Brochure

U S E R G U I D E
84
L
License
activation code ................................................................................................................................................ 24
End User License Agreement .......................................................................................................................... 23
M
Mail Anti-Virus ...................................................................................................................................................... 36
Microsoft Windows Troubleshooting ...................................................................................................................... 35
N
Notifications.......................................................................................................................................................... 29
O
Object recovery .................................................................................................................................................... 34
Online Banking ..................................................................................................................................................... 46
P
Parental Control ................................................................................................................................................... 50
computer usage .............................................................................................................................................. 51
Internet usage ................................................................................................................................................. 52
messages ....................................................................................................................................................... 55
report .............................................................................................................................................................. 57
running of applications ..................................................................................................................................... 54
running of games ............................................................................................................................................ 54
social networks ............................................................................................................................................... 55
Privacy Cleaner .................................................................................................................................................... 47
Protect a Friend program ...................................................................................................................................... 67
bonus activation code ...................................................................................................................................... 69
Protection status ................................................................................................................................................... 30
Q
Quarantine
restoring an object ........................................................................................................................................... 34
R
Removing
application ...................................................................................................................................................... 21
Reports ................................................................................................................................................................ 64
Rescue Disk ......................................................................................................................................................... 57
Restoring the default settings ................................................................................................................................ 61
Restricting access to the application ...................................................................................................................... 60
S
Security analysis................................................................................................................................................... 30
Security problems ................................................................................................................................................. 30
Security threats .................................................................................................................................................... 30
Software requirements .......................................................................................................................................... 14
Spam ................................................................................................................................................................... 37
Statistics .............................................................................................................................................................. 64
T
Traces
creating a trace file .......................................................................................................................................... 72
uploading tracing results .................................................................................................................................. 73
Trusted Applications ............................................................................................................................................. 40