Home

TrustPort Antivirus 2013, 10u, 1Y, OEM

image

Contents

1. TrustPort 10 6 1 Keep IT Secure Shields E Access Control E Secure Shredding E Encryption fee Logs and Results Firewall Antivirus H Network Utilities GL Advanced Settings E About and Licenses Firewall e TOT Logs and Results Logs and Results e i D TrustPort Total Protection This page serves for displaying log records created by the Antivirus or Firewall Firewall Serves for displaying log records created by the Firewall Antivirus Serves for displaying log records created by the Antivirus asier orientation TS seh A Page Firewall Log Viewer makes possible to display all the accessible logs from TrustPort Personal Firewall On the first load of the page are loaded all the logs to the list The newest log records are displayed in the highest position on the list H Shields E Access Control E Antivirus E Secure Shredding E Encryption E Logs and Results i External Log Viewer Ei Antivirus Hl Network Utilities i Advanced Settings H About and Licenses Log Viewer Time 3 10 58 PM 3 10 58 PM 3 10 57 PM 3 10 57 PM 3 10 57 PM 3 10 55 PM 3 10 55 PM 3 10 54 PM 3 10 54 PM 3 07 12 PM TrustPort Personal Firewall Firewall Log Log Viewer Event Description Connection Connection Connection Connection Connection Connection Connection Connection Connection Connection Button Refresh serves for reload of the list of all l
2. 10 5 Encryption Encryption page enables the creation and management of encrypted discs and archives lt lt uy Encryption oak FP TrustPort Total Protection Shields Encryption D Access Control Page Encryption unifies a set of tools which serve for E Antivirus creating encrypted archives and also for creating and l Secure Shredding management of encrypted disks se Encryption kl Drives Drives E This product lets you store your files and folders securely in Loge and Results encrypted volume images which can be mounted and E Network Utilities unmounted at any time GL Advanced Settings D About and Licenses Archives This product lets you store your files and folders securely in encrypted file packages These packages are very easy to Show categories placed in the tree for easier orientation 103 TrustPort Keep IT Secure e 1 10 5 1 Drives 10 5 1 1 Unmount options Ka On this page you can setup some Disk Protection options The first of them is auto unmounting option You can generally enable or disable this functionality by setting auto unmounting time When you don t do any operation with any mounted drives during this time period then Disk Protection automatically unmounts all mounted images You can choose if Disk Protection should automatically unmount all mounted images when computer goes to sleep TrustPort Disk Protection Configuration FP TrustPort Total Protection E Shield
3. About and Licenses Execute file scan You can perform an On Demand scan of files or directories by clicking on the button below and selecting a required target More details to customize If you want to customize the advanced settings of the On Demand scanner click on the button below Show categories placed in the tree for easier orientation Scan files e Scan all files scanning all files without difference in format or type e Scan only files with the following extensions antivirus software will scan only files with specified extensions The predefined list contains dangerous extensions we recommend modifying it to experienced users only e Exclude files with following extensions antivirus software will not scan files with extensions that you select We recommend this option to use to experienced users only Scanning options e Scan compressed files zip arj cab archive files i e their contents are scanned searched for malicious codes This option slows the scanning down but on the other hand increases the computer protection In the bottom right section there is a button Scan Now After the button has been pressed a context menu will appear from which it is possible to start the scanning of all disks or it also possible to choose a specific target file directory disk which you wish to scan Selecting the item from the context menu enables the on demand scanner to scan with the required paramete
4. 14 3 3 Add files to the archive J You can add files and folders to the opened CAR archive To do this find the folder where you want to add the new files and select Add files from the toolbar or from the Edit menu TPE shows a window where you can browse for files and folders that will be added When done press OK button TrustPort Keep IT Secure Select files folders to Add CiTestinglarch0 DACH Documents and Si GED Perflogs DACH Program Files LECH Program Files x8 E ProgramData GG tem EE Testing Ge on _ GHD pic After that TPE starts to add the selected files and or folders to the archive You can interrupt the process by pressing Esc key or using the Cancel button If TPE finds a file with the same name in the archive then will it will display a confirmation dialog window where you will be asked you if this file should be overwritten or not lt lt 14 3 4 Delete files from the archive E If you want to delete some files and or folders from the opened archive then you need to select them and press Delete key or use the Delete files menu item or toolbar button You will be asked for confirmation and then the deletion process will begin You can interrupt the deleting process pressing Esc key or using the Cancel button lt 14 3 5 Extract files from the archive MM You can select some files and folders and extract them to any specified directory To do this click on Extract archive toolbar b
5. The silent installation can be done in two modes SILENT or VERYSILENT In case of SILENT neither the Setup nor the background window are displayed but the installation process window is If the switch VERYSILENT is used not even the installation process window is displayed The user is not allowed to interrupt the installation process due to disabling the button Cancel and ignoring the close application button This switch can be used together with SILENT This overwrites the implicit directory name displayed on the Select Destination Path page of the Setup wizard Full path to the directory must be entered It is also available in both the silent installation modes Overwriting the implicit folder name displayed on the Select Start Menu Folder page of the Setup wizard If a valid activation code is entered pages regarding registration are skipped and the product is registered If a path to valid licence key is entered including filename pages regarding registration are skipped and product is registered Welcome to the TrustPort Total Protection Setup Wizard This will install TrustPort Total Protection version 2013 13 0 0 5037 ALPHA on your computer Itis recommended that you dose all other applications before continuing Click Next to continue or Cancel to exit Setup reseller listed on the following webpage AP To order a full license please contact your local http www trustport comfenfestore buy Product h
6. 14 3 11 Create new folder M To create a new folder in any CAR archive or in any CAR archive folder or sub folder you just simply have to browse and select the destination where the new folder will be created and click on Create folder on the Edit menu A new window will appear and you will be prompted to type the new folder s name o 14 3 12 Keyboard shortcuts Mora soma 1 mme Test archive consistency Moves selector without selecting 155 TrustPort Keep IT Secure SPACE Selects file folder under selector 14 4 Management of CAR archives Total Commander E Total Commander is a file manager for Windows TM similar to Windows Explorer But Total Commander uses a different approach it has two fixed windows side by side like a well known file manager for DOS Total Commander plug in allows you to manage CAR archives as any normal file with the only difference of being asked for a password anytime you want to open a CAR file For more information about Total Commander see http www ghisler com lt Total Commander 7 57a AEC Ltd e lw Files Mark Commands Net Show Configuration Start Help elelzleselslslaoeieolsolaraealz Kgl oO Ge Gf Ga Gh Gi Gi Em Be v Lnone_ 18 907 268 of 45 648 696 k free Lx He Lnone_ 18 907 268 k of 45 648 696 k free c 03 13 2012 03 01 hs 05 29 2012 09 11 exe 155 930 796 05 29 2012 13 24a F 03 23 2012 15 52 data 152 02 05 18 2012 11 552 04 25 2012 12
7. On the Options tab set scanning of Selected files with following extensions and switch off Use heuristic methods e What is the On Demand Scanner good for when the computer is guarded by the On Access Scanner constantly In the On Demand Scanner we use several advanced techniques to reveal viruses that can t be used in the On Access Scanner because they are too time consuming Therefore the On Demand Scanner is more effective We recommend to use it e g for checking files downloaded from the Internet from a not very reliable source 194 TrustPort Keep IT Secure e What are logs good for Logs are records about all program activities They are used mostly by system administrators A regular user doesn t have to care about them e I received a license key for the TrustPort Antivirus what shall I do with it Click the right button on the quick launch icon in the right bottom corner of the screen and choose the Configure item in the antivirus menu When a window opens choose Register license from the General Settings dropdown menu Find the file with the license key in a dialog and press Open In the following dialog information about the license key is displayed Finish the product registration by pressing the Import button The changes aren t applied until you close all windows of the TrustPort Antivirus e The TrustPort Antivirus found a virus and moved the infected file to the quarantine but I cannot find it there
8. Then you have to select a file which will be started after installer extracts data to the temporary folder TrustPort Archive Encryption Ea TrustPort Archive Encryption Size Date ZG2DA 2 23 4 2012 About Manual Filter OK Cancel 146 TrustPort Keep IT Secure M The created encrypted file using CAR Installer will have an EXE extension but when you open it you will be asked for the password or you can use pxxx command line parameter where xxx iS a password and if it is valid the file will immediately open and be extracted to a temporary folder If the file has any comment it will be displayed automatically when the user opens the file lt lt 14 2 3 Extracting CAR archives Decrypt E If you select an encrypted archive file CAR or EXE archive in the Windows Explorer or any other Shell program then the Decrypt item will appear in the context menu When you click on it the following dialog box appears Decrypt Archive a TrustPort Archive Encryption Extract files to folder Ci Testing DACH MSOCache GME PerfLogs ES Program Files GG Program Files 86 Gl ProgramData EE System Volume Infor E temp EMG Testing be i oA kescht rahale 7 a m About Manual e e Select destination folder In this window you have to type a password and specify the destination folder where the archive will be decrypted to In order to ease the navigation you can use the p
9. 5 p g a oo EA a i ae Of Gs Gr Di Gi di lc Lnone_ 19 906 896 k of 45 648 696 k free A de Lnone_ 18 906 896 k of 45 648 696 k free e eodTestingrarchivesinewv Name Et Size Date Atr Name tEt Size I lt DIR gt 05 30 2012 07 35 DIR Chew DIES 05 30 90 007 35 l H Test01 Pack files Pack 2 Hei fo the archive ee ee Ch Testing archives new iparchive saii ZIP ORAR TAR V Also pack path names only recursed O ARS O UCZ GZ ua LHA ACE TGZ in D D D KH a ee o gt C Create sef extracting archive eege E Create separate archives one per selected fei _ Encrypt L o 1 ms Il Gei IL me JI The most important option is the Move to archive option If you select it then all files will be moved to the archive file It means that after the archivation process the original files will be securely deleted Select CAR packer option on the right side of the window If you don t have this option you have to configure the packer If you click the Configure button you can change the compression level of the archive You will be asked to type in and confirm a password and also you will have the option to choose the encryption algorithm The file folder will be packed into the folder opened in the other panel of Total Commander if you haven t specified it differently lt Total Commander 7 57a AEC Ltd Files Mark Commands Net Show Configuration Start l elselzlges
10. Ge v Lnone_ 18 907 196 Li DSSS eas A Icons 4 Treat archives like directories 03 19 2012 03 01 hs 05 29 2012 09 11 03 23 2012 15 52 04 25 2012 12 30 02 18 2012 02 23 hs 04 23 2012 12 05r h 02 18 2012 02 32 04 23 2012 12 49 05 29 2012 09 11r 04 25 2012 12 51 h 05 30 2012 03 08 hs 03 23 2012 15 43 05 30 2012 07 33 05 30 2012 07 26 03 07 2012 14 28r 05 29 2012 13 04 04 23 2012 13 29 386 226 02 17 2012 23 44rahs 1 01 12 2012 13 36 ahs 1 779 145 04 25 2012 13 50he Ok 227 914 k in 0 4 file s 0 1 dire Ok 3 742 670 k in 0 6 file s 07 17 dire c Testingarchives gt F3 View F4 Edit F5 Copy FG Move F7NewPolder F8 Delete AlteF4 Exit e In the upper right corner combo box type or select if exist CAR without any dot or asterisk Click on the New type button and browse for CARWinCmd wcx file that is located in the TrustPort Archive Encryption installation directory and click Open Click the OK button Confirm by clicking OK lt lt 14 4 2 Create new archive Win Total Commander select the files and or folders that should be added to the new archive and press ALT F5 or select Pack on the Files menu The following window will open 157 TrustPort Keep IT Secure el Total Commander 7 57a AEC Ltd Files Mark Commands Net Show Configuration Start eae ejaj e gt
11. Phages Phages modify other programs or databases in an unauthorized way Specialists gave them their name after the real phages which are especially destructive because they replace the infected cell by their own genetic code The computer phage really replaces the executable file with its own code instead of appending to it It often generates an accompanying file too Phages are extremely destructive because they annihilate every infected file Cavity viruses Not always a virus has to write its body to the beginning or the end of an exe or com file There are exceptions fortunately not many which inserts its body into host file cavities usually command com According to our definition they are not link viruses because the infection does not cause file lengthening Cluster viruses Cluster viruses form rather interesting group They modify only the directory trees reference such that it refers to one copy of virus located for example at the end of disk instead of direct writing to the data region Macroviruses The most dangerous aspect of macroviruses is that they are platform independent like Internet unlike file or boot sector viruses Moreover macroviruses do not confine to executable or object files but they primarily take aim at data files According to the memory location e Resident viruses Resident virus as its name prompts is a virus that stays illegally in the memory It usually 15 Love L tP Ort
12. System32 G Access Control ee ch pe Gees vaEenpuen i Secure Shreddi SowindirYo dll E Encryption D Logs and Results Ed Network Utilities S _ Y dangerous H Advanced Settings fy a protected E About and Licenses ae 48 ASOFTWARE Classes i SOFTWARE Microsoft Security Center BY SOFTWARE Microsoft Windows NT CurrentVersion AEDebug ffi SOFTWARE Microsoft Windows NT CurrentVersion Drivers32 Y SOFTWARE Microsoft Windows NT CurrentVersion Drivers A SOFTWARE Microsoft Windows NT CurrentVersion Windows T mt p e cancel Add filesystem Add registry Ketten 10 2 Access Control Access Control is used to set user permissions to access removable devices folders and files and as well as blocking inappropriate internet website content These settings can be protected by a password 74 Keep IT Secure wg TrustPort Keep IT Secure Access Control Access Control Access control unifies the set of various tools which serve in restricting improper user access to computer devices Parental Lock Enables the blocking of inappropriate website content using particular user profiles Websites can be blocked by specified URL addresses or by categories Volumes and Directories tis to add discs or directories which can hawe set access permissions either through the default profile or by H Network Utilities i i adding an own user profile i Advanced Setting
13. TrustPort Keep IT Secure 10 4 3 Panic Shredding Panic shredder tab can be used for safe shredding of user selected files and directories User can select freely which files or directories have to be shredded In order to accomplish panic shredding fast and silently it is activated by predefined hotkey TrustPort DataShredder Panic Shredding Panic Shredding 4 Use panic shredding Configuration Ask for confirmation EE How it should be activated Logs and Results i E Network Utilities Panic hotkey E About and Licenses What to be shredded Show categories placed in the tree for easier orientation Use Panic shredding This option activates deactivates the Panic shredding function Ask for confirmation If checked DataShredder will require user confirmation before panic shredding will be performed Panic hotkey It is possible to specify hotkey in this editbox simply press requested key combination while focused this control Manage panic objects Press this button to specify objects files or folders to be shredded lt 102 TrustPort D TrustPort DataShredder Panic Shredding TrustPort Total Protection BENE Manage objects for panic shredding EI Access Control l S S Hei be i H Logs and Results H Network Utilities i Advanced Settings H About and Licenses _ Remove Ji c p0 Show categories placed in the tree for easier orientation
14. USE Mass Storage Device Vendor ID USB WID_OC45PID_1060 569cf25002 Remember this choice About Manual In the event that the computer is turned off and a USB device is inserted for which a rule is not yet defined device protection for it will not be applied 80 TrustPort Keep IT Secure From the list of allowed or blocked devices a device may be deleted using the button Remove From the list of blocked devices a device may be moved to the list of allowed with the Allow button which will connect the device to the system Conversely from the list of allowed devices can be moved to the list of blocked by using the Block button TrustPort Antivirus Access Control Device Security H Shields Device security Access Control Device security enables to actively manage user access to devices as USB flash CD DVD Bluetooth Smart cards iPod memory card readers and another multimedia General settings Use rules Show notification for blocked devices Logs and Results Network Utilities Advanced Settings About and Licenses go USB Mass Storage Device Remove Allow Show categories placed in the tree for easier orientation Manually adding a device to the list of allowed or blocked devices is done by clicking the Add button in the appropriate category From the list select the type of device required to be administered and by clicking OK it is added to either blocked or allowed devices D
15. becomes resident in the memory at the first executing of the infected file if it is a file virus or at the first loading to the main memory from the infected boot sector if it is a boot sector virus and does harm from there The virus stays in the memory until the system shutdown These viruses got into trouble on the 32bit systems where their acting and survival is dependent on their code Generally it can be said that the more sophisticated the virus is and the more unusual commands uses the less is the chance to stay active and unnoticed after the 32bit system start e Resident TSR viruses Some file viruses can install themselves into the memory using DOS services as resident TSR and then they can secretly harm and replicate themselves It is a sort of subgroup of the mentioned resident viruses The difference between these two groups is that TSR viruses are installed legally and can be identified by checking interrupt vectors or searching the memory with some of standard programs Although it is not easy to find out and localize it is possible in principle It is necessary to watch the changes in the interrupt vectors of resident programs installation and alert any program attempting to install itself into the memory immediately Afterwards it is possible to enable or disable the installation in a software way and to annihilate the program by the computer reset Watching viruses trying installing as TSR can be successful The weak point
16. chat etc General settings gt a Use Parental Lock i Secure Shredding E Use heuristic analysis CERN List of Profiles _ ___ __________ tl Logs and Results i Network Utilities User profiles list al Advanced Settings Default profile About and Licenses Parental Lock L Settings Show categories placed in the tree for easier orientation a Apply The Add button acts to add a new user According to pre set values choose the Object name and Locations in the select field Enter the object names to select that you want to find such as Computer _1 User_1 In the link Examples a hint is hidden with several useable syntaxes for correct filling in of the field If there is no user profile created TrustPort Antivirus works from the settings from the default profile These settings are inherited by all other developed profiles User profiles may be added only to existing users Select Users Select this object type Sa Se From this location z TEST WING Enter the object names to select examples SC Bookmark Advanced is increased by field Common queries This field is activated when the computer is in the domain and set in the way of filtering users from searching Clicking on Find Now automatically lists for the given folder and set list all the potential users for the creation of profiles 76 E TrustPort Kee
17. if running the program in a trial version a warning to purchase the full version is displayed and also a link to TrustPort where the product can be purchased This information disappears when the product is registered Open advanced configuration Below left you can use links to display the Help information About the program or to open the Advanced Configuration Manager where advanced users can change in detail the settings of the product The Close button closes the window 6 On Access Scanner On Access Scanner checks computer operations all the time and protects the computer from virus attacks on line The On Access Scanner is a name coming from the DOS times and even though it is not very suitable it has survived in people s minds until now The On Access Scanner of antivirus software is sometimes called a resident shield By the resident shield we mean an antivirus software function that constantly monitors all the opened files system folders and what you actually work with at the system task in the background If you have an infected file in the computer and you open it the antivirus software by means of the resident shield alerts the virus presence in a certain file What happens with such a file depends on the On Access Scanner setting The On Access Scanner is often the last chance to detect a virus before executing in the main memory which usually leads to the further spread 6 1 Information about an infection If t
18. parameter 4 After installation running TrustPort Antivirus 4 1 TrustPort Antivirus Quick Launch This application runs in the Windows notification area and allows monitoring of current status of virus protection and protection against hackers and also runs the most popular features of TrustPort Antivirus Quick launch TrustPort Tray is automatically started when a user logs into Windows Status of On Access and Internet Protection is immediately visible through the quick launch icon This icon is divided into two halves The left upper half indicates the status of Protection against viruses status of Real Time Protection Application Inspector and virus updates and right lower half indicates the status of Protection against hackers status of E mail Protection Parental Lock Web Antivirus and Firewall If both protection against viruses and hackers are turned on the entire icon is green see figure on the left If either the virus protection or protection against hackers is turned off half of the icon will be red in this case see figure in the middle Protection status is also recorded in the tooltip that appears when you hover the mouse over the quick launch icon When both protection against viruses and hackers is turned off the whole icon turns red see figure on the right TrustPort Total Protection 2013 UNPROTECTED against viruses PROTECTED against hackers Changes in protection against viruses and hackers are al
19. 50 log 49 762 04 25 2012 07 28 a ing 02 18 2012 02 23 hs exe 77 252 072 04 23 2012 12473 y 04 23 2012 12 05r h 02 18 2012 02 32 04 23 2012 12 49 05 29 2012 09 111 04 25 2012 12 51 h 05 30 2012 03 08 hs 03 23 2012 15 43 05 30 2012 07 33 05 30 2012 07 26 03 07 2012 14 28 05 29 2012 13 04 04 23 2012 13 23 306 226 02 17 2012 23 44rahs 1 01 12 2012 13 36 ahs log 1 779 145 04 25 2012 13 50a sys1 280 192 512 05 29 2012 09 14 ahs sys 281 701 376 05 29 2012 09 14 ahs sys 260 435 456 05 29 2012 09 14 ahs Ok 227 914 k in 0 4 file e 0 1 dir s Ok 3 742 670 in 0 Gfile s 0 17 dir s cATestingtarchives gt e F3 View F4 Edit F5 Copy FG Move F7 NewFolder F8 Delete At F4 Exit 14 4 1 Packer configuration ea CAR plugin has to be configured properly in order to work correctly The Archive Encryption installation procedure automatically install this plug in to Total Commander but if it is not installed at the moment you install Archive Encryption then the plug in will not be correctly registered In this case you will have to register it manually 156 f TrustPort Keep IT Secure Run Total Commander and select Options on the Configuration menu e Click on the Packer tab e Press the Configure packer extension DLLs button and the following dialog window will appear Total Commander 7 57a AEC Ltd el 2 clanes je es oo 53M 8 B a Gd Ges af E Configuration
20. 9 1 License Information The License Information tab displays information about the current license including its expiration date Buttons below are used to register the product using a simple wizard Register button and to display the list of installed license keys Keys button 134 TrustPort Keep IT Secure Shields License Information D Access Control H Antivirus Information about the licensee of this product is displayed on this page You can EI Secure Shredding register this product with the Register button El Encryption E Logs and Results E Network Utilities E Advanced Settings icense Evaluation i ee Friday May 25 2012 3 03 11 PM License Information Number of users 1 This is a TRIAL version Buy this software Show categories placed in the tree for easier orientation metteg Apply The standard trial version can be used for 30 days free of charge but if you want to use the software over this period you will have to purchase a full license registration Product Registration The Register button will begin the TrustPort Registration Wizard With the help of the Wizard you can register any TrustPort products in just a few simple steps Registration Wizard Welcome to the TrustPort Products TOTAL Registration Wizard This wizard helps you register TrustPort products To continue dick Next In the next window choose the method of registration If you have a license key choose the sec
