Home
Manual
Contents
1. aa TRV Fas Tech Guard Internet Security For More information please visit www techguardantivirus com Technical Support Team TG Technologies Content Download Tech Guard Internet Security EE 4 Installation Tech Guard Internet Security 4 SE RE EE 7 SV SOF COILS ee ee 9 When Tech Guard Internet Security finds a threat 12 T ch G ard Internet Security Preferente E 13 EE EE 14 Tech Guard Internet Security Protection COMPONENHS cccccseecceeecccceeseceeuscsceusceceeuseeeueceeeeesseeeeseeuesssseueceseeeseseuneeeas 15 Databases and program modules updates 18 Tech Guard Internet Security registration cccccccsecccesccccsececeeseceensceceuececeeueeeueeeeesecscuueeeeeeeeeeusesseeueeeesueeeseuecessueesenes 19 SSES SUD DONG ar EE Debt 21 Tech Guard Technologies 2 User Manual for Tech Guard Internet Security 2014 Dear user We sincerely thank you for your choice of Tech Guard Internet Security reliable integrated information security solutions Tech Guard Internet Security includes anti virus functionality that detects and eliminates viruses spyware adware and other malware worms Trojans rootkits and other threats and the firewall that protects your work online Reliability of Tech Guard Internet Security makes usage of the computer connected to Internet safer Tech Guard Internet Security unlike many other antivirus software does not load the system and does not make conflicts wi
2. taiii dgan ja ety ae SLA aT detected Sonal spe S Oa ee Apiai ween 1 1 33720 ty EI Leg das OSS Fateh gie l Mal st apbagt miie RE bwni to take jaart in pa geiena orina CNR aral haia bo angrer Tech daai Fiama suiii imei rede rel 21 ley Cine j Delete J Tech Guard Technologies 17 User Manual for Tech Guard Internet Security 2014 Databases and program modules updates The effectiveness of antivirus product depends on how regularly virus database is updated Regular automatic update of databases is critically needed to keep the optimal level of protection of your computer lt ei Tech Guard Internet Security Ej Q w E CS e d 3 SCAM THREATS FIREWALL TOOLS SETTINGS LICENSE SUPPORT The efleciiveness of your computer crotection depends on tre up to date antivrus bases System Status and agplizaton You can configure automatic updates in fie window Do not forget thal Hate gen eenean all pesessace regula updeting otha software is very mporant Cutotdate attivirus bases are components ae running Updazes are effective downloaded Ho threats were detected Antivirus bases automatic update Enabled Last update 20 01 214 5 50 28 Bazes version 2 0 0 1670 rus defintons 4264783 entries heyt update FO 270144 Dm A Updatz evers hours Update ngwe Application version 1 1 3416 U Last update J7 sU 2U14 Patra nabled Mail scanning nabled se IE ETE ai Application automatic update Enabled
3. Guard Internet Security presents graphical representation of the system status in two colors Blue color indicates adequate protection for your computer all systems for protection are on anti virus databases are up to date and there are no active threats in the system at that time The red color indicates the presence of security vulnerabilities one or some modules of the product services are turned off anti virus database are outdated there are currently active threats etc System Status area provides the description on the state of the system and the cause of security vulnerabilities and provides specific actions for their removal You should only follow the advice and guidance offered by program by clicking Fix button Tech Guard Technologies 8 User Manual for Tech Guard Internet Security 2014 System Scanning Tech Guard Internet Security has three scan modes which are available in main window Quick Full and Custom Scan Each set is provided with certain parameters of the mode Tach Guard Internat Security _ eaa a ary Quick scan a ee ee osurarmtimaan dowiddaded Ha thesis were e e deeisgl Splice sgr gtt HI RI Lag epi 1 LTTE Full scan Pack tidien Te Ful stan ofr rimparo mabara Tarh Guard indienne Mel piai sratied i Beni mam objects mal dikes iiion emnin meia Fha ei rh Fimpen TII geg East T Waan i Botsgtrd Custom scan SRR Page Bean af he comperaractondiip kb Ucar 3pibrgg To obtain
