Vous êtes sur la page 1sur 64

G Data Software

Table of contents
G Data Software 3

G Data ServiceCenter 5

Installing the software 6

After the installation 8

On the first run 9

SecurityCenter 14

Tips for virus check 19

Tips for the virus monitor 30

Tips on virus updates 33

Tips for installation 37

What threats are there? 50

Licence agreement 59

1
G Data Software

2
G Data Software

G Data Software
This fast start guide will help you install your new G Data
Software and gives you a few practical, easy tips on how to
use it to protect your computer optimally. The following
sections will give you additional help on installing, getting
started with and general questions about the program:

Installing the software: this will show you how to install


the G Data software on your computer.
After the installation: what's changed on your system
since installing the software? What options does the
software offer? Find out here.
On the first run: wizards will help you create the necessary
settings to ensure that your system is protected effectively
as soon as the software has been installed. If you are an
experienced user of G Data software you won't need these
wizards anymore.
SecurityCenter: the actual G Data software program
interface. You can create settings and find information here.
Normally you only need to open the SecurityCenter interface
if the G Data software advises you to.
Tips for virus check: do you want to check your computer
once or regularly for virus attacks or malware? This will
show you how.
Tips for the virus monitor: the virus monitor is designed to
protect your computer permanently without interfering with
your day-to-day work. You can find information on this in
this section.
Tips on virus updates: there is no other software for which
updating is so important! Here you can find out all you need
to know to keep your G Data software completely up to date
all the time.

3
G Data Software
Attachment: do you only want to use specific G Data
software modules? Not interested in a standard installation?
Find out here exactly how to customise the G Data software
optimally for your system.

Do you have further questions? You can consult the


online help in the software at any time. Just press the
F1 key while using the program or click on the Help
button. The answers to many queries can also be
found in the Online database for frequently asked
questions (FAQ), which can be accessed in the
Support section on the G Data website.

4
G Data ServiceCenter

G Data ServiceCenter
Installation and use of G Data Software is generally easy and
self-explanatory. However, should you encounter a problem,
just contact our G Data ServiceCenter via the Internet.

English support: www.gdata-software.com

5
G Data Software

Installing the software


To ensure that the G Data software functions smoothly, your
computer should meet the following minimum
requirements:
PC with one of the following operating systems: Windows 7,
Windows Vista, Windows XP (SP2 or higher)
At least 512 MB RAM memory, Internet access, Internet
Explorer 6 or higher

If your computer is or has already been protected by antivirus


software, you can run the installation as follows. However, if
you have good reason to suspect that your computer has
already been infected by a virus, it is recommended that you
run a boot scan before installing the G Data software. For
more information please read the section Boot scan prior to
installation.

To begin the installation, insert the G Data software


1 CD or connect the G Data software USB stick to your
computer. An installation window will open
automatically.

Now click on the Install button. A wizard then guides


2 you through the process of installing the software on
your computer. Once you have entered the required
information, the wizard starts installing the software on
your system.

You may have to restart your computer after the


3 installation is complete. The G Data software will then
be ready for use.

6
Installing the software
Problems during installation?
? Should you encounter any problems during installation
of the G Data software, or if online registration of your
single- or multi-user licence does not work
immediately, please go to the end of this Quick Help
and look in the chapter entitled Tips for installation

7
G Data Software

After the installation


To open your G Data software program interface, just
click on the icon on your desktop pictured here. To
read about how you use the SecurityCenter, read the
section: SecurityCenter

By installing the G Data software, several other things that we


would like to briefly point out to you here have also happened
on your computer:

Security icon: Your G Data software will permanently


protect your computer from viruses and malware. An icon
appears in the taskbar at the bottom next to the clock, so
you can see that the protection is active. You can read what
additional functions are available here in the section
entitled: What is the security icon for?
Fast check: Is there a suspicious file on your computer? Do
you want to scan a download for viruses? Fast check
enables you to check a file or folder with great ease, and
without having to run the G Data software. Just use your
mouse to select the file or folder in e.g. Windows Explorer.
Right-click now and select Check for viruses (G Data
AntiVirus). The affected files will now be automatically
scanned for viruses.
Create G Data boot CD: If your computer has already been
compromised by viruses, it can mean in rare instances that
antivirus programs can no longer be installed, because the
virus is blocking the installation. To render your system
virus-free, you can go back to the G Data boot CD. Read
how to create and use a boot CD in the section: Boot scan
prior to installation

8
On the first run

On the first run


When you run the G Data software, two wizards automatically
open one after the other. They will help you create important
settings for the software. As soon as this is done and you are
familiar with how the software works, you can disable these
wizards and create settings in the software yourself.

To disable an assistant, simply check the box next to


? Do not show this message again.

Internet update wizard


If you are running the software for the first time after installing
it, a wizard opens which you can use to update your G Data
software directly over the Internet. As new viruses are
constantly being developed, it is crucial that your antivirus
software is up to date! Therefore you should run the Internet
update as quickly as possible.

To do so, click on the Perform updates button. A


1 window will now appear requesting the access data for
Internet updates.

9
G Data Software
To get this access data, just click on the Register with
2 server button. Then you will see a new window where
you can enter your registration number and customer
data.

Unable to log onto the server?


? If you cannot log onto the server, please first make
sure that you have an Internet connection (that is,
whether you can access a website via your browser). If
you can and the G Data software still cannot register
with the server, please click on the Internet settings
button. Here you can then check the settings for your
Internet connections. Please read about this in the
section: Problems with the Internet update?

You can find the registration number on the back of


3 the printed manual. If you bought the software online,
you will receive your registration number in a separate
email.

10
On the first run

If you click the Login button, your access data is


generated on the G Data UpdateServer. If the
registration was successful, an information screen
appears in which you can click on the OK button.

The actual updating of the data will now follow. An


4 information screen will tell you about the progress of
the update and about which data is being transferred
to your computer. You can then exit the update window
by clicking on the Close button. You have now
updated your G Data software.

11
G Data Software
Virus check wizard
As soon as you have installed the G Data software on your
computer, it is protected from malware. However, you should
verify whether a virus could have nested itself on your
computer BEFORE the installation. You can use the virus
check wizard, which appears when you start the software for
the first time, to directly carry out this scan.

You can choose between the Quick virus check


(recommended) and Intensive virus check options. An
intensive virus check is generally preferred, but depending on
your hardware configuration it can take more than an hour. If
you are pressed for time, at least run the quick virus check.

How precisely a virus check runs and what you should


? do if you actually find a virus can be read in the
section: What happens during a virus check?

