User Guide Intended for products TrustPort Antivirus 2013 TrustPort Internet Security 2013 TrustPort Total Protection 2013 Revision date: 10/19/2012 Copyright © 2012, TrustPort, a.s., All rights reserved.
Content CONTENT .................................................................................................................... 2 1 TRUSTPORT ANTIVIRUS ...................................................................................... 10 1.1 PRODUCT OVERVIEW AND KEY FEATURES ...................................................................... 10 1.2 MINIMUM SYSTEM REQUIREMENTS............................................................................. 10 1.3 WHAT IS NEW IN THIS VERSION ....
7.4 CONSOLE APPLICATION .......................................................................................... 36 7.5 EXECUTING FROM THE COMMAND LINE ........................................................................ 37 8 INTERNET SCANNER ............................................................................................ 39 8.1 MAIL ANTIVIRUS ................................................................................................. 39 8.2 MAIL ANTISPAM ......................
10.2 ACCESS CONTROL ................................................................................................ 74 10.2.1 Parental lock............................................................................................. 75 10.2.2 Volume Security ........................................................................................ 77 10.2.3 Device Security ......................................................................................... 79 10.2.4 Autorun Protection ..................
10.5.1.3.1 Auto-mounts.............................................................................................................. 105 10.5.1.3.2 Recent mounts ........................................................................................................... 107 10.5.1.3.3 Search ...................................................................................................................... 107 10.5.1.4 Image Editor .........................................................................
10.8.1 Language configuration ............................................................................ 130 10.8.2 Proxy ..................................................................................................... 131 10.8.3 Configuration Maintenance ....................................................................... 132 10.9 ABOUT AND LICENSES ......................................................................................... 134 10.9.1 License Information ............................
14.3 ARCHIVE MANAGEMENT - CAR MANAGER ................................................................... 148 14.3.1 Create new archive (Encrypt archive) ........................................................ 150 14.3.2 Open existing archive .............................................................................. 151 14.3.3 Add files to the archive ............................................................................ 151 14.3.4 Delete files from the archive ...................................
15.4 CONSOLE APPLICATION ........................................................................................ 165 15.5 DATASHREDDER FAQ ......................................................................................... 166 16 DISK PROTECTION ......................................................................................... 167 16.1 PRODUCT OVERVIEW ........................................................................................... 167 16.2 IN THE SHELL CONTEXT MENU...............
17.4.1 Check an image in advanced mode ............................................................ 188 17.4.2 Choose the FAT table ............................................................................... 188 17.4.3 Different view modes ............................................................................... 189 17.4.4 Change the repair settings ....................................................................... 191 17.4.5 Repair errors .....................................................
1 TrustPort Antivirus 1.1 Product overview and key features The TrustPort Antivirus is an antivirus program that protects your computer from virus attacks and other malicious codes. It watches your computer continuously and prevents it from a virus infection. In case that your computer is attacked, it reveals the infected files before they can be executed and heals them. It also quarantines files so that they cannot do any harm. It enables you to configure all the components according to your demands.
1.
What is a computer virus and what is not Computer viruses classification Ten commandments of antivirus protection Which extensions are (un)safe Antivirus protection glossary 2.1 What is a computer virus and what is not Computers are threatened not only by viruses but also by other malicious codes. Antivirus programs detect most of them. But there often appear different phenomena in computers that cannot be classified as malicious codes - malware (malicious/malign software).
its defect). So if you see some strange colors on the screen, first check the graphic card and its functionality - sooner than you start to revile the virus authors or the antivirus software developers. Software damages - A software damage (being a typical sign of computer viruses) can be caused by many other ways. For example an incorrect program can terminate (for example due to short-term power cut) during saving data file. Not every data or software damage is a result of a work of a computer virus.
According to exhibition time: Viruses activated immediately The times when rules like "do not start your computer that particular day" were held are gone. The most contemporary malicious codes are being activated right after entering the computer. This is because contemporary antivirus methods are able to react to the virus occurrence in a few hours. Just these few hours are the only time when the code can do what it wants. After this period, the antivirus protection begins to win.
sys, bat, obj, prg, mnu etc. In all cases, the file viruses act in a similar way. They most often rewrite the beginning of a file where they either write the jump command referring to themselves (to the so-called virus body), or store themselves to this place. The second case may concern so-called overwriting or destructive viruses. One of their drawbacks is that they destroy or damage the host program.
becomes resident in the memory at the first executing of the infected file (if it is a file virus) or at the first loading to the main memory from the infected boot sector (if it is a boot sector virus) and does harm from there. The virus stays in the memory until the system shutdown. These viruses got into trouble on the 32bit systems, where their acting and survival is dependent on their code.
polymorphic viruses, specially constructed lookup machines modified for encoding schemas identification are able to find them. Polymorphic viruses are not undefeatable but they have made scanning programs a hard and expensive task. The majority of antivirus programs contain searching for encoding mechanism because of protection from polymorphic viruses.
created by programmers in order not to spread, or by programmers who wanted to gain the primacy in some field (first virus for Windows 2000 and so on) at any price (malfunction). Sometimes it is contrasted with so-called In-the-wild viruses: malicious codes that can be met with some (bad) luck. 2.3 Ten commandments of an antivirus protection 1. Use antivirus software! It is the cornerstone of the whole information security. 2.
Operating system DOS: Extension Description Note APP Digital Research DRDOS executable DOS executables (16 bit BIN Device driver/binary image DOS executables (16 bit) BO? Boot sector image Compressed executable boot images COM Executable program file DOS executables (16 bit) COM DIET, PKLITE, CRYPTCOM, ICE etc. Compressed executable files DEV Device driver DOS executables (16 bit) DRV Device driver DOS executables (16 bit) EXE DIET, PKLITE, LZEXE, UPX etc.
PIF Program Information File Windows Executables REG Windows Registry files SCR Screen saver Windows 16-bit Executables SYS Win NT device driver Windows 32-bit Executables TSP Windows Telephony Service Windows Executables VXD Virtual Device Drivers Windows 32-bit executables VWP Audio plug-in Windows Executables WIN Window file Windows 32-bit executables ?? MS Compress/Expand Compressed executable files 286 Device driver for Windows 2.0 and 3.
MSG Outlook message files Possibly contains macros (VBScript) MSO MS Office 000 files saved as HTML Possibly contains JavaScript OBZ MS Binder Wizard Possibly contains macros (VBScript) OCX Active-X OLE control OLB OLE Object Library OLE OLE Object OTM MS Outlook macro (VBA) storage Possibly contains macros (VBScript) POT MS PowerPoint presentation template Possibly contains macros (VBScript) PPS MS PowerPoint show Possibly contains macros (VBScript) PP? MS PowerPoint presentations
CAR Crypted Archive COM Self-extracting archives COM DIET, PKLITE, CRYPTCOM, ICE etc. CPIO Unix Archive file CPT Compressed MAC file EXE DIET, PKLITE, LZEXE, UPX etc.
Dialer - Malicious software that hides in web pages and is able to redirect the phone connection to commercial (mostly foreign) phone lines. DoS (Denial of Service) - Type of a computer attack. Servers are overloaded by many requests (for example of displaying web pages). The server is unable to manage such amount and falls down. Engine - An antivirus program core which detects viruses.
If the user has bought the licence key, he can use this key already during the installation. Just copy a license key file, named according to the type of the product (antivirus.key, internetsecurity.key, totalprotection.key), to the installation file setup.exe and launch the setup file. You can modify the type of installation by command line parameters: /SILENT, /VERYSILENT The silent installation can be done in two modes: SILENT or VERYSILENT.
