![]() ![]() Otherwise files are only checked when they are read by programs. If a file is checked when written to, the check is carried out as soon as a new file or file version is created to see if an unknown process may have infected this file. Mode: Here you can specify whether files should be checked when run, when read or when written to and read.Exploit Protection protects you against such access – and proactively protects you against previously unknown attacks. PDF viewer, browser etc) are routinely updated. Exploits can even come into effect when applications (e.g. Exploit Protection: An "exploit" exploits vulnerabilities in popular software and can use them to take control of your computer in the worst case.AntiRansomware: Protection against encryption Trojans. ![]() This means that malware for which no signature yet exists is also detected. Behavior monitoring: If behaviour monitoring is enabled, every activity on the system is monitored regardless of the virus monitor.However, please note that moving an archive to quarantine can damage it so that it can no longer be used after it is moved back from Quarantine. files with the extension RAR, ZIP or PST) should be handled differently from normal files. Infected archive: Here you determine whether archive files (e.g.The highest protection for your data is offered here by the setting Disinfect (if not possible: place in quarantine). If you would always like to perform the same action, you can set this here. Infected files: If a virus is detected, you will be asked in the default setting how you want to deal with the virus and the infected file.You can accelerate the virus check in older and slower computers by using just one engine, but normally you should keep the setting Both engines. Every engine by itself would already provide you with a high degree of protection against viruses, but it is precisely the combination of both engines that gives the very best results. Use engines: The software works with two engines, which are two essentially independent virus checking programs.Monitor status: Specify here whether the monitor should be enabled or disabled.The virus monitor is your most important protection! It should never be switched off. The virus monitor real-time protection continuously checks your computer for viruses it controls read and write operations, and as soon as a program attempts to execute malware or spread malicious files it prevents it from doing so. To do this, simply tick the checkboxes for the areas you want to reset. When doing so you can specify whether you want to reset every settings area or just specific ones. Reset settings: If you have made a mistake when configuring your G DATA software, you can use this button to reset all of the software settings to the factory settings. Load settings: You can use this to load a GDataSettings file you have created on this or any other computer. If you are using your G DATA software on multiple computers, you can use this to create settings on one computer, save them and load the settings file onto the other computers. Save settings: You can save the settings you have made to a GDataSettings file. The following general functions are available for the settings: In general there is no need to make any changes at all here, as your G DATA software has already been optimally configured for your system during installation. In the Settings area you can configure the relevant program module how you want. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |