Académique Documents
Professionnel Documents
Culture Documents
Table of contents
G Data Software 3
G Data ServiceCenter 5
SecurityCenter 14
Licence agreement 59
1
G Data Software
2
G Data Software
G Data Software
This fast start guide will help you install your new G Data
Software and gives you a few practical, easy tips on how to
use it to protect your computer optimally. The following
sections will give you additional help on installing, getting
started with and general questions about the program:
3
G Data Software
Attachment: do you only want to use specific G Data
software modules? Not interested in a standard installation?
Find out here exactly how to customise the G Data software
optimally for your system.
4
G Data ServiceCenter
G Data ServiceCenter
Installation and use of G Data Software is generally easy and
self-explanatory. However, should you encounter a problem,
just contact our G Data ServiceCenter via the Internet.
5
G Data Software
6
Installing the software
Problems during installation?
? Should you encounter any problems during installation
of the G Data software, or if online registration of your
single- or multi-user licence does not work
immediately, please go to the end of this Quick Help
and look in the chapter entitled Tips for installation
7
G Data Software
8
On the first run
9
G Data Software
To get this access data, just click on the Register with
2 server button. Then you will see a new window where
you can enter your registration number and customer
data.
10
On the first run
11
G Data Software
Virus check wizard
As soon as you have installed the G Data software on your
computer, it is protected from malware. However, you should
verify whether a virus could have nested itself on your
computer BEFORE the installation. You can use the virus
check wizard, which appears when you start the software for
the first time, to directly carry out this scan.
12
On the first run
Would you like to check your computer from head to
? toe or do you already have problems caused by a virus
or other malware? Then simply read the section: Boot
scan prior to installation
13
G Data Software
SecurityCenter
After installing the G Data software your virus protection
should generally run fully automatically. You only actually need
to consult the SecurityCenter if you want to access the virus
check or one of the software's many additional features.
14
SecurityCenter
Your G Data software is then up to date and you can close the
SecurityCenter again. All functions and settings you can see
under the Security Status icon (such as Virus check or
Updates) can be used if you want to actively configure the
security of your system - however you mustn't! You decide to
what degree you would like to be involved with the subject of
virus protection. G Data software gives you the choice!
15
G Data Software
How is the SecurityCenter organised?
In the relevant subsections (such as Virus check or Updates)
you can see precisely which areas of your G Data software
are optimally set up and which could be improved. The
following icons indicate the security status of the respective
area.
If you click the info icon in the above right, you will
receive information regarding the program version.
This information may be useful when talking to the
G Data ServiceCenter .
16
SecurityCenter
Do you have further questions? You can consult the
online help in the software at any time. In the program,
simply press the F1 key or click on the help button
displayed here.
License
Under the Licence entry on the left-hand side of the program
interface you can see how long your virus update licence is
valid for. Constant updates are more important for antivirus
software than for any other type of software. Therefore the
G Data software will automatically remind you to renew your
licence before it expires. The best way is via the Internet -
effortless and easy! You can find more information on what
happens when your licence expires in the section: What
happens when my licence expires?
17
G Data Software
CPU load
This small chart shows you how much speed the G Data virus
protection costs you when using on your computer. If heavy
CPU load occurs regularly in relation to a specific application
(e.g. when using video processing programs), it may help to
define the relevant application as an exception. You can find
additional information on this in the online help for the Virus
monitor.
18
Tips for virus check
19
G Data Software
How do I start a virus check?
There are different options to do so.
20
Tips for virus check
21
G Data Software
Pause the virus check at times of high system
load: You can use this option to specify that the
software holds the virus check until you are finished
with other tasks on your computer.
Switch off computer after virus check: This
function is very useful if you want to run the virus
check overnight or at the end of the working day. As
soon as the G Data software ends the virus check,
your computer is powered down and no longer uses
up resources unnecessarily.
Access denied: In Windows, there are usually files
that are used exclusively by applications and that
can therefore not be scanned while these
applications are running. It is preferable that you
therefore have no other programs running on your
system during a virus check. If you set a checkmark
here, the data that is not checked will be displayed.
Password-protected archive: As long as an
archive is password-protected, the G Data software
cannot scan the files in it for viruses. If you check
this box, the antivirus software indicates which
password-protected archives it was unable to scan.
Provided the archives are not unpacked, any viruses
it contains will not pose a security risk to your
system.
22
Tips for virus check
In the event that viruses and other malware are found,
3b you can decide how to handle the virus discovery.