4. and Settings Admn iraa Desk op iv Trg pin Ziri Wi nde ufttiese meriad by Dragan folly ins S45 Succeestuly guaranined Loraisn ieee and Sebringi tA L A obama kage infected br vun Ses by gC UL Successfully quarantined Location AG qymenbs ag Seirm and rato Ds ck oe By ea re api nected by Ying te Wind iT Succeestuly qusrenined Lormar CVaumerts ag Seirm ar eed rend FD ck og A By ea re vebp plt ected by Wing Salty Winds iT Succeestuly quarenined Location Go qymenbs sg Seirm n ia Dakot R A ars JIG ade Ae Dt infected by Umom Age ind 11199 Succeestuly quam Lorton Co cuments and Sethnge dm mnistrabortDe sk opti Aires Ager Wins j Tib A ech dae ORE infected by Downloader VE ins SRS Succes estyly glare Locsin C umans and e a Aini If the threats are found there will appear a window with information about their names level of threat and location and Tech Guard Internet Security will offer an optimal action to neutralize infected files In addition you can choose a different action if you are sure that your decision is right When clicking the Apply button Tech Guard Internet Security will begin neutralization of all detected threats This process can take several seconds to several minutes depending on the number of detected threats When this process is completed you will receive a detailed report on the work done which will contain the name of infected file and action applied to it Threat Name Loca
5. establishment of rules to network access for programs Automatic Interactive by user When the Message section is set Tech Guard Internet Security will notify you about the detection of infected or suspicious files in email messages as well as about the completion of the upgrade process Tech Guard Technologies 13 User Manual for Tech Guard Internet Security 2014 Real time system protection Tech Guard Internet Security has a built in tracking in real time entitled Patrol Patrol detects viruses and other malicious programs at the moment effectively blocking them even before the entry into the operating system or files tracks running processes and thus ensures reliable prevention of infection By default the Patrol is automatically activated every time you start the program This is a very important component of protection We do not recommend you disable this feature To check whether the Patrol is turned on press the right mouse button on Tech Guard Internet Security icon in the taskbar notification area or go to the Tools gt Properties About Customer support Patrol fon Utilities Check For updates Open Tech Guard Internet Security Exit Tech Guard Internet Security Tech Guard Technologies 14 User Manual for Tech Guard Internet Security 2014 Tech Guard Internet Security protection components To guarantee a multilevel protection except Patrol Tech Guard Internet Security has several important comp
6. reaction of anti virus module for the object if you are unsure in actions of antivirus Otherwise we recommend performing actions that the program offers Also you can hide active threats if you are sure that your decision is right In this case they will not be shown in the list of Active threats and influence the system status However we strongly recommend not doing that and better send suspicious files to our antivirus lab for the detailed study of the threat To send suspicious files choose Tools gt Feedback In some cases to remove an infected object you have to restart your computer So do not worry if A not all infected files can be deleted However in case when even after restart of computer the problem still exists please seek help from customer service T Tech Guard Internet Security uses a special repository Quarantine to isolate dangerous files We do not recommend you to restore files from quarantine if you are not sure that they are safe Tech Guard internet Security has an option for folders and files exceptions If you do not want some folders or files checked you can put them to the list It is possible that Tech Guard Internet Security e finds some malicious files are safe so there was add an option to Send files for analysis There is a T note only files are sent from the list of exceptions folders are not sent to the laboratory Tech Guard Technologies for analysis In case you ve sent files which are n
7. trie key press 17 ORDER Quick Scan express scan of the most vulnerable sectors of system The following objects are checked system process Windows system files all files in Documents and Settings folder Quick Scan mode is useful in case of virus suspect after visiting suspicious site or in case when the system works incorrectly A If you are not using Patrol function for some reasons Quick Scan mode will be useful for regular periodic scanning which you can configure to start automatically Full Scan total system check thorough test of the system The following items are scanned system memory objects that run on startup backup storage systems mail bases hard removable and network drives We recommend you to make a full system scan at least once a week You should adjust full scan automatically not to forget about this important operation Custom Scan scanning only files and folders that user wishes to check After the scan is complete you will receive a detailed report on its results total time of scanning and detailed information about the number of tested and infected objects Tech Guard Technologies 9 User Manual for Tech Guard Internet Security 2014 Pa Labftazb2d bc l3atOgd Uu HE infected by Tren Lat Winds DK Successfully Sart Location OODgcuments and Settings Admn iraa ask op byron Zir Wi nde Pb jei pke ee A PE nede by Trop Zhe Wind HAL Successfully quarantine Location Og coments