21. Configuration TrustPort Total Protection 2013 El Firewall A A a dat ps Af Web Brows Add registry H Access Control For example copy the key name from any registry editor e g regedit nt E Antivirus HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Run and sit E Secure Shreddiy Click OK We support using the star convention and abbreviated descriptions like lee HELM SOFTWARE Microsoft Windows CurrentVersion Run More information can l Encryption be found in help kl Logs and Resul Network Utilities H Advanced Geint Registry path El About and Lice Category pa About Manual The tab Restricted locations displays a list of restricted system and locations and registry locations Process which will be in the Restricted applications list and will try to access location specified in this list the operation will then be restricted but the process itself will run anyways These applications will run in restricted mode It is like a type of sandbox security mechanism when the user is allowed to edit the location of that process during its running which would otherwise be rejected This list can be updated with new items using the items in the Action menu or records can be deleted from the list by choosing Remove from the Action menu Port Antivir Application Inspecto E Shields Real Time Protectio Email Protection E Firewall Sgwindir O exe Stair
22. E 35 Trust ort ken IT Secure 124 ee EE 36 7 5 EXECUTING FROM THE COMMAND LINE usscasceccneccanecnateenneeeeneeeet enna taeda teen en anna EEDA EEDA EEEES 37 8 INTERNET SCANNER scsi iii 39 SL MAL ANTIVIRUS rra PATEAR 39 Oe MAL ANSP Msi iaa 40 Su WES SCANNER sra sa ea 40 E PARENT O iio 40 9 USB ANTIVIRUS our 41 Ol USD ANTIVIRUS CREA EE 41 OZ USING USD ANTIVIRUS iia iii 43 10 ADVANCED CONFIGURATION MANAGER ccccssccscscescseesceesnseesnseesceeesceeeasensanens 44 LOL EE 45 Eh On ACCESS SCAN aaa 45 10 i General SOLOS rta sa 45 Olla e e e o A 46 Be SC E mail Proteccion conciso iodo 49 SO A RE 49 TO Mal ANUVIN S SOOO 6 eebe EE 51 KE Eege ON SCM EE 53 MOMS Fre Wa AAA iz NU o o A 55 TOdo Fer AGMA ir AO ANA ANA ANA AA R 58 Orio ll EUn Sel OF MUGS esmas ei oleo da alinea cal 58 101 3 Filter Ee tee 60 AA A 61 O Ee 66 10 14 WED Ee 67 10 1 5 Application Inspector ccc cece cnn nn 68 TrustPort Keep IT Secure LUZ ACCESS CONTROL aaa da E A 74 A MR Mos APP E o Em OO E EEE 75 IA o oe E 77 10 2 DEVICES EEN E y E araa 79 ha e E E ele ln BR Protection mesura nr E E RR eS 82 10 23 PassWord ee 83 LS Ee 83 RT Oe D ON DeManG SCAN WE 84 O29 2 EE ProteculO WVarmstassnsiana cdta 86 ROMS AC me so ne ne re ee ee ee 89 LOSE SONS PPP OO e 91 E e E ee e E 91 E ENEE 93 PO PPP eo 94 10 30 07 UBA aaa 94 1003 021 ONE UDI Eege E is 95 IOA EE erte 96 10 3 7 Advanced SettingS ccccccccccces seen eee e tree R
23. El E Antivirus E Secure Shredding E Encryption E Logs and Results E Network Utilities E Advanced Setting H About and Licens Show ask dialog Trust digitally signed applications About Manual The Protected locations tab displays a list of protected system and registry locations This list can be updated with new items using the items in the Action menu or records can be deleted from the list by choosing Remove from the Action menu 72 TrustPort Keep IT Secure TrustPort Total Protection 2013 SS Real Time Protection Email Protection 4ProgramFiles 86 Internet Explorer dl 6ProgramFiles 86 Internet Explorer exe Anini PDA Secure Shredding 2 Wboot ini E Encryption config sys E Logs and Results Network Utilities E as Advanced Settings fy a protected H About and Licenses tom settings It Show categories placed in the tree for easier Add registry Apply Remove Filesystem A list of all files and directories that are protected Use the Add filesystem button to add another protected location You can choose from already running application or from any file stored on disk By Right clicking you can duplicate the value and add it to restricted locations Example of a protected file location Classical c Program Files x86 Adobe Reader 9 0 Reader AcroRd32 exe Wildcard c Documents and Settings Administrator protects all files and subdirectories in the Adm
24. Get the information Try to be in the know as for new computer viruses It is good to monitor web pages of antivirus companies or virus paragraphs in the expert press You will find there answers to many questions as well as advices how to solve individual situations 8 Patch Patches applied on computer change the source codes and configuration of the parent software in order to solve the known problems These problems may be of various kinds collision with another software malfunction an undesirable property that can be used by hackers or viruses and so on All patches for the most frequent operating system are available at WINDOWSUPDATE MICROSOFT COM or through the Windows Update in the Start Menu 9 Backup your data 10 When appropriate contact experts The effects of most computer viruses can be removed by experts It requires some knowledge and tools Most of harm debited to computer viruses are caused by something different by non professional attempts to deal with them 2 4 Which extensions are un safe Probably each of us knows or at least guesses what is the use of extensions EXE ZIP DOC JPG etc There are more extensions in the computer on the following lines you can meet at least the basic ones that are important for the computer security and antivirus protection 18 TrustPort Keep IT Secure Operating system DOS Extension APP BIN BO COM COM DEV DRV EXE EXE EXE
25. How can I change an archive s password Current version of TrustPort Archive Encryption does not support password changing on CAR and CPH files If you need change the password then you have to extract the data from the archive and create a new archive with a new password You will have to do the same with CPH files e I have some archives made by previous version of TPE 1 0 Can I use them in this new version of TrustPort Archive Encryption How is it with backward data compatibility New versions of TPE are backward compatible It means that all archives and CPH files created by previous versions of TPE can be read by the new version Format version of CAR and CPH files was improved in TPE 1 1 But TrustPort Archive Encryption 2 5 uses exactly the same format version of CAR and CPH If you are using TrustPort Encryption version 1 0 please upgrade it to the latest version which has many improvements e What is the difference between CAR and CPH files CAR and CPH are two data formats supported by TrustPort Archive Encryption The first one is a format for PCs and the latter for mobile devices using TrustPort Mobile Encryption software that is designed for Pocket PC and EPOC systems Each of them is destinated for different method of files security CAR archives are similar to other well known formats as ZIP RAR ARC and so on but data in CAR archives is always encrypted using strong encryption algorithms and none is able to gain access to the
26. It is perhaps a strange category among the other malicious codes but it belongs here Most of the funny programs behave in a way that they are impossible to quit correctly and hard restart is unavoidable It may cause fairly serious problems to machines that should run non stop That is why antivirus programs are often set to detect these undesirable codes Therefore viruses and other malicious programs are detected by antivirus programs When operating computers the following problems can be met frequently e Programming errors In spite of the fact that programmers do their best to test and check their work sometimes an error or omission occurs The more complicated and complex software the higher probability of an error of course That is why sometimes a computer program disobeys its owner without any obvious reason It can be due to a virus but not necessarily e Software or hardware collision Yes it is like that Even computer programs compete with each other for the free system resources or battle against the lack of capacity for example free disk space Apart from the fact that the most hardware despite the one hundred percent compatibility declared is much less compatible These breakdowns are often adjudicated to the effects of malicious codes according to the motto the reason is unknown there must be some virus behind it e Hardware failures Another very often defect that we can come across in the world of informatio
27. Licenses About Manual CC TrustPort DiskProtection mages limage00 1 tdi tester 2 0 Show categories placed in the tree for easier orientation pr Apply The user account is a normal user account which has read write access to the mounted image so he can also copy and delete files in the image Read only user account is a restricted account which allows only read only access to the image Administrator account has the same access rights as a user account but in addition it can make administration operations in the image Adding a new user is one of the administration operations which needs such administration privileges There is possible to create generally 20 accounts in each image and the type of account is not important A It is important to choose a strong password It is possible to leave password fields blank d but we strongly recommend using strong passwords Be careful to remember passwords because neither manufacturer can decrypt images and get your data without login and password knowledge i This operation is available only when the opened image is not mounted If it is mounted it is D necessary to unmount it first and then repeat the operation ka 10 5 1 4 3 Modify a User Account EI Using this function you can change the user account type Only accounts with administration privileges can use this function TrustPort Keep IT Secure Led E H Shields E Access Control E Antivirus H Secure Sh
28. Malware Malicious software It is a complex denotation of any undesirable programs that are installed on the computer without user s knowledge and behave in an unwanted way e On access Processing mainly scanning for viruses in the act of doing something with file region etc e On demand Processing mainly scanning for viruses defined group of files programs etc usually whole disks or directories e Patch A process on which computer software errors are corrected e Resident antivirus program An antivirus program permanently running in the computer memory where checks files real time e Social engineering An attack method whose object is to gain data and information from the weakest security point which is usually human Uses mostly deceits or cheats e Spyware Spy Software Software installed on a computer that monitors running tasks all or only some of them entering passwords executed programs written e mails etc e Stealth Computer virus s ability to become invisible for antivirus programs e Trojan horse Any computer program that does what the user expects but besides does something that the user does not know at all and that would probably disagree with e Virus A part of a program code that is able to replicate repeatedly using a host application Ina clear and simple language virus is a computer program that spreads without being noticed by the person sitting at the computer e ZOO viruses Viruse
29. Results H Network Utilities SB Advanced Settings Configuration Maintenance g About and Licenses Advanced Settings E i ei TrustPort Total Protection Advanced Settings t unifies the set of enhanced and advanced common settings of this software Some of these settings are recommended only for experienced users Language t enables language selection which will be used by this application Proxy Proxy settings are used for informing applications about access to the Internet and if they are accesible only by the intermediary server This settings is mainly used in corporate networks Configuration Maintenance On this page you can import new or export the current configuration which can also be used on other computers You can also restore the default configuration asier orientation 129 TrustPort Keep IT Secure e ae 10 8 1 Language configuration On this page you can set the language version The default language that is selected is the one you chose at the beginning of the installation Language i Shields Language H Access Control H Antivirus H Secure Shredding i Encryption i Logs and Results H Network Utilities Advanced Settings i Use language This page serves for switching language of all software included in TrustPort You can choose from several available languages below The change is neccessary to confirm by Apply or OK button Configuratio
30. Your user account has only read only permission and therefore you can only read data from the mounted disk To be able to write data to the mounted disk you need a standard user or administrator privileges e I can t write any data to a mounted image though I have created this image and therefore I have administrator s privilege What s happened This can be caused by three different reasons Are you sure that you have write access to the place where the image is located Are you sure that your account has administrator privileges right now Another administrator could change your account to read only for instance Check the license it may have expired If the license expires then Disk Protection allows only read only mounting e Iforget my administration password What can I do If there is another account with administrator privileges in the image then you can ask this user to set your password But if you are the only administrator then it is a serious problem You have to remember your password because neither manufacturer can help you to get any data from the image e I have changed the last administrator account to read only user account But I need to do some administration operation What can I do If you delete or change the last administrator account then the image becomes uneditable It means that nobody is able to create a new user account delete account change account type change limit etc There is only one chance to crea
31. a window where you can select the file you want to read the comment from lt lt 14 3 9 Archived file folder properties Kc If you select a file or folder and click on the File menu and choose File properties or right click ona file or folder and select Properties on the context menu you will see some important information about the file or folder like type of file location size packed size the CRC etc Properties a TrustPort Archive Encryption Archived File Properties Type of file Application 75 441 kB 77 252 072 bytes 75 379 kB 77 188 416 bytes Tuesday May 29 2012 1 22 48 PM Monday April 23 2012 12 47 21 PM Tuesday May 29 2012 Tuesday May 29 2012 1 33 14 PM DFS6CF79 Archived Read only E Hidden 0 Fl System About Manual 14 3 10 Files and folders selection MH You can select some files and folders in different ways using CAR Manager through the options on the Edit menu or in the context menu displayed by right clicking on any folder or file These options allow the user to Select all Unselect all Invert selection Select group by the extension Unselect group unmark by extension 154 TrustPort Keep IT Secure D CAR Manager CA Testinglinstall car File Edit View Options Help snie IK Expand selection Specify file type bd About Manual This window will remember the file extensions you used to group even after closing and re opening CAR Manager o
32. all outgoing and incoming connections Firewall will not block any connections and the computer will behave as if no firewall is installed there This option is very dangerous and you should not select this option if you are not sure what you are doing or if it is not necessary for you e Enable outgoing connections This option enables all outgoing connections and firewall rules are used only for incoming communication This mode is relatively safe but it cannot protect the computer against Trojan horse or software that sends information to the Internet and that is why it is necessary to be careful with the software you use and what e mail attachment you open e Use firewall rules When there is mode Use firewall rules the firewall starts to filter all incoming and outgoing connections according to the set rules The rules can be set on pages Manage Rule Sets and Manage Firewall Rules This option is safe but it depends how the filter rules are set If the filter settings are wrong it is possible that the computer behaves as if no firewall is installed and you should be very careful e Deny all connections Option Deny all connections prohibits all incoming and outgoing connections Firewall will block all connections and the computer will behave as if it is not connected to the computer network This option is very safe but the practical utility is only if you do not want from some reason any network connectivity The button Advanced serv
33. archive the encryption algorithm used total number of files stored in the archive total and packed size of these files etc CAR archive properties TrustPort Archive Encryption CAR Encrypted Archive Version 13 0 0 5047 Archive format 1 1 Total files 3 Total length 236 322 Bytes Packed length 231416 Bytes Ratio 98 EXE module size O Bytes Comment Public information TrustPort Archive Encryption 2 5 uses 1 1 archive s format version You can work with previous format versions and as soon as you open or modify those archives the format version will be upgraded to 1 1 lt lt 14 3 8 Add or edit archive file comment A Comment is public information and therefore it is not protected It means that anyone can read this comment without needing a password The maximum number of alphanumeric characters in a comment is 63999 If you want to add or edit an archive file comment then press F4 key use Edit comment menu item or toolbar button 153 TrustPort Keep IT Secure Comment Public information Comment is public information and therefore itis not protected a It means that anyone can read this comment without needing a password The maximum number of alphanumeric characters in a comment is 63999 About Manual There is the possibility of loading a file s comment If you want to do it click on the small folder icon on the upper right corner of this dialog window TPE will open
34. are called to paralyze other viruses It is not a difficult task to create a retrovirus Of course authors of viruses can get to any antivirus on the market The only thing that they have to do is to study the software they want to defeat find some weak point in it and think of how to abuse it For example a retrovirus finds a data file in which an antivirus program stores signatures of viruses and deletes it In that way it decreases the ability of the antivirus software to detect viruses More sophisticated retroviruses can find integrity information database and delete it The removal of the database has the same consequences for the controller as the removal of data files for the antivirus software Other retroviruses detect the activation of an antivirus program and then they hide from it or stop it eventually start a destructive routine before discovery Some retroviruses change the computation environment so that it affects operations of the antivirus program Others use specific weak points and loopholes of individual antivirus programs to weaken or break their activity e Tunneling viruses A tunneling virus searches for the original interrupt vectors in DOS and BIOS and calls them directly and thereby avoids any eventual monitoring program in system that could detect any attempts to call these interrupt vectors Such tunneling methods are sometimes used by viruses enemies too some antivirus programs use them to avoid any unknown o
35. be used for general files Report options Generate report E Overwrite report file E Ask for report file name before wiping Use this report file name C Program Files x86 TrustPort DataShredder Report Report rpt Show categories placed in the tree for easier orientation Apply Description of available methods Quick method Russian GOST P50739 95 TrustPort U S DoD 5220 22 M E U S DoD 5220 22 M E C and E Bruce Schneier German VSITR Peter Gutmann Quick method is a very quick for file shredding This method is not very safe because the data are overwritten only once The pattern for overwriting works with the random numbers Method suitable for shredding of files containing common information it uses Russian standard GOST Method developed by TrustPort company it is set as default Method based on U S Department of Defense standard With the number of three passes it is suitable rather for files not containing sensitive information This method overwrites data on magnetic media seven times It is based on NSA document specified by number DoD 5220 22 M The method has the medium rapidity and it is sufficiently safe Algorithm using the method of shredding with random data with the overall number of seven passes Method suitable for shredding sensitive data it is based on German standard VSITR Method Peter Gutmann is very safe but very slow as well it is the slowest of all available
36. by the run parameters Priority the scanning priority to the other processes Additional parameters you can edit this if the user defined parameters or user defined target is selected If you want to learn more about the parameters go to the Command line parameters e Comments user can type details about the task Planned tasks are launched automatically according to the set time and parameters e Start date and time when the task is started for the first time Default start time is the time of the new task creation e End date and time if the Unlimited option is enabled default setting the scanning is not interrupted Otherwise the running task is stopped at that time automatically e Run parameters defines the time period of the task launching Once a day is the default setting 92 TrustPort Keep IT Secure fe TrustPort Antivirus Scheduler Please enter required time attributes Start date and time End date and time Date 5 18 2012 Ely Unlimited Time 11 33 49 AM Date 12 31 1969 Time 4 00 00 PM Manual Show categories placed in the tree for easier orientation 10 3 4 2 Task Properties You can change the task setting by double click on a proper line on the task list or by the Properties button ei TrustPort Antivirus Scheduler ell Scan local disks Silent scanner scan all local disks Normal priority adl b Manual Show categories p
37. copy not the original The fight with slow viruses is a difficult task An integrity controller should detect a new file and alert the user to it because there is no control sum for this file available The integrity controller is an antivirus application that monitors contents of disk devices size of all files and control sums It alerts the user to any case of inconsistence However the user probably finds nothing suspicious in error sums because he himself ordered the instruction to create a new file Most often quite logically orders to compute a new sum for the new infected file e Sparse infectors This term is used for viruses that infect their victims only occasionally or on completing some condition of little likelihood Thus they infect only sparsely which gives them their name This behavior minimizes the risk of getting caught by a user e ZOO viruses This term denotes viruses that do not spread in the real world at all They exist antivirus programs are able to detect them but there is no chance to meet them They were created for study purposes or the number of their errors makes them non vital Some of them might be 17 wm een Kr _ TrustPort created by programmers in order not to spread or by programmers who wanted to gain the primacy in some field first virus for Windows 2000 and so on at any price malfunction Sometimes it is contrasted with so called In the wild viruses malicious codes that can be
38. create the set for All addresses with the most general settings and the biggest restrictions When we click the button OK the entered values are verified and stored If we edit the set of rules then its modification is processed and after pressing the button Apply or OK the core of the personal firewall is set to these new values in the window of the TrustPort Personal Firewall During import of the set of rules the dialog window is pre filled by the values from the imported file and you have possibilities to adjust the values further When you press Apply or OK in the main configuration window TrustPort Personal Firewall the firewall is set for the new values and the imported set of rules is stored 59 l a TrustPort 10 1 3 2 Filter Definitions P Page Filter Definitions serves for creation deletion and edition of rules for TrustPort Personal Firewall The firewall behaviour is influenced by rules During the attempt for incoming or outgoing connection the firewall starts to go via all accessible rules in certain set and it starts to look for a rule that can be applied for the given connection If it finds such a rule then the connection is either permitted or denied according the found rule configuration If it does not find any corresponding rule for the given connection the default action configured for the firewall is done It is set by default that the connections that do not satisfy any rules are denied This function
39. everything OK 1600 Infected suspected object has been repaired disinfected 1601 Infected suspected object has been renamed 1602 Infected suspected object has been moved to the quarantine 1603 Infected suspected object has been deleted 1606 Computer requires a reboot to clean the infection 1610 Archive is password protected so it couldn t be scanned 1611 Unsupported compression format 1612 Illegal structures in the scanned file 1613 Error parsing compressed file 36 a TrustPort Keep IT Secure 1614 CRC checks do not match Viruses 1602 AV engine has found a virus some object is infected 1603 AV engine reports that the scanned object is suspected Other errors 1610 No AV engine found gt av cannot work 1611 AV engine initialization has failed 1612 AV engine integrity error 1613 AV configuration error 1614 AVMGMA communication error OR service is stopped 1615 Antivirus Self check failed Cleaning errors 1620 Infected suspected object couldn t be deleted 1621 Infected suspected object couldn t be renamed 1622 Infected suspected object couldn t be moved to the quarantine 1623 Infected suspected object couldn t be repaired disinfected 7 5 Executing from the command line The antivirus software can be configured with parameters You can execute the AVC EXE or AVCC EXE file from the command line with parameters If you execute the AVCC EXE without any parameter available parameters will be displayed
