Heuristics: This type of analysis is not based on the virus signatures that are downloaded regularly, but on typical
  features of a virus. This adds some extra security, but may in some rare cases produce false positive virus detections.

  Check archives: Checking packed files in archives (those usually have file extensions like *.zip, *.rar or *.pst) for
  viruses is a very time consuming process and can be disabled if the virus monitor is enabled on the system anyway. To
  improve performance the size of archives that are to be checked by the virus monitor can be limited.

  Check email archives: Enables scanning email archives
  Check system areas: In general, system areas (for example boot sectors) in your computer should not be excluded
  from virus checks.
  Check for dialers / spyware / adware / riskware: G Data check s the system for dialers and other malware
  programs (spyware, adware,
  riskware). These are programs that, for instance, establish expensive, unwanted Internet connections, the potential
  financial damage of which is no less significant than that of a virus. They may for example secretly record your surfing
  habits or even all key strokes (including passwords) and forward these to third parties via the Internet at the earliest
  opportunity

  Check for rootkits: rootkits attempt to evade conventional virus detection methods. Additional monitoring for this type of
  malware is recommended.
  Only check new and updated files: If this option is enabled, only those files that have recently been modified will be
  checked. This adds a lot of performance and is safe at the same time.

  Generate log: By checking the Generate log box, the user can specify that the software creates a log of the virus
  check process. This log can be viewed in the the SecurityCenter under More > Logs


User account
In this section a user account under which the scan job should be run can be defined. This is required to scan network
drives.




                                                                                                                             19
G Data AntiVirus

Useful information
You can find useful information regarding the features of your software here.



BootScan
The boot scan will help you fight viruses that have embedded themselves prior to installation of the antivirus software on
your computer and that may prevent the G Data software from being installed. That is why there is a special version of the
G Data software that can be run before the start of Windows.

          What is meant by booting up?
          When you switch on your computer, the Windows operating system
          will normally start up automatically. This process is called booting.
          However, it is also possible to run other programs automatically instead
          of your Windows operating system. To scan your computer for viruses
          before Windows starts up, G Data has provided you with a special
          "bootable" version in addition to the Windows version.

          How do I cancel a boot scan?
          If you restart your computer and a G Data interface appears instead of
          the usual Windows environment, there is no cause for alarm. If you
          have not planned a boot scan, just use the arrow to select the
          Microsoft Windows entry and click on return. Windows will now start
          normally, without first carrying out a boot scan.

If you want to run a boot scan, proceed as follows:

     1a   Boot scan using the program CD: Use the G Data program CD to
          boot up your computer. - Insert the G Data software CD into the drive.
          In the start window that opens, click Cancel and turn off the computer.

     1b   Boot scan with G Data software that you have downloaded from
          the Internet: You can burn a new boot CD via the Create G Data
          boot CD entry in the G Data software program group.
          Insert the boot CD you have burnt into the drive. In the start window that
          opens, click Cancel and turn off the computer.

          If you are using Windows XP, when you try to create a boot CD, you
          may get a message saying that IMAPI 2.x has not been installed. This
          refers to a Microsoft update for older operating systems that is required
          for burning data media.
          You can download and install the necessary update directly from the
          Microsoft home page by clicking on the link in this display window.

     1c   Do you have a special netbook version of the G Data software on
          a USB stick? You can run the boot scan directly from the USB stick
          here. However, to do so your netbook must be set up to boot from a
          USB stick.
          Connect the G Data USB stick to your netbook. In the start window
          that opens, click on Cancel and turn off the netbook.

After this first step the boot scan will proceed identically for all three scenarios:

     2    Restart the computer. The G Data boot scan start menu will appear.


     3    Use the arrow keys to choose the G Data boot CD option and confirm
          your choice with Enter. A Linux operating system is now started from
          the CD and a G Data special version for boot scans appears.




20
                                                                                Useful information

     If you are having problems with the program interface display, restart
     your computer and choose the G Data boot CD – alternative option.

4    The program will now suggest updating the virus definitions (or virus
     signatures).

5    Click Yes and perform the update. As soon as the data has been
     updated via the Internet, you see the message Update complete. Now
     exit the update screen by clicking the Close button.

     The automatic Internet update is available if you are using a router
     that assigns IP addresses automatically (DHCP). If the Internet update
     is not available, you can still perform the boot scan using old virus
     signatures.
     However, in that case, you should perform a new boot scan with
     updated data as soon after installing the G Data software as
     possible.

6    You will now see the program interface. Click the Check computer
     entry to check your computer for viruses and malware. Depending on
     the type of computer and size of the hard drive, the boot scan can take
     an hour or more.

7    If the G Data software finds any viruses, use the option provided in the
     program to remove them. Once the virus has been removed
     successfully, the original file is available again.

8    Once the virus check is complete, exit by clicking the Exit button and
     then choosing Restart.

     The Exit button is located on the bottom right of the Linux program
     interface.


9    Take the G Data software CD out of the drive as soon as the drive tray
     opens or remove the G Data USB stick from your netbook.

10   Switch off your computer again and restart it. Your computer will now
     start with your standard Windows operating system again, and you can
     be certain of being able to install the regular G Data software on a
     virus-free system.