8. RES The installation process Tech Guard Technologies 6 User Manual for Tech Guard Internet Security 2014 ig Tech Guard Internet Security 1 1 3916 0 Setup ES P EM Installing Tech Guard Internet Security N A Please wait while the Setup Wizard installs Tech Guard Internet Security This may take several minutes Status Copying new files lt Back Installation completed successfully G Tech Guard Internet Security 1 1 3916 0 Setup Completing the Tech Guard Internet Security 1 1 3916 0 Setup Wizard Click the Finish button to exit the Setup Wizard Restart the computer to successfully complete the installation ie Installer Information You must restart your syvstem For the configuration changes made to Tech Guard Internet Security to bake effect Click Yes to restart now or Mo iF you plan to manually restart later System Status Tech Guard Internet Security automatically monitors the system status in terms of security and provides summary information in the System Status in any window of the program Tech Guard Technologies 7 User Manual for Tech Guard Internet Security 2014 system Status Your system is protected All necessary components are running Updates are downloaded No threats were detected Application version 1 1 3513 0 Last update 01 30 2016 Patrol enabled Mail scanning enabled Firewall enabled Running for 731 day Cured 3 Quarantined 769 Deleted 3 Tech
9. Runningfor L day Last update Cured 0 Current version 171 20120 Ouarantined O ext update 27 01 2314 6 01 75 Deleted 0 Updat ever 1 day Urdetz now To cbtain the key cress ORDER Developers of Tech Guard Internet Security promptly react to new threats update the antivirus bases and bases of malware Typically virus updates are issued 1 2 times a day In case of epidemics Tech Guard Technologies team prepares updates in accelerated mode to protect users For users who do not have regular access to the Internet it is possible to use off line updates of anti virus 1 By default automatic database updates and program modules are enabled If for any reason you need to disable these settings return to their original state as soon as possible Tech Guard Technologies 18 User Manual for Tech Guard Internet Security 2014 Tech Guard Internet Security Registration This is how unregistered program window looks like ZE Tach Guard Internat Bocurity TRIAL _ Syston Status FM ee urai the oie ves ee of Se Grup pl Yor mieni piate inca Sop mw ary rietst Sg Top thal peered s mre bes Mi lees dreeme Ra teats Rare Cis Tt cope l it ees wl zt E Ee ee deian waag Pig yarari Lies ey ied Splice gg geit 1 1 BG Lam a OS Priok erdik sl pssaipugg Hia Eija as ai EEE a E Fipa prii Fimumigier Bean o mio Urs ko par EC fora E Hihat P A i vista 8 ll poe already bren She cnam tery ploace pe
10. al and Paid Use License Date January 2014 IMPORTANT THE FOLLOVWNG AGREEMENT AGREEMENT SETS FORTH THE TERMS AND CONDITIONS UNDER WHICH Tech Guard Technologies Tech Guard let eee Oe OOP LT L Paes Pa l hi Tr Pa TUC ee Tt ce I accept the terms in the License Agreement I do not accept the terms in the License Agreement A When installing Tech Guard Internet Security you should pay attention to some important notes Before installing Tech Guard Internet Security the Installation Wizard emphasizes that the presence of other already installed antivirus software can cause conflicts in the operating system i Tech Guard Internet Security 1 1 3916 0 Setup Eg Pay attention to potential conflicts which can be on concurrent usage of Warning about potential conflicts different antivirus software ATTENTION Concurrent usage of Tech Guard Internet Security 1 1 3916 0 with other antivirus software can cause to system errors We recommend you to delete your antivirus program manually before installing of Tech Guard Internet Security 1 1 3916 0 I am sure I don t have any other antivirus software wy There are several reasons that limit a usage of multiple antivirus products on the same computer e Anti virus programs request the same system files as you work Simultaneous requests to system resources can cause conflict or failure of system e Some antivirus products offer a scanning service in real time Such scanning req