40. from the installation folder TrustPort DiskProtection bin tdcheck exe switch to advanced mode open the image and use the Format image option in File menu I create a new image unselect Mount at start up option but in spite of this Disk Protection mounts the new image I am confused The new image is always mounted If you want different behaviour you have to change Create Wizard starting parameters manually To do this you need some knowledge of XML files Locate tpdptray htm file in the installation folder s Shortcuts DiskProtection subfolder and find the TPT_ITEM element with id 3099 There you can modify the creating parameters The Mount at startup means that the image will be automatically mounted when you logon to Windows next time I use Windows XP and I cannot mount an image even if I have a lot of available letters Why 179 TrustPort Keep IT Secure You may have used switching users in Windows XP and there are more users logged in at the same time and have their own mounted images e Although I have typed right username and password the Disk Protection informs me that the image is already mounted I am confused I use Windows XP There is another user logged in and this user has already mounted the image file that you try to mount e I have mounted an image using Mount Wizard and even if I see that the image is mounted as read write I m not able to write to this image Why This is a user rights problem
41. full and you need some more space to store your data In this case it is possible to increase this image until this limit The size of reserve depends on size of the image and file system used in this image From 5 MB to 8 MB inclusive FAT12 10 of disk size 1 MB From 8 MB to 256 MB inclusive FAT16 10 of disk size 4 MB Over 256 MB FAT32 10 of disk size 20 MB If you create a virtual disk with 512 MB of size then it will use FAT32 file system and you will be able to increase the limit until 512 MB 51 MB 20 MB what is 583 MB This number is called the maximum limit and cannot be exceeded 115 TrustPort Keep IT Secure E Network Utilities E Advanced Settings E About and Licenses About Manual Show categories placed in the tree for easier orientation If you still need more space you have to create new image file and copy all data to it It is of course possible to increase the limit gradually according to increasing requirements to disk space it is not necessary to immediately set the maximum size Minimum step of increasing limit is 1 MB Values of both limits can be displayed in Image Properties This function is available for authenticated account with administrator privileges This function is available when this image file is not currently mounted If is then is necessary to unmount it first and try it again lt lt 10 5 1 4 10 Change View E Image editor can be switched to few
42. help of the function Permit unknown connections you can change the default functionality in a way that all the attempts for connection that do not satisfy any rule will not be blocked but permitted This option totally turns around the logic of the whole firewall and this has an impact on the logic of all settings status Use this option only in case that you know exactly what you are doing and when you need to change this logic The option Deny unknown connections sets back the default behaviour of the firewall When you set the option Permit unknown connections you will be alerted so as you are careful not to choose the unwanted firewall setting Deny unknown connections but ask though firewall has all unknown connections denied if application tries to connect to the network it asks if new rule should be created for this application in filter definitions lt lt 57 TrustPort Keep IT Secure 10 1 3 1 Filter Administration P Page Filter Administration serves for creation deletion import and export of rule sets It is possible to create any number of rule sets but always only one set for each IP address All rule sets are displayed in a transparent list This list also displays the legend and the IP address for which the given rule is active TrustPort Personal Firewall Filter Administration A TrustPort Total Protection E Shields Filter Administration po Real Time Protection Rule set name For address Desc
43. i Logs and Results H Network Utilities H Advanced Settings d About and Licenses User Name tester Old Password New Password Confim New Password oe About Manual Cu WrustPort DiskProtection mages limage00 1 tdi tester A CO Show categories placed in the tree for easier orientation Apply 4 It is important to choose a strong password It is possible to leave password fields blank d but we strongly recommend using strong passwords Be careful to remember passwords because neither manufacturer can decrypt images and get your data without login and password knowledge lt lt 10 5 1 4 7 Set Password for a user account KE Setting password is an administration operation and can be used for setting the password for any user account The administration rights are necessary for this operation It is also possible to change password for other administration accounts This functionality is available only when the opened image is not currently being mounted L It is important to choose a strong password It is possible to leave password fields blank but we strongly recommend using combination of small and capital letters and numbers of minimum length of 8 characters as a password lt lt 10 5 1 4 8 Mount Unmount opened image An opened image file can be mounted without necessity to enter your credentials again Editor remembers the credentials entered during opening of image and uses them also for mounti
44. in five chapters You should know the information for proper using of your antivirus program and you should extract the basic set of pieces of information to understand better how this antivirus software works what is and what is not dangerous to change in its settings and why 11 _ TrustPort What is a computer virus and what is not Computer viruses classification Ten commandments of antivirus protection Which extensions are un safe Antivirus protection glossary 2 1 What is a computer virus and what is not Computers are threatened not only by viruses but also by other malicious codes Antivirus programs detect most of them But there often appear different phenomena in computers that cannot be classified as malicious codes malware malicious malign software e Computer virus It is a piece of a program code that is able to make copies of itself through the host application more than once In a plain language Virus is a computer program that spreads without letting know the user sitting at the computer It has no other property It does not need to do harm it does not need to call anybody s attention to itself which are examples of extra symptoms that their authors add for various reasons Trojan horse It is in fact any computer program which on one hand does what the user is expecting it to do but on the other hand does something that the user has no notion of and that she or he probably would not agree with Let us give you
45. is also indicated by text Active or Stopped We strongly recommend having the On Access scanner activated 45 TrustPort TrustPort Antivirus On Access Scanner rt Total Protection guration Manager ae On Access Scanner fe Real Time Protection Email Protection EA Firewall iWeb Browsing Protection Real time virus protection Active Application Inspector E Show splash screen while starting E Access Control H Antivirus Options scan selected extensions Requested action Ask user Excluded GL Secure Shredding extensions enabled Excluded objects disabled Heuristics disabled H Encryption E Logs and Results Scanning statistics E Network Utilities ER Advanced Settings Scanned H About and Licenses Infected Repaired Renamed Quarantined Deleted show categories placed in the tree for easier orientation Any change of the On Access Scanner status is indicated by the icon change on the Windows status bar You can enable disable displaying of the splash screen see below during starting of On Access Scanner by the Show splash screen while starting option TrustPort TOTAL When the On Access scanner is enabled then every file is scanned at the time when it is being read from the hard disk and when it is being written to the hard disk In other words in the first case every file is scanned before processing and before it can cause any problems if infected In the second case every file is scanned every time i
46. letters is limited to 26 A Z If there is no letter available for mounting the image the mounting process will fail and a warning message will be displayed The image that is going to be mounted mustn t be compressed or encrypted by the NTFS file system If Disk Protection detects that the mounting image is compressed then decompresses it automatically TrustPort Disk Protection Uncompressing ation is being compressing operation cessed please wat If the image file is encrypted by the EFS then Disk Protection displays a warning message and mounting procedure is cancelled In this case you have to decrypt it manually 16 8 Quick mount Mi This application affords you to mount an image very quickly and easily It expects that you have already created an image file see Create a new Disk Protection image wizard Quick mount can be launched from the system context menu after right clicking the image file and selecting the Mount option from the Disk Protection Quick Launch or by parameters of command line Mount Image allows you to mount an image from various places on your harddrive CD ROM USB flashdisk network etc 177 Keep IT Secure L ml keng TrustPort Keep IT Secure Please type your user name and password into the following fields UserName admin Password Click OK to authenticate and mount the image About Manual You have to enter the username and password confirm
47. menu e Can I securely shred the whole harddisk where I have current operating system Yes it is possible but this software uses Windows devices to work and this it is not a safe situation this software does not guarantee that the harddisk will be shredded all right For this purpose TrustPort a s offers program TrustPort DiscShredder which shreds securely your harddisk e How can I get to the latest version of TrustPort DataShredder Visit our website lt lt 16 Disk Protection 16 1 Product overview MA TrustPort Disk Protection enables to create a new virtual disk on your computer The work with a virtual disk is the same as work with any other logical drive All data stored in this virtual disk are transparently encrypted and during reading or copying from this drive are automatically decrypted Transparent encryption works automatically without user s assistance When operating system crashes or a power failure occurs then no data are avoided All the data are continuously encrypted on the image Transparent encryption of the data Easy to use you have to create an image file only and plug it in Strong hard disk encryption to protect your data You can store an image file anywhere on your hard drive on the network or in any removable media Images located on the network can be shared between more users But only the user who mounts the image as first can decide if the image will be mounted as read and write or re
48. menu you can choose among others to view the file properties or View file To enable this function you have to have the file viewer predefined see Settings configuration Add Remove SFX allows user to simply add or remove the EXE extension on any file without the need of decrypting it as in previous versions lt lt 14 3 1 Create new archive Encrypt archive BW For creating a new archive you have to click on Create new archive toolbar button or select the Same menu item from the File menu or press CTRL N key combination Following window will be displayed Select files folders to Add Ea CiTestinglarch0 DACH Documents and Si O Perflogs o H ProgramData DE System Volume In Qt E Testing SE oO Ode B pic d Ml In the left pane is the directory s tree with disks and folders and in the right pane is the content of the selected disk or folder You can browse your drives and network neighborhood and select a folder or drive that you want to include into the new archive When done press ENTER or click the OK button TPE will ask you to type the new archive file s name and password and you can choose some additional archive creation options see Archive creation options 150 TrustPort Keep IT Secure Encrypt Archive pal TrustPort Archive Encryption Encrypting archive TrustPort Archive Encryption Archive CA Testingarch_test car Move to archive Password eee Create EXE archive SS _ P
49. met with some bad luck 2 3 Ten commandments of an antivirus protection 1 Use antivirus software It is the cornerstone of the whole information security 2 Be careful using e mail Antivirus software is the cornerstone one of the other recommendations is not to use an e mail preview because some codes are able to activate without clicking on the attachment Just opening the message and viewing this preview makes it easier to them User has no possibility to remove the suspicious e mail without infecting the computer Moreover it is convenient not to send e mails in HTML because a dangerous code can be inserted in it on reply Be careful with any e mail attachments It holds especially for various congratulations or funny programs 3 Beware of illegal programs Producers police the il legality of their software on computers and do not enable fundamental functions for the security for example patching to irregularly gained programs 4 Think over the web pages you want to visit Many web pages contain malicious codes that are able to install themselves on the computer and cause many problems there Try to avoid Suspicious pages where this or similar infection threats erotics illegally distributed games software and music serial numbers cracks warez hackers etc 5 Use a personal firewall If you are connected to the Internet the use of a personal firewall is necessary It is a computer program checking all the data flowing from o
50. mostly exception Into editing field Host name or IP address is entered a host name for example www trustport com or IP address that has the following form X X X X If the field is not filled in then it is not possible to start the tool WhoIs Host address must be in the following form domain xy for example trustport com so it means only domains of the first and second level all the other levels will be automatically trimmed and they will not be used during searching 128 TrustPort Keep IT Secure TrustPort Personal Firewall Network Utilities Whols E Shields E Access Control E Antivirus E Secure Shredding E Encryption E Logs and Results E Network Utilities Network Statistics Traffic Watcher E Advanced Settings H About and Licenses Note If there is not allowed the outgoing TCP connection on port 43 in TrustPort Personal Firewall asier orientation e i D TrustPort Total Protection WhoIs Host name or IP address 195 133 85 15 Tal seh configuration the tool Whols will not function If you want to use this service create firewall rule that enables you to use outgoing TCP connection on port 43 10 8 Advanced Settings Advanced settings include tabs for language selection the import or export of configurations setting of proxy servers and restoring default configuration F Shields H Access Control H Antivirus i Secure Shredding i Encryption H Logs and
51. on the Edit button you can change a desired protocol or number of a port By clicking on the Delete button you will delete a selected item Secure Shredding i Encryption H Logs and Results H Network Utilities H Advanced Settings t About and Licenses TrustPort Antivirus Internet Protection About Manual About Manual Show categories placed in the tree for easier orientation HTTP scan size limit It is made for setting up the maximum size of files which will be scanned by the antivirus program Maximal possible size of scanned file is 262144kB i e 256MB It accelerates a work with browser along operating with video music viewing pictures etc F Shields EI Access Control ial Antivirus i Encryption t Logs and Results H Network Utilities H Advanced Settings H About and Licenses TrustPort Antivirus Internet Protection Port list settings Mail Port List settings Web Port Lists settings Http scan size limit Don t scan large http i large http files 256 kilobytes kB Options Scan compressed files Enable heuristic analysis About Manual Show categories placed in the tree for easier orientation 88 TrustPort Keep IT Secure Scanning options e Scan compressed files zip arj cab archive files i e their contents are scanned searched for malicious codes This option slows the scanning down but on the other hand increases the compute
52. opening an image file for the first time then installation folder location is used You can also choose an image file from the list of recently opened images It is not important if the opening image is currently mounted But opening functionality is disabled when you have already opened an image file If you want to open another one then you have to close it before Open image C Program Files x86 TrustPort DiskProtection TrustPort Disk Protection Please type your user name and password into the following fields User Name tester Password Click OK to authenticate and open the image About Manual After the authentication data are verified Image Editor opens selected image displays all user accounts and displays name of the authenticated account in the status bar From this moment you can modify the opened image within your user permissions If you have administrator rights to the image you can access all functions lt lt 10 5 1 4 2 New User Account E Adding user function serves to adding new user accounts to the image There are three types of user accounts which you can add user read only user and administrator 110 TrustPort Keep IT Secure e ae H Shields E Access Control H Secure Shredding e Encryption Please type a user name password and password confirmation into the following fields User Name user H Network Utilities t Advanced Settings Password t About and
53. order mount and unmount them run editation tool for editing images and display image file properties You can select a mounting point to the selected image will be mounted on Automatic selection of mounting point is also available 105 TrustPort Disk Protection Mount Manager PP TrustPort Total Protection 31131 ot bok l Shields Mount Manager Access Control i Antivirus Auto mount H Secure Shredding E Encryption Dives Name Image path image000 C Program Files x86 TrustPort DiskPr wt image001 C Program Files 86 TrustPort DiskPr e Timage002 C Program Files 86 TrustPort DiskPr E Network Utilities E Advanced Settings El About and Licenses Mount point Automatic Status Unmounted Encryption algorithm AES Rijndael File system FATI6 Current limit size 10 MB Maximum limit size 15 MB ET Show categories placed in the tree for easier orientation Use up arrow or down arrow to move the selected image in the auto mounts list up or down respectively Select an image and click Remove button to remove this image from the auto mounts list The affected image will be removed from the list only not physically deleted Clicking Add button you can add a new image to the auto mounts list Disk Protection opens browsing dialog window and you can type or select an image file The Edit option allows you to edit the selected image When you click it Disk Protection opens the Image Editor a
54. program still had a chance to identify and clean the virus due to the constant signature of the decoding routine Recognizing a polymorphic virus is much more complicated because it generates a brand new decoding routine at every infection so its signature is changing with every virus installation A polymorphic virus generally changes its signature using a simple machine code generator so called mutator Mutation Engine A mutator changes the signature with the help of random numbers generator and a simple mathematic algorithm Using a mutator every virus can be changed into a polymorphic one A simple modification of the source code in assembler is enough to make the virus calling a mutator before copying itself Even though basic scanning methods for example code strings comparison cannot reveal 16 d e gl L polymorphic viruses specially constructed lookup machines modified for encoding schemas identification are able to find them Polymorphic viruses are not undefeatable but they have made scanning programs a hard and expensive task The majority of antivirus programs contain searching for encoding mechanism because of protection from polymorphic viruses e Retroviruses Retrovirus is a computer virus that tries to evade a capture or protects itself from antivirus programs operations by attacking antivirus software Experts sometimes call retroviruses anti antiviruses do not confuse anti antiviruses with antivirus viruses that
55. serves for the host name such as for example www trustport com or IP address that has form X X X X If this field is not filled in then it is not possible to startup the tool Ping The switching element Number of retries and Infinite ping serve for determination how many Ping requirements there should be sent to the host computer Option Infinite ping ensures that the sending of Ping requirements will be going on till the user presses the Cancel button Option Number of attempts enables to determine how many Ping requirements should be sent to the host computer Startup of sending Ping requirements is done by button Start and finish of sending Ping requirements can be done any time by button Cancel 127 TrustPort D TrustPort Personal Firewall Network Utilities Ping FP TrustPort Total Protection Access Control E Antivirus E Secure Shredding E Encryption E Logs and Results E Network Utilities Infinite ping Es eN Result Traffic Watcher Yyhols E Advanced Settings E About and Licenses Host name or IP address computer name IP Number of attempts 4 Show categories placed in the tree for easier orientation Apply If the answer to the sent requirement is received there is displayed information that contains the following who was the answer received from what is the size of the received ICMP packet and what time passed between the requirement and the answer If the answer was not delive
56. that the virus code is loaded into the memory Invisible viruses are usually capable to mask the file size or its contents on reading Viruses masking size belong to the group of viruses attacking files The virus appends to the target program and replicates by which the file size increases But the virus masks the file size so the user normally does not notice its activity It is quite easy to reveal an invisible virus The most of standard antivirus programs detects invisible viruses providing that the antivirus system is executed on healthy system without active virus If you do boot system from clean safe system disk with overwrite protection before scanning invisible viruses should be detected As we mentioned above invisible viruses can hide only if they are resident and active in the memory e Polymorphic viruses A polymorphic virus encodes its body in order to hide its signature from an antivirus program Polymorphic or other encoded viruses spread by decoding the encoded part using a special decoding routine it converts the encoded file into the original one The decoding routine takes control over the computer for a while to decode the virus body Afterwards it passes control to the extracted virus that can start its activity First encoded viruses ever were not polymorphic In other words they used decoding routines which did not vary from infection to another one Although the virus itself was encoded and hidden the antivirus
57. this client will be installed List of supported clients and their versions Outlook Express version 6 Windows Mail version 6 Thunderbird version 3 1 x to 15 0 Microsoft Outlook version 2000 2007 2010 32bit 64bit The Bat version 5 0 If the default e mail client is later changed and it was not selected on this page during installation then it is possible to easily register TrustPort Antivirus to this client directly in the user interface The process will be similar in case of integrating TrustPort Antivirus into additionally installed e mail client if it wasn t selected during installation on this page Registration using activation code licence key Product registration can be done in the last step of the installation The process is analogous to registration through user interface Setup TrustPort Total Protection Select a method to register Select a method to register your product Selection of registration method Activation code registration Enter a valid activation code 5 License key registration Enter path and filename of license key File Path to the license key Trial version TrustPort 4 5 Product home page 25 TrustPort Keep IT Secure The standard uninstallation process can be modified by the use of switch SILENT as well It requires executing the file unins000 exe located in the program installation directory with the SILENT
58. to configuration of Access Control items i e Parental Lock Devices Volumes and Directories and Settings The password is entered twice for verification it has to be confirmed with the Create password button TrustPort Antivirus Access Control Settings F Shields General settings Cl Access Control o ip tal Lock ir Password settings Create Change password If you need to change the password please enter a new one in the field dispalyed below and then click on the Create button Password tae r Logs and Results Confirm password i Network Utilities H About and Licenses Passwords are same Delete password If you need to delete the password click the Delete button The configuration will not be protected until you have entered a new password Delete password Show categories placed in the tree for easier orientation Modification of password has to be confirmed with the Change password button A current password can be deleted easily by clicking on the Delete password button 10 3 Antivirus This category enables the configuration of other antivirus options such as on demand protection settings scheduled scanning of files and directories quarantine settings scanning engine configurations and update services 83 TrustPort Keep IT Secure Shields Antivirus D Access Control A complex solution for effective antivirus protection of your SB Antivirus personal compute