12
On the first run
Would you like to check your computer from head to
? toe or do you already have problems caused by a virus
or other malware? Then simply read the section: Boot
scan prior to installation

13
G Data Software

SecurityCenter
After installing the G Data software your virus protection
should generally run fully automatically. You only actually need
to consult the SecurityCenter if you want to access the virus
check or one of the software's many additional features.

In rare circumstances, it may also be necessary to


access the SecurityCenter if the security icon in the
task bar displays a warning sign indicating that you
need to intervene. You can find out more about this in
the section: What is the security icon for?

In the SecurityCenter you can see all key information at a


glance and can intervene directly if a protection function
needs updating or checking.

14
SecurityCenter

How do I improve the security status?


Security does not have to be complicated. You can get
possible threats to your computer out of the way with just one
click. You can use the Security status icon and the Correct
button for this.

If there is a green cross next to the Security status


entry, your system is secure.

A red light indicates that your system is in immediate


danger. You should then undertake immediate
measures so that the protection of your data remains
ensured.

If you click on the Correct button, the G Data software will


suggest to you what actions you should take in order to
optimally protect your system again. Simply select the actions
displayed one after the other until the security status displays
a green light again. The Correct button then automatically
changes to inactive and can only be used again if the security
status should get worse.

Your G Data software is then up to date and you can close the
SecurityCenter again. All functions and settings you can see
under the Security Status icon (such as Virus check or
Updates) can be used if you want to actively configure the
security of your system - however you mustn't! You decide to
what degree you would like to be involved with the subject of
virus protection. G Data software gives you the choice!

15
G Data Software
How is the SecurityCenter organised?
In the relevant subsections (such as Virus check or Updates)
you can see precisely which areas of your G Data software
are optimally set up and which could be improved. The
following icons indicate the security status of the respective
area.

Green checkmark = everything is ok

Yellow exclamation mark = intervention needed


soon

Red exclamation mark = immediate intervention


required

Wildcard = This security function was not enabled


by you.

If an area should be marked yellow or red, simply click on it


with the mouse. This will take you directly to the program area
where you can carry out the required settings. Additional
functions can be invoked via the blue entries. Do you want to
make an unscheduled check of the computer for viruses? Do
you want to reset the schedule? Is a check of the settings
needed? Simply click on the blue actions.

If you click the info icon in the above right, you will
receive information regarding the program version.
This information may be useful when talking to the
G Data ServiceCenter .

16
SecurityCenter
Do you have further questions? You can consult the
online help in the software at any time. In the program,
simply press the F1 key or click on the help button
displayed here.

License
Under the Licence entry on the left-hand side of the program
interface you can see how long your virus update licence is
valid for. Constant updates are more important for antivirus
software than for any other type of software. Therefore the
G Data software will automatically remind you to renew your
licence before it expires. The best way is via the Internet -
effortless and easy! You can find more information on what
happens when your licence expires in the section: What
happens when my licence expires?

Naturally you can increase the number of licences you


? have or upgrade to products with increased
functionality at any time. If you click on the Expand
licenses entry, you will be taken directly to the online
shop on our website.

17
G Data Software

CPU load
This small chart shows you how much speed the G Data virus
protection costs you when using on your computer. If heavy
CPU load occurs regularly in relation to a specific application
(e.g. when using video processing programs), it may help to
define the relevant application as an exception. You can find
additional information on this in the online help for the Virus
monitor.

Under the G Data header, you can view the current


? load the G Data software is placing on your computer.
The total current load on your computer is displayed
under the System header. During virus checks the
system load caused by the G Data software can be
very high; however, under normal use your G Data
software should only use up very little processing
power. So if your computer is responding more slowly
than usual, you can see at a glance here if the G Data
software is carrying out a detailed scan or if your
computer is being slowed down by something other
than a virus check.

You can also configure the G Data software so the


? virus check can be automatically interrupted if your
computer is under a heavy load from other
applications. For more information please read the
section Options (Virus check).

18
Tips for virus check

Tips for virus check


Here you can obtain information on manual and automatic
virus checks and permanent protection through the virus
monitor.

Virus check or virus monitor?


The virus monitor continuously checks your computer
A for viruses, it controls read and write operations, and
becomes active as soon as a program intends to
execute malware or spread malicious files. The virus
monitor is your most important protection! It should
never be switched off.

The virus check is an additional protection. It checks


B whether a virus has nested itself onto your system
after all. A virus check would also detect viruses that
were copied onto your computer before you had
installed the G Data software or that you obtained once
while the virus monitor was not switched. A virus check
should occur at regular intervals, preferably
automatically at times when your computer is not
needed.

19
G Data Software
How do I start a virus check?
There are different options to do so.

You would like to immediately check your computer for


viruses: In the SecurityCenter interface, simply click on the
Check computer entry. Your computer will now be
inspected for virus infection.
The virus check will be started automatically. If you see
a green icon next to the Automatic check entry, this means
that your G Data software is independently performing
automatic virus checks at regular intervals. Information on
how to set or, where applicable, change an automatic virus
check can be found in the section entitled Schedule.
The last virus check was a long time ago: As soon as
your G Data software indicates that the last virus check was
too long ago, you can start a virus check by simply clicking
to the right of the Last virus check entry.
You would only like to check certain areas of your
computer: In the event that you have a particular suspicion
and only want to check certain areas of your computer for
malware, select the Virus check entry. Here you can
specify which areas you would like to check. In the section
Virus check , you can find comprehensive tips on how to
check certain areas of your computer.

20
Tips for virus check

What happens during a virus check?


With the virus check, you check your computer for infestation
by malware. If you start the virus check, it monitors every file
on your computer as to whether it can infect other files or is
itself already infected. If viruses or other malware is found
during a virus check, there are different options as to how the
virus can be removed or disarmed.

Start the virus check. You can read how to do this in


1 the section How do I start a virus check?

Now a check of your computer for virus infestation


2 occurs. A window opens for this which includes
information on the status of the check.

A progress bar at the top of the window shows you


how the scan of your system is advancing.
While the virus check is taking place you have a
number of options for influencing the course of the
virus check.

21
G Data Software
Pause the virus check at times of high system
load: You can use this option to specify that the
software holds the virus check until you are finished
with other tasks on your computer.
Switch off computer after virus check: This
function is very useful if you want to run the virus
check overnight or at the end of the working day. As
soon as the G Data software ends the virus check,
your computer is powered down and no longer uses
up resources unnecessarily.
Access denied: In Windows, there are usually files
that are used exclusively by applications and that
can therefore not be scanned while these
applications are running. It is preferable that you
therefore have no other programs running on your
system during a virus check. If you set a checkmark
here, the data that is not checked will be displayed.
Password-protected archive: As long as an
archive is password-protected, the G Data software
cannot scan the files in it for viruses. If you check
this box, the antivirus software indicates which
password-protected archives it was unable to scan.
Provided the archives are not unpacked, any viruses
it contains will not pose a security risk to your
system.