     What do I do if my computer will not boot from the CD-ROM?
     If your computer will not boot from the CD/DVD-ROM, you may need to
     set this option up first. This is done in the BIOS, a system that is
     automatically started before your Windows operating system. To make
     changes in BIOS, proceed as follows:
     1. Switch your computer off.
     2. Restart your computer. Usually you reach the BIOS setup by
        pressing the DEL button as the computer is booting up (and
        sometimes the F2 or F10 button as well).
     3. How to change individual settings in your BIOS setup varies from
        computer to computer. Please consult your computer's
        documentation. The result should be the boot sequence CD/DVD-
        ROM:, C: , meaning that the CD/DVD-ROM drive becomes the 1st
        boot device and the hard disk partition with your Windows
        operating system on it becomes the 2nd boot device.
     4. Save the changes and restart your computer. Your computer is now
        ready for a boot scan.




                                                                                                21
G Data AntiVirus

           What do I do if my netbook (or desktop PC/notebook) will not
           boot from the USB stick?
           If your computer will not boot from the USB stick automatically,
           proceed as follows:
           1. Switch your computer off.
           2. Insert the G Data USB stick into a free USB port on your computer.
           3. Switch your computer on.
           4. As it boots up, press the F2 button to access your computer's BIOS
              .
           5. A BIOS interface will then appear with a menu list from which you
              should select the Boot menu using the arrow keys (left/right). Now
              press Enter.
           6. You will now see a list, select the Hard disk drives entry using the
              arrow keys (up/down). Press Enter.
           7. Select the USB entry, so it appears in first place 1st Drive = USB
              ( using the Enter key and arrow keys.)
           8. Press F10 to save the changes and exit the BIOS. Your computer
              can now be booted from the USB stick.
           9. Restart the computer. Your computer is now ready for a boot scan.


G Data Symbol
Your G Data software protects your computer permanently against viruses and malware. So that you can see if your
protection is active, a symbol is displayed in the task bar next to the clock.

           This Security icon tells you that everything is OK and that protection for
           your computer has been enabled.

           If the monitor is disabled or some other problem occurs, the Security
           icon displays a warning message. You should then start the G Data
           software as soon as possible and check the settings.

           If the G Data software is downloading data from the Internet a special
           symbol is displayed.

The following functions are available:

     Start G Data Software: You can use this to start the SecurityCenter and can for example configure the virus monitor
     settings. Read about what you can do in the SecurityCenter in the section: SecurityCenter
     Disable monitor: This allows you to disable or enable Virus monitor if required. This may be advisable if, for example,
     you are copying large volumes of data from one part of your hard drive to another or running memory-intensive processes
     (such as copying DVDs, etc.). You should only leave the virus monitor disabled when absolutely necessary and make
     sure, wherever possible, that your system is not connected to the Internet during this time and that it cannot access
     any new, unscanned data (e.g. from CDs, DVDs, memory cards or USB sticks). Read about how the virus monitor
     works in the section: Tips for the virus monitor?
     Disable firewall: If you use a version of the G Data software with an integrated firewall, you can switch the firewall off
     via the context menu if necessary. This means that your computer is still connected to the Internet and any other
     networks, but the firewall is no longer protecting it against attacks or electronic espionage.
     Disable autopilot: The autopilot is a component of the firewall that decides independently which connections from
     and to the network or Internet should be allowed or blocked. The autopilot is ideal for normal use and you should always
     have it enabled. Like the firewall, the autopilot is only available in certain versions of the G Data software.
     Update virus signatures: Antivirus software should always be fully up to date. You can of course have the data
     updated automatically by the software. However, if you urgently need an update, you can launch one via the Virus
     update button. Read about the purpose of a virus update in the chapter: How do I start a virus update?
     Statistics: This allows you to view the virus monitor's scan statistics.




22
                                                                                                              Useful information

Virus check
With the virus check, you check your computer for infestation by malware. If you start the virus check, it monitors every
file on your computer as to whether it can infect other files or is itself already infected. If viruses or other malware is found
during a virus check, there are different options as to how the virus can be removed or rendered safe.

   1     Start the virus check.


   2     Now a check of your computer for virus infestation occurs. A window
         opens for this which includes information on the status of the check


         Now a check of your computer for virus infestation occurs. A window
         opens for this which includes information on the status of the check.

         A progress bar at the top of the window shows you how the scan of
         your system is advancing.
         While the virus check is taking place you have a number of options for
         influencing the course of the virus check.
           Pause the virus check at times of high system load: You can
           use this option to specify that the software pauses the virus check
           until you are finished with other tasks on your computer.
           Switch off computer after virus check: This function is very useful
           if you want to run the virus check overnight or at the end of the
           working day. As soon as the G Data software ends the virus check,
           your computer is powered down.
           Access denied: In Windows, there are usually files that are used
           exclusively by applications and can therefore not be scanned while
           these applications are running. It is preferable that you therefore have
           no other programs running on your system during a virus check. If
           you set a checkmark here, the data that is not checked will be
           displayed.
           Password-protected archive: As long as an archive is password-
           protected, the G Data software cannot scan the files in it for viruses.
           If you check this box, the antivirus software indicates which
           password-protected archives it was unable to scan. Provided the
           archives are not unpacked, any viruses it contains will not pose a
           security risk to your system.

  3a     If your system is virus-free, you can exit the wizard window after the
         check has finished using the Close button.
         Your system has now been checked and cleared of viruses.

  3b     In the event that viruses and other malware are found, you can decide
         how to handle the virus discovery. Generally clicking on the Execute
         actions button is sufficient.