59. to the main memory on every startup therefore it is enough if the virus or its activating mechanism jump to executable code is stored in this sector and the virus will be loaded to main memory with every bootup Mentioned viruses usually rewrite the boot sector with their own code and the original part of the boot sector save on different part of disk The infection then spreads using floppy disk boot sectors that got in touch with the infected system and that the resident boot virus replicates into immediately The DOS operating system was an optimum host for them regarding little possibilities to control it above all due to frequent usage of the simplest commands such as read and write from to disk floppy disk copying searching directories etc The spread of boot sector viruses in 32bit systems is much more difficult than in DOS because a boot sector virus is detected right away on the system boot e File viruses We should subdivide file viruses according to the target of infection they are typically executable files because the virus s aim is to activate virus through executing host code and therefore the possibility of its spread The most frequent file extensions are com exe ovl bin 14 L sys bat obj prg mnu etc In all cases the file viruses act in a similar way They most often rewrite the beginning of a file where they either write the jump command referring to themselves to the so called virus body or store thems
60. tools such as ping or traceroute with intuitive interface can be used 13 2 Shortcut keys B Filter Administration Ctrl Del Deletion of the marked set of rules B Filter Definitions sort ney emm et Baton oF arid rile rom the ist P Log Viewer Ctrl Del Deletion of all logs 142 TrustPort Keep IT Secure Ctrl R Reloading of the log list Alt R Reloading of the log list Shift R Reloading of the log list 13 3 Application Settings E This dialog will appear only in case unknown application is trying to communicate through TCP IP network Also option Deny unknown connections but ask default setting has to be specified in Advanced Firewall settings to make this work After checking the option Allow this application Firewall creates permanent rule in the filter definitions which can be further edited and will not ask about the application again The option Block this application creates rule which after it is applied bans all incoming and outgoing connections The last option Create custom permanent rule enables to define your own rule The checkbox Remember choice defines whether permanent rule will be created in filter definitions or if the dialog window is displayed again when the application is launched lt TrustPort Total Protection 2013 Select a firewall action PA SRWare Iron is trying to make a connection L Direction Outgoing A4 Protocol TCP L L
61. will be exported information about the set name allocated IP address and all the rules in the set 10 1 3 1 1 Editing set of rules This dialog window serves for editing and importing sets of rules The name of the new set of rules will be automatically preset and the IP address for which this new set is destined is preset to All addresses The name of the set and IP address are obligatory items and it is necessary to insert the right values It is not obligatory to insert items Created by and Description but we recommend fill them in 58 _ TrustPort Create a New Rule Set Create New Rule Set Specify rule set properties Enter a unique name description author s name and host IP address e set for TrustPort Perse Rule set name New rule set ea Access Control ean H Antivirus H Secure Shredding Created by El Encryption 4 Logs and Results E Network Utilities cal cis New rule set will be defined for About and Licenses Host address Subnet mask Show categories placed in the tree for easier orientatio IP address that is tied up with the set of rules can be inserted in several forms e All addresses set of rules will be applied for all IP addresses in the computer Option all addresses has the smallest priority during firewall processing e IP address set of rules will be applied only for the specified IP address Option IP address has the highest priority during firewall processing e Range of
62. 17 2 DESCRIPTION OF ERROR TYPES AND REPAIRING wacscscscccscntecneenntenntneneeeseeesenenennenanennnenanes 181 LA SIMPLE MODE ee 184 17 3 1 Check an image in simple mode 185 17 3 2 Errors and their repairing in simple mode 186 17 4 USING CHECKIMAGE IN ADVANCED MODE cr ais 187 f d TrustPort Keep IT Secure 17 4 1 Check an image in advanced mode 188 7 Ae Choose the FAT e TEE 188 17 4 3 Different VMeWinode EN 189 17 4 4 Change the repair SettingS 0coocccccccccccccccccnncnancnnnnn rr rr rr rr rr rr 191 LAO RODA EE GE EE acces 192 a gy q q e 192 LID CHECK IMACE FA A ii 192 18 TRUSTPORT ANTIVIRUS FA 193 19 TECHNICAL SUPPORT SE 195 Note A this part of the manual applies only to products Internet Security and Total Protection B this part of the manual applies only to Total Protection product Remaining unmarked parts of the manual apply to all products e Antivirus Internet Security and Total Protection TrustPort Keep IT Secure 1 TrustPort Antivirus 1 1 Product overview and key features The TrustPort Antivirus is an antivirus program that protects your computer from virus attacks and other malicious codes It watches your computer continuously and prevents it from a virus infection In case that your computer is attacked it reveals the infected files before they can be executed and heals them It also quarantines files so that they cannot do any harm It enables you to configure all the components acc
63. 2 bit executables Windows Executables Windows 32 bit executables Compressed executable files Windows 16 bit Executables Possibly contains JavaScript Possibly contains JavaScript Note Note Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript 20 TrustPort Keep IT Secure MSG MSO OBZ OCX OLB OLE OTM POT PPS PP PWZ RTF SHW SMM TLB VS WBK WIZ WPD WPT WRI XLB XL XLT Outlook message files MS Office 000 files saved as HTML MS Binder Wizard Active X OLE control OLE Object Library OLE Object MS Outlook macro VBA storage MS PowerPoint presentation template MS PowerPoint show MS PowerPoint presentations Office MS PowerPoint Wizard MS Rich text format embedded and renamed OLE2 Corel Presentation Show AMI Pro macro file OLE library file MS Visio documents MS Office workbook Microsoft wizards Corel WordPerfect 9 with VBA WordPerfect Document Template MS Write MS Excel Worksheet MS Excel Spreadsheet MS Excel Spreadsheet Template Archives and compressed files Extension ACE AIN ARC ARJ B64 BO BZ B
64. A AAA 138 11 2 EXECUTING FROM THE COMMAND ee 139 12 PROGRAM e E 140 UZ A RIAL Ee 140 122 TEMPORARY SUPPORT EE 140 12 3 TRIAL LICENSE TEMPORARY SUPPORT ENXPIBATION 141 124 REGISTERINO THE PRODUCT ee 141 13 PERSONAL FIREWALL costra a 141 Pood PRODU e 141 Tue SHORTCUT EE 142 Loss APPLICATION EE 143 13 4 FINDING OF IP ADDRESSES IN THE COMPUTER ee ENEE ENER 143 14 ARCHIVE ENCRYPTION eege beer eebe ee Ee EEN 144 TA WRODUCT OVER VIA ariete bielas 144 14 2 INOHELLCONTEXT MENU cian 144 14 1 Create NEW gei KIT 145 142 2 Creare E ee UE EE 146 14 2 3 Extracting CAR archives Decrnpt ccc cccccceceee cece eee e nese eeeeeeeeeeeeeeeneneeeeeenags 147 142 4 CAR Acie Drop Crile died 148 14 2 5 Add Edit archive Comment 148 TrustPort Keep IT Secure 14 3 ARCHIVE MANAGEMENT CAR MANAGER sti EE EE Ee 148 14 3 1 Create new archive Encrypt archive ENEE E EEN 150 14 3 2 Open existing archive cccccocccccccnnnnnccnrncn rca rr rr rr 151 143 35 Add files to the D ei 151 14 3 4 Delete files from the archive 4 ee NNNEN EEN rr 152 14 305 Extract files from the Te AE 152 14 3 6 Test archive consistency nr 152 14 3 7 Display archive properties ue REENEN REENEN 153 14 3 8 Add or edit archive file e un En EEN 153 14 3 9 Archived file folder properties sunno 154 14 9110 Files and folders s lection EEN 154 TO Ereate Ee e E 155 E da Keyboard nie ie gei EN 155 14 4 MANAGEMENT OF CAR ARCHIVES TOTAL COMMANDER uusescccccccecceceennnneeeeeeeeeeenenenn
65. CP gt lS Kerberos over UDP lsass lt Permit Both directions UDP gt lS Lightweight Directory Access Protocol over UDP sass lt Permit Both W Lightweight Directory Access Protocol over TCP ease lt Permit Outa oll LDAP over SSL sass lt Permit Outgoing TCP gt dif Global catalog LDAP sass lt Permit Outgoing TCP gt i Show categories placed in the tree for easier orientation Apply i Advanced Settings H About and Licenses To have transparent list of rules it is possible to create sub group s and to add new predefined rules to this newly created sub groups The new sub groups are created by clicking the right mouse button and there is chosen the menu Create Group During creation of predefined rules it is enough to mark the group where the new predefined rule should be created It is not possible to shift rules between groups and create groups inside other group Button Add serves for adding of a new rule to the existing rule set Afterwards wizard is displayed Before pressing the button Add it is necessary to choose the set where you want to place the new rule 60 TrustPort Keep IT Secure Button Edit serves for editing of the existing rule When the button is pressed a dialog window is displayed which serves for editing of the rule features Button Remove serves for deletion of existing rule from the set By pressing Remove is displayed a confirmation dialog window asking if you are
66. Check virus protection Ke Windows Defender and TrustPort Antivirus are both turned off Tap or click to see installed antivirus apps The Windows Security Center informs you whether your Antivirus software is installed and whether it is working properly If the virus definitions are not up to date or the On Access scanner is disabled the user is warned about this fact 28 TrustPort Keep IT Secure 4 4 Antivirus in the shell context menu The TrustPort Antivirus is associated with the shell context menu which is displayed when a user clicks the right mouse button on any file folder or disk In this menu you can execute the On Demand scanner to scan the selected object by selecting the Scan for viruses item If this object is a folder all its subfolders will be scanned too BFI tester Home Share View E i Computer Local Disk C Users tester Y Favorites Name Type Size B Desktop 2012 1 File folder Downloads Y i 2012 1 29PM File folde 2 Open in new window eg ge 7m D YE Recent places 2 2012 1 29 PM File folder Pin to Start File folder Libraries Share with 2012 12 47 P File folder Documents EE P012 1 29PM File folder a Music i o khk 2012 1 29PM File folder El Pictures aed 2012 1 29 PM File folder E Videos T i Send to 2012 1 29PM Filefolder 2012 1 29 PM File folder Cut ai Homegroup D012 1 29PM File folder EE P012 1290
67. DHCP service DHCP service serves for IP address allocation during computer startup or during connection to the computer network or to the Internet If you use in your network DHCP for IP addresses allocation or you connect yourself to the Internet by a service that appoints IP address to your computer then select this option If you deny service DHCP your computer will not be able to get the IP address form DHCP server and it will not be possible to get the connection If you use connection to the local network with static IP addresses then it is not necessary to have this option selected and you can deny it For details about your IP addresses allocation contact your provider of the connection or the administrator Create rules for trusted processes query pop up dialogs will not be displayed anymore for processes that are trying to connect to the internet and that aren t signed with a valid digital signature and therefore are not considered trusted for TrustPort Firewall A rule will be created for these applications automatically and they will be included in the list in Application rules section Stealth ports enables the hiding of all the computer s open ports which could be used to perform attacks from the internet We recommend enabling this option During the mode Use firewall rules the firewall by default attempts to establish the connection goes through the rule set and if it does not find any convenient rule it blocks the attempt With
68. DM File folder j Computer 2012 1 29 PM File folder E Local Disk C Ga Local Disk D Ga Rezervov no syst m BD ROM Drive G ER Network 13 items 1 item selected 5 User Interface An antivirus program protects your computer against attacks from viruses and other malicious codes In the event of an infection of your computer the program can also be used to remove the infection In order to wholly fulfill its function the program must be regularly updated and if necessary adjust its settings This controller combines all the features of the antivirus settings that somehow affect the behavior of the program Control is available in a simplified user interface or in an advanced configuration manager The simplified user interface is clear and simple in design so that a common user can easily operate the program For experienced users advanced configuration manager is available Features available depend on the installed product 29 TrustPort Ke OnAccess Application Scan Now Check For Scanner Inspector Updates General Settings Buy this software Help About Open advanced configuration TrustPort Antivirus TrustPort Total Protection 2013 13 0 0 5037 D against viruses against hackers e axe SG E U OnAccess Application Email Scanner Parental Lock Web Scanner Use Firewall Check For Scanner Inspector Rules Updates Tools General Settings Buy this software Help About Ope
69. Drugs Violence Porn Warez Hacking Spyware Phishing Malware List of blocked sites Add new address Modify list List of sites which are always allowed Add new address Modify list Use this link if you wish to change the password Tools ES By clicking on Create new encrypted drive the Disk Protection Image Creation Wizard opens With it you can Safely store files in encrypted disk images Any created encrypted disk can then be connected or disconnected from the system using the appropriate item Through the Wipe now item you can safely delete temporary files history and files containing sensitive information Clicking on Open CAR Manager opens a file manager that is used to create the CAR archives and other operations with these archives 31 TrustPort e ar Through the Configure Drive Encryption you can set which encrypted disks will be automatically mounted after system boot lt A In the Tools menu are two more items they can be used to launch Portunes the password manager and Skytale for encryption of messages General Settings Here it is possible by using the Register License item to run the Registration Wizard which will register the product you can also check whether program updates are available as well as set whether to verify the availability of this update automatically in the future There is also the possibility to change the program language At the bottom part of the window
70. EENEN E EEN 97 POM SECURE HRE ODIN rip A A AAA a 98 10 41 e el del e EE 99 LO VIDS Ee 100 104 3 Pale STE ainda aaa 102 ENEE 103 A ee steer eo stamens ge sonar tna KEEN 104 105 11 UNMOUNT OPUON EE 104 RR GE eet TTT 104 be ee MO uate et TEE 105 TrustPort Keep IT Secure TOD E AT T E E EE E E E EE EE E EE E EEE E E EEE E EE 105 Ls ele nee 107 10 SOOM Odia 107 1031 94 TEEN EE ee 108 10 5 1 4 1 Open an iMage AAA A nnna 110 LG oes INOW USEF AC EO ee 110 TOS Leo Moda User Accor bolas 111 Ol Delete ar WISE ACC OU E 112 E Renae a Ser a CCOO eeneg 112 061 Change Paso WO ld A A ads 113 10 30 14 7 Set Password fora ee E EE 114 10 5 1 4 8 Mount Unmount opened IMAGE 2 cece c cee EEE EDDA E REESE EE EERE EEE 114 Open Rows allas NE ql E 115 IOS EE EE 116 10 5 L4 11 volume Image Properties treressstocnsundusatnenauscumvausdoueioundveatecmisusduumvasodounadsentmesusdunals 117 E EE 118 EE DEENEN 119 Oe FOWA o oo E 120 10 6 L L Firewall 100 CONMGUIAUON ET 121 IOo Xena EE 121 TO eZ o yen 122 E LOO GOINGS EE 123 10 7 NETWORK EE 124 tOr je CS ee 125 Ee Trane E 125 BOS Gu e D 127 LOTA O Sa 128 LOS ADVAN T EE 129 TrustPort Keep IT Secure 10 8 1 Language Configuration eee EEE E EAHA EEE E EEE E EEE E HEHE EEE E SHEE EERE SEES 130 IO en A EE 131 10 8 3 Configuration Maintenance 132 SEENEN 134 10 9 1 License Information NEEN 134 hee e EE 138 TL UPDATE EE 138 Dll IPDATING is AAA AAA AAA AA AAA AAA AAN AN
71. Enable engines update option If it is not checked the scheduler service is not active TrustPort Antivirus Update Shields E Access Control viewer URL Address i On Demand Protection Check the Enable engines update option if you want the scheduler to update engines in defined periods automatically 4 Enable engines update gun even JE Start day E Encryption E Logs and Results Start time E Network Utilities i H Advanced Settings H About and Licenses Show categories placed in the tree for easier orientation If you enable the scheduler you need to set the desired period of the update checking Intervals from the start date and time are used It is necessary to ensure that the computer has a functional Internet connection at the moment of the update For setting the period you can select the combination of values and units Values can be set to values between 1 and 32767 You can select the unit from the following options hour day week If the scheduler is active the period of one day is set implicitly The start date and time are set to the installation date and time by default For completing setting of the scheduler it is necessary to check whether your personal firewall is configured correctly and the Internet connection is enabled You can test it by running the update from the quick launch 10 3 6 1 Offline update The Offline update feature is used to manually download virus definition
72. H About and Licenses E Hide listening sockets Hide non istening and non connected sockets E Hide TCP sockets E Hide UDP sockets Process displaying KP only Show only filename 5 Show whole pathname Show categories placed in the tree for easier orientation In this dialog window it is possible to set features for list of active network connections display e Enable DNS resolving all IP addresses will be displayed as domain names If this option is on the display refreshing may take more time e Hide listening sockets all the listening ports stop displaying e Hide non listening and non connected sockets only active connections and listening ports will be displayed TrustPort Personal Firewall Network Utilities Traffic Watcher 127 0 0 1 49868 127 0 0 1 49867 127 0 0 1 49892 127 0 0 1 49891 TrustPort Personal Firewall Network Utilities Traffic Watcher State Listening Listening Listening Listening Listening Listening Listening Listening Established Established Established Established listenin a State Listening Listening Listening Listening Listening Listening Listening Listening Listening Established Established Established Established Listening listenina TrustPort Keep IT Secure e Hide TCP connections all the items for TCP are hidden e Hide UDP connections all the items for UDP are hidden e Show only file name the name of the communication pr
73. IM MB OV SYS TDO 00 Description Digital Research DR DOS executable Device driver binary image Boot sector image Executable program file DIET PKLITE CRYPTCOM ICE etc Device driver Device driver DIET PKLITE LZEXE UPX etc Executable program Self extracting archives Disk image MBR image Overlay Device driver Deledisk diskette images Xtree overlays Operating system Windows Extension ACM CMD CPL DEV DLL DL DRV EXE EXE EXE HLP LNK MOD MSC MSI MSP PCI Description Audi Compression Module add on Windows NT batch file Control Panel extension Device driver Dynamic Link Library Dynamic Link Library Device driver DIET PKLITE LZEXE UPX etc New Executable Portable Executable Help files Shortcut file Kernel Module Microsoft Common Console Document MS Windows Installer File Windows Installer Patch Windows PCI Miniport system file Note DOS executables 16 bit DOS executables 16 bit Compressed executable boot images DOS executables 16 bit Compressed executable files DOS executables 16 bit DOS executables 16 bit Compressed executable files DOS executables 16 bit File archives Archive System DOS executables 16 bit DOS executables 16 bit Compressed boot images DOS executables 16 bit Note Windows System file Windows 32 bit Executables Windows 16 bit Executables Windows 32 bit Executables
74. IP addresses set of rules will be applied for all IP addresses that are in the stated range of IP addresses e IP address and subnet mask set of rules will be applied for all IP addresses that can be included into the stated subnet Each set must be unique and therefore it is possible to create a set with a unique name and for unique IP address By a unique address is also meant All addresses or ranges of addresses or an address with subnet mask If you have a computer that you connect via network card to the local network with static IP addresses and modem that you use for connection to the Internet then we have several possibilities which set of rules should be created The safest way is to create a set of rules for one IP address defined by the IP address that was allocated by the administrator see Location of IP addresses in computer Next we create a second set of rules for IP addresses range where our connection provider allocated our address to us It is also possible to create a set of rules for the whole subnet or even for the rest of the addresses If we have a connection from our provider by a static IP address for connection to the Internet ADSL etc then it is more convenient to create set of rules directly for the IP address that we have appointed by the provider If we select All addresses then we have to remember that for each new IP address created in the computer is automatically used this set of rules This is why we should
75. Port DataShredder Yes it is possible Select multiple files in some window manager e g Windows Explorer Total Commander and push the right button of the mouse The shell context menu appears and select TrustPort DataShredder item e What about already deleted files Can I shred those files Yes it is possible If you have files in Recycle Bin already you can use possibility shredding Recycle Bin by TrustPort DataShredder in Wipe tab If you have not files in Recycle Bin yet you can use the possibility Shred free space in the shell context menu TrustPort DataShredder item of disk 166 TrustPort Keep IT Secure e Data Shredder uses several methods of shredding which method is the best It is hard to say which is better The first method is the fastest because it has only 1 shredding cycle but it is the worst from the security point of view The latest method is the slowest because it has 35 shredding cycles but is the best from the security point of view For common files it can be used some of the quick methods for files containing sensitive data is more suitable method with higher number of shredding passes such as Peter Gutmann method The default method developed by TrustPort company uses 3 shredding passes e How can I securely shred Recycle Bin or temporary files You need to run TrustPort DataShredder from Start menu or from the TrustPort Tray In the interface select item Wipe now from the Tools dropdown
76. R Test File not a virus Code 1602 File eicar_com zip In case of using an encrypted connection POP3 over SSL POP3S scanning for malicious codes is not technically possible 39 l a TrustPort 8 2 Mail Antispam A Mail antispam helps you to handle unsolicited emails in a desired way If this feature is enabled every incoming email is evaluated by predefined antispam rules If an email is classified as a spam an informational header is added to the email and the email subject is modified so you can create a rule in your email client and put such marked emails into a separate folder delete them etc 8 3 Web Scanner web Scanner checks and evaluates your HTTP communication In case of trying to view or download an infected file it will display an error screen with basic information about the infected file in your Internet browser as shown on the image below fe Virus infection found Tru O eicar org download eicar com WW gl d E TrustPort VIRUS INFECTION FOUND e Data Security File which you are trying download contains virus Loading has been interrupted Technical data Error name Virusalarm Virus description EICAR Trustport Error code 1602 Requested URL http eicar org download eicar com Requested HTTP method GET Requested ContentType application octet stream Requested IP 192 168 0 1 eicar org Possible solutions You can contact your
77. S X86 UNLOCKER UNLOCKERASSIS E About and Licenses A g C PROGRAM FILES X86 SOFTSNOW MERGER MERGER EXE Add allowed show categories placed in the tree for easie Add restricted O O K O Apply Add blocked Remove Purge Allowed applications List of all applications where Application Inspector protection will not be applied Restricted applications List of all applications that are always running in restricted mode It is type sandboxing when the application is running but modifications of critical system locations are prohibited These locations are stored in the table Restricted locations where you can edit them as needed Blocked applications List of all applications that are blocked by the Application Inspector and thus will not run at all Context Menu The application can be assigned to each individual location also by right clicking in Windows Explorer 71 TrustPort Keep IT Secure de a Gd Home Share ER i m W ls a Je Computer Local Disk C OO View Application ES sk EE Marne Date modified Type ES Desktop vHtmlMerger 5 18 2012 10 30 AM File folc lp Downloads _ licbox ENUdat 5 29 2012 7 40 AM File El Recent places ddfrv data 4 26 2012 12 01PM DATAF Dropbox G Drophow 1A 5013 2012 3 32 AM Applica lor EK 8 2010 11 37 DM Applica Libraries en Pin to Start 2 2010 7 44 AM 150 Fil
78. S its name in the format 8 3 8 letters for the filename and 3 letters for the file extension The Windows operating system added to the filesystem longer names But these longer names are stored separately because of holding compatibility with the old system So it is possible that a long name is corrupted while the corresponding short name is all right That s the case of this error What CheckImage managed to read from the corrupted filename is that filename which you can see in the errors list Solution You can of course delete the whole file You can also do nothing with this error but it s possible that you won t be able to read or modify this file later in normal usage If you choose to repair this error the long filename will be deleted so just the short name will remain You can after you mounted the image rename the file back to its whole long name manually e Invalid FAT index Description One cluster from this file s chain has an invalid reference to the next cluster where this file should continue That reference pointed to a nonexistent cluster For further explanation of file chain see the first paragraph in the description of Crosslinked This error is most likely combined with the Too short error Solution It is impossible to correct the invalid reference in terms of finding the cluster where the file originally continued You can just trim the file on position of the invalid reference Additional repairing prog