If your system is virus-free, you can exit the wizard


3a window after the check has finished using the Close
button.
Your system has now been checked and cleared of
viruses.

22
Tips for virus check
In the event that viruses and other malware are found,
3b you can decide how to handle the virus discovery.
Generally clicking on the Execute actions button is
sufficient.

The G Data software will now use a default setting and


disinfect the compromised files, i.e. it will repair them
so that they can be used as normal and they no longer
pose a threat to your computer.
If such disinfection is not possible, the files are placed
under quarantine, i.e. they are encrypted and moved to
an extra safe folder where they cannot cause any
further damage. If you still need this infected file, in
exceptional cases you can take the file back out of
quarantine and use it again.
Your system has now been checked and cleared of
viruses.

If you are familiar with the infected files/objects and


3c can tell which ones are no longer required, you also
have the option of customising precisely how to
respond to each virus discovery.
You can use the Action column in the list of virus
discoveries to define what should happen with each
individual virus discovery.

Log only: The infection is listed in the Logs view.


Repair of deletion of the affected file does not
occur. Warning: If a virus is only logged, it
continues to be active and dangerous.

23
G Data Software
Disinfect (if not possible: log only): Here, an
attempt is made to remove the virus from an
affected file; if this is not possible without damaging
the file, the virus is logged and you can deal with it
later via the log entry. Warning: If a virus is only
logged, it continues to be active and dangerous.
Disinfect (if not possible: place in quarantine):
This is the default setting. Here, an attempt is made
to remove the virus from an affected file; if this is not
possible without damaging the file, the file is moved
to the Quarantine. Please read about this in the
section: How does the quarantine work?
Disinfect (if not possible: delete file): An attempt
is made to remove the virus from a compromised
file; if this is not possible, the file is deleted. This
function should only be used if there is no important
data on your computer. Always deleting infected files
can, in the worst case, result in your Windows
becoming inoperable and requiring a reinstallation.
Move file to quarantine: Infected files are
immediately moved to the Quarantine. Files saved
in the quarantine are encrypted. The virus cannot
cause any damage here, and the infected file is still
available for possible repair attempts. Please read
about this in the section: How does the quarantine
work?
Delete file: This function should only be used if
there is no important data on your computer. Always
deleting infected files can, in the worst case, result in
your Windows becoming inoperable and requiring a
reinstallation.

24
Tips for virus check
If you click on the Execute actions button now, the G
Data software proceeds with each virus discovery as
you have defined.

Your system has now been checked for viruses.


However, if you have used a setting with the Log
option, it may be that your computer is not virus-
free.

After the virus check has ended, you have the option of
4 sending a copy of the infected files to G Data Software,
so we can improve virus protection for all our users on
the basis of this data. Your data will of course be
handled in confidence in doing so, and your personal
details will not be forwarded or used.

25
G Data Software
Forwarding of such data is of course entirely optional
and, if you prefer, you can skip this action or
permanently switch it off under the menu item In case
of further infections. For more information see the
section: What is the G Data Malware Information
Initiative?

What happens when a virus is found?


If the G Data software detects a virus or malware on you
computer, you can handle the infected file in the following
ways.

Log only: The infection is listed in the Logs view. Repair of


deletion of the affected file does not occur. However, you
can individually check the detected viruses via the log and
remove them in a targeted manner. Warning: If a virus is
only logged, it continues to be active and dangerous.
Disinfect (if not possible: move to quarantine): Here, an
attempt is made to remove the virus from an affected file; if
this is not possible without damaging the file, the file is
moved to the Quarantine. Please read about this in the
section: How does the quarantine work?
Move file to quarantine: Infected files are immediately
moved to the Quarantine. Files saved in the quarantine are
encrypted. The virus cannot cause any damage here, and
the infected file is still available for possible repair attempts.
Please read about this in the section: How does the
quarantine work?

26
Tips for virus check
Delete infected file: This function should only be used if
there is no important data on your computer. Always
deleting infected files can, in the worst case, result in your
Windows becoming inoperable and requiring a
reinstallation.

Handling viruses can be automated, i.e., the G Data software


always executes one of the above-mentioned actions if a virus
or malware is detected. Alternatively, you can also respond
individually. In this case, a selection screen opens when a
virus is detected in which you can specify how the infected file
should be handled.

Quarantine and mailboxes


? There are files where a move to the quarantine is not
recommended, e.g. the archive files for mailboxes. If a
mailbox is moved to the quarantine, your mail program
can no longer access it and may no longer work. You
should therefore be especially careful with files ending
in PST , since these usually contain the data of your
Outlook mailbox.

27
G Data Software
Virus information
? You can display further information from the Internet
regarding the detected virus at any time. Simply click
on the respective virus report in the selection screen,
the report, or in the logs and click on the Virus
information button. You will then be connected to the
G Data Security Labs via the Internet and can thus
obtain current information in your Internet browser
regarding the detected virus.

"Not-a-virus" appears during a virus check


Files reported as not a virus are potentially dangerous
applications. Such programs do not have malware directly but
may be used against you by attackers under certain
circumstances. This category can include certain tools for
remote administration, programs for automatically switching
the keyboard layout, IRC clients, FTP servers or different tools
for creating or hiding processes.

How does the quarantine work?


During the virus check, you have different options for dealing
with any viruses found. One option is to move the infected
file to quarantine. Quarantine is a secure area in the software
where infected files are encrypted and stored so they cannot
transfer the virus to any other files. The files in quarantine
remain in the condition they were in when the G Data software
found them, you can decide how to proceed.

28
Tips for virus check
Update: If you have kept the quarantine dialogue window
open for a long time, and have since discovered a virus and
moved it into quarantine (e.g. automatically via the virus
monitor), you can use this button to update the display.
Submit: In certain cases, if you cannot disinfect an infected
file, you can send it to G Data via the Internet. The contents
of this file will naturally be treated confidentially. The results
of the investigation are channeled into improving and
updating the virus definitions and the software. For more
information see the section: What is the G Data Malware
Information Initiative?
Disinfect: In many cases, infected files can still be
recovered. The software removes the virus components
from the infected file and reconstructs the uninfected
original file. If the disinfection is successful, the file is moved
back to where it was saved before the virus check and is
available to you again without any restrictions.
Move back: Sometimes it is necessary to move an infected
file that cannot be cleaned back out of quarantine to its
original storage location. This may be for data recovery
purposes for example. You should only select this function
in exceptional cases and observe strict security measures
(e.g. disconnect the computer from the network/Internet,
back up uninfected data, etc.).
Delete: If you no longer require the infected file, you can
simply delete it from quarantine.