         The G Data software will now use a default setting and disinfect the
         compromised files, i.e. it will repair them so that they can be used as
         normal and they no longer pose a threat to your computer.
         If such disinfection is not possible, the files are placed under
         quarantine, i.e. they are encrypted and moved to an extra safe folder
         where they cannot cause any further damage.
         If you still need this infected file you can retrieve the file from quarantine
         and use it again.
         Your system has now been checked and cleared of viruses.




                                                                                                                                    23
G Data AntiVirus

     3c   If you are familiar with the infected files/objects and can tell which ones
          are no longer required, you also have the option of customising
          precisely how to respond to each virus detection.
          You can use the Action column in the list of virus discoveries to define
          what should happen with each individual virus detection.

            Log only: The infection is listed in the Logs view. Repair of deletion
            of the affected file does not occur. Warning: If a virus is only
            logged, it continues to be active and dangerous.
            Disinfect (if not possible: log only): Here, an attempt is made to
            remove the virus from an affected file; if this is not possible without
            damaging the file, the virus is logged and you can deal with it later via
            the log entry. Warning: If a virus is only logged, it continues to
            be active and dangerous.
            Disinfect (if not possible: place in quarantine): This is the default
            setting. Here, an attempt is made to remove the virus from an
            affected file; if this is not possible without damaging the file, the file is
            moved to the Quarantine. For more information read the section:
            How does the quarantine work?
            Disinfect (if not possible: delete file): An attempt is made to
            remove the virus from a compromised file; if this is not possible, the
            file is deleted. This function should only be used if there is no
            important data on your computer. Always deleting infected files can,
            in the worst case, result in your Windows becoming inoperable and
            requiring a reinstallation.
            Move file to quarantine: Infected files are immediately moved to
            the Quarantine. Files saved in the quarantine are encrypted. The
            virus cannot cause any damage here, and the infected file is still
            available for possible repair attempts. For more information read the
            section: How does the quarantine work?
            Delete file: This function should only be used if there is no important
            data on your computer. Always deleting infected files can, in the
            worst case, result in your Windows becoming inoperable and
            requiring a reinstallation.

          If you click on the Execute actions button now, the G Data software
          proceeds with each virus detection as you have defined.

          Your system has now been checked for viruses. However, if you
          have used a setting with the Log option, it may be that your
          computer is not virus-free.

     4    After the virus check has ended, you have the option of sending a copy
          of the infected files to G Data Software, so we can improve virus
          protection for all our users on the basis of this data. Your data will of
          course be handled in confidence and your personal details will not be
          forwarded or used.

          Forwarding of such data is of course entirely optional and, if you prefer,
          you can skip this action or permanently disable it under the menu item
          In case of further infections. For more information see the section:
          What is the G Data Malware Information Initiative?




24
                                                                                                          Useful information

Virus detection
If the G Data software detects a virus or malware on you computer, you can handle the infected file in the following ways.

  Log only: The infection is listed in the Logs view. Repair of deletion of the affected file does not occur. However, you
  can individually check the detected viruses via the log and remove them in a targeted manner. Warning: If a virus is
  only logged, it continues to be active and dangerous.
  Disinfect (if not possible: move to quarantine): Here, an attempt is made to remove the virus from an affected file; if
  this is not possible without damaging the file, the file is moved to the Quarantine.
  Move file to quarantine: Infected files are immediately moved to the Quarantine. Files saved in the quarantine are
  encrypted. The virus cannot cause any damage here, and the infected file is still available for possible repair attempts.
  Please read about this in the section: How does the quarantine work?
  Delete infected file: This function should only be used if there is no important data on your computer. Always deleting
  infected files can, in the worst case, result in your Windows becoming inoperable and requiring a reinstallation.

Handling viruses can be automated, i.e., the G Data software always executes one of the above-mentioned actions if a
virus or malware is detected. Alternatively, you can also respond individually. In this case, a selection screen opens when
a virus is detected in which you can specify how the infected file should be handled.

        Quarantine and mailboxes
        There are files where a move to the quarantine is not recommended, e.
        g. the archive files for mailboxes. If a mailbox is moved to the
        quarantine, your mail program can no longer access it and may no
        longer work.
        You should therefore be especially careful with files ending in PST ,
        since these usually contain the data from your Outlook mailbox.

        Virus information
        You can see further information on the Internet regarding the detected
        virus at any time. Simply click on the respective virus report in the
        selection screen, the report, or in the logs and click on the Virus
        information button.
        You will then be connected to the G Data Security Labs via the
        Internet and can obtain current information in your Internet browser
        regarding the detected virus.


Malware feedback
The G Data Security Labs are constantly developing ways to protect G Data customers against malware. The more
information there is available, the more effectively the protection mechanisms can be developed. There is plenty of
information available, but only on systems that are attacked or infected. The G Data Malware Information Initiative was set
up to include such information in its analyses. For this reason, information relating to malware can be sent to the G Data
Security Labs. By participating you can contribute to helping all G Data customers be safer when using the Internet.

        Malware: A collective definition for all files, programs or code that are programmed to infect, spy on or control a
        computer without the users knowledge. Viruses, worms, rootkits, trojans, keyloggers and many others fall within
        this definition.