11. ar cleme Guten To obtain the kay prea Cerdsc ag cemrmgtzogesttoteknwrckebken of par oam ORDER WS To register the program enter copy the code which you purchased to the License code box on License tab and click Activate x lt Tech Guard Internet Security inthis window you can activate the product using your license key or product activation code or license file Choose which method you want to activate the product and enter your registration information have activation code with 32 symbols O have license key O have license file file with extention lic Enter your activation code Please note when using this method of activation must be connected to the Internet at the time of product activation Activation code format is eee ee ee ee KNNX ee ee eee ee You will receive a request to confirm your registration information and then fill in correct information and click Send Tech Guard Technologies 19 User Manual for Tech Guard Internet Security 2014 cunrp TECH Be GUARD Please confirm your registration information Tech Guard Internet Security will inform you about the successful registration Thank you for registering Tech Guard Internet Security This is how the window of registered program looks like Teoh Guard Internet Security Swgigzp Statue Tou i poega a racy Corey aes ui ie i erin Pk Gee rE Dia ERY cy Brei H i
12. ion bass or control retori Eege ane running Updates ae SONS winks ahr Vou Cen CEBI Tiel bo US per f ie biiy Fei edgk ones COBO de josie ho thas are Wie nha Benge Ve eee hs eatin E r Alpe ste et ee TS Apeli kan rairs Lim late OLE Jobat soplecoion tims AN w Tise gaim oiTa batine berb ag i sar Faist ij Ge ge installer SEET l Plaji ii aj piaj Aiia F 3 Pres a LE a T a Ou Cep G Brka D Fipa sutiel fe 7 Gamer Host Process for in Serres e gt Sr asses ola vimi D e interne Explorer z EE eerie Prepare Feu icereer EeperenE tl ore EE tege d Unasi 3 Menen e i To otan the hey press MB Fite H RSR RH Protection against external attacks By default Firewall allows applications only outbound connections This allows to protect system against malicious attempts to take control over it Built in set of rules Application has built in set of rules that have all necessary rules to allow functioning of standard system services and protocols NetBios DHCP DNS etc With these rules network activity of particular protocol or service could be easily enabled or disabled An ability to set global settings for all applications in the system Tech Guard Internet Security has an opportunity to set global settings for all applications For example if you need to give an access to server for all applications To do that you can set a rule to allow access to certain IP addresses on port settings In addition there will be no need fo
13. ji ic ee eee ee e Liena cea Piri Hore Leri Nees E Mail cca Licenta key commercial Fale aiki Liseirie iypH Conner Mal sr astaut cen Epke daer RAT fgasab md Appia aie yet 1 2912 H Leen ipi OS brieche fei FPL dan Cine 7 Dam miis PEN Sek E peu alira have the boent ker plone Hoi Topay balha Taobtan the key press og oua disios autre ky helo i reghin of you verii Tech Guard Technologies 20 User Manual for Tech Guard Internet Security 2014 Customer support If you have questions about Tech Guard Internet Security you can contact customer support service Users can use the following e E mail support techguardantivirus com e Fill in the request form to customer service Tech Guard Technologies 21 User Manual for Tech Guard Internet Security 2014
14. not want to see it every time you turn on your computer you should clear the check mark in front of the corresponding field The following settings indicate which exactly is to be scanned archive files boot sectors or turn on heuristics It is recommended to leave a mark in front of each tag to the maximum protection remained Heuristic analysis is virus detection by typical behavior i e the ability of antivirus software to identify a virus that just appeared even if it is not added to the antivirus bases Option Load full set of base This option is disabled by default Antivirus is downloaded with a basic set of virus databases The basic package includes the most world spread and dangerous viruses If the antivirus finds at least one virus on your computer it loads the full set of virus database without rebooting antivirus In complete virus database includes basic set and all the old and less ubiquitous virus signatures In order to antivirus always worked with a full set of virus database you need to include this option in the settings and restart the antivirus Tech Guard Internet Security has a built in algorithm of heuristic analysis and therefore provides protection even against the latest viruses and threats Default actions of the Patrol Specify what should be the reaction of Tech Guard Internet Security when finding malicious file from notification about its presence to its removal the Firewall mode determines a way of the