29
G Data Software

Tips for the virus monitor


The virus monitor continuously checks your computer for
viruses, it controls read and write operations, and becomes
active as soon as a program intends to execute malware or
spread malicious files. The virus monitor is your most
important protection! It should never be switched off.

How can I tell if the monitor is protecting my


system?
The security icon in your computer's taskbar shows
you if the virus monitor is enabled. Please read about
this in the section: What is the security icon for?

How do I switch the virus monitor on/off?


You can switch off the virus monitor by right-clicking the
security icon.

30
Tips for the virus monitor
This can be useful in rare instances if, for example, you would
like to copy many files back and forth on the computer or
would like to perform procedures that are computationally
intensive (e.g. video editing). If you want to switch off the virus
monitor permanently, click on the icon to the right of the Virus
monitor entry in the Virus check area in the SecurityCenter.
You can permanently switch the virus monitor off here.

What is the security icon for?


Your G Data software will permanently protect your computer
from viruses and malware. An icon appears in the taskbar at
the bottom next to the clock, so you can see that the
protection is active.
This Security icon tells you that everything is OK and
that protection for your computer has been enabled.

If the monitor is disabled or some other problem


occurs, the Security icon displays a warning message.
You should then start the G Data software as soon as
possible and check the settings.

If you right-click the icon, a context menu appears which you


can use to control the basic security functions of the software.
The following functions are available:

Start SecurityCenter: You can use this to call up the


SecurityCenter and can for example work with the virus
monitor settings. Read about what you can do in the
SecurityCenter in the section: SecurityCenter

31
G Data Software
Disable monitor: This allows you to switch the Virus
monitor off and back on again if you need to. This may be
advisable if, for example, you are copying large volumes of
data from one part of your hard drive to another or running
memory-intensive processes (such as copying DVDs, etc.).
You should only leave the virus monitor disabled when
absolutely necessary and make sure, wherever possible,
that your system is not connected to the Internet during this
time and that it cannot access any new, unscanned data (e.
g. from CDs, DVDs, memory cards or USB sticks). Read
about how the virus monitor works in the section: Tips for
the virus monitor?
Virus update: Antivirus software should always be fully up
to date. You can of course have the data updated
automatically by the software. However, if you urgently need
an update, you can launch one via the Virus update button.
Read about the purpose of a virus update in the chapter:
How do I start a virus update?
Statistics: This allows you to view the virus monitor's scan
statistics.

32
Tips on virus updates

Tips on virus updates


Here you can find information on updating your software.

What are virus updates?


Viruses and other malware are spreading through the Internet
or per email with enormous speed. Almost every minute, new
software is being developed somewhere in the world with the
sole purpose of spying, damaging, or misusing computer
systems. In order to counteract this threat, antivirus programs
utilise the most varied defense technologies. The virus update
is essential support in doing so. As soon as a new virus is
discovered, our experts immediately go to work with this
threat and individually develop

a type of signature with which the virus is easier to detect


and thus does not even get on to your computer,
a "countermeasure" used to remove the virus from
programs and files, and
repair tools that - if possible - can repair files and programs
infected by the virus.

You receive the results of this work updated hourly as a virus


update from the Interet. Naturally, G Data software includes
other techniques and methods to protect your system (e.g.,
heuristical analyses that recognise malware completely
automatically), but it's precisely the virus updates that provide
the greatest amount of protection.

33
G Data Software
How do I start a virus update?
There are various ways of starting a virus update.

You would like to download a virus update from the


Internet immediately: In the SecurityCenter interface,
simply click on the Update virus detection entry. Current
virus signatures will now be automatically copied to your
computer from the Internet.
The virus update will be started automatically. If you see
a green icon next to the Automatic updates entry, this
means that your G Data software is independently
performing automatic updates at regular intervals. As soon
as the automatic update starts, the process is the same as
a virus update that you start directly. Information on how to
set or, where applicable, change an automatic virus update
can be found in the section entitled Schedule.
The last virus update was a long time ago: As soon as
your G Data software indicates that the last virus update
was too long ago, you can start a virus update by simply
clicking to the right of the Last virus update entry.

34
Tips on virus updates
Normally a virus update loads the new data onto your
? computer fully automatically in the background and
updates the G Data software without your assistance.
For this, however, an Internet connection must exist
and/or must be able to be established by the software.
The specifications that you must undertake for this can
be found in the section Internet update. If an Internet
update is not possible, it is recommended that you
simply test whether you can access the Internet with
your Internet access program (e.g. Internet Explorer).
If this is possible, a connection of the G Data software
to the Internet should also be possible in principle. If
connecting to the Internet via Internet Explorer is not
possible, it could be that the connection problems lie
outside the G Data software and must first be resolved
elsewhere. The help documentation of your Windows
operating system will help you with this.

35
G Data Software
What is a software update?
The virus update updates the virus signatures almost
continuously and is a special function so to say that only
antivirus programs have in the form. As with all other software
(e.g. office software), there are also program updates and
improvements for your G Data product regularly. As soon as
a program update is available, you can easily install this via
the Update button in the Updates area.

Problems with the Internet update?


If you use a proxy server, please put a checkmark next to
Use proxy server. You should only change these settings if
your Internet Update does not work. If necessary, consult
your system administrator or Internet service provider about
the proxy address. If necessary you can enter the access
data for the Internet connection (user name and password)
here.

36
Tips for installation

Tips for installation


Here you can find further information about the installation
and registration of your G Data software.

Boot scan prior to installation


The boot scan will help you fight viruses that have embedded
themselves prior to installation of the antivirus software on
your computer and that may prevent the G Data software from
being installed. That is why there is a special version of the
G Data software that can be run before the start of Windows.
What is meant by booting up?
? When you switch on your computer, the Windows
operating system will normally start up automatically.
This process is called booting. However, it is also
possible to run other programs automatically instead of
your Windows operating system. To scan your
computer for viruses before Windows starts up,
G Data has provided you with a special "bootable"
version in addition to the Windows version.

How do I cancel a boot scan?


? If you restart your computer and a special G Data
interface appears instead of the usual Windows
environment, there is no cause for alarm. If you have
not planned a boot scan, just use the arrows to select
the Microsoft Windows entry and click on return.
Windows will now start normally, without first carrying
out a boot scan.