Integration to more e-mail clients is possible by checking the checkbox next to the name of the required client (their number is not limited). If some e-mail client is not supported by the operating system, then it is not possible to choose this client from the list and support for this client will not be installed.
The standard uninstallation process can be modified by the use of switch /SILENT as well. It requires executing the file unins000.exe, located in the program installation directory, with the /SILENT parameter. 4 After installation - running TrustPort Antivirus 4.1 TrustPort Antivirus Quick Launch This application runs in the Windows notification area and allows monitoring of current status of virus protection and protection against hackers, and also runs the most popular features of TrustPort Antivirus.
Antivirus: Enables the user to activate on-demand scanning in different modes. For example: Scan all disks - engages the on-demand scan of all local and mapped network drives. Scan all removable media - runs on-demand scan for all removable media connected to your computer, such as floppy disks, CDs, external drives, ZIP drives, USB tokens, etc. Scan selected target - runs on-demand scan of your chosen directory.
If the user changes the protection settings manually in the user interface, this new status will be indicated as Custom status in the quick launch menu. Configure is used to run the configurator, with which you can change the behavior of the antivirus program. Exit ends and closes the quick launch application. If you have a program running under On-access Protection, then closing this application does not mean the antivirus program is aborted. 4.
4.4 Antivirus in the shell context menu The TrustPort Antivirus is associated with the shell context menu which is displayed when a user clicks the right mouse button on any file, folder or disk. In this menu you can execute the On-Demand scanner to scan the selected object by selecting the Scan for viruses... item. If this object is a folder, all its subfolders will be scanned too. 5 User Interface An antivirus program protects your computer against attacks from viruses and other malicious codes.
TrustPort Antivirus TrustPort Total Protection The simplified interface header contains the name of the installed product along with its version number. At the top of the interface window, the current state of computer protection is also displayed. Text informing about the state of protection against viruses and hackers is also accompanied by an icon that changes color depending on the current state of protection. The same icon is then displayed in the Windows notification area.
On-Access Scanner, Application Inspector, Check for updates – Antivirus, Internet Security, Total Protection ██ E-mail Scanner, Parental lock, Web Scanner, Firewall – Internet Security, Total Protection « These buttons change the colour depending on the current protection status, from green (active) to red (disabled). Below the buttons are drop-down menus with other antivirus options: Antivirus From the menu, Antivirus scanning can be started by selecting a specific target to be scanned for viruses.
Through the Configure Drive Encryption, you can set which encrypted disks will be automatically mounted after system boot. « ██ In the Tools menu are two more items, they can be used to launch Portunes, the password manager, and Skytale for encryption of messages.
Which action the On-Access Scanner responds, depends on its settings. By default, the option Rename is selected. If you select an action that cannot be performed for any reason, the On-Access Scanner performs the following one, according to these priorities: Deny access, Repair, Rename, Move to quarantine, Delete. 6.
7.1 On-Demand Scanner The On-Demand Scanner is used for scanning viruses and other malicious codes in the selected directory on the hard disks or removable media. It can be executed from the Start menu, shell context menu or through the quick launch. If the On-Demand Scanning is running, an information window with some details is displayed. There are scanning statistics displayed (number of scanned, infected and solved infections).
In case that the Ask User mode is not selected, the user is kept posted by statistics. You will get to know which files were infected and how the infection was resolved, from the results in the report. 7.3 Scanning report The scanning report is an output of the On-Demand Scanner. It is saved in the XML format in the report.xml file in the docs directory in the installation directory. Besides this file there are files report.css, report.xsl and the img directory.
7.4 Console application Sometimes it is necessary to be able to execute scanning in the console mode, which enables easier cooperation with other applications, allows you to execute the service using batch files, scheduled application executing and so on. For these reasons, application AVCC.EXE executable in console mode was created besides the On-Demand Scanner AVC.EXE running in graphic mode. Both applications can be configured with the same parameters.
1614 CRC checks do not match Viruses: -1602 AV engine has found a virus (some object is infected) -1603 AV engine reports that the scanned object is suspected Other errors: -1610 No AV engine found => av cannot work -1611 AV engine initialization has failed -1612 AV engine integrity error -1613 AV configuration error -1614 AVMGMA communication error OR service is stopped -1615 Antivirus Self-check failed Cleaning errors: -1620 Infected/suspected object couldn't be deleted -1621 Infected
Detailed parameters description: Each command and switch must be preceded by the switch symbol, which is dash '-' or slash '/'. In the following list there are all command line parameters supported by the AVC.EXE and AVCC.EXE applications: -? or -h Display command line parameters help - displays all available command line functions. -b Scan boot sectors - scans all the hardware with boot sectors.
2 ... verbose mode AVC.exe -l=2 -ad AVCC.exe -l=2 -ad -c="file" Read configuration from specified XML file - loads the configuration from an XML file. -cs="file" Read config from specified XML file and save it - loads and saves the configuration from/to an XML file. -r="file" Write the scanning report to the specified XML file - writes the scanning report to an XML file. -tl="file" Read targets to be scanned from the specified file - loads scanning targets from an external text file.
8.2 Mail Antispam ██ Mail antispam helps you to handle unsolicited emails in a desired way. If this feature is enabled, every incoming email is evaluated by predefined antispam rules. If an email is classified as a spam, an informational header is added to the email and the email subject is modified so you can create a rule in your email client and put such marked emails into a separate folder, delete them etc. « 8.3 Web Scanner ██ Web Scanner checks and evaluates your HTTP communication.
9 USB Antivirus In cases where for example we use portable applications on USB keys, we do not have data protected throughout the entire use, as is the case with the use of resident scanner. The solution in such situations is offered by the USB Antivirus that automatically monitors any data written to the protected USB drive. Conduct of the USB Antivirus is very similar to that of the residential scanner.
By pressing the button the dialogue with the selection of interchangeable disks will be displayed, where installation of the USB Antivirus can be achieved. All removable disks detected in the system are shown, and only the one which satisfies the minimum disk space can be chosen. Clicking OK starts the installation process of the USB Antivirus on the exchangeable disc, which is completed with information about its successful implementation.
9.2 Using USB Antivirus USB Antivirus is used to monitor the data that are transmitted to the USB drives. After inserting the USB drive into the computer, the autorun antivirus is automatically triggered. A standard TrustPort antivirus tray icon is an indication that the program is running, and is only suspended if TrustPort Antivirus is already installed.
10 Advanced Configuration Manager Serves for control of program settings for users with advanced knowledge. In this interface, it is possible to configure all configuration items. Configuration is divided into the following sections: o Shields – setting of shields, which serve as a protection of computer against viruses, malware and spam. o Access Control – setting of user access to some removable devices, files and folders, blocking of inappropriate websites.
You can reach individual settings pages from the tree-like list on the left side of the window. After clicking on one of the configuration sections, the corresponding page is displayed in the right part of the window. Another way to navigate to the configuration section is to click on the respective link on the start page.
Any change of the On-Access Scanner status is indicated by the icon change on the Windows status bar. You can enable/disable displaying of the splash screen (see below) during starting of On-Access Scanner by the Show splash screen while starting option. When the On-Access scanner is enabled then every file is scanned at the time when it is being read from the hard disk and when it is being written to the hard disk.
Repair - the antivirus software will try to restore the infected file (if it is possible or efficient some files are malicious software themselves, so there is no sense in repairing it). Rename - the infected file is left on its place, but its extension is changed to some other which is not associated with any activity in the system. Move to quarantine - the infected file is moved into a safe directory controlled by the antivirus software where it cannot do any harm.
After clicking the Advanced button the following options will appear: Exclude from scanning: Objects (files, folders) - You can select this option if you want to exclude some objects from scanning. By pressing Manage you can set these objects.