79. T Change password Ctrl P C WrustPort DiskProtection Images jmage00 1 tdi tester A Show categories placed in the tree for easier orientation 109 TrustPort Keep IT Secure e a Image editor allows users to use most functions from the application toolbar or context menu where are collected frequently used user accounts functions Next component is status bar where you can see an image status green light represents unmounted and red light mounted state and the name of the authenticated account Create a new image You can easily create a new image file and then manage it To do this click New image at toolbar Disk Protection opens Create New Image wizard This wizard helps you create a new image in few steps As soon as Create Wizard finishes image creation this new image is automatically opened in the Image Editor This option is available only when you don t have any other image file opened If you have then it is necessary to close it before Close image It closes currently opened image It isn t important if this image is already mounted If no image is opened this option is disabled lt 10 5 1 4 1 Open an image Mi This function allows user to open an existing image and manage it When you select this function standard opening dialog appears and you can select an image file This dialog remembers the location of the last opened image and automatically navigates to this location When you are
80. Traffic Watcher serves for display of active network TCP IP connection list All active connections are displayed in a transparent table that is renewed periodically In the table are displayed information such as protocol state local and remote address and relevant ports On Windows XP there is moreover displayed information saying which application works with the network connection Under the table there is displayed a brief statistics containing information how many TPC connections are active and how many TCP or UDP connections are waiting for the connection 125 TrustPort Keep IT Secure FP Trust F Shields H Access Control H Antivirus H Secure Shredding i Encryption Logs and Results l Network Utilities Network Statistics S Traffic Watcher i Advanced Settings H About and Licenses TrustPort Personal Firewall application enables to edit some features of active network connections ort Total Protection Traffic Watcher Local IF address all 135 192 168 30 152 139 all 554 all 49152 all 49153 all 49154 all 49156 all 49157 all 49161 127 0 0 149867 127 0 0 1 49868 127 0 0 149891 127 0 0 1 49892 all 445 all 2960 display To edit the feature display press the button Settings F Shields H Access Control H Antivirus H Secure Shredding i Encryption Logs and Results Network Utilities Network Statistics Traffic Watcher fa i Advanced Settings
81. TrustPort Total Protection 2013 13 0 0 5037 ALPHA O aveexe TrustPort Antivirus On Demand Scanner command line parameters Hh b X 5 folder file ad adl adr reg l x c cfg xml cs cfg xml r report xml H 000 let external file man topic topic Display command line parameters help Scan boot sectors Stop scanning when an infection found Scan subdirectories Scan specified folder Scan specified file Scan all disks Scan all local disks Scan all removable media Scan registry Log level O silent 1 normal 2 verbose Read configuration from specified XML file Read config from specified XML file and save it Write scanning report to the specified XML file Read targets to be scanned from the specified Open Antivirus User s Guide and display selected 37 Ge Administrator C Windows System32 cmd exe TrustPort Antivirus 13 6 6 5837 ALPHA TrustPort Antivirus is running in Trial mode License expires 5 24 2812 8 52 18 _ AM 3 TrustPort Antivirus On Demand Scanner command line parameters Display this help Scan hoot sectors Stop scanning when a virus is found Quiet mode Scan subdirectories Scan the specified folder Scan the specified file Scan all disks Scan all local disks Scan all removable media Scan registry Report to stdout mode console only use with g option Logging level BH low 1 medium 2 high c
82. User Guide Intended for products TrustPort Antivirus 2013 TrustPort Internet Security 2013 TrustPort Total Protection 2013 Revision date 10 19 2012 Copyright 2012 TrustPort a s All rights reserved TrustPort Keep IT Secure Content CONTEN NEE 2 1 TRUSTPORT ANTIVIRUS gereegelt gereegelt gue Neien ses 10 1 1 PRODUCT OVERVIEW AND KEY FEATURES occonncnonenonenanenanenanenaneranenanenanenanenanenanenanenanenans 10 1 2 MINIMUM SYSTEM REQUIREMENTS EE 10 13 WHAT IS NEW IN TAS VERSION cesaron 11 2 INTRODUCTION TO THE ANTIVIRUS PROTECTION nek KKK KREE KEE RE EE KEE KEE 11 2 1 WHAT IS A COMPUTER VIRUS AND WHAT IS NOT 12 ZZ COMPUTER Eege 13 2 3 TEN COMMANDMENTS OF AN ANTIVIRUS PROTECTION 18 2 4 WHICH EXTENSIONS Fe Se a 18 225 ANTIVIRUS PROTECTION ee 22 3 INSTALLATION AND UNINSTALLATION OF TRUSTPORT PRODUCTS ccccsssssenes 23 4 AFTER INSTALLATION RUNNING TRUSTPORT ANTIVIRUS cccccssscccceennsseesseeens 26 4 1 TRUSTPORT ANTIVIRUS QUICK LAUNCH EE 26 4 2 LAUNCHING THE TRUSTPORT ANTIVIRUS FROM THE START MENU 28 4 3 INTEGRATION INTO THE WINDOWS SECURITY CENTER deed Eeer 28 AG ANTIVIRUS IN THE SHELL CONTEXT MENU a ES 29 gt USERINTERFACE eege 29 6 ON ACCESS SCANNER ies iaa 32 6 1 INFORMATION ABOUT gl 32 6 2 CHOOSING AN ACTION FOR THE EENS e ee EE 33 7 USER S ON DEMAND SCANNER socias 33 LE ON DEMAND SCANNER aiii iia 34 7 2 GHOOSINGACTION FOR AN IDENTIFIED VIRUS usaran ee 34 Ded SCANNING REPORT
83. What should I do with it You had probably opened the user interface before Click on the Refresh button and the quarantine content will be loaded from the disk The quarantine content isn t automatically refreshing because of the situation when the quarantine contains many files 19 Technical support Thank you for using the TrustPort Antivirus If you wish to meet other products of our company you can find all the necessary information on our web pages If you have any comments or questions about the TrustPort Antivirus please first read Frequently asked questions FAQ and visit our website If you do not find answers there use any of the contacts below Error announcement If you come across an error in the TrustPort Antivirus you can announce it to some of the contacts below Please prepare the following information in advance e the exact description of error e the program version including the compile number you will find this information in the About dialog window e which operating system you use including its version Contact Address TrustPort a s Holandska 2 639 00 Brno Czech Republic Web www trustport com E mail info trustport com support trustport com 195
84. Windows 16 bit Executables Windows 32 bit Executables Windows 32 bit Executables Compressed Executable files Windows 16 bit Executables Windows 32 bit Executables Windows 16 bit Executables Windows Executable Windows 16 bit Executables File archives Windows Executables 19 TrustPort Keep IT Secure PIF REG SCR SYS TSP VXD VWP WIN 2 286 386 HT HTML Unsorted Extension PRC PDB Program Information File Windows Registry files Screen saver Win NT device driver Windows Telephony Service Virtual Device Drivers Audio plug in Window file MS Compress Expand Device driver for Windows 2 0 and 3 x real mode Virtual device driver HTML Document HTML Document Description PalmOS application PalmOS Database Applications for Windows Extension ADP ASD CDR CNV D B DOC DOT D B DWG GMS MD MDE MPD MPP MPT Description Microsoft Access Project MS Word Au o backup file Corel Draw vector graphics MS Word Data conversion support file AutoCad MS Word Document MS Word Document template AutoCAD Project files Autocad Drawing files Corel products Global Macro Storage MS Access Office database files MS Access MDE Database MS Project Database file MS Project 98 Document MS Project 98 Template Windows Executables Windows 16 bit Executables Windows 32 bit Executables Windows Executables Windows 3
85. Z2 CAB Description ACE Archiver file AIN compressed file PKARC Archiver file ARJ Archiver file Encoded base64 MIME archive Boot sector image BZIP compressed file BZIP2 compressed file MS Cabinet file Possibly contains macros VBScript Possibly contains JavaScript Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Possibly contains Note Holds also for extensions A0 A1 etc macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript macros VBScript 21 TrustPort Keep IT Secure CAR Crypted Archive COM Self extracting archives COM DIET PKLITE CRYPTCOM ICE etc CPIO Unix Archive file CPT Compressed MAC file EXE DIET PKLITE LZEXE UPX etc GZ GZIP compressed ICE ICE compressed IM Disk image JAR Java Archive LIM Limit compressed LZH LHA compressed MSI MS Windows Installer file PAK PkPak compressed RAR RAR compressed Holds also for extensions RO R1 etc TAR Unix TAR compressed TAZ Unix Compressed TAR file TDO TeleDisk diskette images UU UUEncoded Unix file UUE UUEncode Z Unix Compr
86. ack to ZIP archive Creating archive Files 3 Total size 77 453 856 bytes Compress rato 100 Encrypting C Testing arch0 install exe 23 Waming lf you cancel encryption process then archive will be TPE will start the archive creation process and after finishing it an information box will appear Click the OK button and TPE automatically opens the created archive file Please note that in order to extract this archive TrustPort Archive Encryption must be installed hence if you want to send an encrypted archive file to a computer where TrustPort Archive Encryption is not installed you will have to check Create EXE archive box on the Encrypt Archive window lt lt 14 3 2 Open existing archive To open a CAR archive file use the Open archive menu item on the File menu or in the toolbar or CTRL O key combination TPE will show a standard browsing window After that TPE will ask you the file s password Ki CAR Manager File Edit View Options Help D e TrustPort Archive Encryption gt CAR Encrypted Archive Password 0 You could also open a CAR archive double clicking on a CAR archive If CAR Manager is not open when you double click on a CAR archive it will be launched immediately There can only be one CAR Manager application running at the same time therefore if you try to open a CAR archive while the application is busy a new window will be displayed showing that CAR Manager is busy lt
87. ad only access If he decides to mount it for read and write then the others will have no access to this image Otherwise all users will have read only access to the mounted image Image files can be automatically mounted during Windows start up and automatically unmounted after a period of time when computer goes to sleep or pressing a special key combination Disk Protection remembers all mounted images and mounting parameters in the recent image list and allows quick selecting and mounting of these images Interactive management of them is also available You can search for Disk Protection images on the local drive or network TrustPort Disk Protection automatically chooses the optimal file system according to the image size Available file systems are FAT 12 FAT16 and FAT32 The possibility to create additional user accounts in each image file for sharing the data It contains an application aligned to checking and repairing damaged image files lt lt 167 TrustPort Keep IT Secure 16 2 In the shell context menu WH TrustPort Disk Protection is associated with the shell context menu This context menu is displayed when you right click on any image file or on a mounted drive In this menu you can select Mount or Unmount item depending on whether the image is currentlymounted or not AGE Home Share View 00 E ai e TrustPort DiskProtection Images Es Se roate Name Date modifie
88. ality can be changed on the page General Firewall Settings in dialog window for advanced configuration But this turned logic of TrustPort Personal Firewall is not recommended because of security reasons When the individual rules are evaluated if the certain rule can be applied for the given connection there is also where it is specified carried out the verification of the hash If the rule is convenient with the given connection and also with the hash of this application then the rule is applied to this connection In the opposite case the evaluation of the following rules will go on Each rule can be temporary inactivated by marking off The marking off is done by the check box on the left side next to the rule name If we disable all the rules then all the set is also inactivated The icon by each rule shows the direction incoming outgoing or both directions for which the certain operation is done The orange colour of the arrow means that the rule enables the communication in the given direction and the grey arrow that the rule denies communication in the given direction The arrow towards the right means outgoing connection and the arrow towards left the incoming connection Two arrows mean two way communication Information in brackets show some important information about the rule it means direction of the communication action and protocol that is active for the given protocol Individual rules can be moved upwards and downwards in the gi
89. an example some dubious software downloaded from Internet when you execute it you can take pleasure in watching a beautiful African dancer but the same program can be sending files from your computer at the moment and we certainly do not need to emphasize that it makes no difference between private data and less private data it is just a dull program or encrypting some data and consequently asking for a kickback for the code Backdoors As the name of this software suggests these are applications that open the computer without warning the user for the attackers who are interested in the data stored on it or in your computer as a tool for their future attacks More than a type this is a software property Genuine backdoors occur very seldom more likely they are combined with another application type for example Trojan horses or computer viruses E mail worms It is a slight exaggeration to say that it is a computer virus that uses e mail services for its spread But it is not as simple as that While a computer virus needs host applications for its spread with the exception of so called accompanying viruses which adopt the name of exe files but they have the com extension and presume on the fact that this extension is preferred by operating systems an e mail worm is generally malicious itself there are more exceptions indeed for example the macrovirus Melissa uses e mail for its spread and needs no host e Funny programs
90. an format it directly using CheckImage d NOTE By formatting an image file all data on this disk will be lost ae In CheckImage you can t change any properties size encryption algorithm etc of Image when you format it If you want to change it use Image Editor lt lt 17 5 CheckImage FAQ e BH When should I use CheckImage Similarly as Windows check your harddisk whenever you shutdown your system not properly you should check your disk in this case Disk Protection images are unmounted by logging out from Windows so you don t have to check your disk if your system freezes after you log out On the other hand data in the image can be also corrupted some other way than just by unsafe unmount force unmount see Disk Protection options So if you have on your image valuable data you should check your image from time to time during normal usage at least once a month 192 TrustPort Keep IT Secure e How can I prevent from errors in my images There are basically two ways how your image can be corrupted that you can in some cases prevent The first way is as mentioned before when you shutdown the system without unmounting your image which is done automatically by logging out Sometimes you can avoid it but not always The other way is when the disk or other medium on which is your image stored is somehow damaged Hence you shouldn t store your image with some valuable data on an old and erroneous har
91. an set up the option Move to archive Then all files will be moved to the archive file and the original files will be securely deleted Press OK button or ENTER to add the files lt lt 14 4 5 Delete files from CAR archive Ml Open CAR archive file and select the files and folders which should be deleted Then press F8 or Delete key or select Delete from context menu Total Commander will show a confirmation dialog window lt lt E Total Commander 7 57a AEC Ltd Files Mark Commands Wet Show Configuration Start elselzigeelsaislaoalaa EA ad Ge Of Go Oh Gi Gi d i ic Lnone_ 18 830 796 k of 45 648 696 k free SE ec none 18 830 96 k of 45 648 696 AT a E gt A o o o A Testingiarchives 5 E E FTF URL B5 B we Testing archives new tparchive car Et Size Date Mir Name lt DIR gt 05 30 2012 07 43 E LI _ lt DIR gt __ 05 30 2012 07 41 _ config Total Commander Pr Do you really want to remove the 2 selected files from archive config data install exe pr eee ee 14 4 6 Extract files from CAR archive Mi The simplest way is to select files in any open archive in one pane open the destination folder in the other pane and press F5 or simply drag and drop it Total Commander 7 57a AEC Ltd Files Mark Commands Net Show Configuration Start e ele sjaj e gt 5 S S S Ms aa Selad Ge OF Ga Gr Gi Gi Br Ge Lnone_ 18 830 676
92. and malicious codes in general can be divided with respect to various aspects and attributes The attempt to classify codes according to some attributes is not easy at all and in practice one can come across codes that combine properties of several categories Well there is not everything only black or white in the real world We point out that the computer viruses field is developing very dynamically and that some following categories belong to the museum at this moment nevertheless we list them all for completeness sake According to the visible symptoms e Viruses without symptoms The most of malicious codes try to show themselves as little as possible at least in the way that the attacked user doesn t notice them The reason is quite simple any evidence causes the revelation and the user starts to fight against the malicious code and if she or he does it a little adroitly she or he will usually win This is just the reason why programmers intend to restrict these symptoms to absolutely unavoidable minimum e Viruses with a graphic exhibition If an author of a malicious code decides to involve some exhibition it is usually the graphic one It may be displaying some message on the screen stop testing products on animals stop wildwood felling etc or it can modify the desktop Often programmers take advantage of graphic exhibition for hiding the virus presence in the computer It can concern for example showing some prepared pictures tha
93. ane at the left side of the Decrypt Archive window If you click on any folder or drive the selected name with its path will appear in the Extract files to folder address box and you will not be required to type the full path where you want to extract the archive s content to e Create new destination folder If you want to extract an archive to a folder that currently does not exist then select the parent folder where the new folder should be created and add the name of the new one to the end of the line TrustPort Archive Encryption creates this new folder at the beginning of the extraction process automatically e Overwrite mode There are three different overwrite modes that specify what will be done when a file with the same name is found Ask before overwrite option shows a warning dialog box and prompts you for overwriting the existing file Overwrite without prompt overwrites all existing files with the same names without prompt Skip existing files all of the existing files with the same names will be skipped Note All non existing folders will be automatically created without prompting lt lt 147 TrustPort Keep IT Secure 14 2 4 CAR Archive properties E if you want to view the CAR archive properties please click the appropriate file containing the encrypted archive with the right button or choose File Properties in the File menu in CAR Manager After switching to the Archive bookmark the fo
94. are com or exe files This leads to the length extension of the infected file If it is a resident virus capable of so called stealth techniques this length extension is invisible to the user when the virus controls the system because all changes are hidden by the virus Infection means overwriting first bytes of the infected file that cause immediate passing control to the virus or in exe file first header bytes that refer to the beginning of the program are overwritten Cleverer viruses contain self identification mechanism to avoid multiple attacks But there are exceptions for example twentyfold infection by the Jerusalem virus is not anything unusual The process of the self identification becomes a problem in case of polymorphic viruses namely due to decrease of the detection rate because all decoding is slow These viruses are easy to remove by repairing the beginning of the program and removing the virus from its beginning or end according to factual virus body localization Companion viruses Companion viruses create a new file with a different extension which is composed of the original file and the appended virus The name of this virus comes from the fact that the virus accompanies the infected file with a companion file The virus can be given name for example file com Everytime the user executes file exe operating system loads file com first and therefore infects the system The companion virus is often generated by a phage
95. as expired Please contact your local reseller to get a new valid key TrustPort Total Protection 2013 now works in restricted mode Updating of virus definition files is currently Updating of antiviral engines is disabled To get a valid license key that can fully restore the whole functionality contact your local reseller 12 4 Registering the product See License Information 13 Personal Firewall 13 1 Product overview PE TrustPort Personal Firewall is convenient both for advanced users who are aware of network protocols and services as well as for those who prefer applications of pre set rule sets designed for operation of common Internet applications directly by the producer 141 TrustPort Keep IT Secure TrustPort Personal Firewall creates on the protected computer a gateway where all the network connections pass by The gate makes possible to permit or to prohibit communication of the computer with the neighborhood network The set of rules can be set by the user for all communication adapters those that are represented by their IP addresses at the same time for a concrete address or for a range of addresses Each concrete IP address of the host computer has its own defined set of rules that regulates the data flow itself across the firewall gate With help of Advanced Configuration Manager user can manage individual sets of rules create and edit The function for rule import and export ensures easy sharin
96. atically grouped into the antispam monitoring database as a message which is not spam and the string which marks spam is removed from the subject of the message e Configure enables settings of e mail scanner Pw oF Pa Pah A Mark as spam Markasnotspam kal Configure Warning The buttons of all e mail clients are added to all accessible task bar buttons however only to some clients they are automatically added Windows Mail is the only exception which does not have these buttons integrated yet The buttons are very similar amongst e mail clients but not totally identical It always depends on the settings of the actual e mail client Advanced settings of e mail clients This dialog has the advanced settings of individual e mail clients However some characteristics are supported only for some e mail clients In Incoming e mails it is possible to configure Requested action The selected action will be activated with the infected incoming e mail It is possible to choose from the following actions e Deliver infected e mail scanning will not be used and the email will be delivered without TrustPort Antivirus interference Warning If you choose this option you completely remove all incoming email scanning and settings Mail Antivirus will not be considered e Delete infected e mail the infected e mail will be automatically deleted but it is still possible to restore it from the Delete items folder from the e mail
97. ation about the version of the installed product furthermore it is also possible to display the License Agreement By clicking on Show Licenses information about third party license libraries is shown and the last button displays System Information SES TrustPort Total Protection E Shields About E Access Control E TrustPort Total Protection 2013 El Secure Shredding Version 2013 13 0 0 5038 Gi EA Copyright 2011 TrustPort a s weew trustport com E Logs and Results SC All rights reserved EI Network Utilities El Advanced Settings E About and Licenses oe tn This computer program is protected by copyright law and international treaties S About Unauthorized reproduction or distribution of this program or any portion thereof may result in severe civil and criminal penalties and will be prosecuted to the maximum extent possible under the law This product is based on third party libraries that are protected by their licence terms List of licence agreements is shown by clicking on the button Show categories placed in the tree for easier orientation 11 Update Regular updates are necessary if you want the antivirus software to protect your computer properly On update the information about new malicious codes and viruses is added The regular update is necessary for saving the ability to scan for the newest viruses In the past it was normal to update the antivirus software once a month nowadays it is convenient to do it s
98. buttons is described in the chapter Auto mounts lt lt 10 5 1 4 Image Editor MN TrustPort Disk Protection Image Editor is a user friendly utility that joins most of images management functionality The user can easily create a new image mount and unmount an opened image or do administration operations as creating a new account in the image set a password for a user account and more 108 TrustPort TrustPort Disk Protection Image Editor H Shields E Access Control H Secure Shredding E Encryption H Network Utilities tH Advanced Settings H About and Licenses Cu TrustPort DiskProtection mages limage00 1 tdi tester 2 0 Disk Protection defines three types of user privileges e anormal user e a read only user e an administrator All the users can mount and unmount the image but read only users have granted only restricted reading access to the image It means that they cannot write any data to the mounted disk A user with administrator s privilege can manage other user accounts create new delete rename and change account type set password for selected account change size limit etc E Shields Image Editor E Access Control E pre PaGRO GIRSAR B E Secure Shredding E Encryption E Drives New account Ctrl Ins Delete selected accounts Shift Del Logs and Results r Network Utilities Rename account F2 H Advanced Settings Set password Ctrl E About and Licenses Change type Ctrl