15. onents tech Guerd Internet Securty EE Appie pt akut 1 170498 Lag enz Hie Pato arabin Hl cer ether Phrae zrek Ppgetgeier Nig Bap Zeigt 5 homama Tit Be egprt 3 Tu atte te by press e Office documents check Tech Guard Internet Security checks all types of Microsoft Office documents Sou Mall mtn gt Cukpaing r i eigai recep ad Ouyang Se kd Vie ee Cake Tipi Me a ad a a i ShewTechGuadaeisegs H e Check the files that are downloaded to a computer with Internet D Scheduler 7 Feedback Det cal Dees 86 Erais Tech Guard Internet Security monitor all users download from the Internet and after the detection of malicious files blocks them e Mail check Mail filter checks all incoming and outgoing mail messages and attachments which guarantees computer safety e Firewall This module is very important if there is a network or Internet in your PC A firewall monitors all attempts of application to access the network both incoming and outgoing traffic Tech Guard Technologies 15 User Manual for Tech Guard Internet Security 2014 Tech Guard internet Security d mt gent NEE eeng 2 DL EIB BEE Te HU E Ta a In ia m aiii heal rts CE Fe Geiger De af System Stabes Programrules F Systemrules CS WEB f ter rules a tee A prites A reese Crone eree ana ieri netek AE rights On par aprioat
16. ot really harmful experts of Tech Guard Technologies will remove them from the base Tech Guard Technologies 12 User Manual for Tech Guard Internet Security 2014 Tech Guard Internet Security Preferences You can configure the program on your own choose objects to scan actions to be performed in case of detection configure the proxy server and more If you are unsure about the correctness of your actions we recommend using the default settings lt Tech Guard Internet Security Froxy server settings CI Use proxy server settings T VM fi LR H t D i Launch antivirus on startup O Turn off the spasi scan I Archive files Iw Bor sectors O Authorization Wer Louad full sel uf hasas O Wi Heuristic analysis Ceboot needed NTERACTION OPTIONS Op dargerous the detection Notification k CH Quaranlineid Fi Deleted 3 BF Cn infected mail detacton To obtain the key press Wi Cn successful uadate ORDER Fesore settings to detauka Apply Settings of Tech Guard Internet Security are divided into 3 categories general default actions and messages It is strongly recommended to always keep the option Load at the launch of OS activated it will help Internet Security to protect your system from the very first seconds of the PC launch When Tech Guard Internet Security launches there appears a screensaver that disappears in a few seconds If you do
17. r each application to create separate rules for access to this server WEB filter Blocking of dangerous sites and malicious content Tech Guard Internet Security has an ability to block malicious content from untrusted sites in browser In this case user is shown a message If the site is in a black list you will be able to attend it view the images but not be able to download programs archives documents and other files that could potentially harm your computer from this site e Additional Utilities Task Manager and Startup Manager Additional tools such as Task Manager and Startup Manager expand the functionality of the program and help user to control processes in the system better Task Manager is required to watch applications that run on your computer and control them Using Startup Manager you can view information about programs that start automatically when you start Windows e Feedback If you have suspicions about certain files you can send them to our laboratory and participate in collecting statistics Thus you can help us respond more quickly to new threats and updating existing ones Tech Guard Technologies 16 User Manual for Tech Guard Internet Security 2014 Tech Guard Internet security OR SE fie a S an LU et sl B TE 7 Tie Le FEF bs 1807 Le ik He T wm uk vo os ee i Lk Ae Sybian Statue BD Settings 0 umes Scheduler Feedback Fues pn Seal bape eiis Se Bet anaba Ar
18. rs Gaer E Mai seanina efebled Hore nb tege Ded wri R If you do not have the time or will to wait for the scan is complete you can use an option that is placed at the bottom of the SCAN window Turn off computer after scan Tech Guard Technologies 11 User Manual for Tech Guard Internet Security 2014 When Tech Guard Internet Security finds a threat Tech Guard Internet Security has a built in algorithm of analysis of the identified threat and determination of the optimal action hide ignore heal quarantine delete which needs to be applied After the scan is completed in case of certain threats you can view the actions offered by the program In the Threats window you can view basic information about active threats name security level location and decide on their future fate Teoh Guard Internet Security 9 Ta Achve threats 7 Quarantine GH Exclusions Tha oegricroe conde niara abou forests detecied during prea acer BpGrseerregeb Act hica inko hiena ie raren TANE raring daria probir cence Uaa iehi stengen ee en a ie cores ad ph ection eae bry Tech cammed rier Secut nor nine Alb Ierpel ane eege Tee eat geckeg ee bar here Lorain Airbag rum Agut eer atii Cibran and zen bernd Ora Nin Ethan Ricon J aall Gibier are Sat fun ar Cues D EEr Ae LS wg Hl cipean arc Seit mes EE Gre ROSCH roata oes t sare taken attest E E You can change the