Processes - This functionality could be potentially dangerous and it is recommended only for experienced users! When you add new process image, changes will be applied immediately even for already running processes. After removing of process image, currently excluded processes will remain excluded until its termination. For correct function, it is necessary to select executable process file.
By default during the installation, support is installed for all e-mail clients that are supported by the operating system. As active are designated all e-mail clients who were selected before the completion of the installation TrustPort Antivirus product.
Use Bayesian filtering - defines whether the method of Bayesian dictionary will be used to check for spam. Junk email to spam folder – emails marked as junk by the antispam engine will be marked and automatically moved to the spam folder of a particular user profile. In Outgoing e-mails it is only possible to configure option Check. If this option is active, scanning of outgoing post occurs with the e-mail client. Show toolbar - displays the toolbar of the antivirus plugin in a client's email GUI.
Settings In this part you can edit the basic options of the Mail Antivirus. All files - all types of attachments will be scanned for viruses. Selected files with following extensions - only attachments with extensions specified in the list will be scanned, they can be edited by clicking on Modify button. Exclude files with following extensions - if you don't want to scan some attachment types, you can specify them in the list if you enable the check box.
Add Header - you can specify a header that will be added to an email in case of being infected. Subject Modification - text specified here will be put to the subject in front of the original text. File Name - you can specify a name of a text file which will be attached to an email instead of an infected attachment. « 10.1.2.
By clicking on the Advanced... button, following window will appear: Spam/Ham Threshold - here you can set the ratio by which emails will be divided to solicited (ham) and unsolicited group (spam). The range is 0 - 10,000, the default value is 5,000. Increasing the value will cause smaller probability of passing a spam email without marking but also higher probability of marking a solicited email as a spam.
Maximum scan size (kB) – maximum size in kB, when e-mails will be checked for spam. Default value is 400kB. By clicking on the White List or Black List button, you can control the lists of e-mail addresses, which are not scanned for spam. In the White list there are e-mail addresses of senders who do not send unsolicited e-mails. Their emails are never marked as spam. The Black list contains e-mail addresses, which are sources of unsolicited e-mails.
List and description of TrustPort Personal Firewall modes: Permit all connections Option Permit all connections makes possible all outgoing and incoming connections. Firewall will not block any connections and the computer will behave as if no firewall is installed there. This option is very dangerous and you should not select this option if you are not sure what you are doing or if it is not necessary for you.
Enable DNS resolving - serves for automatic translation of domain names for firewall. TrustPort Personal Firewall needs during the operation the possibility to covert the domain names and that is way it is recommended to have this option always permitted. If you do not allow this option, you take risk that your computer would not communicate correctly in the local network or in the Internet. Enable DHCP - serves for permission of DHCP service.
10.1.3.1 Filter Administration ██ Page Filter Administration serves for creation, deletion, import and export of rule sets. It is possible to create any number of rule sets but always only one set for each IP address. All rule sets are displayed in a transparent list. This list also displays the legend and the IP address for which the given rule is active. A new rule set can be added by pressing New. It is possible to adjust rule sets with the help of button Edit.
IP address that is tied up with the set of rules can be inserted in several forms: All addresses - set of rules will be applied for all IP addresses in the computer. Option all addresses has the smallest priority during firewall processing. IP address - set of rules will be applied only for the specified IP address. Option IP address has the highest priority during firewall processing.
10.1.3.2 Filter Definitions ██ Page "Filter Definitions" serves for creation, deletion and edition of rules for TrustPort Personal Firewall. The firewall behaviour is influenced by rules. During the attempt for incoming or outgoing connection, the firewall starts to go via all accessible rules in certain set and it starts to look for a rule that can be applied for the given connection. If it finds such a rule, then the connection is either permitted or denied, according the found rule configuration.
Button Edit serves for editing of the existing rule. When the button is pressed, a dialog window is displayed, which serves for editing of the rule features. Button Remove serves for deletion of existing rule from the set. By pressing Remove is displayed a confirmation dialog window asking if you are sure to remove the specified rule. « 10.1.3.2.1 New Rule Wizard ██ Welcome to the New Rule Wizard When the New Rule Wizard is started, this first page is displayed.
Choose a log message On page Choose a log message it is possible to choose the log message of TrustPort Personal Firewall, to which the new rule should be created. The wizard from the marked message uses all the information as parameters for a new rule. The marked message is highlighted in the bottom part of the wizard page. In the list with logged messages are displayed only those messages that can be used as information (parameters) for new rule creation.
Select main rule preferences Feature Direction determines for which communication direction this rule will be applied. For example: if the selection Outgoing is chosen, some application will require a new connection from this computer to some Internet server and then this rule will be applied and the required operation is done. The possible values when specifying the direction are Outgoing, Incoming and Both directions. Feature Protocol defines for which protocol the rule will be active.
For the determination of the local address there is possible to use any address, one address, a range of addresses, address with network mask or list of addresses. For determination of local port there is possible to use any port, one port, range of ports or a list of ports. By a change of roll list Address type it is possible to specify the address type and therefore the way how the local addresses will be entered. With each change of the roll list is also changed the page content.
Select an application This page of a new rule creation serves for application specification that can be added to the rule as other evaluation criteria. If the connection parameters agree (protocol >, local and remote IP address > with port s and connection direction) with rule parameters, then there is evaluated as the next criteria the application that tries to make this connection.
This wizard page is displayed only in case that there is selected ICMP protocol in previous steps. Completing the New Rule Wizard This page of wizard says that there is enough information to complete the required operation. By pressing Finish the creation itself will be done and the New Rule Wizard is finished. « 10.1.3.2.2 Edit Rule ██ General - dialog window Edit rule - General serves for editing of the main rule features.
Remote endpoint - dialog window Edit rule - Remote endpoint serves for address and ports adjustment, that were allocated to the rule. For all control elements are valid the same rules as for the control elements on page Selection of remote endpoint of the New Rule Wizard. Application - dialog window Edit Rule - Application serves for definition of application that was allocated to the rule.
10.1.5 Application Inspector Using the Application inspector you can manage potentially dangerous behavior of applications and untrusted programs from unverified third-parties that seek to modify the system. Application Inspector is a powerful weapon for the detection of "Zero-day" viruses which antivirus companies have not yet detected, but also for "walking" mutating viruses, which often changes its structure, and also for not updated anti-virus solutions.
An example of system location modification can be the editing of protected registries, running other untrusted processes, an attempt to shut down the computer, obtaining system permission, or shutting down system services and more. NOTICE: The credibility of the application when asked by Application inspector must be evaluated by the user.
other malicious program may try to restart as part of the infection, or turn off the computer and insert the malicious code as part of the next reboot. If the user acts in time, the malware will not install correctly on the computer. Application Inspector may be run in three modes: Secure Mode – in this mode the Application Inspector will automatically block all untrusted and unsigned applications without user intervention. Notice will only be displayed on the desktop, that the process was blocked.
Allowed applications – List of all applications where Application Inspector protection will not be applied. Restricted applications – List of all applications that are always running in restricted mode. It is type sandboxing when the application is running, but modifications of critical system locations are prohibited. These locations are stored in the table Restricted locations, where you can edit them as needed.
Clicking on the Settings button opens the advanced settings dialog. Don‘t scan applications larger than – Applications that will have a larger size (in kilobytes) than the value set here, will not be scanned by Application Inspector. This is an optimization function because of the high false-positive alarms for legitimate applications. Action – The default settings for pop-up windows. Show ask dialog – Automatic mode.