Generally clicking on the Execute actions button is
sufficient.
23
G Data Software
Disinfect (if not possible: log only): Here, an
attempt is made to remove the virus from an
affected file; if this is not possible without damaging
the file, the virus is logged and you can deal with it
later via the log entry. Warning: If a virus is only
logged, it continues to be active and dangerous.
Disinfect (if not possible: place in quarantine):
This is the default setting. Here, an attempt is made
to remove the virus from an affected file; if this is not
possible without damaging the file, the file is moved
to the Quarantine. Please read about this in the
section: How does the quarantine work?
Disinfect (if not possible: delete file): An attempt
is made to remove the virus from a compromised
file; if this is not possible, the file is deleted. This
function should only be used if there is no important
data on your computer. Always deleting infected files
can, in the worst case, result in your Windows
becoming inoperable and requiring a reinstallation.
Move file to quarantine: Infected files are
immediately moved to the Quarantine. Files saved
in the quarantine are encrypted. The virus cannot
cause any damage here, and the infected file is still
available for possible repair attempts. Please read
about this in the section: How does the quarantine
work?
Delete file: This function should only be used if
there is no important data on your computer. Always
deleting infected files can, in the worst case, result in
your Windows becoming inoperable and requiring a
reinstallation.
24
Tips for virus check
If you click on the Execute actions button now, the G
Data software proceeds with each virus discovery as
you have defined.
After the virus check has ended, you have the option of
4 sending a copy of the infected files to G Data Software,
so we can improve virus protection for all our users on
the basis of this data. Your data will of course be
handled in confidence in doing so, and your personal
details will not be forwarded or used.
25
G Data Software
Forwarding of such data is of course entirely optional
and, if you prefer, you can skip this action or
permanently switch it off under the menu item In case
of further infections. For more information see the
section: What is the G Data Malware Information
Initiative?
26
Tips for virus check
Delete infected file: This function should only be used if
there is no important data on your computer. Always
deleting infected files can, in the worst case, result in your
Windows becoming inoperable and requiring a
reinstallation.
27
G Data Software
Virus information
? You can display further information from the Internet
regarding the detected virus at any time. Simply click
on the respective virus report in the selection screen,
the report, or in the logs and click on the Virus
information button. You will then be connected to the
G Data Security Labs via the Internet and can thus
obtain current information in your Internet browser
regarding the detected virus.
28
Tips for virus check
Update: If you have kept the quarantine dialogue window
open for a long time, and have since discovered a virus and
moved it into quarantine (e.g. automatically via the virus
monitor), you can use this button to update the display.
Submit: In certain cases, if you cannot disinfect an infected
file, you can send it to G Data via the Internet. The contents
of this file will naturally be treated confidentially. The results
of the investigation are channeled into improving and
updating the virus definitions and the software. For more
information see the section: What is the G Data Malware
Information Initiative?
Disinfect: In many cases, infected files can still be
recovered. The software removes the virus components
from the infected file and reconstructs the uninfected
original file. If the disinfection is successful, the file is moved
back to where it was saved before the virus check and is
available to you again without any restrictions.
Move back: Sometimes it is necessary to move an infected
file that cannot be cleaned back out of quarantine to its
original storage location. This may be for data recovery
purposes for example. You should only select this function
in exceptional cases and observe strict security measures
(e.g. disconnect the computer from the network/Internet,
back up uninfected data, etc.).
Delete: If you no longer require the infected file, you can
simply delete it from quarantine.
29
G Data Software
30
Tips for the virus monitor
This can be useful in rare instances if, for example, you would
like to copy many files back and forth on the computer or
would like to perform procedures that are computationally
intensive (e.g. video editing). If you want to switch off the virus
monitor permanently, click on the icon to the right of the Virus
monitor entry in the Virus check area in the SecurityCenter.
You can permanently switch the virus monitor off here.
31
G Data Software
Disable monitor: This allows you to switch the Virus
monitor off and back on again if you need to. This may be
advisable if, for example, you are copying large volumes of
data from one part of your hard drive to another or running
memory-intensive processes (such as copying DVDs, etc.).
You should only leave the virus monitor disabled when
absolutely necessary and make sure, wherever possible,
that your system is not connected to the Internet during this
time and that it cannot access any new, unscanned data (e.
g. from CDs, DVDs, memory cards or USB sticks). Read
about how the virus monitor works in the section: Tips for
the virus monitor?
