User guide

Table Of Contents
.................................................................................69User Interface and application usage5.6.2
.............................................................................69Program Controls5.6.2.1
.............................................................................70Navigating in ESET SysInspector5.6.2.2
...............................................................................71Keyboard shortcuts5.6.2.2.1
.............................................................................72Compare5.6.2.3
.................................................................................73Command line parameters5.6.3
.................................................................................74Service Script5.6.4
.............................................................................74Generating Service script5.6.4.1
.............................................................................74Structure of the Service script5.6.4.2
.............................................................................77Executing Service scripts5.6.4.3
.................................................................................77FAQ5.6.5
.................................................................................78
ESET SysInspector as part of ESET NOD32
Antivirus
5.6.6
........................................................................78ESET SysRescue5.7
.................................................................................79Minimum requirements5.7.1
.................................................................................79How to create rescue CD5.7.2
.................................................................................79Target selection5.7.3
.................................................................................80Settings5.7.4
.............................................................................80Folders5.7.4.1
.............................................................................80ESET Antivirus5.7.4.2
.............................................................................80Advanced settings5.7.4.3
.............................................................................81Internet protocol5.7.4.4
.............................................................................81Bootable USB device5.7.4.5
.............................................................................81Burn5.7.4.6
.................................................................................81Working with ESET SysRescue5.7.5
.............................................................................82Using ESET SysRescue5.7.5.1
........................................................................82Command Line5.8
..................................................84
Glossary6.
........................................................................84Types of infiltration6.1
.................................................................................84Viruses6.1.1
.................................................................................84Worms6.1.2
.................................................................................84Trojans6.1.3
.................................................................................85Rootkits6.1.4
.................................................................................85Adware6.1.5
.................................................................................85Spyware6.1.6
.................................................................................85Packers6.1.7
.................................................................................86Potentially unsafe applications6.1.8
.................................................................................86Potentially unwanted applications6.1.9
........................................................................86Email6.2
.................................................................................86Advertisements6.2.1
.................................................................................87Hoaxes6.2.2
.................................................................................87Phishing6.2.3
.................................................................................87Recognizing spam scams6.2.4