Filesystem – A list of all files and directories that are protected. Use the Add filesystem button to add another protected location. You can choose from already running application, or from any file stored on disk. By Right-clicking you can duplicate the value and add it to restricted locations. Example of a protected file location: Classical: c:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.
The tab Restricted locations displays a list of restricted system and locations and registry locations. Process, which will be in the Restricted applications list and will try to access location specified in this list, the operation will then be restricted, but the process itself will run anyways. These applications will run in restricted mode. It is like a type of sandbox security mechanism, when the user is allowed to edit the location of that process, during its running which would otherwise be rejected.
10.2.1 Parental lock ██ Parental Lock’s function is to block children's access to inappropriate web content. However it allows pages that are appropriate for the child and basically prohibits those that could have an adverse effect. TrustPort Antivirus can be set to filter either on the base of a preset database of inappropriate Web sites, or you can create a specific list of URLs of sites to block. With Use Parental Lock button, the Parental Lock and all its functionality is either enabled or disabled.
The Add button acts to add a new user. According to pre-set values choose the Object name and Locations, in the select field Enter the object names to select that you want to find (such as Computer _1, User_1...). In the link "Examples" a hint is hidden with several useable syntaxes for correct filling in of the field. If there is no user profile created, TrustPort Antivirus works from the settings from "the default profile." These settings are inherited by all other developed profiles.
Profiles in the list can be edited with the Settings button. In this window you can choose the categories you want to block from the children, or specific URL’s whose access will be denied. An example of an URL may be www.sex.com, http://sex.com. However we recommend using the star convention *sex.com, or *sex*, because of the relative links to these pages. In the Exceptions tab, then define the URLs that TrustPort Antivirus will ignore in the setting of blocked content. « 10.2.
Afterwards it is possible to start managing the permissions setting personally. This can be done through user profiles. By default, the Default profile is present, other profiles can be defined using the Add button. The process of adding new profile is similar as in case of Parental Lock. By selecting the required profile and clicking on the Settings button, access rights to selected directories can be defined.
and directories such as Program Files, Windows, root and others are denied because of possible instability to the system. « 10.2.3 Device Security ██ Device Security offers the option to allow or block user access to USB device, CD/DVD, Bluetooth, Smart cards, iPod, FireWire, memory card readers and other media storage device. This protection is activated by selecting Use rules. Then you need to set each device that you wish to block.
Specific device can be adjusted in the Categories tab, or you can also make adjustments in terms of Connectivity ports. By default, all devices are allowed and thus the protection is not active. This can be changed using the drop-down menu for each item, in which the user can choose from the following options: Block - if the protection for a particular device is set to Block, this device after connecting to the system is blocked without user intervention, and by default a message is shown on the desktop.
From the list of allowed or blocked devices, a device may be deleted using the button Remove. From the list of blocked devices, a device may be moved to the list of allowed with the Allow button, which will connect the device to the system. Conversely, from the list of allowed, devices can be moved to the list of blocked by using the Block button. Manually adding a device to the list of allowed or blocked devices is done by clicking the Add button in the appropriate category.
If the user wishes to be alerted whenever the device is blocked in the system, he can set this option in the top of the window by selecting the Show notification for blocked devices. Otherwise, notification will only appear the first time the device is inserted into the system. A list of all the devices for which Device Security can be applied can be updated with the Refresh button. « 10.2.
10.2.5 Password Settings ██ The Settings tab allows users to set password to restrict access to configuration of Access Control items, i.e. Parental Lock, Devices, Volumes and Directories and Settings. The password is entered twice for verification; it has to be confirmed with the Create password button. Modification of password has to be confirmed with the Change password button. A current password can be deleted easily by clicking on the Delete password button. « 10.
10.3.1 On-Demand Scanner On this page you can set options for the On-Demand Scanner. In the Requested action setting you can select the software action after finding a malicious code. These possibilities are available: Report only - the user is informed about finding an infection by a dialog window and the notice is also displayed in the final report. No other action is performed.
Scan files: Scan all files - scanning all files without difference in format or type. Scan only files with the following extensions - antivirus software will scan only files with specified extensions. The predefined list contains dangerous extensions, we recommend modifying it to experienced users only! Exclude files with following extensions - antivirus software will not scan files with extensions that you select.
Removable volumes scanning: Scan newly inserted removable volumes (CD-ROM, USB) - antivirus program will begin to scan removable media (USB, CD-ROM) automatically after being inserted into the computer. Ask before scanning of removable volumes - after insertion of removable media, the antivirus will firstly ask whether it should scan it. Additional features: Prepare the BartPE plugin - use this button to create a BartPE disk plugin.
Advanced settings Port list You can edit a list of ports which you want to be scanned, separately for email and web communication. By clicking on the appropriate button you can display the list of ports. On the left side of the window there is a list of ports and protocols that are going to be checked. On the right side there are three buttons which serve for managing the list.
can add a new item to the list. If you click on the Edit button you can change a desired protocol or number of a port. By clicking on the Delete button you will delete a selected item. HTTP scan size limit It is made for setting up the maximum size of files which will be scanned by the antivirus program. Maximal possible size of scanned file is 262144kB i.e. 256MB. It accelerates a work with browser along operating with video, music, viewing pictures etc.
Scanning options Scan compressed files (zip, arj, cab...) - archive files, i.e. their contents, are scanned (searched for malicious codes). This option slows the scanning down, but on the other hand increases the computer protection. Enable heuristic analysis - antivirus software will not only scan objects for known viruses, but it will also try to identify unknown malicious codes (suspicious routines, suspicious features etc.) By the help of heuristics, program can reveal new or unknown viruses.
If original folder doesn't already exist, new target directory has to be selected for correct file restoring. The Quarantine is implicitly located in the quarantine directory in the installation directory. You can change this location to any existing directory by clicking on the icon in the upper right corner.
10.3.4 Scheduler Thanks to the scheduler you can make the On-Demand scanner be launched automatically. Users can choose the scanned area (disks, folders), when the scanning starts, how often is the task performed and some other options. If you want to scan a particular disk or folder regularly you can create a task by the New task button. For a new taks you can set the destination of scanning, date and time of the first start and some more parameters.
You can set: Task name - name of the task chosen by user (e.g. "D disk scanning") Command - what area (disks, folders) is scanned. You can select scanning of registry, all removable disks, all local disks, all disks or define your own target (disk, folder). If you select the "user defined parameters" option you can specify the scanning properties by the run parameters.
10.3.4.2 Task Properties You can change the task setting by double click on a proper line on the task list or by the Properties button. It is possible to edit the same parameters, which are available during creating new task.
10.3.5 Scanning engines The Engines Settings tab contains a list of all the items used to configure the scanning engines. Archive depth level - determines whether the archive will scan the files with/without limitation of the depth of immersion archive (e.g. nested .zip files inside .zip file). Analyze packed executables - if this option is enabled, then all compressed files will be scanned. Compressed file includes both archive files created without compression such as .
The most important option on this page is the Enable engines update option. If it is not checked, the scheduler service is not active. If you enable the scheduler, you need to set the desired period of the update checking. Intervals from the start date and time are used. It is necessary to ensure that the computer has a functional Internet connection at the moment of the update. For setting the period you can select the combination of values and units. Values can be set to values between 1 and 32767.
A folder where the updates will be stored is selected in the dialog and by clicking on OK the downloading starts. Downloaded virus definitions are applied on the required computer using the Apply packages button. The user is asked for the location of the update package on the computer, after selecting the correct location the update is automatically executed. 10.3.6.2 URL Address The list of URLs that will be used for downloading the update is displayed on this page.