99. by OK button then the image will be mounted New disk will appear in Windows If something is wrong Disk Protection will display an error message and you can check the parameters 16 8 1 The number of available disk letters is limited to 26 A Z If there is no available letter in the system for mounting an image mounting operation will fail The image that is going to be mounted mustn t be compressed or encrypted by the NTFS file system If Disk Protection detects that the mounting image is compressed then decompresses it automatically TrustPort Disk Protection Uncompressing Uncompressing operation is being If the image file is encrypted by the EFS then Disk Protection displays a warning message and mounting procedure is cancelled In this case you have to decrypt it manually TrustPort Disk Protection x File is encrypted by EFS Quick Mount Options KH In this dialog window you can select a mounting letter from the list Another option is Read only access If you select it the mounted image will be accessible for reading only If you select Mount it at start up option then selected image will be added to the auto mounts list If you remove selection this image will be removed from the auto mount list lt lt 178 TrustPort Keep IT Secure 16 9 Mount Options Mount as eter E Mount it at startup About Manual About Manual Disk Protection FAQ ES I want to add a new user ac
100. categories placed in the tree for easier orientation pur Apply 49 _ TrustPort By default during the installation support is installed for all e mail clients that are supported by the operating system As active are designated all e mail clients who were selected before the completion of the installation TrustPort Antivirus product Warning If at least one email client uses TrustPort Antivirus for the scanning of post it is always necessary to have active choices Enable antivirus mail protection and Enable antispam mail protection in settings of E mail Scanner Otherwise e mail scanning will not work correctly The button Configure will appear next to every supported e mail client after it has been selected which enables advanced settings configuration of the client after its selection If support has not been installed for any particular e mail client during the installation or the current version of e mail client is not supported it is not possible to scan emails with the help of TrustPort Antivirus For every e mail client with active TrustPort Antivirus support the following buttons are added to the toolbar e Mark as spam marks the selected message as spam The e mail message is automatically grouped into the antispam monitoring database as spam and the subject of the message is modified according to settings options Subject modifications e Mark as not spam cancels selected messages as spam The e mail message is autom
101. cfg xml Read configuration from the specified AML file cs cfg xml Read config from the specified AML file and store it r report xml Save the scanning report to the specified AML file tl xxx lat Read targets for scanning from the specified external file Display a list of installed engines and their definition files ns Mo statistics will be shown manl topic Open the Antivirus User s Guide and display the specified topic Detailed parameters description Each command and switch must be preceded by the switch symbol which is dash or slash In the following list there are all command line parameters supported by the AVC EXE and AVCC EXE applications or h Display command line parameters help displays all available command line functions b Scan boot sectors scans all the hardware with boot sectors X Stop scanning when infection is found activity of antivirus scanning will be terminated at the moment of detecting infection q Quiet mode the antivirus program will run in so called silent mode i e without any output information 5 Scan subdirectories the selected directory will be scanned together with its subdirectories folder Scan specified folder the selected directory will be scanned without subdirectories Attention if there are blank spaces in the path it is necessary to insert the path into quotes AVC exe C Program Files AVCC exe C Program Files file Scan specified file Att
102. ch as Program Files Windows root and others are denied because of possible instability to the system lt 10 2 3 Device Security Device Security offers the option to allow or block user access to USB device CD DVD Bluetooth Smart cards iPod FireWire memory card readers and other media storage device TrustPort Antivirus Access Control Device Security Device security Device security enables to actively manage user access to devices as USB flash CD DVD Bluetooth Smart cards iPod memory card readers and another multimedia General settings Use rules Show notification for blocked devices Logs and Results H Network Utilities H Advanced Settings E About and Licenses Windows Portable devices Smart Card readers Media Tape drives Printers Unknown thls 46 Bi eo eo ME Show categories placed in the tree for easier orientation This protection is activated by selecting Use rules Then you need to set each device that you wish to block 79 TrustPort Keep IT Secure e ae TrustPort Antivirus Access Control Device Security E 7 Af TrustPort Total Protection FB Shields Device security Access Control Parental Lock i Device security enables to actively manage user access to devices as USB flash p Volumes and Directories CD DVD Bluetooth Smart cards iPod memory card readers and another multimedia General settings fk un Sg Use rules H Antivirus Show notificat
103. client e Delete infected attachments all infected attachments will be changed according to settings options Name of file of Mail Antivirus and they will be placed into quarantine 50 TrustPort Keep IT Secure e ae TrustPort Antivirus Internet Protection E mail Scanner Zi TrustPort Total Protection e Manual E Shields 2 B Configure client Real Time Protection e e F sch Incoming e mails gt Web Browsing Protectio Requested action D Antivirus Use Bayesian filtering D Secure Shredding Junk email to spam folder E Encryption H Logs and Results E Network Utilities GL Advanced Settings Check H About and Licenses Outgoing e mails Restore path C Program Files x86 TrustPor t antivirus eme About Manual ail Show categories placed in the tree for easier orientation Use Bayesian filtering defines whether the method of Bayesian dictionary will be used to check for spam Junk email to spam folder emails marked as junk by the antispam engine will be marked and automatically moved to the spam folder of a particular user profile In Outgoing e mails it is only possible to configure option Check If this option is active scanning of outgoing post occurs with the e mail client Show toolbar displays the toolbar of the antivirus plugin in a client s email GUI Option Restore path contains the path to the directory where scanned e mail messages are temporarily stored After thei
104. copied over the other e Lost clusters Some sectors are marked as if they were filled with data but they don t belong to any file in the image These sectors are marked as free space by repairing of the image e Damaged object s A damaged object means either a file or a directory that contains errors The repair method which will be used depends on the error s found in each damaged object Some of them even can t be repaired and have to deleted lt lt 17 4 2 Choose the FAT table Ki If there is an inconsistency in FAT tables in advanced mode you can choose which of them you want to use by repairing The actual selected FAT table toolbar button is pushed down If the FAT tables are consistent the buttons for selecting them are disabled When you switch actual FAT table CheckImage shows you the results from check based on the newly selected table that can be completely different from the previous results 188 TrustPort Keep IT Secure E Disk Protection Checklmage cn Si e File View Help a a a Ea BB hh Crosslinked Too long 1 Delete this tem A WNSTALL IMAGES advancedO3 png Crosslinked Too long 5 Delete this itern a VINSTALLA IMAGES advanced04 png Too short 2 KB Invalid Repair it D INSTALL SETUP SETUP ZIP 416 MB Crosslinked Too short Delete this item Disk Protection Checklmage asa ae E UNSTALL SETUPASETUP ZIP 4 16 MB Too short 1 39 MB Repair it Any changes that you made in the pr
105. count delete user rename user set user password or change account type function and I cannot choose it in Disk Protection I don t understand it what s happened There are more reasons for this situation Firstly you need administrator privileges to be able to do these actions If you are a common user or read only user then you are not allowed to do this The second reason might have been the state of opened image file If this image is currently mounted what is signalized by red light in the status bar then all administration functions are disabled I have an administration account but I cannot add a new user TrustPort Disk Protection displays warning that there is not enough free space to do this operation but I have enough free space I don t understand what happened Check number of your users The maximum number of user accounts in each image is limited to 20 I can t format an image file using Windows tools because Windows isn t able to complete formatting operation When I close the format application Disk Protection cannot access the mounted drive What can I do This version of Disk Protection doesn t support image formatting using Windows tools Windows had locked this drive for exclusive access during formatting operation and because it didn t finish successfully this lock hasn t been removed The solution is to Unmount this image and mount it again If you need to format an image run Disk Protection CheckImage application
106. cs serves for display of basic information about the number of transmitted packets and bytes e Total packets The total number of all outgoing and incoming packets transmitted via all network interfaces in the computer e Total blocked packets The total number of all outgoing and incoming packets that were blocked by application TrustPort Personal Firewall on all network interfaces in the computer e Sent packets The total number of approved sent packet via all network interfaces in the computer e Received packets The total number of approved received packets via all network interfaces in the computer e Total bytes transmitted The total number of all sent and received bytes via all network interfaces in the computer e Sent bytes The total number of sent bytes via all network interfaces in the computer e Received bytes The total number of received bytes via all network interfaces in the computer E km TrustPort Total Protection E Shields Network Statistics E Access Control H Antivirus EI Secure Shredding Packets gt E Encryption Total packets EI Logs and Results Total blocked packets l Network Utilities Sent packets pu Network Statistics Received packets Bytes Total bytes transmitted H Advanced Settings Sent bytes H About and Licenses Received bytes Show categories placed in the tree for easier orientation MA Apply 10 7 2 Traffic Watcher p Page
107. ctory in the installation directory Besides this file there are files report css report xsl and the img directory If you want to save the Report for a future use you have to copy all these files not only the XML file The scanning report is created as an output of every On Demand scanning Since the reports would cumulate uselessly the file report xml is always rewritten with the last test s result and it is up to the user to save the interesting reports If you want to save the output of the last test you have to backup this file latest before finishing the following test by the Close button otherwise the previous contents of this file will be lost The report can be divided into some basic parts Header contains the information about the time and date of scanning Test parameters says what was scanned i e disk s or file s separated by semicolon and the scanning parameters defined in the options of the On Demand Scanner i e which extensions were scanned and so on Results can show the text No infection found or some of the sections Boot sectors and Files The Boot sectors section informs you about scanning the boot sectors of individual devices connected to your computer such as disk floppy disk or CD mechanics This section is displayed only if you use the tests of hard disks or removable mechanics The Files section appears only in case of finding any infection You get to know which file was infected which virus attacked
108. d Licenses Delete Restore Details Show categories placed in the tree for easier orientation a Apply This information about infected files stored in the Quarantine is displayed e File name the name of the file before moving to the Quarantine e Date and time when the file was quarantined e Original location the file location right before quarantining The next actions can be done with the infected files in Quarantine e Clear all objects in the Quarantine will be deleted forever e Refresh the content of the Quarantine will be loaded from the quarantine on the disk e Restore the selected object will be moved to its original location in the same condition as before quarantining e Delete the selected object will be deleted from the Quarantine the file will be deleted forever e Details all details about the infection and quarantining will be displayed 89 TrustPort Keep IT Secure TrustPort Antivirus Quarantine E CP TrustPort Total Protection Quarantine File name File location Secure Shredding Result i Encryption H Logs and Results Infection name H Network Utilities H Advanced Settings 0 About and Licenses Discovery date eicar com C Testing Black listed EICAR Trustport 5 18 2012 8 56 11 AM E Shields i Restore file E Access Control Antivirus Target directory doesnt exist Please select new directory or cancel file On Demand Protec ston
109. d Type BR Desktop S imageD00 35 29 2012 217 AM TrustPo Je Downloads image001 3 29 2012 10 50 AM TrustPo 3 29 2012 10 26 AM TrustPor KS Recent places Open EE Encrypt archive uments A Wes TrustPort DataShredder kl Pictures Mount ES Videos Open with Scan for wiruses E When you right click on any image file and select the Properties menu item the window with properties tabs appears Here you can select the Disk Protection tab imaged003 Properties A Disk Protection Image Properties Image E TrustPort Disk Protection mages image003 tdi Version 1 16 Encryption algorithm CAST128 Encryption key size 128 bits File system FAT16 Allocation unit size 2 048 bytes Current limit size 20 MB Maximum limit size 26 MB Status Mounted ON Edit image Cao 7 This window informs the user about an image and displays all available details the image file version number encryption algorithm which has been selected at the time of image creation encryption key size it depends on selected encryption algorithm file system used for this image file which depends on image file size Image file with size equal or less than 8MB uses FAT 12 file system an image with size equal or less than 256MB uses FAT16 file system and image up to 32GB uses FAT32 file system e size of allocation unit it depends on used file system and selected image size e actual limit size what is current size of the
110. d applications automatic enable disable applications RB Improved Device Security e new enhanced GUI interface e the possibility of blocking devices by device type or connectivity ports e device action settings ask user allow block lt lt Engines e new proprietary TrustPort scanning engine based on dynamic whitelisting technology based on database of known clean files e upgrade of Vipre scanning engine including new MX Virtualization for the heuristic malware s detection MX V uses Dynamic Translation emulator optimized for speed e unified global settings for all scanning engines e new decompression library speeding up the scanning process New GUI of the program simplified basic user interface Added new item Scan network drives into On Access Scanner options Added new TrustPort OEM phishing malware database New standard custom mode in the installer Windows 8 compatible Update locations are unified for all components access to updates is optimized for transfer speed Silent mode of AV Option to restore default configuration A Portunes iPhone Android and Windows password manager security storage for sensitive information PE Skytale iPhone Android and Windows application for encryption of messages 2 Introduction to the antivirus protection In this part of the manual we will try to introduce you the mystique of antivirus problems We will give you the basic information step by step
111. d be mounted TDisk exe m am d ua henry q c Program Files TrustPort Disk Protection Images image000 tdi mount as read only add the image to the auto mounts list remove the image from the auto mounts list disable modifying mount parameters except user credentials given user account name will be used instead of account name taken from the Windows select the letter which will be assigned to the mounted image the file name of the Disk Protection image that should be mounted TDisk exe q ro d ua henry q c Program Files TrustPort Disk Protection Images image000 tdi Unmount a virtual disk or disk image respectively the file name with full path of the mounted image OR a letter that should be unmounted OR unmount of all currently mounted virtual disks TDisk exe u q Create a new Disk Protection image add the image to the auto mounts list mount the image after creating fill in the parameters automatically change encryption algorithm which will be used for the new created image cast CAST 128 algorithm rijn AES Rijndael algorithm disable modifying creating parameters except user credentials given user account name will be used instead of account name taken from the Windows specify new image size in megabytes current size special parameter which makes TDisk exe to remove itself from the list of automatically started applications during Windows start up used during installat
112. d objects if possible If not it will automatically rename it move it to the quarantine or delete it in this order e Rename the infected file is left on its place but its extension is changed to an extension that is not associated with any activity in the system e Move to quarantine the infected file is quarantined moved to a directory controlled by the antivirus software where it cannot do any harm It is possible to treat the infected file safely in the quarantine restore it delete it etc e Delete the file containing a malicious code or a file that is a malicious code itself will be deleted If you select an action that cannot be performed for any reason the On Access Scanner takes the following one according to these priorities Report only Repair Rename Move to quarantine Delete Option Repair is set by default Warning The user action setting is not relevant to scanning mailboxes The Repair action is always performed as the first one If repairing cannot be performed then the Report only action is chosen 84 TrustPort Shields On Demand Scanner E Access Control 3 Antivirus a o Requested action Which files should be scanned Scan all files 5 Scan only files with the following extensions Modify E Exdude files with the following extensions i Secure Shredding tH Encryption tl Logs and Results i Network Utilities Scanning options Advanced Settings Scan compressed files
113. d scanning source is displayed on this page You can choose from the following logging sources On Demand Scanner On Access Scanner Internet Protection Antivirus Updater Antivirus System 122 TrustPort Keep IT Secure TrustPort Antivirus Antivirus Log Log Viewer 7 TrustPort Total Protection E Shields E Access Control Antivirus GL Secure Shredding EH Encryption E Logs and Results Time Process Code Message El Firewall 4 26 2012 8 35 39 AM 1568 0 OK Internet Scanner started Eb Antivirus 4 26 2012 8 35 35 AM 1648 OK Internet Scanner stopped 4 26 2012 7 38 27 AM 1648 0 OK Internet Scanner started 4 26 2012 7 38 24 AM 2288 D OK Internet Scanner stopped 4 26 2012 7 37 23 AM 2288 1737 Ui blocked Web page badoo com block 4 25 2012 15 04 32 2288 0 OK Internet Scanner started Log Viewer Ee Network Utilities EH Advanced Settings E About and Licenses Fy Show categories placed in the tree for easier orientatio a Apply For every log there is its time process identification code action code and plain text description of the event Logs of critical events are highlighted by dark colour e g a virus was not repaired Pink colour is used for performed action e g a file was quarantined 10 6 2 1 Log settings On this page you can enable disable the log by checking unchecking the Enable logging option It is implicitly enabled Using the option Level of detail you can set how detailed the log
114. d their repairing in simple mode M In general there are three types of errors that can occur e Inconsistency in file allocation tables FAT FAT table contains information about every file and directory stored in the image including the size and the exact position where it is stored In each image there are two FAT tables copies that have to be consistent If just one FAT table is corrupted you can save your data using the other table If the FAT tables aren t consistent CheckImage chooses for you the table with less errors When you choose to repair the image the FAT table inconsistency is repaired also e Lost clusters Some sectors the whole image is divided into sectors each sector contains 512 bytes of data in FAT table are marked as if they were filled with data but they don t belong to any file in the image These sectors are marked as free space by repairing of the image e Damaged object s A damaged object means either a file or a directory that contains errors The repair method which will be used depends on the error s found in each damaged object Some of them even can t be repaired and have to be deleted Information about errors in the image you have checked is in the line at the bottom of the application window LE Disk Protection Checklmage File View Help a INSTALLAIMAGES advancedoz png 21 KB aay Too ne E ios Delete this tem INSTALL IMAGES advanced04 png 20 KB Too short 2 KB Invalid R
115. dded to the auto mounts list Total number of available letters is limited to 26 A Z If there is no letter available for mounting the image the mounting process will fail and a warning message will be displayed 16 7 2 Volume image authentication MI At this page you have to enter the user name and password for selected image file A user name can contain alphanumeric characters only and is case insensitive lt lt TrustPort Disk Protection Mount Wizard iti x Volume image authentication Please type your user name and password into the following fields User Name admin Password CETT Click OK to continue About Manual _ 16 7 3 Completing Mount Wizard I At this page you can review all selected mounting parameters When you click the Finish button Disk Protection starts mounting procedure and the image will then be plugged in to the Windows and you can start using the new mounted drive If something is wrong Disk Protection displays an error message and you can go back thru the wizard and change any parameter 176 TrustPort TrustPort Disk Protection Mount Wizard 5 x Completing the Disk Protection Mount Wizard You have successfully completed the TrustPor Disk Protection Mount Wizard Image C Disk Protection Images image O03 tdi Account tester Letter Automatic Mount as Read write E To mount image click Finish button About Manual Total number of available
116. ddisk for instance e What is the meaning of the texts in the Error column Each row contains a comma separated list of errors that were found to this wrong item See Description of error types in images e When I try to check an image just a message This file is already opened appears What s wrong This message means that you try to check an image that is currently in use In most cases is the problem that you haven t unmounted your image before you check it using CheckImage You can t check an image that is mounted at the same time e For what reason are there in the advanced mode the FAT 1 and FAT 2 buttons I ve opened an image but they re always grayed out These buttons can be used only if there is an inconsistency in FAT tables Than you can switch between these two FAT tables you choose the relevant one for repairing If the FAT tables are consistent there s no reason to choose one of them so the buttons are grayed out More information about choosing the FAT table can be found here e What can I do when CheckImage reports that This image is far too corrupted it can t be checked This image is so corrupted that it can t be checked and also it can t most likely be mounted In this case there s unfortunately no way to rescue your data saved in this image You can just format it or create a new image e If I try to run CheckImage on my CD ROM it displays an error in access to this file What s happened This
117. details is displayed There are scanning statistics displayed number of scanned infected and solved infections TrustPort Total Protection 2013 On Demand Scanner Scanning svchost exe 912 Target Verifying memory On the whole 275 files were scanned 0 infections were found and 0 of them were successfully solved ON E Shutdown automatically after the scan has been completed You can whenever interrupt the Scanner by pressing the Pause button or terminate it by pressing the Cancel button The paused scanning can be resumed by pressing Continue button scanning will continue from the point where it has been paused or finished by pressing Cancel button You can also set that the computers turns off after the on demand check is finished It can be done through the Shutdown automatically after the scan has been completed checkbox When the scanning is finished you can choose either Close or Display Report Display Report leads to displaying the scanning report in an Internet browser with the basic information about the antivirus software and the scanning results TrustPort Total Protection 2013 On Demand Scanner Status Finished Target C Testing 333 On the whole 735 files were scanned 1 infections were found and 1 of them were successfully solved E Shutdown automatically after the scan has been completed About Manual Display Report If the scanner finds a virus the program behaves according to the set
118. different types of view Large icons user accounts are displayed as standard named icons Small icons Simple list and Detailed list 116 TrustPort Keep IT Secure TrustPort Disk Protection Image Editor D TrustPort Total Protection P Shields Image Editor t Access Control H Antivirus Baeai enaeh ue a 8 H Secure Shredding l Encryption EC i Logs and Results H Network Utilities H Advanced Settings H About and Licenses CC WTrustPort DiskProtection mages limage00 1 tdi tester 2 GO Show categories placed in the tree for easier orientation If you want to change the view then simply click the particular icon in the toolbar and choose a new view from the displayed list lt lt TrustPort Disk Protection Image Editor e TrustPort Total Protection l Shields Image Editor H Access Control eps PABLO H Secure Shredding l Er Encryption ame Type _ Drives Administrator User Read only user H Network Utilities tH Advanced Settings d About and Licenses Cu WTrustPortiDiskProtection mages limage00 1 tdi tester 2 CG Show categories placed in the tree for easier orientation 10 5 1 4 11 Volume Image Properties I This window informs the user about an image and displays all available details about an image file 117 TrustPort Keep IT Secure TrustPort Disk Protection Volume Image TrustPort Disk Protection A Disk Protection Image Properties Image C Tr