What sort of data is collected? Generally speaking, there are two scenarios where data is sent to us. 1. You can send
malware files to the G Data Internet Ambulance on a voluntary basis and 2. harmful content is found on a website. If you
send malware files to the Internet Ambulance, the source, original file name and date of creation of the file are also
included. If harmful web content is found the following data is sent:

  Information on the version of the malware
  Version number for the G Data product and the engines used
  Operating system language
  URL for which access was blocked and the reason why (malware, phishing etc.)
  Name of the malware




                                                                                                                              25
G Data AntiVirus

This information is usually insufficient for identifying PC users. It does not contain any personal data.


How will the received data be used? When processing and saving the data, the relevant country's legal requirements for
data protection and forwarding of data will be observed. G Data takes great care to protect data from unauthorised access.
Evaluation of the data is carried out in the G Data Security Labs and is used for clarifying research questions relating to IT
security. The principal intention is to investigate security risks and develop protection mechanisms. A few examples of
use include the creation of block lists, statistical evaluation for publication in specialist articles or development of rule sets
for protection technologies. Participation is voluntary and refusal to do so has no negative effects on the product's
functioning. Through your participation in the G Data Malware Information Initiative every G Data customer will in future be
better informed about computer-based threats and be better protected against them.



Not a virus notification
Files reported as not a virus are potentially dangerous applications. Such programs do not contain malware but may be
used against you by attackers under certain circumstances. This category can include certain tools for remote
administration, programs for automatically switching the keyboard layout, IRC clients, FTP servers or tools for creating or
hiding processes.


Quarantine
If a virus is found during a virus check there are various options available to deal with it. One option is to move the infected
file to quarantine. Quarantine is a secure area in the software where infected files are encrypted and stored so they cannot
transfer the virus to any other files. The files in quarantine remain in the condition they were in when the G Data software
found them, you can decide how to proceed.

     Update: If you have kept the quarantine dialogue window open for a long time, and have since discovered a virus and
     moved it into quarantine (e.g. automatically via the virus monitor), you can use this button to update the display.

     Submit: In certain cases, if an infected file cannot be disinfected, it can be sent to G Data via the Internet. The contents
     of this file will naturally be treated confidentially. The results of the investigation are channeled into improving and
     updating the virus definitions and the software. For more information see the section: What is the G Data Malware
     Information Initiative?
     Disinfect: In many cases, infected files can still be recovered. The software removes the virus components from the
     infected file and reconstructs the uninfected original file. If the disinfection is successful the file is moved back to it's
     original location before the virus check and is available to you again without any restrictions.
     Move back: Sometimes it is necessary to move an infected file that cannot be cleaned back out of quarantine to its
     original storage location. This may be for data recovery purposes for example. You should only select this function in
     exceptional cases and observe strict security measures (e.g. disconnect the computer from the network/Internet, back
     up uninfected data, etc.).
     Delete: If you no longer require the infected file, you can simply delete it from quarantine.


Logs
The log area lists the logs created by the software. Click the Start time, Type, Titel, or Status column headers to sort
the available logs accordingly. The Save as and Print buttons can be used to save log data as text files or print them out
directly. To delete a log, highlight the entry in the table using the mouse and either press the Del key or click on the
Delete button.




26
                                                                                                            Useful information

Multi-User License
With a multi-user license the G Data software can be operated on the same number of computers that the license is valid
for. After installing and registering on the first computer and completing an Internet Update, the access data will be
received per email. When installing to the second computer enter the user name and password that was received during
registration. Repeat these steps for all other computers.

Proceed as follows:

   1     Start the G Data software.


   2     Go to the SecurityCenter and click on the Update button.


   3     In the window that now opens, please enter the access data that was
         sent to you by email. If you then click on OK, your computer will be
         licensed.



License extension
A few days before your licence expires, an information window appears in the task bar. If you click this, a dialogue window
opens in which you can extend your licence in a few steps. Simply click on the Buy now button, enter your data and your
virus protection will be guaranteed again immediately. You will conveniently receive the invoice by mail in the next few
days.

        This notification only appears when the license has expired after the first year's use. After this the license will be
        renewed automatically. The subscription can be canceled at any time without giving reason.


Change of computer
You can use your G Data product on a different or new computer using your existing access data. Install the software on
the new computer and enter the access data. If the G Data software is still installed on the old computer the license will
have to be transferred to the new computer. When updating the software on the new computer for the first time you will be
asked if you would like to transfer the license. Confirm this message by clicking on OK. The number of times that the
license can be transferred is limited. When this limit has been reached then the license will be disabled and updating
your software will no longer be allowed.



Uninstalling
If you intend to uninstall the G Data software the easiest way to do this is by clicking on the Uninstall button in the G
Data program group. The uninstall then takes place automatically. Alternatively, you can uninstall the program using the
Windows Control Panel.

  Windows Vista, Windows 7: On the Windows taskbar click on the start icon (normally at the bottom left of your
  screen) and select the Control Panel folder. Here you will find the option Programs > Uninstall a program. Select G
  Data software from the list and then click Uninstall to initiate the uninstall process.

  Windows XP: Click Start on the Windows taskbar and select Settings > Control Panel > Software. You can then use
  the mouse to highlight G Data software on the Install/Uninstall tab. Then, click the Add/Remove button to run the
  uninstall process.

If you still have files in the Quarantine area of your G Data software during the uninstall, you will be asked whether or not
these files should be deleted. If you do not delete the files, they remain encrypted on your computer in a special G Data
folder and are therefore incapable of causing any harm. You can only use these files again by reinstalling the G Data
software on your computer. During the uninstall process, you will be prompted whether you want to delete settings and
logs. If you do not delete these files, the logs and settings will be available on reinstallation of the software. Complete the
uninstall process by clicking on the Exit button. The software is now completely uninstalled from your system.