Virus update: Antivirus software should always be fully up
to date. You can of course have the data updated
automatically by the software. However, if you urgently need
an update, you can launch one via the Virus update button.
Read about the purpose of a virus update in the chapter:
How do I start a virus update?
Statistics: This allows you to view the virus monitor's scan
statistics.
32
Tips on virus updates
33
G Data Software
How do I start a virus update?
There are various ways of starting a virus update.
34
Tips on virus updates
Normally a virus update loads the new data onto your
? computer fully automatically in the background and
updates the G Data software without your assistance.
For this, however, an Internet connection must exist
and/or must be able to be established by the software.
The specifications that you must undertake for this can
be found in the section Internet update. If an Internet
update is not possible, it is recommended that you
simply test whether you can access the Internet with
your Internet access program (e.g. Internet Explorer).
If this is possible, a connection of the G Data software
to the Internet should also be possible in principle. If
connecting to the Internet via Internet Explorer is not
possible, it could be that the connection problems lie
outside the G Data software and must first be resolved
elsewhere. The help documentation of your Windows
operating system will help you with this.
35
G Data Software
What is a software update?
The virus update updates the virus signatures almost
continuously and is a special function so to say that only
antivirus programs have in the form. As with all other software
(e.g. office software), there are also program updates and
improvements for your G Data product regularly. As soon as
a program update is available, you can easily install this via
the Update button in the Updates area.
36
Tips for installation
37
G Data Software
38
Tips for installation
After this first step the boot scan in all three scenarios will
proceed identically:
39
G Data Software
You will now see the program interface. Click the
6 Check computer entry to check your computer for
viruses and malware. Depending on the type of
computer and size of the hard drive, the boot scan can
take an hour or more.
40
Tips for installation
1. Switch your computer off.
2. Restart your computer. Usually you reach the BIOS
setup by pressing the DEL button as the computer
is booting up (and sometimes the F2 or F10 button
as well).
3. How to change individual settings in your BIOS
setup varies from computer to computer. Please
consult your computer's documentation. The result
should be the boot sequence CD/DVD-ROM:, C: ,
meaning that the CD/DVD-ROM drive becomes the
1st boot device and the hard disk partition with
your Windows operating system on it becomes the
2nd boot device.
4. Save the changes and restart your computer. Your
computer is now ready for a boot scan.
41
G Data Software
6. You will now see a list, from which you need to
select the Hard disk drives entry using the arrow
keys (up/down). Now press Enter.
7. Now select the USB entry, so it appears in first
place 1st Drive = USB( using the Enter key and
arrow keys.)
8. Now press F10 to save the changes and exit the
BIOS. Your computer can now be booted from the
USB stick.
9. Restart the computer. Your computer is now ready
for a boot scan.
42
Tips for installation
43
G Data Software
How will the received data be used? When processing and
saving the data, the relevant country's legal requirements for
data protection and forwarding of data will be observed.
G Data takes great care to protect data from unauthorised
access. Evaluation of the data is carried out in the G Data
Security Labs and is used for clarifying research questions
relating to IT security. The principal intention is to investigate
security risks and develop protection mechanisms. A few
examples of use include the creation of block lists, statistical
evaluation for publication in specialist articles or development
of rule sets for protection technologies. Participation is
voluntary and refusal to do so has no negative effects on the
product's functioning. Through your participation in the G Data
Malware Information Initiative every G Data customer will in
future be better informed about computer-based threats and
be better protected against them.
44
Tips for installation
45
G Data Software
Can I use my old access data to obtain updates on a
new computer?
Yes. In this event, the update server establishes its
connection with the new computer - from then on the old
computer can no longer obtain updates.
46
Tips for installation
Why does the message: "The product has already
? been registered" during registration?
If you have already registered the G Data software
once, it is not possible to register it again using a
registration number that has already been used.
Please use the access data (user name and
password) assigned to you when you first registered
for Internet updates. After you have entered your
access data, confirm by clicking OK - do not click on
Register with server. If you are registering the
product for the first time and you receive this message,
please contact the G Data Service Center.
47
G Data Software
Can I also purchase more licences for additional PCs
or more functions to add to my software package?
Naturally you can increase the number of licences you have or
upgrade to products with increased functionality at any time. If
you click on the Expand licences entry in the SecurityCenter,
you will be taken directly to the online shop on our website.
Notes on uninstalling
If you intend to uninstall the G Data software again sometime
in the future, the easiest way to do this is by clicking on the
Uninstall button in the G Data program group. The uninstall
then takes place automatically. Alternatively, you can also
uninstall the program using the Windows Control Panel.