119. ding methods from the most quick for common files to the most effective Peter Gutmann method with 35 shredding passes suitable also for very sensitive data possibility to generate report file with detailed list of deleted files shell context menu integration files folders drives possibility to wipe various system caches and histories unrecoverable deletion of file folder names sizes and locations on the drives possibility to wipe from the command line lt lt 15 2 In Shell context menu EA Program TrustPort DataShredder is fully integrated with the shell context menu and in this way it supports files folders and drives the wiping After installation it appears as TrustPort DataShredder new option in the shell context menu displayed in any file manager upon right mouse click on any file folder or drive ie 7 Local Disk C Home Share View GO Cy y Ar lila gt Computer Local Disk C gt a Mame Date modified Type Y Favorites E Desktop 00 5 29 2012 9 11AM File folc p Downloads Common 3 23 2012 3 52PM File fol El Recent places de 4 25 2012 12 50 PM Piero 2 18 2012 1 32 AM File folc Libraries Open in new window 4 23 2012 12 49PM File folc E Documents Pin to Start 5 29 2012 9 11 AM File falc a Music ATEN 3 23 2012 3 43 PM File folc E Pictures 5 30 2012 7 33 AM Pie folc Fe Videos et Daland 5 30 2012 7 26AM File folc Share with 3 7 2012 1 28PM File folc 2 Home
120. do any harm It is possible to treat the infected file safely in the quarantine restore delete etc e Delete the file containing a malicious code or a file being a malicious code itself will be deleted If you select an action that cannot be performed for any reason the On Access Scanner takes the following one according to these priorities Deny access Repair Rename Move to quarantine Delete The default option is Rename Warning The user action setting is not relevant to scanning mailboxes The Repair action is always performed as the first one If repairing cannot be performed then the Deny access action is chosen TrustPort Antivirus On Access Scanner FP TrustPort Total Protection a Shields On Access Scanner i 7 Firewall a Ste i Access Control Scan files on Scan all files H Secure ing ee SE a SE i Encryption 8 Scan only files with the following extensions t Logs and Results Exdude files with the following extensions PST i Network Utilities i Advanced Settings d About and Licenses Scanning options Scan compressed files Scan network drives More details to customize If you want to customize the advanced settings of real time scanner click the button below Show categories placed in the tree for easier orientatio Scan files e Scan all files scanning all files without difference in format or type e Scan only files with the following extensions antivirus soft
121. e The most contemporary malicious codes are being activated right after entering the computer This is because contemporary antivirus methods are able to react to the virus occurrence in a few hours Just these few hours are the only time when the code can do what it wants After this period the antivirus protection begins to win e Viruses activated on a certain date Attention do not start your computer tomorrow Danger of losing all your data a malicious virus is going to strike We used to meet such or similar prognoses quite regularly in the beginning of the nineties The antivirus protection was still in swaddling clothes if ever and it took months to react to a virus occurrence on the other hand it took many months before the virus could spread all over the world in the time before the presence of e mail and the Internet If the programmer wanted to start a real global epidemic it was enough to set a suitable date Not too early in order to enable the virus spread and not too far to let the antivirus companies eradicate it e Viruses activated on a certain act Special kind of viruses are those that are activated on some interesting act for example on every eighth reboot or on every pressing a certain key or a key combination Especially some macroviruses which used to add their comments to the politicians names written by the user were extremely interesting According to the seriousness e Nondestructive viruses Most of co
122. e Documents en Run as administrator 2 2010 12 59AM KEY File a Music im FSC Troubleshoot compatibility 6 2012 11 54 AM Applica E Pictures O sci ae 6 2012 11 53 AM CAR File B Videos FSC IS Application Inspector z i e co l A Homegroup el Mel pato ttha iD set Send to ETETA patt ihe Computer ia spil 0 2011 8 45 AM Windo Ey Local Disk C T Thu 17 2012 6 13 AM Applic Clicking on the Settings button opens the advanced settings dialog Don t scan applications larger than Applications that will have a larger size in kilobytes than the value set here will not be scanned by Application Inspector This is an optimization function because of the high false positive alarms for legitimate applications Action The default settings for pop up windows Show ask dialog Automatic mode If the ask dialog is disabled Application Inspector will automatically behave to all new applications that it detects as dangerous according to the Action settings The ask dialog will not be displayed Trust digitally signed applications Digital signature of applications is confirmation of the software author and a guarantee that the code was not changed or damaged All processes are then signed by trusted certification authorities approved by Microsoft Application Inspector implicitly trusts these processes and skips their monitoring Application Inspector Advanced Settings Don t scan applications larger than kB E Access Control 768
123. e address there is possible to use any address one address a range of addresses address with network mask or list of addresses For determination of remote port there is possible to use any port one port range of ports or a list of ports By a change of roll list Address type it is possible to specify the address type and therefore the way how the remote addresses will be entered With each change of the roll list is also changed the page content The remote addresses are entered as IP addresses in format X X X X or as the domain names For address entered as domain names are certain limitations the characters can be only alphanumeric and they also contain these signs During entering remote addresses as range of addresses or as an address with subnet mask it is not possible to use domain names as addresses there are allowed only the correct IP addresses By a change of roll list Port type it is possible to determine the port type and therefore the way how the remote ports will be entered For each change of the roll list is also changed the page content The ports are entered as full number values and they must be from 1 to 65535 64 TrustPort Keep IT Secure M A Create a New Rule Select a remote endpoint Select an address and port number for your remote endpoint gedo Hot adies 192 168 30 152 Manual Select an application This page of a new rule creation serves for application spec
124. e lines e DoS Denial of Service Type of a computer attack Servers are overloaded by many requests for example of displaying web pages The server is unable to manage such amount and falls down e Engine An antivirus program core which detects viruses e False alarm Situation when antivirus software makes a mistake and alerts to a non existing danger e Hacker A person who hacks software in the world of information technology Originally hackers were people who changed computer programs in order to use them in a specific environment In the course of time this term has got a different meaning and indicates all people who act illegally in the cyber world e Heuristics It is an analysis of a program code by an antivirus program that reveals unknown malicious codes based on suspicious sequences or commands e Hoax An e mail message that is not based on truth It warns against superdangerous viruses and appeals to send round e I Frame A security defect that allows executing an e mail attachment without user s click e In the wild Denotation of viruses and malicious software that can be met ordinary when working with a computer i e that are not laboratory matter e Keylogger A program that records pressed keys It is usually used for stealing some information login and password etc e Macrovirus A computer virus that is able to affect documents and spread through them Word Excel PowerPoint e Malign Software
125. e the Delete activation code button and confirm this intention in the window This will remove all information about the used activation code from this computer Attention By pressing this button there will be no removal or invalidation of the activation code from TrustPort s side This is only to eliminate the record from the computer 136 TrustPort Keep IT Secure O Registration Wizard Select a method to register Select a method to register your product Selection of registration Registration Wizard Do you really wish to delete information about a used activation code from this computer After deletion you can enter a new activation code Manual The window Activation code owner details will appear only in the case that TrustPort products are being registered with this activation code for the first time To advance minimum fields of Company Name User Name Country and E mail are required he Registration Wizard Activation code owner details The following information will be used in the licence key Company Name User name John Fish Address City To finish importing of key click Finish Registration Wizard Completing the TrustPort Products Registration Wizard Registration Wizard O License key file was successfully imported To register TrustPort products dick the Finish button Finish Cancel 137 TrustPort Keep IT Secure L Ma e 10 9 2 About The About tab provides inform
126. e to activate Silent mode when no pop up windows will be displayed 97 TrustPort Keep IT Secure d Shields d Access Control 7 Antivirus On Demand Protection Secure Shredding Encryption Logs and Results Network Utilities Advanced Settings About and Licenses Advanced Settings Advanced Settings A Do not allow to start any user process until real time protection is active E silent mode no popup will be shown Show categories placed in the tree for easier orientation 10 4 Secure Shredding Fa In this category it is possible to perform shredding of temporary system files sensitive data cookies shredding settings and the panic shredding function can be enabled lt lt Shields E Access Control E Antivirus Panic Shredding G Encryption Logs and Results H Network Utilities H Advanced Settings About and Licenses Show categories placed in the tree for eas Secure Shredding Secure Shredding TrustPort DataShredder allows you to to delete your files and folders safely and securely t also allows you to delete some system parts which can contain private data not encrypted in readable format for eg Cookies temporary files history records recycle bin etc Configure Here you can set the TrustPort DataShredder options These options are the wiping method and the creation of a file report Wipe Now You can shred some system parts here It is possible to
127. ed by relative way The value parameters can contain following parameters Parameter list help h Help display with parameter overview that can be used When the Help of TrustPort DataShredder is displayed the application is finished showmethods z Displays list of available shredding methods After that the program is finished Suppression of requirements to display confirmation about shredding of files and directories DataShredder will use the answer Yes to all of them version v View of version of TrustPort DataShredder application After the version is displayed the application is finished method m This parameter serves for determination what method should the file use for shredding The method is specified as a parameter entered after method or after m The possible method values can be found by showmethods Example dshrcon method usdod or dshrcon m quick genrep g Parameter starts function of generating the report files repfile r This parameter determines which file should be used for shredding reports Behind the parameter repfile must be entered the path the report file It the path was not entered the parameter will be ignored askrep p DataShredder will ask before shredding for the file name where the report should be recorded repover 0 Parameter starts a function of file overwriting before each shredding This parameter can be used only together with the genrep parame
128. ed of scanning more objects than is limit of command line AVC exe tl setting st AVCC exe tl setting Ist le Display list of installed engines and their definition files displays the list of installed antivirus engines and antiviral signatures files ns No statistics will be shown using this switch will cause that no statistics will be displayed after the scanning has finished man Open the Antivirus User s Guide 8 Internet Scanner p For a complete protection of your computer against malicious codes it is also necessary to scan your Internet communication In case of your computer being connected to the Internet this feature can detect and remove incoming malicious codes before they are written to your disk so they cannot do any harm This protection consists of four parts Mail Antivirus Mail Antispam Web Scanner and Parental Lock These parts are described in appropriate chapters 8 1 Mail Antivirus This feature serves for scanning your email communication The scanner checks emails body and attachments In case of detecting a virus the email or its attachment is immediately moved to quarantine or deleted in dependency on your settings Instead of the infected file a text file with basic information about the infection is attached to the email You can see an example of such a text file on the picture below File Edit Format View Help TrustPort Mail Antivirus ReplacedBlockedFileO Notepad Virus EICA
129. eisalslaaleolisoalesaalz ele Ge it de Gh Gi Gi d i ic Lnone_ 18 906 896 of 45 648 696 k free He Lnone_ 18 906 896 k of 45 648 696 k free ec esting Warcnives mew It Et Confirm Algorithm About Manual 14 4 3 Open an existing CAR archive E If you want to open an existing CAR archive you only need to locate this file and press ENTER or doubleclick left mouse button on this file Total Commander recognizes that the file is a CAR archive and calls CAR manager plug in You will be asked to type in the password 158 TrustPort Keep IT Secure el Total Commander 7 57a AEC Ltd Files Mark Commands Net Show Configuration Start elelzigeelsaislaalaaleeloeraalz cl as Ge Of Ga Oh Gi Qi E Qe v Lnone_ 18 231 232 k of 45 648 696 k free XA lc none 18 831 232 k of 45 648 656 TrustPort Archive Encryption 2 CAR Encrypted Archive Password sees CAR plug in remembers the name and password of the last opened CAR archive file If you want to force CAR plug in to forget last entered password try to open another CAR archive file and at the password request window press ESC Total Commander s panes work independently meaning that if you want to open the same CAR archive on both panes you will be asked twice to enter the password and if you want Total Commander to forget the password of two open archives you will have to do it on each pane Note Total Commander plug in interface doe
130. elves to this place The second case may concern so called overwriting or destructive viruses One of their drawbacks is that they destroy or damage the host program When you try to execute it the virus is activated but the program itself is not able to run It is disadvantageous not only for users but also for the virus itself because the user is warned about its existence Hence the overwriting viruses are less common than the non overwriting ones e Overwriting viruses It is not sometimes possible to detect and almost never cure some file viruses without checking writing to disk The viruses are very simple and direct in their actions They overwrite the host program with their own code which devaluates it That is why they are called overwriting viruses When calling the host program the viruses need not to be installed to memory at all although there are some cases when they do it and they just overwrite some program on the disk by themselves The program is chosen using some key that is specific for every virus The program itself becomes worthless and calling it only activates the malefactor and then an error occurs e Extending viruses If the file virus already got into the system and has not been preventively detected it can become parasitic Viruses know several ways of replication and one of them is the method of adding the virus body to the end or the beginning of the file whichever executable file it is the most frequent
131. emovable volumes CD ROM USB t Logs and Results i Network Utilities Ask before scanning of removable volumes tl Advanced Settings Additional features About and Licenses Prepare TrustPort USB Antivirus cing on the button Prepare BartPE plugin Prepare Windows PE CD Show categories placed in the tree for easier orientation By pressing the button the dialogue with the selection of interchangeable disks will be displayed where installation of the USB Antivirus can be achieved Prepare TrustPort USB Number of remaining exports is 5 Select removable drive min 151 MB All removable disks detected in the system are shown and only the one which satisfies the minimum disk space can be chosen Clicking OK starts the installation process of the USB Antivirus on the exchangeable disc 62 complete Copying 96 items from engines to engines 62 complete ec More details which is completed with information about its successful implementation On Demand Scanner O TrustPort USB succesfully copied All the required files for the correct functioning of the USB Antivirus are copied The current configuration of the antivirus is transferred 42 TrustPort Keep IT Secure 9 2 Using USB Antivirus USB Antivirus is used to monitor the data that are transmitted to the USB drives After inserting the USB drive into the computer the autorun antivirus is automatically triggered A standard TrustPort a
132. ention if there are blank spaces in the path it is necessary to insert the path into quotes AVC exe C Documents and Settings Jirka My Documents smlouva doc AVCC exe C Documents and Settings Jirka My Documents smlouva doc ad Scan all disks all disks including network disks will be scanned adli Scan all local disks all local disks will be scanned adr Scan all removable media all removable media will be scanned rs This option is enabled only in console mode together with option q when the output information is reduced only to the name of the found infection AVCC exe rs q file exe l x Log level sets the log verbosity level by number x from O to 2 with the following meaning e 0 silent mode 1 normal mode 38 TrustPort Keep IT Secure e 2 verbose mode AVC exe 2 ad AVCC exe 2 ad c file Read configuration from specified XML file loads the configuration from an XML file cs file Read config from specified XML file and save it loads and saves the configuration from to an XML file r file Write the scanning report to the specified XML file writes the scanning report to an XML file tl file Read targets to be scanned from the specified file loads scanning targets from an external text file This file must include a list of targets i e paths to objects on the local drive or on LAN you want to scan Each target must be on a new line Usable for example in ne
133. epair it A INSTALL SETUP SETUP ZIP 4116 MB Crosslinked Too short Delete this item For Help press Fl 186 TrustPort Keep IT Secure Damaged objects are listed in the table in the middle of the window For each object there is information about its name with the full path size just for files errors and the method which will be used by repairing More information about errors and relevant repair methods is on page Description of error types in images e Disk Protection Checklmage ofS D File View Help EE For Help press F1 Now the last remaining action is to repair the image The repaired image is closed in the end 17 4 Using CheckImage in advanced mode WEN When you switch to the advanced mode you can also as in the simple mode check an image E Disk Protection Checklmage Gs View Help SIS ca ea AA Delete this item AAA IMAGES advancedO3 pna a Delete this item AI INSTALL IMAGES advanced04 p1 Y Delete this T e en my Repair it A INSTALL SETUP SETUP ZIP Repair it shorten ed Too short Delete this item Repair it extend Additional features in the advanced mode compared to the simple mode e CheckImage lets you choose on which FAT table you want to base the image check and repair e You can also change what you want to do with wrong files and directories if there are more possibilities to choose from e There are three different views you can use to change the act
134. ept for emails which sender is defined in the White List Black List for unsolicited emails Such emails will be marked as SPAM and you can manage them in your email client Warning This option affects the monitoring of mail in all used e mail clients 53 TrustPort Keep IT Secure l Shields e Real Time Protection E Firewall Web Browsing Protection E Application Inspector Access Control E Antivirus H Secure Shredding H Encryption Logs and Results H Network Utilities H Advanced Settings E About and Licenses E mail Scanner Check emails for spam White List Emails delivered from the White List will not be checked for Black List Emails delivered from the Black List are automatically marked as More details to customize Advanced antispam control settings Spam Ham threshold e mail s header of marked spams Show categories placed in the tree for easier orientation FP TrustPort Tot E Shields i Real Time Protection Firewall Web Browsing Protection Application Inspector H Access Control H Antivirus tl Secure Shredding i Encryption H Logs and Results H Network Utilities H Advanced Settings H About and Licenses Show categories placed in the tree for eas al Protection Advanced settings Spam Ham Threshold Add Header X Spam Found YES Subject Modification Maximum scan size kB Manual er orientation e Spam Ham T
135. er after selecting the correct location the update is automatically executed 10 3 6 2 URL Address The list of URLs that will be used for downloading the update is displayed on this page As you can see it is a list of mirrors that provide the same update packages After starting the update the update agent tries to connect the first server in the list and download the content of an update package from this server If the connection fails the agent tries to connect to the second server in the list etc 96 TrustPort Keep IT Secure Offine Update URL Address amp http download trustport com update Le Logs and Results E Network Utilities H Advanced Settings H About and Licenses Show categories placed in the tree for easier orientation The URLs are sorted in the same order as they will be used for update e the first address on the list will come first If the package cannot be downloaded the following address is tried Otherwise there is no need to continue and the other addresses will be ignored For the administration of the update servers use the Add Edit and Remove buttons The order of the URL addresses can be changed by the arrows on the right side of the list 10 3 7 Advanced Settings On this tab it is possible to use the checkbox to set that after computer starts the user processes won t be started until the Real Time Protection is started Besides it is possibl
136. es for dialog window display for advanced setting of TrustPort Personal Firewall If you are not an advanced user or you do not have the relevant knowledge of TCP IP network then do not adjust options in this dialog window 56 TrustPort TrustPort Personal Firewall Global Settings FP TrustPort Total Protection ced Confiquration Manag Shields E tege _ p Real Time Protection TrustPort Total Protection 2013 po Email Protection E Firewall i EEA Web Browsing Protection ME dude i Access Control Enable DNS Resolving Firewall to use your defined H Antivirus 1 several pages in this EJ Secure Shredding ia EE o SES a Minima ols and intern Encryption ESA br experienced users only Be E Logs and Results Create rules for trusted processes User s Guide for more E Network Utilities Stealth ports and firewall rules E Advanced Settings H About and Licenses A 8 Deny unknown connections but ask Permit unknown connections Show categories placed in the tree for easier orientation Apply Enable DNS resolving serves for automatic translation of domain names for firewall TrustPort Personal Firewall needs during the operation the possibility to covert the domain names and that is way it is recommended to have this option always permitted If you do not allow this option you take risk that your computer would not communicate correctly in the local network or in the Internet Enable DHCP serves for permission of
137. ess file ZIP PKZIP WinZip ZOO ZOO Compress file GE MS Compress Expand 2 5 Antivirus protection glossary Explanation of the basic terms you can meet in the world of malicious software e Update Upgrade In the terms of antivirus software it means the completion of a computer viruses database update or the antivirus scanner engine modernizing upgrade Backdoor Applications that open a computer mostly without user s knowledge for attackers it concerns not only data stored on it but also a way to future attacks Boot sector A floppy disk boot sector or a hard disk boot sector It consists of parts of a program code that can be modified and some viruses abuse it for their spread they abused it mainly in the past Worm It is a malicious code that uses services of any network local or global for its spread A computer virus needs host applications for its spread whereas a worm is usually malicious by itself An exception is so called companion viruses that take names after exe files but their extension is com They exploit the fact that this extension is preferred by operating systems DDoS Distributed Denial of Service Advanced version of DoS in which the server is attacked from many places at the same time This increases the chance of success 22 TrustPort sao e Dialer Malicious software that hides in web pages and is able to redirect the phone connection to commercial mostly foreign phon
