User Manual
4. THE BASICS
Once you have installed Bitdefender Internet Security, your computer is
protected against all kinds of threats (such as malware, spyware,
ransomware, exploits, botnets and trojans) and internet threats (such as
hackers, phishing and spam).
The app uses the Photon technology to enhance the speed and performance
of the threat scanning process. It works by learning the usage patterns of
your system apps to know what and when to scan, thus minimizing the
impact on system performance.
Connecting to public wireless networks belonging to airports, malls, cafés,
or hotels without protection may be dangerous for your device and data.
Mainly because fraudsters may be watching your activity and find the best
moment to steal personal data, but also because everyone can see your IP
address; thus making your machine a victim for future cyberattacks. To
avoid such unfortunate situations, install and use the “VPN” (p. 146) app.
You can keep track of your passwords and online accounts by storing them
with “Password Manager protection for your credentials” (p. 139) in a wallet.
With a single master password you are able to protect your privacy from
intruders that may try to let you out of money.
“Webcam Protection” (p. 126) keeps away the untrusted apps from accessing
your video camera, thus avoiding any attempt to be hacked. Based on the
Bitdefender users' choice, the access of popular apps to your webcam will
be allowed or blocked.
To safeguard you from potential snoops and spies when your device is
connected to an unsecured wireless network, Bitdefender analyzes its security
level, and when necessary, comes with recommendations to boost the safety
of your online activities. For instructions on how to keep your personal data
secure, refer to “Wi-Fi Security Advisor” (p. 122).
Your personal files stored locally such as documents, photos or movies and
also those stored in the cloud can stay now far away from the today’s most
dangerous threats, namely ransomware. For information on how to settle
personal files to a shelter, refer to “Safe Files” (p. 128).
Files encrypted by ransomware can now be recovered without having to
spend money for any requested ransom. For information on how to recover
encrypted files, refer to “Ransomware Remediation” (p. 131).
The basics 13
Bitdefender Internet Security