19. th other installed products Tech Guard Internet Security is easy to use product with minimal design and many useful functions reliable and efficient at the time eg ere 8 Ki Tech Guard Technologies 3 User Manual for Tech Guard Internet Security 2014 Download Tech Guard Internet Security Distribution Tech Guard Internet Security is free and available from the project site www techguardantivirus com Installation Tech Guard Internet Security Proper installation of Tech Guard Internet Security is provided by Tech Guard Internet Security Installation Wizard You just have to follow the wizard Preparing to install Windows Installer Preparing to install Cancel Cancel Starting the Installation Wizard iz Tech Guard Internet Security 1 1 3916 0 Setup Welcome to the Tech Guard Internet Security 1 1 3916 0 Setup Wizard The Setup Wizard will install Tech Guard Internet Security 1 1 5916 0 on your computer Click Nexk bo continue or Cancel to exit the Setup Wizard Cancel Read the license agreement and choose I agree with the license agreement if you agree with it click Next Tech Guard Technologies 4 User Manual for Tech Guard Internet Security 2014 i Tech Guard Internet Security 1 1 3916 0 License Agreement End User License Agreement Please read the Following license agreement carefully Tech Guard Internet Security End User License Agreement Version English Purpose Tri
20. tion Action Virus Alamat Macroword 1 CADocuments and Setti Menn doc Cured worm Autorun wins z C Viocumente an Bhojpur song exe Quarantined Worm Autorun Wins 7 Ci BHOJPURI OLD FILM SONG ep Quarantined Worm Autorun Wind 7 CADocuments BIRGHA VIDEO exe Quarantined Worm Autorun M in 7 CADocuments 4 DHOBIVS MPS exe Quarantined Trojan Sality Wine 541 CADocuments and Settin dArq exe Quarantined There are three levels of threats in Tech Guard Internet Security FIRST LEVEL green the files are found using heuristics SECOND LEVEL yellow viruses that were found in archives installation files disk images etc THIRD LEVEL red infected files which were found on the computer With Tech Guard Internet Security you will not have to keep in mind the date of next scanning You can configure to start scanning automatically using the Scheduler which is available from the Tools menu Tech Guard Technologies 10 User Manual for Tech Guard Internet Security 2014 ch Guard Internat Sorten Ta y e jj 3 dr er EE ME Zus E Settings 7 Utis CD Schachuler Feedback l tar senei Anamitar l tirpirarin enero pda D k Gran Ire fe siias rur isr 1 d re Pid aneh is aoka Ermmbmi A bbaba Mo i ag Treaties bahra 21 2004 79657 oe Aete ied Application serie 11 0 THO Cone ine a Boas See retena Late Ai oan en Ft c v the Hne Lat apii DALANE Of he euro Fee treble see
21. uires system resources Your computer can start working much slower In addition before installing Tech Guard Internet Security you should remove its previous version To remove an old version of Tech Guard Internet Security anti virus or a previous version yourself you should follow these steps Tech Guard Technologies 5 User Manual for Tech Guard Internet Security 2014 1 Click Start click Control Panel and double click Add or Remove Programs 2 Select an antivirus program to be deleted in the list of installed programs and click Remove 3 For implementation of changes follow the instructions on screen After removal of the previous anti virus program continue to follow the Setup Wizard Enter your name email anonymous information CG Tech Guard Internet Security 1 1 3916 0 Setup Customer Information Please enter your customer information First name First Mame Second name Second Mame E Mail youremail mail com elt want to subscribe for Tech Guard Internet Security news Lil t want to take participation in online statistics collection Cancel The installer is ready for installation Click Install i Tech Guard Internet Security 1 1 3916 0 Setup IN Ready to Install N The Setup Wizard is ready to begin the Typical installation m Click Install to begin the installation IF you want to review or change any of your installation settings click Back Click Cancel to exit the wizard
Download Pdf Manuals
Related Search
Related Contents
Télécharger la notice (nécessite Adobe Reader) Multiquip MC-62S User's Manual Manual uso MODUS System Design Guidelines for the TM4C129x Copyright © All rights reserved.
Failed to retrieve file