                                                                                                                                 27
G Data AntiVirus

Malware
When we talk about viruses, worms and trojan horses, we generally mean software that has a damaging effect. The
general term for these is malware (from malicious + software). Malware covers all programs that aim to cause damage by
creating, changing or deleting access to electronic data. These always have a payload. Some malware just wants to
announce its existence, other malware spies on your personal data or even deletes your hard drive. Malware can be
divided into three groups: Trojan horses, worms and viruses. More broadly, it can also include spyware and diallers.

     Trojans: Trojans are differ from worms and viruses in that they do not replicate themselves automatically. The name
     Trojan horse is a reference to the historic legend and describes a program which gives the user the impression that it
     has a given and desired function. However, Trojans also include a hidden program component which opens a backdoor,
     as it were, to the stricken computer and can thereby allow almost complete access to the affected system without the
     user noticing. Trojans' methods of concealing themselves are almost unlimited. They can hide in prompt commands (so-
     called rootkits) or appear as Remote Access Trojans (so-called RATs, also referred to as backdoors). These
     malicious programs are also sent as screen savers or games via email.

     Common characteristics of viruses and worms: Viruses and worms are made up of the following components:

      Replication component: This program component is used to propagate the virus. This is a necessary component for
      all viruses. The infection can be spread via diskettes, USB sticks (and other removable media), shared folders,
      network scans, peer-to-peer networks or email. The malware attacks all kinds of different targets, although this
      sometimes only works on specific combinations of hardware, software and operating systems.

      Detection component: The detection component scans a system to check if it is already infected with this virus.
      Each host program is infected only once to enable the virus to spread more quickly and to avoid detection.

      Damage component: Payloads can be classified in the following groups: Hackers use backdoor programs to
      access a computer and its data so they can manipulate the data or launch Denial of Service attacks. Data
      manipulation may be carried out. This ranges from (more or less amusing) messages, displays and noises, to the
      deletion of files and drives. In addition, information may be spied on and distributed. Such attacks target passwords,
      credit card numbers, login names and other personal data. Infected computers are often misused for Denial of
      Service (DoS) attacks. These are aimed at e.g. overwhelming a website with huge numbers of requests. If the attacks
      originate from a single source, they are very easy to counteract. Distributed Denial of Service (DDoS) attacks
      therefore misuse infected computers to support the attacks. DoS and DDoS attacks may aim to crash the target
      system, overload the bandwidth and storage capacity or render the service untraceable in the network.

      Conditional component: Both the distribution and the malicious function can be programmed depending on
      conditions. In the simplest case, the malware is launched automatically without the victim noticing. In certain cases
      the payload must be launched by the victim himself. This can involve calling up a contaminated program, opening an
      email attachment, or phishing for personal data. The launch of malware can also be linked to conditions, e.g. with
      some viruses the malware is launched on a certain date or when the program is called a certain number of times.

      Stealth component: Worms, trojans and viruses try to protect themselves from discovery by users and virus
      recognition tools. They use a range of mechanisms to do this. For example, they recognise when debuggers are
      running or protect themselves with superfluous and confusing lines of (assembly) code. They hide the traces of an
      infection. This includes falsifying status report updates and log entries. A virus residing in the memory can lead the
      system to believe that the memory space it is occupying is still occupied by the program it has previously removed.
      To avoid discovery many viruses encrypt themselves and/or their harmful code. This encryption varies: the same
      codes may be used every time, the codes may be taken from a list (oligomorphic virus) or an infinite number of new
      codes may be generated (polymorphic virus).

     Worms: Unlike viruses, a worm does not attach itself to executable files. It spreads by transferring itself automatically
     to other computers via networks or mail connections.

      Network worms: Several ports on randomly selected network computers are scanned and, if an attack is possible,
      the vulnerabilities in the protocols (e.g. IIS) or their implementation are used to spread the worm. Well known
      examples of this type are Lovsan/Blaster and CodeRed. Sasser exploits a buffer overflow error in the Local
      Security Authority Subsystem Service (LSASS) and infects computers when they are connected to the Internet.

      Email worms: A worm spreading via email can use the available email programs (e.g. Outlook, Outlook Express) or it
      may have its own SMTP mail engine. Worms may contain additional payloads besides the resulting additional
      network traffic and increased allocation of system resources. Notorious members of this group are Beagle and Sober.




28
                                                                                                           Useful information

Viruses: Viruses are also aimed at reproducing themselves and spreading to other computers. To do so, they attach
themselves to other files or embed themselves in the boot sectors of data carriers. They are often smuggled on to the
PC undetected by removable media (e.g. diskettes), via networks (including peer-to-peer), by email or via the Internet.
Viruses can attach themselves to many different parts of the operating system and can function using a range of
different channels. They can be divided into the following categories:

 Boot sector viruses: Boot sector or MBR viruses (= master boot record viruses) actually settle in front of the boot
 sector on a data medium, thus ensuring that the virus code is read first and then the original boot sector when the
 computer boots from this medium. This enables the virus to slip into the system undetected then run when the hard
 disk boots up. Often the virus code remains in the memory after it has infected the system. These viruses are known
 as memory-resident. The virus is then passed on when diskettes are formatted, enabling it to spread to other
 computers. However, boot sector viruses are not just activated during formatting processes. A virus can be transferred
 from an infected diskette via the DOS DIR command. Depending on the infection routine, boot sector viruses can
 either be highly dangerous or just annoying. The oldest and most widespread of this type of virus is called Form.