37
G Data Software

If you want to run a boot scan, proceed as follows:

Boot scan using the program CD: Use the G Data


1a program CD to boot up your computer. - Insert the
G Data software CD into the drive. In the start window
that opens, click Cancel and turn off the computer.

Boot scan with G Data software that you have


1b downloaded from the Internet: You can burn a new
boot CD via the Create G Data boot CD entry in the
G Data software program group. - Insert the boot CD
you have burnt into the drive. In the start window that
opens, click Cancel and turn off the computer.

Do you have a special netbook version of the


1c G Data software on a USB stick? You can run the
boot scan directly from the USB stick here. However,
to do so your netbook must be set up to boot from a
USB stick. - Connect the G Data USB stick to your
netbook. In the start window that opens, click on
Cancel and turn off the netbook.

38
Tips for installation
After this first step the boot scan in all three scenarios will
proceed identically:

Restart the computer. The G Data boot scan start


2 menu will appear.

Use the arrow keys to choose the G DATA boot CD


3 option and confirm your choice with Enter. A Linux
operating system is now started from the CD and a
G Data special version for boot scans appears.

If you are having problems with the program interface


? display, restart your computer and choose the G DATA
boot CD alternative option.

The program will now suggest updating the virus


4 definitions (or virus signatures).

Click Yes and perform the update. As soon as the data


5 has been updated via the Internet, you see the
message Update complete. Now exit the update
screen by clicking the Close button.

The automatic Internet update is available if you are


? using a router that assigns IP addresses automatically
(DHCP). If the Internet update is not available, you can
still perform the boot scan using old virus signatures.
However, in that case, you should perform a new boot
scan with updated data as soon after installing the
G Data software as possible.

39
G Data Software
You will now see the program interface. Click the
6 Check computer entry to check your computer for
viruses and malware. Depending on the type of
computer and size of the hard drive, the boot scan can
take an hour or more.

If the G Data software finds any viruses, please use


7 the option provided in the program to remove them.
Once the virus has been removed successfully, the
original file is available again.

Once the virus check is complete, leave the system by


8 clicking the Exit button and then choosing Restart.

The Exit button is located on the bottom right of the


Linux program interface.

Take the G Data software CD out of the drive as soon


9 as the drive tray opens or remove the G Data USB
stick from your netbook.

Switch off your computer again and restart it. Your


10 computer will now start with your standard Windows
operating system again, and you can be certain of
being able to install the regular G Data software on a
virus-free system.

What do I do if my computer will not boot from the


? CD-ROM?
If your computer will not boot from the CD/DVD-ROM,
you may need to set this option up first. This is done in
the so-called BIOS, a system that is automatically
started before your Windows operating system. To
make changes in BIOS, proceed as follows:

40
Tips for installation
1. Switch your computer off.
2. Restart your computer. Usually you reach the BIOS
setup by pressing the DEL button as the computer
is booting up (and sometimes the F2 or F10 button
as well).
3. How to change individual settings in your BIOS
setup varies from computer to computer. Please
consult your computer's documentation. The result
should be the boot sequence CD/DVD-ROM:, C: ,
meaning that the CD/DVD-ROM drive becomes the
1st boot device and the hard disk partition with
your Windows operating system on it becomes the
2nd boot device.
4. Save the changes and restart your computer. Your
computer is now ready for a boot scan.

What do I do if my netbook (or desktop PC/


? notebook) will not boot from the USB stick?
If your computer will not boot from the USB stick
automatically, please proceed as follows:
1. Switch your computer off.
2. Insert the G Data USB stick into a free USB port
on your computer.
3. Switch your computer on.
4. As it boots up, press the F2 button to access your
computer's BIOS.
5. A BIOS interface will then appear with a menu list
from which you should select the Boot menu using
the arrow keys (left/right). Now press Enter.

41
G Data Software
6. You will now see a list, from which you need to
select the Hard disk drives entry using the arrow
keys (up/down). Now press Enter.
7. Now select the USB entry, so it appears in first
place 1st Drive = USB( using the Enter key and
arrow keys.)
8. Now press F10 to save the changes and exit the
BIOS. Your computer can now be booted from the
USB stick.
9. Restart the computer. Your computer is now ready
for a boot scan.

No installation window appears


If you have not configured your computer's Autostart
function properly, the software cannot automatically run the
installation process after the software CD is inserted (or the
USB stick for the USB version of the G Data software) and the
window for installing the G Data software will not open.

If an autoplay selection window opens instead, please click


on the Run AUTOSTRT.EXE option.
If the selection window does not open, search for the data
carrier with the G Data software via Windows Explorer, then
start the Setup file or Setup.exe..

This will make the installation window for your G Data


software appear and you can begin the installation.

42
Tips for installation

What is the G Data Malware Information Initiative?


The G Data Security Labs are constantly developing ways to
protect G Data customers against malware. The more
information there is available, the more effectively the
protection mechanisms can be developed. There is plenty of
information available, but only on systems that are attacked or
infected. The G Data Malware Information Initiative was set up
to include such information in its analyses. For this reason,
information relating to malware is sent to the G Data Security
Labs. Through your participation, you can contribute to
helping every G Data customer make use of the Internet in a
safer way.
What sort of data is collected? Generally speaking, there
are two scenarios where data is sent to us. 1. You can send
malware files to the G Data Internet Ambulance on a voluntary
basis and 2. harmful content is found on a website. If you
send malware files to the Internet Ambulance, the source,
original file name and date of creation for the file are also
included. If harmful web content is found the following data is
sent:

Information on the version of the malware


Version number for the G Data product and the engines
used
Operating system language (locale)
URL for which access was blocked and the reason why
(malware, phishing etc.)
Name of the malware

This information is usually insufficient for identifying PC users.


It does not contain any personal data.

43
G Data Software
How will the received data be used? When processing and
saving the data, the relevant country's legal requirements for
data protection and forwarding of data will be observed.
G Data takes great care to protect data from unauthorised
access. Evaluation of the data is carried out in the G Data
Security Labs and is used for clarifying research questions
relating to IT security. The principal intention is to investigate
security risks and develop protection mechanisms. A few
examples of use include the creation of block lists, statistical
evaluation for publication in specialist articles or development
of rule sets for protection technologies. Participation is
voluntary and refusal to do so has no negative effects on the
product's functioning. Through your participation in the G Data
Malware Information Initiative every G Data customer will in
future be better informed about computer-based threats and
be better protected against them.

Customised setup or full installation?


A full setup applies the settings that make sense for the
majority of users. Just click on the module you want and
select whether it should be installed or not.