The URLs are sorted in the same order as they will be used for update, i.e. the first address on the list will come first. If the package cannot be downloaded, the following address is tried. Otherwise there is no need to continue and the other addresses will be ignored. For the administration of the update servers use the Add, Edit and Remove buttons. The order of the URL addresses can be changed by the arrows on the right side of the list. 10.3.
10.4 Secure Shredding ██ In this category, it is possible to perform shredding of temporary system files, sensitive data, cookies, shredding settings and the panic shredding function can be enabled.
10.4.1 Configuration ██ Page Configuration serves for configuration selection for all parts of the application. This configuration will be used in shredding process. You can set here the shredding method and the possibility to generate record file. The method is selected in the dropdown menu. When the method is chosen, its description is shown below the list. This description contains the basic information about the method and how many passes of shredding will the file be overwritten.
Report options: Generate report If this option is selected, a file of reports will be created. The created report file contains information about time and date of the start and the finish of the shredding process, list of deleted files or folders and the list of shredded items. The name of currently logged user of the system Windows is also recorded. Overwrite report file If you select this option, DataShredder overwrites the report file before each start of shredding.
Internet Temporary Files If you choose this item, TrustPort DataShredder application shreds the content of Temporary Internet Files. Your internet browser uses the Temporary Internet Files to store web pages, pictures and other files. Cookies By marking this option, you delete all files in directory Cookies. Cookies can contain sensitive data, for example passwords for access to various internet pages but also information from visited web servers.
10.4.3 Panic Shredding ██ Panic shredder tab can be used for safe shredding of user selected files and directories. User can select freely which files or directories have to be shredded. In order to accomplish panic shredding fast and silently, it is activated by predefined hotkey. Use Panic shredding This option activates/deactivates the Panic shredding function. Ask for confirmation If checked, DataShredder will require user confirmation, before panic shredding will be performed.
10.5 Encryption ██ Encryption page enables the creation and management of encrypted discs and archives.
10.5.1 Drives 10.5.1.1 Unmount options ██ On this page you can setup some Disk Protection options. The first of them is auto-unmounting option. You can generally enable or disable this functionality by setting auto-unmounting time. When you don't do any operation with any mounted drives during this time period then Disk Protection automatically unmounts all mounted images. You can choose if Disk Protection should automatically unmount all mounted images when computer goes to sleep.
You can also limit the image search history in the Search tab in the Mount manager and clear this history immediately by Clear history button. « 10.5.1.3 Mount Manager 10.5.1.3.1 Auto-mounts ██ At this page you can manage Disk Protection auto-mounts. You can add and remove images, which will be automatically mounted during the system startup, change their mounting order, mount and unmount them, run editation tool for editing images and display image file properties.
Use up-arrow or down-arrow to move the selected image in the auto-mounts list up or down respectively. Select an image and click Remove button to remove this image from the auto-mounts list. The affected image will be removed from the list only, not physically deleted. Clicking Add button you can add a new image to the auto-mounts list. Disk Protection opens browsing dialog window and you can type or select an image file. The Edit option allows you to edit the selected image.
10.5.1.3.2 Recent mounts ██ At this page you can manage Disk Protection recent-mounts. Disk Protection remembers the file path and letter of the recent mounted images and you can manage these images here. You can also add and remove images, change their mounting order, mount and unmount them, run editation tool for editing images and display image file properties. You can select a mounting point to the selected image will be mounted on. Automatic selection of mounting point is also available.
Running searching procedure can be independently interrupted by clicking Stop button. You can also use the context menu available after right mouse click on any found image file item. Use Add to auto-mount list or Add to recent mount list buttons to add selected image file to the proper list. Functionality of other buttons is described in the chapter Auto-mounts. « 10.5.1.
Disk Protection defines three types of user privileges: a normal user a read-only user an administrator All the users can mount and unmount the image but read-only users have granted only restricted reading access to the image. It means that they cannot write any data to the mounted disk. A user with administrator's privilege can manage other user accounts – create new, delete, rename and change account type, set password for selected account, change size limit etc.
Image editor allows users to use most functions from the application toolbar or context menu where are collected frequently used user accounts functions. Next component is status bar where you can see an image status (green light represents unmounted and red light mounted state) and the name of the authenticated account. Create a new image You can easily create a new image file and then manage it. To do this click New image at toolbar. Disk Protection opens Create New Image wizard.
The user account is a normal user account, which has read-write access to the mounted image, so he can also copy and delete files in the image. Read-only user account is a restricted account, which allows only read-only access to the image. Administrator account has the same access rights as a user account but in addition it can make administration operations in the image. Adding a new user is one of the administration operations, which needs such administration privileges.
This function is available only when opened image is not mounted. Take care of changing or deleting all administrator accounts from the image. If you change the last account with administration privileges to non-admin account then this file becomes uneditable, so there won't be possible to create a new account, change account type or increase the size limit. « 10.5.1.4.4 Delete a user account ██ Deleting user accounts is an administration operation and can be used for any user account in the image.
The name of a user account has to be unique in the whole opened image. Disk Protection doesn't distinguish the letters case in the user account name so it means that accounts named Robert and robert are the same. National characters are also supported. The length of a user account name is limited to 31 characters. « 10.5.1.4.6 Change Password ██ Changing password operation allows you to change your password. Name of this account is displayed in the status bar.
It is important to choose a strong password. It is possible to leave password fields blank but we strongly recommend using strong passwords! Be careful to remember passwords because neither manufacturer can decrypt images and get your data without login and password knowledge. « 10.5.1.4.7 Set Password for a user account ██ Setting password is an administration operation and can be used for setting the password for any user account. The administration rights are necessary for this operation.
If the image file is encrypted by the EFS then Disk Protection displays a warning message and mounting procedure is cancelled. In this case you have to decrypt it manually. The mounted image can be unmounted at any time by clicking Unmount button in the toolbar or pressing proper keyboard shortcut (see hotkeys). There is an exception when the mounted image cannot be unmounted. It can occur if there are some opened files in the mounted drive.
If you still need more space, you have to create new image file and copy all data to it. It is of course possible to increase the limit gradually, according to increasing requirements to disk space, it is not necessary to immediately set the maximum size. Minimum step of increasing limit is 1 MB. Values of both limits can be displayed in Image Properties. This function is available for authenticated account with administrator privileges.
If you want to change the view then simply click the particular icon in the toolbar and choose a new view from the displayed list. « 10.5.1.4.
the image file version number encryption algorithm, which has been selected at the time of image creation encryption key size, it depends on selected encryption algorithm file system used for this image file, which depends on image file size.
Drag and Drop function allows you to move files or folders automatically encrypting or decrypting them when you move them from and to encrypted archives. When you want to view an encrypted archive you can select the file in the CAR Manager and click on the View file toolbar button or press F3 and CAR Manager will allow you to view the file using the selected viewer indicated in the Set-up configuration box or in Advanced Configuration Manager.
10.6.1 Firewall ██ Page Firewall Log Viewer makes possible to display all the accessible logs from TrustPort Personal Firewall. On the first load of the page are loaded all the logs to the list. The newest log records are displayed in the highest position on the list. Button Refresh serves for reload of the list of all log records.
Button Clear log deletes all log records from the list. When the button is pressed, a dialog window is displayed so as the list cannot be deleted by mistake. Button Save as serves for storage of the list of the log records to the file. The records are stored to the output file in text form, separated by semicolon, it is so called CSV format. A file created by this way can be further processed or viewed in another program that supports CSV format file (for example Microsoft Excel).
Button Open log serves to open the file with logged records and for the list loading. During the file loading there is displayed a dialog window with the process indication. Button Save as serves for storage of the list of the log records to the file. The records are stored to the output file in text form, separated by semicolon, it is so called CSV format. A file created by this way can be further processed or viewed in another program that supports CSV format file (for example Microsoft Excel). « 10.6.
