Unisar 1.24.1867 manual Command line, Cookie, Disk drive, Download, Mail

Page 98

Glossary

Internet Explorer. Both of these are graphical browsers, which means that they can display graphics as well as text. In addition, most modern browsers can present multimedia information, including sound and video, though they require plug-ins for some formats.

Command line

In a command line interface, the user types commands in the space provided directly on the screen using command language

Cookie

Within the Internet industry, cookies are described as small files containing information about individual computers that can be analyzed and used by advertisers to track your online interests and tastes. In this realm, cookie technology is still being developed and the intention is to target ads directly to what you've said your interests are. It's a double-edge sword for many people because on one hand, it's efficient and pertinent as you only see ads about what you're interested in. On the other hand, it involves actually "tracking" and "following" where you go and what you click. Understandably so, there is a debate over privacy and many people feel offended by the notion that they are viewed as a "SKU number" (you know, the bar code on the back of packages that gets scanned at the grocery check-out line). While this viewpoint may be extreme, in some cases it is accurate.

Disk drive

It's a machine that reads data from and writes data onto a disk.

A hard disk drive reads and writes hard disks.

A floppy drive accesses floppy disks.

Disk drives can be either internal (housed within a computer) or external (housed in a separate box that connects to the computer).

Download

To copy data (usually an entire file) from a main source to a peripheral device. The term is often used to describe the process of copying a file from an online service to one's own computer. Downloading can also refer to copying a file from a network file server to a computer on the network.

E-mail

Electronic mail. A service that sends messages on computers via local or global networks.

98

Image 98
Contents Users Guide Users Guide As every cat owner knows, nobody owns a cat BitDefender Antivirus Scanner for Unices Table of Contents Real life usage UninstallConfiguration file Testing BitDefender BitDefender integrationProduct registration UpdatesFrequently Asked Questions Support Best practicesBitDefender Antivirus Scanner for Unices Viii End User Software License Agreement End User Software License Agreement End User Software License Agreement Xii Typographical conventions PrefaceConventions used in this book Command AdmonitionsBook structure Request for Comments Description and features Description and features Why BitDefender? OverviewData Security Division Softwin Description Product features BitDefender Antivirus Scanner for UnicesKey Features Scanning mechanism More in the manualFeatures Installation Installation Hardware system requirements PrerequisitesSystem requirements Linux convention Package naming conventionSoftware system requirements Linux requirementsFreeBSD convention Installation Test the rpm and deb packages Package installationTest the package for integrity Test the self-extractable archive Test the FreeBSD tbz packageInstall the deb package Install the packageInstall the rpm package Install the self-extractable archiveAdditional parameters Installer Install the FreeBSD packageConfigures the quarantine directory Uninstall the deb package UninstallUninstall the rpm package Uninstall using the self-extractable archiveUninstall from the ports collection Uninstall the FreeBSD packageUninstall a package downloaded locally Using BitDefender Using BitDefender Configuration file System versus User configurationMore about triggered update Key DescriptionUsing07 BitDefender Regular users and quarantineUsing BitDefender Product registrationEicar online resources Testing BitDefenderScan an executable file Command output will be the following Scan an archiveScan a mailbox Tmp/mail.mbox Scan a regular file Real life usageVirus scanning Scan a directory Scan the entire system Scan the archives Actions on archivesScan the mailbox Using the log file ReportGet more information Display the virus listVirus submission Display the product versionDesktop integration Midnight CommanderBitDefender integration Do not break the last line Different installation pathKDE Konqueror Krusader Action on file in KonquerorROX-Filer Krusaders User ActionsPine Pine Information CenterWhat to do with infected emails This is how the screen should look likeExit Status Interval 1,254 Evolution BitDefender pipe bdscanpipeKMail Server integration Filter actions in KMailMailScanner Qmail-Scanner installationMailScanner installation Amavisd-new Change it to the following formAmavisd-new installation Using Run the triggered update UpdatesTriggered update Regular updatesEdit the cron table Manual update Http proxyOrder to extract the updates Check the expiration date Product registrationTrial License License for home or personal use License for commercial use Best practices Best practices Getting help Getting help Frequently Asked Questions Getting help BitDefender Knowledge Base SupportSupport department Address Contact informationWeb addresses Softwin GmbHRomania BitDefender LLCGetting help Manual Pages Manual Pages Options SynopsisDescription Manual Pages Actions Examples FilesBugs See alsoManual Pages Glossary Disk drive Command lineCookie DownloadFilename extension EventsFalse positive HeuristicNon-heuristic Macro virusMail client Packed programsScript PortReport file Startup itemsVirus definition UpdateVirus Worm