A drive icon will show you that the module is being


installed.
A delete icon will show you that the module cannot be
installed.

You can also install or uninstall software components


? later. To do so, simply run the installation again and
activate or deactivate the modules you want (or do not
want) using the custom setup.

44
Tips for installation

Invalid registration number?


If you have problems entering your registration number,
please check for correct entry. Depending on the font used, a
capital "I" (for India) is often misread as the number "1" or the
letter "l" (for Lima). The same applies to: "B" and "8", "G" and
"6", "Z" and "2".

Access data invalid or missing?


Please check that the access data has been entered
A correctly. Please note the case-sensitivity; the access
data does not contain spaces.

If you have lost or forgotten your access data, go to the


B login page and click on the Access data misplaced?
entry. A website opens where you can enter your
registration number again. When you have done so,
your access data will be re-sent to the email address
you entered during registration.

If your email address has changed in the meantime,


C please contact our ServiceCenter.

45
G Data Software
Can I use my old access data to obtain updates on a
new computer?
Yes. In this event, the update server establishes its
connection with the new computer - from then on the old
computer can no longer obtain updates.

I have a multi-user licence. How can I use it?


You can use multi-user licences to operate the G Data
software on the licenced number of computers. You will
receive online access data after installation on the first
computer and running the Internet update. When you install
your software on the next computer, just enter the user name
and password you were given when registering on the G Data
UpdateServer. Repeat this procedure on every other
computer.

What is the registration number for?


? By entering the registration number during
registration for the Internet update, you will receive the
customer data (user name & password). You then
use this customer data to install the G Data software
on other computers as part of a multiple licence. It is
not necessary to re-enter the registration number.

46
Tips for installation
Why does the message: "The product has already
? been registered" during registration?
If you have already registered the G Data software
once, it is not possible to register it again using a
registration number that has already been used.
Please use the access data (user name and
password) assigned to you when you first registered
for Internet updates. After you have entered your
access data, confirm by clicking OK - do not click on
Register with server. If you are registering the
product for the first time and you receive this message,
please contact the G Data Service Center.

Please use the access data (user name and password)


assigned to you when you first registered for Internet updates
for all PCs. Please proceed as follows:

Start the G Data software.


1
Go to the SecurityCenter and click on the Update
2 button.

In the window that now opens, please enter the access


3 data that was sent to you by email. If you then click on
OK, your computer will be licensed.

47
G Data Software
Can I also purchase more licences for additional PCs
or more functions to add to my software package?
Naturally you can increase the number of licences you have or
upgrade to products with increased functionality at any time. If
you click on the Expand licences entry in the SecurityCenter,
you will be taken directly to the online shop on our website.

What happens when my licence expires?


A few days before your licence expires, an information window
appears in the task bar. If you click this, a dialogue window
opens in which you can extend your licence without a problem
and in a few steps. Simply click on the Buy now button,
complete your data and your virus protection will be
guaranteed again immediately. You will conveniently receive
the invoice by mail in the next few days.

Notes on uninstalling
If you intend to uninstall the G Data software again sometime
in the future, the easiest way to do this is by clicking on the
Uninstall button in the G Data program group. The uninstall
then takes place automatically. Alternatively, you can also
uninstall the program using the Windows Control Panel.

Windows XP: Click Start on the Windows taskbar and


selectSettings > Control Panel > Software. You can then
use the mouse to highlight G Data software on the Install/
Uninstall tab. Then, click the Add/Remove button to run
the uninstall process.

48
Tips for installation
Windows Vista, Windows 7: On the Windows taskbar click
on the start icon (normally at the bottom left of your screen)
and select the Control Panel folder. Here you will find the
option Programs > Uninstall a program. Select G Data
software from the list and then click Uninstall to initiate the
uninstall process.

If you still have files in the Quarantine area of your G Data


software during the uninstall, you will be asked whether or not
these files should be deleted. If you do not delete the files,
they remain encrypted on your computer in a special G Data
folder and are therefore incapable of causing any harm. You
can only use these files again by reinstalling the G Data
software on your computer. During the uninstall process, you
will be prompted whether you want to delete settings and
logs. If you do not delete these files, the logs and settings will
be available on reinstallation of the software. Complete the
uninstall process by clicking on the Exit button. The software
is now completely uninstalled from your system.

49
G Data Software

What threats are there?


When we talk about viruses, worms and Trojan horses, we
generally mean software that has a damaging effect. The
general term for these is malware (from malicious + software
). Malware covers all programs that aim to cause damage by
creating, changing or deleting access to electronic data.
These always have a payload. Some malware just wants to
announce its existence, other malware spies on your personal
data or even deletes your hard drive. Malware can be divided
into three groups: Trojan horses, worms and viruses. More
broadly, it can also include spyware and diallers.

Trojans: Trojans are different from worms and viruses in


that they do not replicate themselves automatically. The
name Trojan horse is an allusion to the historic model and
describes a program which gives the user the impression
that it has a given and desired function. However, Trojans
also include a hidden program component which opens a
backdoor, as it were, to the stricken computer and can
thereby allow almost complete access to the affected
system without the user noticing. Trojans' methods of
concealing themselves are almost unlimited. They can hide
in prompt commands (so-called rootkits) or appear as
Remote Access Trojans (so-called RATs, also referred to
as backdoors). These malicious programs are also sent as
screen savers or games via email.

Common characteristics of viruses and worms: Viruses


and worms are made up of the following components:

Replication component: This program component is


used to propagate the virus. This is a necessary
component for all viruses. The infection can be spread via
diskettes, USB sticks (and other removable media),

50
What threats are there?
shared folders, network scans, peer-to-peer networks or
email. The malware attacks all kinds of different targets,
although this sometimes only works on specific
combinations of hardware, software and operating
systems.

Detection component: The detection component scans


a system to check if it is already infected with this virus.
Each host program is infected only once to enable the
virus to spread more quickly and to avoid detection.

Damage component: Payloads can be classified in the


following groups: Hackers use backdoor programs to
access a computer and its data so they can manipulate
the data or launch Denial of Service attacks. Data
manipulation may be carried out. This ranges from
(more or less amusing) messages, displays and noises,
to the deletion of files and drives. In addition, information
may be spied on and distributed. Such attacks target
passwords, credit card numbers, login names and
other personal data. Infected computers are often
misused for Denial of Service (DoS) attacks. These are
aimed at e.g. overwhelming a website with huge numbers
of requests. If the attacks originate from a single source,
they are very easy to counteract. Distributed Denial of
Service (DDoS) attacks therefore misuse infected
computers to support the attacks. DoS and DDoS attacks
may aim to crash the target system, overload the
bandwidth and storage capacity or render the service
untraceable in the network.