For every log there is its time, process identification code, action code and plain text description of the event. Logs of critical events are highlighted by dark colour (e.g. a virus was not repaired). Pink colour is used for performed action (e.g. a file was quarantined). 10.6.2.1 Log settings On this page you can enable/disable the log by checking/unchecking the Enable logging option. It is implicitly enabled.
10.7 Network Utilities ██ Network Utilities include a set of useful network tools allowing users to trace network statistics, network connections, verify accessibility of certain IP addresses or to gain information about internet domains.
10.7.1 Network Statistics ██ Page Network Statistics serves for display of basic information about the number of transmitted packets and bytes: Total packets - The total number of all outgoing and incoming packets transmitted via all network interfaces in the computer. Total blocked packets - The total number of all outgoing and incoming packets that were blocked by application TrustPort Personal Firewall on all network interfaces in the computer.
TrustPort Personal Firewall application enables to edit some features of active network connections display. To edit the feature display, press the button Settings. In this dialog window it is possible to set features for list of active network connections display: Enable DNS resolving - all IP addresses will be displayed as domain names. If this option is on, the display refreshing may take more time. Hide listening sockets - all the listening ports stop displaying.
10.7.3 Hide TCP connections - all the items for TCP are hidden. Hide UDP connections – all the items for UDP are hidden. Show only file name - the name of the communication process will be displayed only as a name of an executable file without the complete path to the file. The name display is allowed only on systems Windows XP and higher. Show whole pathname - there will displayed a complete path by the names of communicating processes.
If the answer to the sent requirement is received, there is displayed information that contains the following: who was the answer received from, what is the size of the received ICMP packet and what time passed between the requirement and the answer. If the answer was not delivered in the given time limit, then information about this event is displayed. When the Ping requirement sending is finished, the tool Ping analyses the sent requirements and the received answers and displays a brief statistics.
Note! If there is not allowed the outgoing TCP connection on port 43 in TrustPort Personal Firewall configuration, the tool WhoIs will not function. If you want to use this service, create firewall rule that enables you to use outgoing TCP connection on port 43. « 10.8 Advanced Settings Advanced settings include tabs for language selection, the import or export of configurations, setting of proxy servers and restoring default configuration.
10.8.1 Language configuration On this page you can set the language version. The default language that is selected is the one you chose at the beginning of the installation. In the list of languages, all available language versions are displayed. If you change the selected language, it is necessary to save the setting by pressing Apply or OK. After this occurs, a window will appear stating that the computer needs to restart.
10.8.2 Proxy Proxy server access settings can be done by checking the checkbox Use a proxy server. Next, it is necessary to enter the proxy server address and port, which will be used to communicate with the server. If identification with a username and password is required, these details are entered into the Log on to proxy server part. This setting is applied mainly in secured corporate networks.
10.8.3 Configuration Maintenance Configuration Import or Export is done through the Execute Wizard button. During the import, a file containing TrustPort Management format (.data) configuration is selected from the computer using the Select button. During the export, a location where the file should be stored in the computer is selected and a required name is entered into the dialog window. The import or export itself is performed after clicking on the OK button.
Restoring default configuration (restoring default settings, which were used during product installation) is performed by Restore button. The process needs to be confirmed in the following dialog window. To finish the configuration restore successfully, it is necessary to restart the computer.
10.9 About and Licenses This tab displays information about the product, including its version, as well as information about the current license. 10.9.1 License Information The License Information tab displays information about the current license, including its expiration date. Buttons below are used to register the product using a simple wizard (Register button) and to display the list of installed license keys (Keys button).
The standard trial version can be used for 30 days free of charge, but if you want to use the software over this period, you will have to purchase a full license registration. Product Registration The Register button will begin the TrustPort Registration Wizard. With the help of the Wizard you can register any TrustPort products in just a few simple steps. In the next window choose the method of registration.
If the product has been registered with an activation code, here is the opportunity to extend its validity with the help of a renewal code. This code can be purchased from TrustPort partners (current list can be found on the TrustPort company website). Under the field where the code is written, the activation code whose validity is to be extended is also listed.
The window Activation code owner details will appear only in the case that TrustPort products are being registered with this activation code for the first time. To advance minimum fields of Company Name/User Name, Country and E-mail are required. To finish importing of key, click Finish.
10.9.2 About The About tab provides information about the version of the installed product, furthermore it is also possible to display the License Agreement. By clicking on Show Licenses, information about thirdparty license libraries is shown, and the last button displays System Information. 11 Update Regular updates are necessary if you want the antivirus software to protect your computer properly. On update, the information about new malicious codes and viruses is added.
If the present antiviral signatures and/or antispam rules are actual, an announcement that update is not necessary will appear. The same information will be displayed in case that the update isn't necessary. In Windows 2000 and XP is the same information also displayed on an information balloon in the notification area of the Windows status bar. 11.2 Executing from the command line The update module can be set from the command line with the use of parameters after the name of the AVUPDATER.EXE file.
-? or -h Command line parameters help - displays all the command line functions. -q Start in the quiet mode - the update program will run in the so-called silent mode, i.e. without any output information. -l=x Log level - sets the log verbosity level by the number x from 0 to 2 with the following meaning: 0 ... silent mode 1 ... normal mode 2 ... verbose mode AVUPDATER.exe -l=2 -cfg=cfgfile.conf Read configuration from a file - loads the configuration from an external file.
12.3 Trial license/temporary support expiration Trial license After 30 days of the trial licence period, the functionality of the antivirus program will be restricted. Using the On-Demand Scanner will not be possible anymore, the update will be disabled and the OnAccess scanner will stop working. Trial license key expiration is announced by this window: Temporary support When the temporary support expires, some functions of the antivirus software will be restricted like in the case of the trial licence.
TrustPort Personal Firewall creates on the protected computer a gateway where all the network connections pass by. The gate makes possible to permit or to prohibit communication of the computer with the neighborhood network. The set of rules can be set by the user for all communication adapters (those that are represented by their IP addresses) at the same time, for a concrete address or for a range of addresses.
13.3 Ctrl + R Reloading of the log list Alt + R Reloading of the log list Shift + R Reloading of the log list Application Settings ██ This dialog will appear only in case unknown application is trying to communicate through TCP/IP network. Also option Deny unknown connections but ask (default setting) has to be specified in Advanced Firewall settings to make this work.
14 Archive Encryption 14.1 Product overview ██ Overview TrustPort Archive Encryption provides secure on-demand encryption to protect user's data against unwanted disclosure. This application uses the strongest encryption/decryption algorithm available to protect confidential and personal information stored in any data storage. This software can be also used for sending secured files to someone who does not have encryption software installed on his/her PC.
If you select any encrypted file or archive then the Decrypt menu item appears. The context menu also will be different depending if you right-click on a folder, file or on the "up dir" icon. « 14.2.1 Create new archive ██ To create a new archive using the context menu, right-click on the desired file and select Encrypt Archive on the context menu. TPE will ask you to type the new archive file's name and password and you can choose some additional archive creation options.
Create self-extraction (SFX) EXE archive To do this you need to check Create EXE archive option. In this case TrustPort Archive Encryption creates classic CAR archive file, but adds special selfextraction header to the archive file and renames it to the EXE extension. Selfextraction archives can be extracted by running them as normal Windows programs or by the same way as normal CAR archives.
The created encrypted file using CAR Installer will have an EXE extension, but when you open it, you will be asked for the password (or you can use -pxxx command line parameter, where xxx is a password) and if it is valid the file will immediately open and be extracted to a temporary folder. If the file has any comment, it will be displayed automatically when the user opens the file. « 14.2.