48
Tips for installation
Windows Vista, Windows 7: On the Windows taskbar click
on the start icon (normally at the bottom left of your screen)
and select the Control Panel folder. Here you will find the
option Programs > Uninstall a program. Select G Data
software from the list and then click Uninstall to initiate the
uninstall process.
49
G Data Software
50
What threats are there?
shared folders, network scans, peer-to-peer networks or
email. The malware attacks all kinds of different targets,
although this sometimes only works on specific
combinations of hardware, software and operating
systems.
51
G Data Software
the payload must be launched by the victim himself. This
can involve calling up a contaminated program, opening
an email attachment, or phishing for personal data. The
launch of malware can also be linked to conditions, e.g.
with some viruses the malware is launched on a certain
date or when the program is called a certain number of
times.
52
What threats are there?
Network worms: Several ports on randomly selected
network computers are scanned and, if an attack is
possible, the vulnerabilities in the protocols (e.g. IIS) or
their implementation are used to spread the worm. Well
known examples of this type are Lovsan/Blaster and
CodeRed. Sasser exploits a buffer overflow error in
the Local Security Authority Subsystem Service (
LSASS) and infects computers when they are connected
to the Internet.
53
G Data Software
Boot sector viruses: Boot sector or MBR viruses (=
master boot record viruses) actually settle in front of the
boot sector on a data medium, thus ensuring that the
virus code is read first and then the original boot sector
when the computer boots from this medium. This enables
the virus to slip into the system undetected then run when
the hard disk boots up. Often the virus code remains in
the memory after it has infected the system. These
viruses are known as memory-resident. The virus is then
passed on when diskettes are formatted, enabling it to
spread to other computers. However, boot sector viruses
are not just activated during formatting processes. A virus
can be transferred from an infected diskette via the DOS
DIR command. Depending on the infection routine, boot
sector viruses can either be highly dangerous or just
annoying. The oldest and most widespread of this type of
virus is called Form.
54
What threats are there?
Companion viruses: Under DOS, COM files are
executed before EXE files of the same name. In the days
when computers frequently or exclusively operated via
command lines, this was an effective device for running
harmful code on a computer without detection.
55
G Data Software
Polymorphic viruses: Polymorphic viruses contain
mechanisms that change their appearance with each
infection. Hence parts of the virus are encrypted. The
encryption routine integrated in the virus generates a new
key for each copy and sometimes even new encryption
routines. Additionally, command sequences that are not
required to operate the virus can be substituted or
randomly rearranged. As such, billions of variants of a
virus can easily occur. It is often not enough to use
standard virus signatures to detect and remove encrypted
and polymorphic viruses. Most of the time, special
programs must be written. The effort required to analyse
them and prepare suitable countermeasures can be
enormous. Thus, polymorphic viruses can truly be
regarded as the kings of the virus world.
56
What threats are there?
Hoaxes: Hoaxes are apparent virus alerts that are often
spread via email. The recipient is advised to forward the
email alert to friends and colleagues. However, this mostly
involves alerts only intended to cause panic.
57
G Data Software
Spam: A similarly costly and annoying menace is the
forwarding of unwanted advertising email or propaganda
email. Modern anti-spam programs combine statistical
procedures (text analysis, mail server lists) and automatic
procedures (based on Bayes' Theorem) to filter out
unwanted email.
58
Licence agreement
Licence agreement
The following are the contractual terms and conditions for the use of the
software G Data Software by the end user (hereafter also called: Licencee).
1. Object of the contract: The object of the contract is the G Data software
recorded on a data medium or downloaded from the Internet and the
program description. This is hereafter referred to as Software. G Data calls
attention to the fact that, due to the status of technology, it is not possible to
manufacture Software in such a way that it operates without error in all
applications and combinations.
2. Scope of use: G Data grants you, for the duration of this contract, the
simple, non-exclusive and personal right (hereafter referred to as Licence) to
use the Software on a contractually agreed number of computers. The
Software can be used in the form of an installation on a physical unit (CPU),
a virtual/emulated machine (such as VMWare) or an instance of a terminal
session. If this computer is a multiple user system, this usage right applies to
all users of this one system. As the Licencee you are permitted to transfer
the Software from one computer to another in physical form (i.e. stored on a
data medium), provided that it is not used on more than the contractually
agreed number of computers at any time. Use that exceeds this is not
permitted.
3. Specific limitations: The Licencee is prohibited from changing the Software
without the prior written consent of G Data.