 File viruses: Many viruses take the opportunity of using executable files as a hiding place. This is achieved by either
 deleting or overwriting the host file or by the virus attaching itself to the file. In the latter case the executable code in
 the file remains functional. If the executable file is accessed, the virus code, mostly written in assembly code, starts
 running first and then the original program opens (if it has not been deleted).

 Multipartite viruses: This type of virus is particularly dangerous as it infects not only executable files but also the
 boot sector (or partition tables).

 Companion viruses: Under DOS, COM files are executed before EXE files of the same name. In the days when
 computers frequently or exclusively operated via command lines, this was an effective device for running harmful code
 on a computer without detection.

 Macro viruses: Macro viruses also attach themselves to files. However, these are not themselves executable.
 Furthermore, macro viruses are not written in assembly code, but in a macro language such as Visual Basic. The
 viruses require a macro language interpreter, as found in Word, Excel, Access, and PowerPoint, to enable them to
 run. Apart from that, macro viruses operate in the same ways as file viruses. They can also disguise themselves,
 contaminate the boot sector or create companion viruses.

 Stealth viruses: Stealth viruses possess special protection mechanisms to escape detection by virus search
 programs. To do this they take control of various system functions. Once this condition has been established, the
 viruses can no longer be detected during normal access to files or system areas. To the virus search program they
 make it look like an infected file is not infected. The camouflage mechanisms of stealth viruses don't start working
 until the virus has become resident in the working memory.

 Polymorphic viruses: Polymorphic viruses contain mechanisms that change their appearance with each infection.
 Hence parts of the virus are encrypted. The encryption routine integrated in the virus generates a new key for each
 copy and sometimes even new encryption routines. Additionally, command sequences that are not required to operate
 the virus can be substituted or randomly rearranged. As such, billions of variants of a virus can easily occur. It is often
 not enough to use standard virus signatures to detect and remove encrypted and polymorphic viruses. Most of the
 time, special programs must be written. The effort required to analyse them and prepare suitable countermeasures
 can be enormous. Thus, polymorphic viruses can truly be regarded as the kings of the virus world.

 Intended virus: An Intended Virus means a partially defective virus that carries out a single file infection, but cannot
 reproduce itself thereafter.

 Email viruses: Email viruses belong to the blended threats category. Such malware combines the properties of
 Trojans, worms and viruses. When the Bubbleboy virus appeared on the scene, it became common knowledge that
 you could smuggle a virus on to a PC via the preview function for an HTML email. This dangerous virus code hides
 itself in HTML email and exploits a security hole in Microsoft Internet Explorer. The threat posed by such combination
 viruses should not be underestimated.

Malware in the broader sense: For the sake of completeness, several irritating and partially harmful categories are
also mentioned here that we do not include in the malware group.

 Hoaxes: Hoaxes are apparent virus alerts that are often spread via email. The recipient is advised to forward the email
 alert to friends and colleagues. However, this mostly involves alerts only intended to cause panic.

 Backdoor programs: Many systems administrators use remote maintenance programs to manage computers




                                                                                                                                 29
G Data AntiVirus

      remotely. This is very useful, especially for large companies. Normally this involves access by the system
      administrator with the knowledge and consent of the PC user. It is only when such backdoor functions are used
      without the PC user's knowledge and harmful actions are initiated that a backdoor program actually becomes
      malware.

      Spyware: Spyware records the activities and processes taking place on a computer and makes them accessible to
      strangers. It is often used for analysing surfing behaviour in order to launch appropriate advertising banners. Spyware
      can generally be removed using appropriate anti-spyware programs.

      Diallers: Like viruses, worms and Trojans, diallers are often installed undetected on a computer. If the internet
      connection is established via a modem, an expensive premium rate number is then used the next time the user
      connects. This is a nuisance that can sometimes lead to serious financial consequences. Anti-dialler programs such
      as Dialler Control can provide protection against unwanted diallers.

      Spam: A similarly costly and annoying menace is the forwarding of unwanted advertising email or propaganda email.
      Modern anti-spam programs combine statistical procedures (text analysis, mail server lists) and automatic procedures
      (based on Bayes' Theorem) to filter out unwanted email.

      Phishing: Phishing is the attempt to obtain personal data such as login names, passwords, credit card numbers,
      bank account access data, etc. using bogus websites or emails. This often involves users being lured to bogus
      websites. In recent years this phenomenon has increased considerably.


Best pratices
Although G Data software not only detects and removes known viruses, it also detects thus far unknown malware with
the aid of the heuristic analysis; it is undoubtedly better to eliminate a virus infection at the outset. To this end, certain
security precautions that don't require a lot of effort, yet noticeably increase the security of your system data should be
undertaken.