Conditional component: Both the distribution and the


malicious function can be programmed depending on
conditions. In the simplest case, the malware is launched
automatically without the victim noticing. In certain cases

51
G Data Software
the payload must be launched by the victim himself. This
can involve calling up a contaminated program, opening
an email attachment, or phishing for personal data. The
launch of malware can also be linked to conditions, e.g.
with some viruses the malware is launched on a certain
date or when the program is called a certain number of
times.

Stealth component: Worms, trojans and viruses try to


protect themselves from discovery by users and virus
recognition tools. They use a range of mechanisms to do
this. For example, they recognise when debuggers are
running or protect themselves with superfluous and
confusing lines of (assembly) code. They hide the traces
of an infection. This includes falsifying status report
updates and log entries. A virus residing in the memory
can lead the system to believe that the memory space it is
occupying is still occupied by the program it has
previously removed. To avoid discovery many viruses
encrypt themselves and/or their harmful code. This
encryption varies: the same codes may be used every
time, the codes may be taken from a list (oligomorphic
virus) or an infinite number of new codes may be
generated (polymorphic virus).

Worms: Unlike viruses, a worm does not attach itself to


executable files. It spreads by transferring itself
automatically to other computers via networks or mail
connections.

52
What threats are there?
Network worms: Several ports on randomly selected
network computers are scanned and, if an attack is
possible, the vulnerabilities in the protocols (e.g. IIS) or
their implementation are used to spread the worm. Well
known examples of this type are Lovsan/Blaster and
CodeRed. Sasser exploits a buffer overflow error in
the Local Security Authority Subsystem Service (
LSASS) and infects computers when they are connected
to the Internet.

Email worms: A worm spreading via email can use the


available email programs (e.g. Outlook, Outlook Express)
or it may have its own SMTP mail engine. Worms may
contain additional payloads besides the resulting
additional network traffic and increased allocation of
system resources. Notorious members of this group are
Beagle and Sober.

Viruses: Viruses are also aimed at reproducing themselves


and spreading to other computers. To do so, they attach
themselves to other files or embed themselves in the boot
sectors of data carriers. They are often smuggled on to the
PC undetected by removable media (e.g. diskettes), via
networks (including peer-to-peer), by email or via the
Internet. Viruses can attach themselves to many different
parts of the operating system and can function using a
range of different channels. They can be divided into the
following categories:

53
G Data Software
Boot sector viruses: Boot sector or MBR viruses (=
master boot record viruses) actually settle in front of the
boot sector on a data medium, thus ensuring that the
virus code is read first and then the original boot sector
when the computer boots from this medium. This enables
the virus to slip into the system undetected then run when
the hard disk boots up. Often the virus code remains in
the memory after it has infected the system. These
viruses are known as memory-resident. The virus is then
passed on when diskettes are formatted, enabling it to
spread to other computers. However, boot sector viruses
are not just activated during formatting processes. A virus
can be transferred from an infected diskette via the DOS
DIR command. Depending on the infection routine, boot
sector viruses can either be highly dangerous or just
annoying. The oldest and most widespread of this type of
virus is called Form.

File viruses: Many viruses take the opportunity of using


executable files as a hiding place. This is achieved by
either deleting or overwriting the host file or by the virus
attaching itself to the file. In the latter case the executable
code in the file remains functional. If the executable file is
accessed, the virus code, mostly written in assembly
code, starts running first and then the original program
opens (if it has not been deleted).

Multipartite viruses: This type of virus is particularly


dangerous as it infects not only executable files but also
the boot sector (or partition tables).

54
What threats are there?
Companion viruses: Under DOS, COM files are
executed before EXE files of the same name. In the days
when computers frequently or exclusively operated via
command lines, this was an effective device for running
harmful code on a computer without detection.

Macro viruses: Macro viruses also attach themselves to


files. However, these are not themselves executable.
Furthermore, macro viruses are not written in assembly
code, but in a macro language such as Visual Basic. The
viruses require a macro language interpreter, as found in
Word, Excel, Access, and PowerPoint, to enable them to
run. Apart from that, macro viruses operate in the same
ways as file viruses. They can also disguise themselves,
contaminate the boot sector or create companion viruses.

Stealth viruses: Stealth viruses possess special


protection mechanisms to escape detection by virus
search programs. To do this they take control of various
system functions. Once this condition has been
established, the viruses can no longer be detected during
normal access to files or system areas. To the virus
search program they make it look like an infected file is
not infected. The camouflage mechanisms of stealth
viruses don't start working until the virus has become
resident in the working memory.

55
G Data Software
Polymorphic viruses: Polymorphic viruses contain
mechanisms that change their appearance with each
infection. Hence parts of the virus are encrypted. The
encryption routine integrated in the virus generates a new
key for each copy and sometimes even new encryption
routines. Additionally, command sequences that are not
required to operate the virus can be substituted or
randomly rearranged. As such, billions of variants of a
virus can easily occur. It is often not enough to use
standard virus signatures to detect and remove encrypted
and polymorphic viruses. Most of the time, special
programs must be written. The effort required to analyse
them and prepare suitable countermeasures can be
enormous. Thus, polymorphic viruses can truly be
regarded as the kings of the virus world.

Intended virus: An Intended Virus means a partially


defective virus that carries out a single file infection, but
cannot reproduce itself thereafter.

Email viruses: Email viruses belong to the blended


threats category. Such malware combines the properties
of Trojans, worms and viruses. When the Bubbleboy
virus appeared on the scene, it became common
knowledge that you could smuggle a virus on to a PC via
the preview function for an HTML email. This dangerous
virus code hides itself in HTML email and exploits a
security hole in Microsoft Internet Explorer. The threat
posed by such combination viruses should not be
underestimated.

Malware in the broader sense: For the sake of


completeness, several irritating and partially harmful
categories are also mentioned here that we do not include
in the malware group.

56
What threats are there?
Hoaxes: Hoaxes are apparent virus alerts that are often
spread via email. The recipient is advised to forward the
email alert to friends and colleagues. However, this mostly
involves alerts only intended to cause panic.

Backdoor programs: Many systems administrators use


remote maintenance programs to manage computers
remotely. This is very useful, especially for large
companies. Normally this involves access by the system
administrator with the knowledge and consent of the PC
user. It is only when such backdoor functions are used
without the PC user's knowledge and harmful actions are
initiated that a backdoor program actually becomes
malware.

