Unisar 1.24.1867 manual Book structure

Page 15

Preface

Warning

This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications. You should read and understand it, because it describes something extremely risky.

2. The book structure

The book consists of four parts, containing the major topics: Description and features, Installation, Usage and Getting help. Moreover, a glossary and UNIX manual pages are provided to clarify some different aspects of BitDefender, which could issue technical problems.

Description and features. A short introduction to BitDefender. It explains who is BitDefender, who is SOFTWIN and Data Security Division. You are presented BitDefender Antivirus Scanner for Unices, its features, the product components and the basics of the integration and the filtering mechanism.

Installation. Step by step instructions for installing BitDefender on a system. Starting with the prerequisites for a successfully installation, you are conducted through the whole installation process. Finally, the uninstall procedure is described in case you need to uninstall BitDefender.

Using BitDefender. Description of basic administration and maintenance of BitDefender. You are presented the BitDefender configuration file, how to get run-time information, how to test the antivirus efficiency, how to perform the updates and how to register the product. You are also presented real life usage scenarios, covering various aspects of using BitDefender to detect malware on your system, and several desktop and server integration procedures, to have the antivirus scanning the files directly from the file manager or the emails passing your local email server.

Getting help. Where to look and where to ask for help if something goes not so right. You are guided to the Knowledge Base and offered the BitDefender and BitDefender partners contact information to call, if needed.

Manual pages. The manual pages of BitDefender Antivirus Scanner for Unices are included for a quick and convenient reference. Whenever you will find examples of BitDefender commands, the manual pages will provide you a valuable help to understand all the options and actions.

Glossary. The Glossary tries to explain some technical and uncommon terms you will find in the pages of this book.

xv

Image 15
Contents Users Guide Users Guide As every cat owner knows, nobody owns a cat BitDefender Antivirus Scanner for Unices Table of Contents BitDefender integration UninstallConfiguration file Testing BitDefender Real life usageBest practices UpdatesFrequently Asked Questions Support Product registrationBitDefender Antivirus Scanner for Unices Viii End User Software License Agreement End User Software License Agreement End User Software License Agreement Xii Preface Conventions used in this bookTypographical conventions Admonitions CommandBook structure Request for Comments Description and features Description and features Overview Why BitDefender?Data Security Division Softwin Description BitDefender Antivirus Scanner for Unices Product featuresKey Features More in the manual Scanning mechanismFeatures Installation Installation Prerequisites System requirementsHardware system requirements Linux requirements Package naming conventionSoftware system requirements Linux conventionFreeBSD convention Installation Package installation Test the package for integrityTest the rpm and deb packages Test the FreeBSD tbz package Test the self-extractable archiveInstall the self-extractable archive Install the packageInstall the rpm package Install the deb packageAdditional parameters Install the FreeBSD package InstallerConfigures the quarantine directory Uninstall using the self-extractable archive UninstallUninstall the rpm package Uninstall the deb packageUninstall the FreeBSD package Uninstall a package downloaded locallyUninstall from the ports collection Using BitDefender Using BitDefender System versus User configuration Configuration fileKey Description More about triggered updateRegular users and quarantine Using07 BitDefenderProduct registration Using BitDefenderTesting BitDefender Scan an executable fileEicar online resources Scan an archive Command output will be the followingScan a mailbox Tmp/mail.mbox Real life usage Virus scanningScan a regular file Scan a directory Scan the entire system Actions on archives Scan the archivesScan the mailbox Report Using the log fileDisplay the virus list Get more informationDisplay the product version Virus submissionMidnight Commander BitDefender integrationDesktop integration Different installation path KDE KonquerorDo not break the last line Action on file in Konqueror KrusaderKrusaders User Actions ROX-FilerPine Information Center PineThis is how the screen should look like What to do with infected emailsExit Status Interval 1,254 BitDefender pipe bdscanpipe EvolutionKMail Filter actions in KMail Server integrationQmail-Scanner installation MailScanner installationMailScanner Change it to the following form Amavisd-newAmavisd-new installation Using Regular updates UpdatesTriggered update Run the triggered updateEdit the cron table Http proxy Manual updateOrder to extract the updates Product registration Trial License License for home or personal useCheck the expiration date License for commercial use Best practices Best practices Getting help Getting help Frequently Asked Questions Getting help Support Support departmentBitDefender Knowledge Base Softwin GmbH Contact informationWeb addresses AddressBitDefender LLC RomaniaGetting help Manual Pages Manual Pages Synopsis DescriptionOptions Manual Pages Actions Files ExamplesSee also BugsManual Pages Glossary Download Command lineCookie Disk driveHeuristic EventsFalse positive Filename extensionPacked programs Macro virusMail client Non-heuristicStartup items PortReport file ScriptWorm UpdateVirus Virus definition