14.2.4 CAR Archive properties ██ If you want to view the CAR archive properties please click the appropriate file containing the encrypted archive with the right button or choose File Properties in the File menu in CAR Manager.
By clicking on the particular column, you can sort the list by selected properties (name, extension, size etc.). If you right-click on the list header you will be able to select the information displayed on the list. On the bottom of the window you can see the number of selected files and their size (not packed size) and also there are a red and a green light that indicates when the Manager is busy (red) or ready (green). In the navigation box, you can see the directory tree of the CAR archive.
In the File menu you can choose, among others, to view the file properties or View file. To enable this function you have to have the file viewer predefined, see Settings configuration. Add/Remove SFX allows user to simply add or remove the .EXE extension on any file without the need of decrypting it as in previous versions. « 14.3.
TPE will start the archive creation process and after finishing it, an information box will appear. Click the OK button and TPE automatically opens the created archive file. Please note that in order to extract this archive TrustPort Archive Encryption must be installed, hence if you want to send an encrypted archive file to a computer where TrustPort Archive Encryption is not installed, you will have to check Create EXE archive box on the Encrypt Archive window. « 14.3.
After that TPE starts to add the selected files and/or folders to the archive. You can interrupt the process by pressing Esc key or using the Cancel button. If TPE finds a file with the same name in the archive then will it will display a confirmation dialog window where you will be asked you if this file should be overwritten or not. « 14.3.
After that TPE starts the checking procedure and if there are no damages, an information dialog box will appear. « 14.3.
There is the possibility of loading a file's comment. If you want to do it, click on the small folder icon on the upper right corner of this dialog window. TPE will open a window where you can select the file you want to read the comment from. « 14.3.
This window will remember the file extensions you used to group even after closing and re-opening CAR Manager. « 14.3.11 Create new folder ██ To create a new folder in any CAR archive or in any CAR archive folder or sub-folder you just simply have to browse and select the destination where the new folder will be created and click on Create folder on the Edit menu. A new window will appear and you will be prompted to type the new folder's name. « 14.3.
14.4 SPACE Selects file/folder under selector SHIFT+UP/DOWN Moves selector - block selection CTRL+A Select all files and folders SHIFT+CTRL+A Unselect all files and folders Gray * Invert selection Gray + Group selection using wildcards Gray - Group unselection using wildcards Management of CAR archives - Total Commander ██ Total Commander is a file manager for Windows (TM) similar to Windows Explorer.
Run Total Commander and select Options on the Configuration menu. Click on the Packer tab. Press the Configure packer extension DLLs button and the following dialog window will appear: In the upper right corner combo box type (or select if exist) CAR (without any dot or asterisk). Click on the New type button and browse for CARWinCmd.wcx file that is located in the TrustPort Archive Encryption installation directory and click Open. Click the OK button. Confirm by clicking OK. « 14.4.
The most important option is the Move to archive option. If you select it then all files will be moved to the archive file. It means that after the archivation process the original files will be securely deleted. Select CAR packer option on the right side of the window (If you don't have this option you have to configure the packer). If you click the Configure button, you can change the compression level of the archive.
CAR plug-in remembers the name and password of the last opened CAR archive file. If you want to force CAR plug-in to forget last entered password try to open another CAR archive file and at the password request window press ESC. Total Commander's panes work independently, meaning that if you want to open the same CAR archive on both panes you will be asked twice to enter the password and if you want Total Commander to forget the password of two open archives you will have to do it on each pane.
On the Pack files window you can set-up the option Move to archive. Then all files will be moved to the archive file and the original files will be securely deleted. Press OK button or ENTER to add the files. « 14.4.5 Delete files from CAR archive ██ Open CAR archive file and select the files and folders, which should be deleted. Then press F8 or Delete key or select Delete from context menu. Total Commander will show a confirmation dialog window. « 14.4.
This way you will be able to specify more options than in the first way: « 14.4.7 View an archived file ██ To view an archived file you need to open a CAR archive file first. Then you can select file that you want to view and press F3 key or right-click on the file and select View from the context menu. Total commander will call the CAR manager plug-in to extract the selected file to the temporary folder and then you can view it. The window can be closed pressing ESC as well.
14.5 Archive Encryption FAQ ██ Can I open an archive stored on a non-writable media like a CD-ROM? Yes, it is possible. But remember that it is not possible to modify this archive, in this case you will not be able to add files, delete files or modify an archive comment. How can I change an archive's password? Current version of TrustPort Archive Encryption does not support password changing on CAR and CPH files.
15 DataShredder 15.1 Product overview ██ The TrustPort DataShredder is a small utility for secure unrecoverable deletion of your electronic data. You can easily delete your sensitive files, folders, free space on drives, Cookies, Internet temporary files, Recycle Bin, System temporary directory, Internet and Document history.
If you select a drive, click the right mouse button and run any command from TrustPort DataShredder item, you will be asked for confirmation. It is recommended to close all applications while you wipe the free space on the drive or all data on the drive. « 15.3 Data shredding ██ The dialog window, displayed below, informs you about the shredding process. Progress counter shows percentage of current file processing. Above this progress counter, a special text is displayed.
current file or directory, the process then continues with the following file or folder. If the file or directory has any attributes, then a dialog window with following notice displays: The file '...' is a file with attribute. Are you sure you want to shred it? If the file is kept by another application, while you want to wipe it, a dialog window with the buttons Abort, Retry, Ignore and Ignore all appears. After every wiping process, the result window is displayed. « 15.
--inettemp (-i) Shredding of temporary internet files. --cookies (-c) Shredding cookies. --systemp (-s) Shredding temporary system files. --recbin (-b) Shredding the recycle bin. --inethist (-n) Shredding internet history. --dochist (-d) Shredding the list of recently opened documents. --runhist (-u) Shredding the list of started applications by Start. --all (-a) This parameter is a combination of parameters --inettemp, --cookies, --systemp, --recbin, --inethist, --dochist and --runhist.
Data Shredder uses several methods of shredding, which method is the best? It is hard to say which is better. The first method is the fastest because it has only 1 shredding cycle but it is the worst from the security point of view. The latest method is the slowest because it has 35 shredding cycles but is the best from the security point of view.
16.2 In the shell context menu ██ TrustPort Disk Protection is associated with the shell context menu. This context menu is displayed when you right click on any image file or on a mounted drive. In this menu you can select Mount or Unmount item, depending on whether the image is currentlymounted or not. When you right click on any image file and select the Properties menu item, the window with properties tabs appears.
maximum limit size, it is the maximum size that the image can be increased to, status, it is the state of image and it can be Unmounted or Mounted. At the bottom of this window is a special Edit image button. If you click this button, then Image Editor will be started and selected image file automatically opens for editation. « 16.3 Quick Launch ██ This application runs in Windows tray and allows you to quickly launch any Disk Protection application.
-am- remove the image from the auto-mounts list, -d disable modifying mount parameters except user credentials, -ua=name given user account name will be used instead of account name taken from the Windows, -unrs special parameter, which makes TDisk.
the new Disk Protection image. TDisk.exe -c -am -im -f -alg=cast -ua=henry -is=512 "c:\Program Files\TrustPort Disk Protection\Images\image000.tdi" -e Edit an image file (user account management, increasing the limit etc.), file the file name with full path of an image that will be edited. TDisk.exe -e "c:\Program Files\TrustPort Disk Protection\Images\image000.tdi" -r Registration of Disk Protection driver.
16.6 Create a new Disk Protection image ██ The Disk Protection Create New Image Wizard is an application that allows you to easily Create a new image. Images created by this wizard are normal files and you can store them on your harddisk, any removable media, or also as for example read only files on CD-ROM. Image created by this wizard is automatically mounted when this wizard successfully finishes.