Spyware: Spyware records the activities and processes


taking place on a computer and makes them accessible
to strangers. It is often used for analysing surfing
behaviour in order to launch appropriate advertising
banners. Spyware can generally be removed using
appropriate anti-spyware programs.

Diallers: Like viruses, worms and Trojans, diallers are


often installed undetected on a computer. If the internet
connection is established via a modem, an expensive
premium rate number is then used the next time the user
connects. This is a nuisance that can sometimes lead to
serious financial consequences. Anti-dialler programs
such as Dialler Control can provide protection against
unwanted diallers.

57
G Data Software
Spam: A similarly costly and annoying menace is the
forwarding of unwanted advertising email or propaganda
email. Modern anti-spam programs combine statistical
procedures (text analysis, mail server lists) and automatic
procedures (based on Bayes' Theorem) to filter out
unwanted email.

Phishing: Phishing is the attempt to obtain personal data


such as login names, passwords, credit card numbers,
bank account access data, etc. using bogus websites or
emails. This often involves users being lured to bogus
websites. In recent years this phenomenon has increased
considerably.

58
Licence agreement

Licence agreement
The following are the contractual terms and conditions for the use of the
software G Data Software by the end user (hereafter also called: Licencee).
1. Object of the contract: The object of the contract is the G Data software
recorded on a data medium or downloaded from the Internet and the
program description. This is hereafter referred to as Software. G Data calls
attention to the fact that, due to the status of technology, it is not possible to
manufacture Software in such a way that it operates without error in all
applications and combinations.
2. Scope of use: G Data grants you, for the duration of this contract, the
simple, non-exclusive and personal right (hereafter referred to as Licence) to
use the Software on a contractually agreed number of computers. The
Software can be used in the form of an installation on a physical unit (CPU),
a virtual/emulated machine (such as VMWare) or an instance of a terminal
session. If this computer is a multiple user system, this usage right applies to
all users of this one system. As the Licencee you are permitted to transfer
the Software from one computer to another in physical form (i.e. stored on a
data medium), provided that it is not used on more than the contractually
agreed number of computers at any time. Use that exceeds this is not
permitted.
3. Specific limitations: The Licencee is prohibited from changing the Software
without the prior written consent of G Data.
4. Ownership of rights: When purchasing the product you only receive
ownership of the physical data medium onto which the Software has been
recorded and to updates agreed in the context of support. Purchase of rights
to the Software itself is not included with this. G Data especially reserves all
publication, reproduction, processing and usage rights to the Software.
5. Reproduction: The Software and associated written materials are
protected by copyright. Creation of a backup copy is permitted, as long as
this is not passed on to a third party.
6. Duration of the contract: The contract is granted for an unspecified period.
This duration does not cover the procurement of updates. The Licencee's
right to use the Software expires automatically and irrevocably if he breaches
any of the terms of this contract. On termination of the usage right it is
obligatory that the original CD-ROM including any UPDATES/UPGRADES
and any written materials is destroyed.
7. Compensation for breach of contract: G Data calls attention to the fact that
you are responsible for all damages through breach of copyright that G Data
incurs from breach of the terms of this contract by you.

59
G Data Software
8. Changes and updates: Our most recent service terms and conditions shall
always apply. The service terms and conditions may be changed at any time,
without notice and without giving reasons.
9. G Data warranty and liability:
a) G Data guarantees with respect to the original Licencee that, at the time of
delivery, the data carrier (CD-ROM) onto which the Software has been
recorded is error-free under normal conditions of use and within normal
maintenance conditions for material performance.
b) If the data medium or download from the Internet is faulty, the purchaser
is entitled to demand delivery of a replacement during the warranty period of
6 months from delivery. To do so, he must provide proof of purchase of the
Software.
c) As per the reason previously stated in para. 1, G Data accepts no
responsibility for the Software not being error-free. In particular, G Data
accepts no warranty for the Software meeting the purchaser's requirements
and purposes or working in conjunction with programs selected by him. The
purchaser is responsible for proper selection and consequences of use of the
Software, together with its intended or achieved results. The same is true of
written materials related to the Software. If the Software is essentially
unusable in the sense of para. 1, the purchaser has the right to revoke the
contract. G Data has the same right if manufacture of Software that may be
required in the sense of para. 1 is not possible within reasonable cost limits.
d) G Data is not liable for damages unless damage is caused intentionally or
by gross negligence on the part of G Data. Liability for gross negligence does
not extend to sales persons. The maximum award for damages shall be the
purchase price of the Software.
10. Legal domicile: The exclusive legal domicile for all disputes directly or
indirectly arising from this contract is the registered head office of G Data.
11. Final provisions: If individual provisions of this Licence Agreement
become invalid, the remaining provisions stay in force. In place of the invalid
provision, an effective provision that approximates its commercial intention
as closely a possible shall be considered as agreed upon.

60
Licence agreement
Copyright 2010 G Data Software AG
Engine A: The Virus Scan Engine and the Spyware Scan Engines
are based on BitDefender technologies 1997-2010 BitDefender
SRL.
Engine B: 2010 Alwil Software
OutbreakShield: 2010 Commtouch Software Ltd.
[G Data Software - 23.03.2010, 10:16]

61
G Data Software

Index I
I have a multi-user licence. How can I
A use it? 46
Access data invalid or missing? 45 Installing the software 6
After the installation 8 Internet update wizard 9
Invalid registration number? 45
B
Boot scan prior to installation 37 L
Licence agreement 59
C
license 17
Can I also purchase more licences for
additional PCs or more functions to add
to my software package? 48
N
Can I use my old access data to obtain No installation window appears 42
updates on a new computer? 46 Not-a-virus appears during a virus
CPU load 18 check 28
Customised setup or full installation? Notes on uninstalling 48
44
O
H On the first run 9
How can I tell if the monitor is
protecting my system? 30 P
How do I improve the security status? Problems with the Internet update?
15 36
How do I start a virus check? 20
How do I start a virus update? 34 S
How do I switch the virus monitor SecurityCenter 14
on/off? 30 ServiceCenter 5
How does the quarantine work? 28
How is the SecurityCenter organised? T
16 Tips for installation 37
Tips for the virus monitor 30
Tips for virus check 19

62
G Data Software
Tips on virus updates 33

V
Virus check or virus monitor? 19
Virus check wizard 12

W
What are virus updates? 33
What happens during a virus check?
21
What happens when a virus is found?
26
What happens when my licence
expires? 48
What is a software update? 36
What is the G Data Malware
Information Initiative? 43
What is the security icon for? 31
What threats are there? 50

63
G Data Software

Notes

64

Vous aimerez peut-être aussi