4. Ownership of rights: When purchasing the product you only receive
ownership of the physical data medium onto which the Software has been
recorded and to updates agreed in the context of support. Purchase of rights
to the Software itself is not included with this. G Data especially reserves all
publication, reproduction, processing and usage rights to the Software.
5. Reproduction: The Software and associated written materials are
protected by copyright. Creation of a backup copy is permitted, as long as
this is not passed on to a third party.
6. Duration of the contract: The contract is granted for an unspecified period.
This duration does not cover the procurement of updates. The Licencee's
right to use the Software expires automatically and irrevocably if he breaches
any of the terms of this contract. On termination of the usage right it is
obligatory that the original CD-ROM including any UPDATES/UPGRADES
and any written materials is destroyed.
7. Compensation for breach of contract: G Data calls attention to the fact that
you are responsible for all damages through breach of copyright that G Data
incurs from breach of the terms of this contract by you.
59
G Data Software
8. Changes and updates: Our most recent service terms and conditions shall
always apply. The service terms and conditions may be changed at any time,
without notice and without giving reasons.
9. G Data warranty and liability:
a) G Data guarantees with respect to the original Licencee that, at the time of
delivery, the data carrier (CD-ROM) onto which the Software has been
recorded is error-free under normal conditions of use and within normal
maintenance conditions for material performance.
b) If the data medium or download from the Internet is faulty, the purchaser
is entitled to demand delivery of a replacement during the warranty period of
6 months from delivery. To do so, he must provide proof of purchase of the
Software.
c) As per the reason previously stated in para. 1, G Data accepts no
responsibility for the Software not being error-free. In particular, G Data
accepts no warranty for the Software meeting the purchaser's requirements
and purposes or working in conjunction with programs selected by him. The
purchaser is responsible for proper selection and consequences of use of the
Software, together with its intended or achieved results. The same is true of
written materials related to the Software. If the Software is essentially
unusable in the sense of para. 1, the purchaser has the right to revoke the
contract. G Data has the same right if manufacture of Software that may be
required in the sense of para. 1 is not possible within reasonable cost limits.
d) G Data is not liable for damages unless damage is caused intentionally or
by gross negligence on the part of G Data. Liability for gross negligence does
not extend to sales persons. The maximum award for damages shall be the
purchase price of the Software.
10. Legal domicile: The exclusive legal domicile for all disputes directly or
indirectly arising from this contract is the registered head office of G Data.
11. Final provisions: If individual provisions of this Licence Agreement
become invalid, the remaining provisions stay in force. In place of the invalid
provision, an effective provision that approximates its commercial intention
as closely a possible shall be considered as agreed upon.
60
Licence agreement
Copyright 2010 G Data Software AG
Engine A: The Virus Scan Engine and the Spyware Scan Engines
are based on BitDefender technologies 1997-2010 BitDefender
SRL.
Engine B: 2010 Alwil Software
OutbreakShield: 2010 Commtouch Software Ltd.
[G Data Software - 23.03.2010, 10:16]
61
G Data Software
Index I
I have a multi-user licence. How can I
A use it? 46
Access data invalid or missing? 45 Installing the software 6
After the installation 8 Internet update wizard 9
Invalid registration number? 45
B
Boot scan prior to installation 37 L
Licence agreement 59
C
license 17
Can I also purchase more licences for
additional PCs or more functions to add
to my software package? 48
N
Can I use my old access data to obtain No installation window appears 42
updates on a new computer? 46 Not-a-virus appears during a virus
CPU load 18 check 28
Customised setup or full installation? Notes on uninstalling 48
44
O
H On the first run 9
How can I tell if the monitor is
protecting my system? 30 P
How do I improve the security status? Problems with the Internet update?
15 36
How do I start a virus check? 20
How do I start a virus update? 34 S
How do I switch the virus monitor SecurityCenter 14
on/off? 30 ServiceCenter 5
How does the quarantine work? 28
How is the SecurityCenter organised? T
16 Tips for installation 37
Tips for the virus monitor 30
Tips for virus check 19
62
G Data Software
Tips on virus updates 33
V
Virus check or virus monitor? 19
Virus check wizard 12
W
What are virus updates? 33
What happens during a virus check?
21
What happens when a virus is found?
26
What happens when my licence
expires? 48
What is a software update? 36
What is the G Data Malware
Information Initiative? 43
What is the security icon for? 31
What threats are there? 50
63
G Data Software
Notes
64