     Use user accounts: You should use two user accounts on your computer. An administrator account, which you
     always use for installing software or carrying out basic settings on your computer, and a user account with limited
     rights. The user account, for example, should not be able to install programs or undertake modifications in the Windows
     operating system. You can use this account to, for example, surf the Internet in relative safety, transfer data from other
     computers, etc. How you can set up different user accounts is explained in your Windows operating system's help
     documentation.
     Ignore spam email: Chain letters and spam email should never be responded to. Even if such email does not contain a
     virus, its unwanted transmission significantly increases the flow of data in the Internet.
     Check suspected viruses: If you have a confirmed suspicion of a virus, e.g. because newly installed software is not
     doing what it is supposed to do or an error message is displayed, check the relevant program for viruses, ideally before
     restarting the computer. This is a good idea, since, for example, certain Trojan horses only execute their delete
     commands during the next computer restart; therefore they are easier to identify and fight beforehand.
     Regular Windows updates: It should also become routine to download the current patches from Microsoft, since these
     often close newly-detected vulnerabilities in Windows before a virus programmer has even had the idea of exploiting
     these using new malicious programs. Windows updates can also be automated.
     Use original software: Even though storage media used for original software may be infected with viruses in very rare
     cases, the probability of a virus infection from pirated copies or copies stored on re-writable storage media is
     considerably higher. Therefore, only use original software.
     Treat software from the Internet with caution: You should also exercise extreme caution when downloading software
     and only use software you really need and that originates from trustworthy sources. Never open files received by email
     from unknown persons or sent unexpectedly by friends, colleagues, or acquaintances. Ideally, make sure that you can
     start the respective application safely by first checking with the relevant authority.




30
                                                                                                                                      Useful information

Software License Agreement
G DATA Softw are AG, its Affiliates and Licensees (hereafter “G DATA”) is w illing to license this Softw are (hereafter “SOFTWARE”) to you as a
user (hereafter “USER”) provided that you accept all of the terms of this License agreement. Read the terms of this agreement carefully. By
clicking the referring button you accept this license agreement as a legal and enforceable contract betw een USER and G DATA according to the
follow ing provisions. If you don´t agree, click on the respective button and do not use or install or store this softw are on any PC.

1. DEFINITIONS.
“Signature- Updates”: Content used by G DATA products w hich is updated after release by G DATA, i.e. signatures defining viruses, spy-, crime-
or other malw are, listings defining anti-phishing- or anti-spam-threats, firew all rules and further more.
“Documentation”: All End-User documentation G DATA provides w ith the SOFTWARE.
“License Certificate”: The G DATA license certificate that G DATA provides w ith the SOFTWARE or any document or w ritten agreement issued
by G DATA to USER expressing the number of Licenses and their duration. In the case of consumer products such information is usually visible
on the packages or in the fact sheet referring to such product.
“Softw are-Update”: Any version of the SOFTWARE that has been released by G DATA to the public and w hich replaces the prior version of the
SOFTWARE.
“License”: The right to use the SOFTWARE on one PC (physical or virtual). A License is called “in use”, if the Softw are is loaded to direct access
memory (RAM) of any PC or installed on or copied to its permanent storage.
“Access Data”: All registration numbers, usernames, passw ords etc. that comes w ith the SOFTWARE or w ill be received from G DATA (i.e. to get
access to Signature-Updates or Softw are-Updates) by using the SOFTWARE.

2. Right of Use
According to the terms and conditions of this License Agreement, G DATA grants USER a non-exclusive, limited and - according to the provisions
in this agreement- transferable License to use the SOFTWARE solely for USERs internal business operations in the quantities and for the duration
described in the License Certificate, and the right to make a single uninstalled copy of the SOFTWARE for archival purposes w hich USER may use
and install for disaster-recovery purposes. This Right of use expressly includes the use of all Signature-Updates and Softw are–Updates referring
to the SOFTWARE G Data w ill release to the public during the duration stated in the License Certificate.
USER is not entitled to use or install the softw are on more PC than stated in the License Certificate. The License Certificate shall constitute proof
of USERs right to use the SOFTWARE for the duration and to the extent of the number of licenses stated in the License Certificate.
USER is not entitled (i) to use, copy, modify, rent, lease, sublicense, sell, transfer or make the SOFTWARE otherw ise available to third parties
except as expressly provided in this license agreement, (ii) to create any derivate of the SOFTWARE or any softw are or product based on the
SOFTWARE, (iii) to reverse engineer, decompile or disassemble the SOFTWARE, (iv) to discloses any Access Data to third parties.

3. Ow nership
The SOFTWARE is the proprietary property of G DATA or its licensors and is protected by copyright law . G DATA and its licensors retain any and
all rights, title and interest in and to the SOFTWARE, including in all copies, improvements, enhancements, modifications and derivative w orks of
the SOFTWARE. The rights to use the SOFTWARE shall be limited to those expressly granted in this License Agreement. All rights not expressly
granted to USER are retained by G DATA and/or its licensors. The right of use stated on section 2 of this agreement is granted solely after USER
has completed all payments for such rights.

