Unisar 1.24.1867 manual Data Security Division

Page 20

01

Description and

Overview

features

 

all complex threats that endanger a network, from a small local area to large multi-server, multi-platform WAN's.

Your Ultimate Protection. The final frontier for any possible threat to your computer system. As virus detection based on code analysis has not always offered good results, BitDefender has implemented behavior-based protection, providing security against born-new malware. MIDAS (Malware Intrusion Detection Advanced System), featuring three levels of security, guarantees your serenity even after the fastest epidemics.

These are the costs that organizations want to avoid and what the security products are designed to prevent:

Worm attacks

Communication loss because of infected e-mails

E-mail breakdown

Cleaning and recovering systems

Lost productivity experienced by end users because systems are not available

Hacking, and unauthorized access that causes damage

Some simultaneously developments and benefits can be accomplished by using the BitDefender security suite:

Increase network availability by stopping the spread of malicious code attacks (i.e., Nimda, Trojan horses, DDoS).

Protect remote users from attacks.

Reduce administrative costs and deploys rapidly with BitDefender Enterprise management capabilities.

Stop the spreading of malware through e-mail, using a BitDefender e-mail protection at the company's gateway. Temporarily or permanently block unauthorized, vulnerable, and expensive application connections.

1.2.Data Security Division

Ever since the beginning, SOFTWIN's Data Security Division approached data protection in a specific manner, with the first intelligent update, requiring no user intervention, the first remote antivirus management through WAP technology or the first Personal Firewall to be integrated within an antivirus engines to provide complete response to today's complex security threats.

Born to provide full data security at all critical levels in today's business environment, Data Security Division aims to ensure the protection of systems against computer

20

Image 20
Contents Users Guide Users Guide As every cat owner knows, nobody owns a cat BitDefender Antivirus Scanner for Unices Table of Contents Uninstall Configuration file Testing BitDefenderReal life usage BitDefender integrationUpdates Frequently Asked Questions SupportProduct registration Best practicesBitDefender Antivirus Scanner for Unices Viii End User Software License Agreement End User Software License Agreement End User Software License Agreement Xii Typographical conventions PrefaceConventions used in this book Command AdmonitionsBook structure Request for Comments Description and features Description and features Why BitDefender? OverviewData Security Division Softwin Description Product features BitDefender Antivirus Scanner for UnicesKey Features Scanning mechanism More in the manualFeatures Installation Installation Hardware system requirements PrerequisitesSystem requirements Package naming convention Software system requirementsLinux convention Linux requirementsFreeBSD convention Installation Test the rpm and deb packages Package installationTest the package for integrity Test the self-extractable archive Test the FreeBSD tbz packageInstall the package Install the rpm packageInstall the deb package Install the self-extractable archiveAdditional parameters Installer Install the FreeBSD packageConfigures the quarantine directory Uninstall Uninstall the rpm packageUninstall the deb package Uninstall using the self-extractable archiveUninstall from the ports collection Uninstall the FreeBSD packageUninstall a package downloaded locally Using BitDefender Using BitDefender Configuration file System versus User configurationMore about triggered update Key DescriptionUsing07 BitDefender Regular users and quarantineUsing BitDefender Product registrationEicar online resources Testing BitDefenderScan an executable file Command output will be the following Scan an archiveScan a mailbox Tmp/mail.mbox Scan a regular file Real life usageVirus scanning Scan a directory Scan the entire system Scan the archives Actions on archivesScan the mailbox Using the log file ReportGet more information Display the virus listVirus submission Display the product versionDesktop integration Midnight CommanderBitDefender integration Do not break the last line Different installation pathKDE Konqueror Krusader Action on file in KonquerorROX-Filer Krusaders User ActionsPine Pine Information CenterWhat to do with infected emails This is how the screen should look likeExit Status Interval 1,254 Evolution BitDefender pipe bdscanpipeKMail Server integration Filter actions in KMailMailScanner Qmail-Scanner installationMailScanner installation Amavisd-new Change it to the following formAmavisd-new installation Using Updates Triggered updateRun the triggered update Regular updatesEdit the cron table Manual update Http proxyOrder to extract the updates Check the expiration date Product registrationTrial License License for home or personal use License for commercial use Best practices Best practices Getting help Getting help Frequently Asked Questions Getting help BitDefender Knowledge Base SupportSupport department Contact information Web addressesAddress Softwin GmbHRomania BitDefender LLCGetting help Manual Pages Manual Pages Options SynopsisDescription Manual Pages Actions Examples FilesBugs See alsoManual Pages Glossary Command line CookieDisk drive DownloadEvents False positiveFilename extension HeuristicMacro virus Mail clientNon-heuristic Packed programsPort Report fileScript Startup itemsUpdate VirusVirus definition Worm