FAT32. Therefore the size limitation of the new image is 32 GB, what is the limitation of FAT32 system. You can't create an image larger than 4095 MB on target disk, if the target disk uses any FAT file system, because the maximum file size on FAT systems is limited to 4 GB (approximately 4095 MB). This last mentioned limitation is not relevant on NTFS file systems, where is no problem to create a file larger than 4 GB. For more details please go to Set image limit.
TrustPort Disk Protection creates a new image file. You can interrupt this process by clicking Cancel button or by Esc key. The process of creating, formatting and encrypting of the image may take some time. Time needed for this operation depends on the image size, selected method, used file system etc. « 16.6.4 Finishing Create New Image Wizard ██ After the process is finished, new image is created on the target disk and is ready for use.
The last page displays summary of information about created image, including new file name, name of the administrator account, size limit, selected algorithm etc. After clicking on Finish, the image is mounted and the wizard is closed. If there is an error during mounting the image, the program will display an error message. If you press Esc, or close the wizard, then the wizard won’t mount the created image to the system. Total number of available letters is limited to 26 (A-Z).
Read-only access means that image will be mounted as read-only, no matter the user rights defined by user account. If you select Mount at start up option, then selected image will be added to the automounts list. Total number of available letters is limited to 26 (A-Z). If there is no letter available for mounting the image, the mounting process will fail and a warning message will be displayed. « 16.7.
Total number of available letters is limited to 26 (A-Z). If there is no letter available for mounting the image, the mounting process will fail and a warning message will be displayed. The image that is going to be mounted mustn't be compressed or encrypted by the NTFS file system. If Disk Protection detects that the mounting image is compressed then decompresses it automatically. If the image file is encrypted by the EFS then Disk Protection displays a warning message and mounting procedure is cancelled.
You have to enter the username and password, confirm by OK button, then the image will be mounted. New disk will appear in Windows. If something is wrong, Disk Protection will display an error message and you can check the parameters. The number of available disk letters is limited to 26 (A-Z). If there is no available letter in the system for mounting an image, mounting operation will fail. The image that is going to be mounted mustn't be compressed or encrypted by the NTFS file system.
16.9 Disk Protection FAQ ██ I want to add a new user account, delete user, rename user, set user password or change account type function and I cannot choose it in Disk Protection. I don't understand it, what's happened? There are more reasons for this situation. Firstly you need administrator privileges to be able to do these actions. If you are a common user or read-only user then you are not allowed to do this. The second reason might have been the state of opened image file.
You may have used switching users in Windows XP and there are more users logged in at the same time and have their own mounted images. Although I have typed right username and password the Disk Protection informs me that the image is already mounted. I am confused. I use Windows XP. There is another user logged-in and this user has already mounted the image file that you try to mount.
17 CheckImage 17.1 Product overview ██ CheckImage is a powerful tool for checking your encrypted images and repairing of opportune errors that can occur for instance because of wrong computer shutdown. When you encounter a problem in your image, you are strongly recommended to check it using CheckImage. But you should check your images after each incorrect shutdown. You can't check an image that is at the same time mounted to your computer or edited by utilities like Image Editor.
You can repair more files from one crosslinked group. The repairing then proceeds according to specified priority. The file with the highest priority occupies its whole chain including the joint part, the others take in sequence as much of their chains as possible (until they run into a part of the chain that has occupied some file before). This applies to methods Repair it and Repair it (extend).
Self LFName Description: In the FAT filesystem (used in TDisk images) has each file since the MS-DOS its name in the format 8.3 (8 letters for the filename and 3 letters for the file extension). The Windows operating system added to the filesystem longer names. But these longer names are stored separately because of holding compatibility with the old system. So it is possible that a long name is corrupted while the corresponding short name is all right. That's the case of this error.
LFName Description: Long filenames (see the description of "Self LFName") are stored in the parent directory of corresponding files. This error indicates that there are some long filenames in this directory that don't belong to any files. Solution: If you choose to repair this error, these redundant long filenames are simply deleted. Dots error Description: Each directory (except for the root directory) contains two special items. One item (with the name "..
When you choose to check your image, CheckImage performs all necessary control procedures and shows you the results. After this you just have to press one button to repair all errors. If you don't want to do it immediately, you can close the opened image without any repairs, of course. « 17.3.1 Check an image in simple mode ██ When you click on the button Check image on the toolbar or select appropriate command in the File menu, the standard open file dialog appears.
If the image contains no errors, it is closed finally, and you can continue to check other images. « 17.3.2 Errors and their repairing in simple mode ██ In general there are three types of errors that can occur: Inconsistency in file allocation tables (FAT): FAT table contains information about every file and directory stored in the image including the size and the exact position, where it is stored. In each image there are two FAT tables copies that have to be consistent.
Damaged objects are listed in the table in the middle of the window. For each object there is information about its name (with the full path), size (just for files), errors and the method which will be used by repairing. More information about errors and relevant repair methods is on page Description of error types in images. Now the last remaining action is to repair the image. The repaired image is closed in the end. « 17.
Advanced mode is for experienced users only! If you didn't understand something from this part of the manual, it would be better to read the part of the manual about the simple mode first. « 17.4.1 Check an image in advanced mode ██ Checking of an image consists of a few steps: 1. Choose the image file from a standard file open dialog. 2. Type in your authentication data necessary to open the image.
Any changes that you made in the previous results won't get lost, you can continue to edit it after that you eventually switched back again. « 17.4.3 Different view modes ██ CheckImage offers you three different view modes All errors In this basic view you can see all wrong items in one list. Each line contains the path of the wrong item, its size, errors (separated by comma) and method which will be used by repairing. You can sort the list by several columns by clicking on their header buttons.
Crosslinked groups Some files or directories in the image can be crosslinked together, see Description of error types in images. On the left side of this view you can select which group of such together crosslinked items you want to see, on the right side there is a list of items you selected. There is one more column with information about priority by repairing and the items are sorted by this priority. This priority is related just to items that are going to be repaired. You can change the priority.
17.4.4 Change the repair settings ██ In advanced mode it is possible to change the action that will be carried out by repairing. When you right-click on an item in the list, a context menu appears where you can select the action to make. In the All files view you can set also an errorless file or directory to be deleted.
17.4.5 Repair errors ██ When you are ready with editing of repairing actions, you can finally do the actual repair by clicking the toolbar button, or File -> Repair errors menu item. If you don't want to do it right now, you can, of course, close the image without repairing it. After repairing, the image remains opened. All changes made in this image are logged into the file CheckImage.log located in the log directory. « 17.4.6 Format an image ██ This action is accessible only in advanced mode.
How can I prevent from errors in my images? There are basically two ways how your image can be corrupted that you can in some cases prevent. The first way is as mentioned before when you shutdown the system without unmounting your image (which is done automatically by logging out). Sometimes you can avoid it but not always. The other way is when the disk or other medium on which is your image stored is somehow damaged.
The On-Access Scanner does not work after start. What shall I do? Go to the Antivirus Settings and check if the On-Access Scanner is active. If not, activate it. Another possibility is that your license of this product has expired; in that case contact our technical support. When executing the On-Demand Scanner, a window announcing that I have a trial version pops up.
What are logs good for? Logs are records about all program activities. They are used mostly by system administrators. A regular user doesn't have to care about them. I received a license key for the TrustPort Antivirus, what shall I do with it? Click the right button on the quick launch icon in the right bottom corner of the screen and choose the Configure item in the antivirus menu. When a window opens, choose Register license from the General Settings dropdown menu.