4. Warranty.
If G DATA provides the SOFTWARE to USER on tangible media, G DATA w arrants that the media upon w hich the SOFTWARE is recorded w ill not
be defective under normal use, for a period of ninety (90) days from delivery. G DATA w ill replace any defective media returned to G DATA w ithin
the w arranty period at no charge to USER. The above w arranty is inapplicable in the event the SOFTWARE media becomes defective due to
unauthorized use of the SOFTWARE.
G DATA w arrants that the SOFTWARE, as delivered by G DATA and w hen used in accordance w ith the Documentation, w ill substantially
conform to the Documentation for a period of ninety (90) days from delivery. If the SOFTWARE does not comply w ith this w arranty and such non-
compliance is reported by USER to G DATA w ithin the ninety (90) day w arranty period, G DATA w ill do one of the follow ing, selected at G DATA’s
reasonable discretion: either (i) repair the SOFTWARE, (ii) replace the SOFTWARE w ith softw are of substantially the same functionality, or (iii)
terminate this License Agreement and refund the relevant license fees paid for such non-compliant SOFTWARE. The above w arranty specifically
excludes defects resulting from accident, abuse, unauthorized repair, modifications or enhancements, or misapplication.
To the maximum extent permitted by applicable law , the w arranties set forth in this license agreement Are the exclusive Warranties to USER and
are in lieu of all w arranties, w hether express or implied, including, but not limited to, the implied w arranties of merchantability, satisfactory quality,
fitness for a certain purpose and noninfringement of intellectual property rights.. G DATA makes no w arranties or representations that the
SOFTWARE, its Softw are-Updates or Signature-Updates w ill alw ays met the requirements of the USER w ill run uninterrupted or error free under
all conditions. USER may have other or additional w arranty rights according to USERs local law .
To the maximum extent permitted by applicable law , in no event G DATA, its Licensors, suppliers, resellers agents or employees w ill be liable to
USER for any costs according to any losses or damages w hether arising directly or indirectly out of the use of the SOFTWARE or this license
agreement, even if G DTA has been advised that such loss or damage might occur. In no case G DATAs liability may exceed the fees USER has
paid for the SOFTWARE. Nothing in this license agreement shall operate so as to exclude G DATAs liability to USER for death or personal injury
arising out of negligence or for any other liability w hich cannot be excluded or limited by law .
The above disclaimers and limitations w ill apply regardless of w hether or not USER accepts the SOFTWARE, its Signature-Updates or Softw are-
updates. USER is solely responsible for the compliance w ith, and agrees to comply w ith, all applicable law s, rules, and regulations in connection
w ith USERs use of the SOFTWARE.




                                                                                                                                                                31
G Data AntiVirus

5. Support.
Under this License Agreement G DATA has no obligation to provide support or maintenance for the SOFTWARE. Any support or maintenance for
the SOFTWARE is subject to G DATA’s then-current support or maintenance policies.

6. Term ination.
This License Agreement shall terminate upon USERs breach of any term contained herein. Upon termination, USER shall immediately stop using
and destroy all copies of the SOFTWARE.

7. Transfer.
USER is entitled to transfer all rights granted by this license agreement to any third party provided G DATA has agreed to such transfer in w riting.

8. License Audit.
An auditor, selected by G DATA and reasonably acceptable by USER, may, upon reasonable notice and during normal business hours, but not
more often than once each year, inspect USERS records and deployment in order to confirm that USERS use of the SOFTWARE complies w ith this
license agreement and the applicable License Certificate. G DATA shall bear the costs of any such audit, except w here the audit demonstrates
that USERs non-compliant usage exceeds five percent of the licenses stated in the License Certificate. In such case, in addition to purchasing
appropriate licenses, USER shall reimburse G DATA for the auditor’s reasonable actual fees for such audit.

9. Governing Law .
This license agreement w ill be governed by the law s of Germany. UN purchasing law is not applicable. If any provision of this license agreement
is found partly or w holly illegal or unenforceable, such provision shall be enforced to the maximum extent permissible, and remaining provisions of
this license agreement shall remain in full force and effect. A w aiver of any breach or default under this License Agreement shall not constitute a
w aiver of any other subsequent breach or default.

10. Third Party Softw are.
This SOFTWARE may contain third party softw are that are available under open source or free softw are licenses. This license agreement does
not alter any rights or obligations USER may have under those open source or free softw are licenses. Notw ithstanding anything to the contrary
contained in such licenses, the disclaimer of w arranties and the limitation of liability provisions in this license agreement shall also apply to such
third party softw are.

11. Additional Term s.
This license agreement and any the License Certificate related to the SOFTWARE are the complete and exclusive agreement betw een USER and
G DATA relating to the SOFTWARE and supersede any previous oral or w ritten communications, proposals, and representations w ith respect to
its subject matter. This license agreement prevails over any conflicting or additional terms of any purchase order, ordering document,
acknow ledgement or confirmation or other document issued by USER. This license agreement may only be modified by a License Certificate or
any other w ritten and mutually signed agreements that accompanies or follow s this license agreement.

Copyright © 2011 G Data Software AG
Engine A: The Virus Scan Engine and the Spyware Scan Engines are based on BitDefender technologies © 1997-2011 BitDefender SRL.
Engine B: © 2011 Alwil Software
OutbreakShield: © 2011 Commtouch Software Ltd




32
                                                      G Data AntiVirus


Index                         Virus detection 25
                              Virus protection 8
A                             Virus signatures 10
Advanced 16
                              W
After Installation 5
                              Web protection 11, 16
Analysis scope 18
AntiVirus 12
Automatic virus checks 18

B
Best pratices 30
BootScan 20

C
Change of computer 27
CPU load 7

E
Email check 17

F
First steps 2

I
Installation 3
Internet settings 15

L
Licence 7
Licence agreement 31
License extension 27
Logs 26

M
Malware 28
Malware feedback 25
Manual virus check 13
Monitor 12
Multi-User License 27

N
Not a virus notification 26

Q
Quarantine 26

R
Register with server 15

S
Scan settings 18
Scheduling 18
SecurityCenter 6
ServiceCenter 2
Settings 12

U
Uninstalling 27
Updates 15
User account 19

V
Virus check 23

                                                                   33

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:0
posted:7/21/2013
language:Latin
pages:33
jny jhtw jny jhtw
About