138. everal times in a week preferably every day The TrustPort Antivirus update is realized through the Internet 11 1 Updating The Update virus definitions function from the Quick launch menu enables updating your antivirus database with the newest known viruses and updating the antispam rules In the opened window you can see the updating process 36 TrustPort Antivirus Updater Le MS TrustPort Antivirus Updater Downloading Downloading Xenon from http download2 trustport com update About Manual Led Use this function only in extraordinary cases It is more advantageous to set the automatic database update in the Update tab that takes care of the regular update according to the set parameters During or after the update you can click your mouse on the arrow on the bottom part of the window and display the information about the update process and see the updated modules 138 TrustPort Keep IT Secure TrustPort Antivirus Updater Downloading Downloading Argon from http download2 trustport com update About Manual Package Size TF Trustport 0 bytes xenon 32 8 MB TF Argon 2 3 MB TF Antispam Database Update 487 9 kE TF Parent Lock Database Update 1 0 MB If the present antiviral signatures and or antispam rules are actual an announcement that update is not necessary will appear The same information will be displayed in case that the update isn t necessary In Windows 2000 and XP is the same in
139. evices marked in gray cannot be managed by Device Security D TrustPort Antivirus Access Control Device Security DG USE a Intel R 823016 ICH Family USB Universal Host Controller 27CA Ge USE Root Hub gj USB Mass Storage Device El Intel R 828016 ICH7 Family USB2 Enhanced Host Controller 27CC 8 USB Root Hub Intel R 828016 ICH7 Family USB Universal Host Controller 27CB few ig USB Root Hub Intel R 828016 ICH Family USB Universal Host Controller 27C8 gd USB Root Hub E a Intel R 828016 ICH Family USB Universal Host Controller 2709 El USB Root Hub ER USB Input Device A HID compliant mouse SS Media Microsoft Streaming Service Proxy El 4 High Definition Audio Device IDE CDROMLITE ON_COMBO_SOHC 4836V_ Show categories placed in the tree for easier orientation 81 TrustPort Keep IT Secure If the user wishes to be alerted whenever the device is blocked in the system he can set this option in the top of the window by selecting the Show notification for blocked devices Otherwise notification will only appear the first time the device is inserted into the system TrustPort Total Protection 2013 Device USB Mass Storage Device has been blocked o ei A list of all the devices for which Device Security can be applied can be updated with the Refresh button 10 2 4 Autorun Protection I Page Autorun Protection enab
140. evious results won t get lost you can continue to edit it after that you eventually switched back again 17 4 3 Different view modes B CheckImage offers you three different view modes e All errors In this basic view you can see all wrong items in one list Each line contains the path of the wrong item its size errors separated by comma and method which will be used by repairing You can sort the list by several columns by clicking on their header buttons 189 TrustPort Keep IT Secure E Disk Protection Checklmage e File View Help ln eo cage A WNISTALL IMAGES advancedO png 23 KB Crosslinked Too long 1 Delete this item d INSTALL IMAGES advanced03 pnq Crosslinked Too long 5 Delete this item a INSTALL IMAGES advanced04 png 20 KB Too short 2 KB Invalid Repair it A INSTALL SETUP SETUP ZIP 4116 MB Crosslinked Too short Delete this item e Crosslinked groups Some files or directories in the image can be crosslinked together see Description of error types in images On the left side of this view you can select which group of such together crosslinked items you want to see on the right side there is a list of items you selected There is one more column with information about priority by repairing and the items are sorted by this priority This priority is related just to items that are going to be repaired You can change the priority Irreparable items are right at the bottom of the li
141. ew address by clicking on the Add button edit an address by the Edit button or delete it by the Delete button 10 1 3 Firewall A On the page Global Firewall Settings is set the main functionality of TrustPort Personal Firewall TrustPort Personal Firewall makes possible to work in four modes that have direct influence on the safety of the computer connection with the Internet or with the local network The firewall modes can be switched by the slider on this page With each slide movement there is shown a name and description of the selected mode on the right side 55 TrustPort Keep IT Secure TrustPort Personal Firewall Global Settings E Shields Global Settings i be Real Time Protection Email Protection E Web Browsing Protection Eb ini oi Application Inspector H Access Control This option forces TrustPort Personal Firewall to use your defined Fl Antivirus firewall rules You can manage them on several Pages in this aie a O aa Pre communition so it is recommended for experienced users only Be H Logs and Results wery careful managing your rules see User s Guide for more t Network Utilities detailed information about this option and firewall rules i Advanced Settings management H About and Licenses Show categories placed in the tree for easier orientation a Apply List and description of TrustPort Personal Firewall modes e Permit all connections Option Permit all connections makes possible
142. ext Run Time DS New scanning task 5 19 2012 11 32 3 E Quick 5 19 2012 11 32 4 E Encryption H Logs and Results H Network Utilities H Advanced Settings About and Licenses Show categories placed in the tree for easier orientation You can stop the running task by the Stop task button Properties of the not running tasks can be changed by double click on the proper line or by the Properties button You can learn more about task properties setting on the Scheduler setting parameters of running task page By clicking on the Delete button you can delete a selected task 10 3 4 1 Creating new task While a new task is created you can set few parameters of the task You can choose the scanned area disks folders when the scanning starts and how often is the task performed 91 TrustPort Keep IT Secure Create New Task Please enter task name and select command Scan local disks Silent scanner scan all local disks Normal priority adl E About and Lig Show categories placed in the tree for easier orientation You can set Task name name of the task chosen by user e g D disk scanning Command what area disks folders is scanned You can select scanning of registry all removable disks all local disks all disks or define your own target disk folder If you select the user defined parameters option you can specify the scanning properties
143. f the file is kept by another application while you want to wipe it a dialog window with the buttons Abort Retry Ignore and Ignore all appears After every wiping process the result window is displayed lt TrustPort DataShredder Operation finished successfully 15 4 Console application BW Console application TrustPort DataShredder is designed for advanced users and the network administrators who need to start the shredding from the system Windows console or from the scripts Console application TrustPort DataShredder is installed to the same directory as the graphic version of TrustPort DataShredder application If you wish to use this console application then start Command Prompt In Windows 98 and Me the command prompt is also called the MS DOS prompt by selecting Start Programs Accessories Command Prompt and go to the directory where is the application TrustPort DataShredder installed for example C Program Files TrustPort DataShredder Bin By writing down the program name dshrcon exe and by pressing Enter is displayed the Help for the program The detail parameter description is stated below Program dshrcon exe has the following syntax dshrcon exe parameters file directory If there are not entered any parameters then only help is displayed and the program is finished For values file or directory is possible to enter any file or directory that you want to shred The file or directory can be also specifi
144. formation also displayed on an information balloon in the notification area of the Windows status bar D 100 TrustPort Antivirus Updater TrustPort Antivirus Updater e TrustPort Antivirus has been successfully updated About Manual Package Trustport Xenon at Argon Antispam Database Update TF Parent Lock Database Update 11 2 Executing from the command line The update module can be set from the command line with the use of parameters after the name of the AVUPDATER EXE file TrustPort Antivirus Updater avupdater exe parameters V h Command line parameters help Start in quiet mode Log level O silent 1 normal 2 verbose cfg cfgfile conf Force external configuration au Ask user if start the update man topic Open Antivirus User s Guide and display selected topic rae Detailed description of parameters Each command and switch must be preceded by the switch symbol which is dash or slash In the following list there are all command line parameters supported by the AVUPDATER EXE utility 139 TrustPort Keep IT Secure cfg cfgfile conf man Command line parameters help displays all the command line functions Start in the quiet mode the update program will run in the so called silent mode i e without any output information Log level sets the log verbosity level by the number x from O to 2 with the following meaning 0 O silent mode 1 n
145. g Protoc i 4 24 2012 Connection Denied Process NA Direction Incoming Protoc Selected log message Connection Denied Process NA Direction Incoming Protocol UDP Sou K S Type a rule name Each rule of TrustPort Personal Firewall application must have its name The name is entered on this page This name is automatically prefilled It depends if there was selected some predefined rule or if there is created a new one The rule name must contain only the permitted characters 62 TrustPort Keep IT Secure A Create a New Rule Type a rule name Type a name which will represent your new rule WE F Select main rule preferences Feature Direction determines for which communication direction this rule will be applied For example if the selection Outgoing is chosen some application will require a new connection from this computer to some Internet server and then this rule will be applied and the required operation is done The possible values when specifying the direction are Outgoing Incoming and Both directions Feature Protocol defines for which protocol the rule will be active There can be selected the following protocols ICMP UDP TCP and combination of TCP with UDP TrustPort Personal Firewall also enables to use other protocols Option Others serves for these other protocols After selecting this option another editing element is displayed where the number of the protocol can be in
146. g and exchange of configurations between individual users and it facilitates the work for the administrator It is possible to configure freely sets of rules this includes setting the priority of rules selecting protocols and directing the monitored connections For easier orientation of the user in individual net protocols set of rules are supplied together with the personal firewall to ensure that the most extended common protocols are sorted into according categories Each rule makes possible to carry out also logging of the arising incidents TrustPort Personal Firewall is set by default in a way that all passing connections are blocked Only after its configuration rules that permit passing of certain data flows are created The solution is supplemented by a monitor module connection on the level of TCP and UDP protocols that gives to the user the current overview over all network activities The user can therefore easily check the efficiency of adjusted filter rules In transparent display the user can quickly reveal all the active network applications that he did not know about With the help of another module WholIs client the user can verify identity of individual domain names and check in this way to whom he wants to permit the access into his computer Another addition to this module is a client that is able to determine reliably the geographical position of the given residence For more detailed tracing of the individual connecting routes
147. ging should be e Low no details will appear in log e Medium the log of the antivirus software activity will contain only the basic information of done actions This is the default level of the log e High the log of the antivirus software will contain a detailed description of done actions The Log source options allow you to select which program functions you want to log information of On Access Scanner events related to the On Access Scanner are recorded into the avoas log file e On Demand Scanner events related to the On Demand Scanner are recorded into the avods log file Internet Protection events related to the Internet Protection are recorded into the avins log file Updater events related to updating are recorded into the avupd log file Antivirus System events that are not related to any of the previous parts e g scheduler are recorded into the avsys log file The Log files size limit option allows you to set the maximum log file size in kilobytes Events will be logged into this file The default value is 1 000 kB In case of exceeding the predefined file size it will be shortened by removing the oldest records 123 TrustPort Keep IT Secure wg TrustPort Antivirus Antivirus Log D TrustPort Total Protection P Shields Antivirus Log H Access Control r Secure Shredding a ce H Encryption Level of detail El Logs and Results Firewall E Antivirus Low Med
148. group ARA AON PN 5 29 2012 1 04PM File folc 4 23 2012 1 29PM File fal Include in library P Computer 4 25 2012 1 50 PM Text D 12 Local Disk C Send to j E In case of drives there are three options available Shred data on the disk Shred free space and Shred the whole drive which is a combination of the previous options 163 TrustPort Keep IT Secure Disk Tools Computer Computer View Drive A 4p Computer v E Search Computer pa Y Favorites 4 Hard Disk Drives 3 B Desktop a Local Disk C Local Disk D lg Downloads 7 A Pm E eres ieee 17 9 GB free of 43 5 GB 1 00 GB free of o Rezervovano syst mem E Open in new window ae SP 51 0 MB free of 99 9 ME Pin to Start Documents A 2 Turn on BitLocker a Music 4 Devices with Removable Storage 5 g i Ca Encrypt archive Pictures ER Videos PO DVD CD RW Drive F Shred data on the disc 18 TrustPort DataShredder BW shred free space Share with Y Homegroup lt lt l BD ROM Drive ao Computer GA Include in library EE Local Disk C 9 8D ROM Drive 1 a Kg y Local Disk Ds If you select a drive click the right mouse button and run any command from TrustPort DataShredder item you will be asked for confirmation It is recommended to close all applications while you wipe the free space on the drive or all data on the drive 15 3 Data shredding Mi The d
149. h of their chains as possible until they run into a part of the chain that has occupied some file before This applies to methods Repair it and Repair it extend For method Repair it shorten a file occupies its chain until it reaches its size specified in parent directory e Too long Description The chain of this file see first paragraph in the description of Crosslinked is too long Its size is bigger than the size of this file recorded in the file s parent directory The length of the chain is in the parentheses next to this error Solution There are two possibilities how to repair this error Repair it shorten this method shortens the file chain so it fits the size specified in the parent directory Repair it extend on the other side if you choose this method the file size in the parent directory will be increased to the chain size e Too short Description The chain of this file see first paragraph in the description of Crosslinked is too Short Its size is smaller than the size of this file recorded in the file s parent directory The length of the chain is in the parentheses next to this error Solution The only way to repair it is to correct the size entry in the parent directory in agreement with the chain size so the file gets smaller You can t enlarge the chain because you don t know where it should continue For the last cluster in the chain there is no reference to the next cluster e Too
150. he On Access Scanner finds an infected file an information window with the following information will be displayed Affected file the name of the infected file Reason the reason why the On Access Scanner called the information window Name if the reason is a virus its name is displayed here Action which action the On Access Scanner responded 32 TrustPort Keep IT Secure TrustPort Total Protection 2013 INES TrustPort Antivirus On Access Scanner A VIRUS ALERT II An infection has been found You can see the details about the infection and performed Affected file C Testing eicar com Reason Black listed Name EICAR Trustp ort Action Renamed About Manual Which action the On Access Scanner responds depends on its settings By default the option Rename is selected If you select an action that cannot be performed for any reason the On Access Scanner performs the following one according to these priorities Deny access Repair Rename Move to quarantine Delete 6 2 Choosing an action for the identified virus If the On Access Scanner finds a virus and the Ask user mode is set in the On Access Scanner settings a user can select one of the following actions Deny access Repair Rename Move to quarantine Delete The selected action is used to clear the virus infection If you select an action that cannot be performed for any reason you are asked for selecting another action No
151. he Recent group you can set the number of recent images which will be displayed in the list of recent images in the Disk Protection Quick Launch either as number of images in the list of recently opened images in the Image Editor If you want to clear all recent lists including the recent list in the Recent mount editor when Windows are logging out the user then check Clear recent lists during logoff If you want to do it immediately then press Clear now button now 104 TrustPort Keep IT Secure TrustPort Disk Protection Configuration H Access Control E Antivirus E Secure Shredding l Encryption ES Drives Recent image list contains last 10 images E Clear recent lists during logoff H Network Utilities Search Advanced SEE Search option allows you to find Disk Protection image files in the selected About and Licenses destination and add them to the auto mount and recent lists You can search on any hard drive network location or any removable media Limit search history to 105 Show categories placed in the tree for easier orientation You can also limit the image search history in the Search tab in the Mount manager and clear this history immediately by Clear history button lt 10 5 1 3 Mount Manager 10 5 1 3 1 Auto mounts De this page you can manage Disk Protection auto mounts You can add and remove images which will be automatically mounted during the system startup change their mounting
152. he use of ICMP packet and ICMP code determines use in the frame of ICMP type Some of the ICMP types have no ICMP codes If there is checked the button Use any ICMP types and codes then there will be allowed or prohibited any ICMP types and ICMP codes in the frame of the newly created rule If this check box will not be selected then it is possible to define ICMP type and ICMP code The type and code can be chosen from values in the rolled up lists In case that it is necessary to use some other ICMP type or code there is available the last option in the list called User defined 65 TrustPort Keep IT Secure Si Create a New Rule Choose an ICMP parameters E Use any ICMP types and codes ICMP Type Select ICMP type that you want to use ICMP Code Select ICMP code that you want to use Manual Completing the New Rule Wizard This page of wizard says that there is enough information to complete the required operation By pressing Finish the creation itself will be done and the New Rule Wizard is finished lt 10 1 3 2 2 Edit Rule PE General dialog window Edit rule General serves for editing of the main rule features For all the control elements are valid the same rules as for control panel on page Main rule features of the New Rule Wizard TrustPort Total Protection 2013 Edit Rule Action Permit CC Deny C Ask user even if rule is fired Log when this rule matches Local endpoint this dialog wi
153. his option slows the scanning down but on the other hand increases the computer protection e Scan modified file after close antivirus program will automatically scan the files after their editing amending of content and saving 10 1 2 E mail protection 10 1 2 1 E mail clients Antivirus protection settings of email clients can be changed in this section The list contains all supported email clients and next to each entry it is also stated if for this client support has been installed during the installation For e mail clients who have support installed it is possible to choose if antivirus protection is to be used or not Warning To change the settings in this section administrator privileges are required Antivirus protection of the email client will occur only in the case if its usage is allowed In the opposite case only a general scan of incoming post will occur and according to the settings in Mail Antivirus and Mail Antispam TrustPort Antivirus Internet Protection E mail Scanner FP TrustPort Total Protection ie E mail Scanner i Real Time Protection EN mae Firewall i Web Browsing Protection l Application Inspector H Access Control Microsoft Outlook Installed H Antivirus 5 Outlook Express Mot installed H Secure Shredding el Windows Mail Not installed E Encryption Mozila Thunderbird Installed H Logs and Results BAD The Bat Not installed H Network Utilities H About and Licenses Show
154. hreshold here you can set the ratio by which emails will be divided to solicited ham and unsolicited group spam The range is O 10 000 the default value is 5 000 Increasing the value will cause smaller probability of passing a spam email without marking but also higher probability of marking a solicited email as a spam e Add Header here you can specify a header that will be added to an email in case of marked as e Subject Modification the text specified here will be put to the subject in front of the original 54 TrustPort Keep IT Secure e Maximum scan size kB maximum size in kB when e mails will be checked for spam Default value is 400kB By clicking on the White List or Black List button you can control the lists of e mail addresses which are not scanned for spam In the White list there are e mail addresses of senders who do not send unsolicited e mails Their e mails are never marked as spam The Black list contains e mail addresses which are sources of unsolicited e mails E mail from any of these senders is always marked as a spam Eh Shields Real Time Protection dE List of trusted email addresses E mail addresses E Access Control anthony email com E Antivirus 4 Secure Shredding E Logs and Results H Network Utilities H Advanced Settings H About and Licenses Edit Delete About Manual Show categories placed in the tree for easier orientation You can add a n
155. ialog window displayed below informs you about the shredding process Progress counter shows percentage of current file processing Above this progress counter a special text is displayed This text shows current and total number of passes Total number of passes corresponds with the selected wiping method see Configuration TrustPort DataShredder TrustPort DataShredder Shredding file Current 1 Total passes 3 File size 77 254 656 Bytes C Testing sc shred gimp 2 8 0 71c1 setup exe 145 Waming lf you cancel this action the data will not be comecthy destroyed Most of operations which TrustPort DataShredder does can be interrupted by user This interruption can be done by clicking the Cancel button Every file or folder that you want to wipe must be confirmed For the confirmation this dialog is used Confirmation Ai Confirmation Are you sure you want to shred file TC Testing sc shred 000 png CET Cee e Gees Corel If you are sure that you want to wipe all the selected files or directories select Yes to a button which will prevent from displaying the confirmation window for each file or directory Button No will skip the 164 current file or directory the process then continues with the following file or folder If the file or directory has any attributes then a dialog window with following notice displays The file is a file with attribute Are you sure you want to shred it I
156. ification that can be added to the rule as other evaluation criteria If the connection parameters agree protocol gt local and remote IP address gt with port s and connection direction with rule parameters then there is evaluated as the next criteria the application that tries to make this connection If the rule parameters and connection agree and at the same time there is agreement with the application on this page then the action that is allocated to this rule is done The state of check box Use any application determines if the application should be used as the next evaluation criteria or not If checked the application will NOT be used as these criteria When there is written the name and the path to the application or when there is done the application selection by Browse the application is determined By using the button Use system you can set the application as an idle system process If the application is changed it means reinstalled by the new version etc then it is necessary to allocate it to the rule again It can be done by the button Update If you don t want Firewall to check application checksum then use the checkbox Disable hash checking A Create a New Rule Select an application Select an application for your new rule Choose ICMP parameters With the ICMP protocol it is possible to determine what type of ICMP packet it is by defining the ICMP type and code ICMP type is a number that specifies t
157. image and it can be increased until maximum image size to do this use Image editor 168 TrustPort Keep IT Secure e maximum limit size it is the maximum size that the image can be increased to e status it is the state of image and it can be Unmounted or Mounted At the bottom of this window is a special Edit image button If you click this button then Image Editor will be started and selected image file automatically opens for editation lt lt 16 3 Quick Launch I This application runs in Windows tray and allows you to quickly launch any Disk Protection application It allows users to create new encrypted disk or mount unmount images C PROGRAM FILES 4380 TRUSTPORT DISKPROTECTION IMAGES IMAGE003 TDI C PROGRAM FILES A86 TRUSTPORT DISKPROTECTIONN IMAGES IMAGE002 TDI TrustPort tray is automatically started during Windows logon Disk Protection Quick Launch also collects all classic Windows shortcuts located in Shortcuts DiskProtection folder in your installation directory for example C Program Files TrustPort Disk Protection Shortcuts DiskProtection You can add other shortcuts to this folder or modify existing if you want lt lt 16 4 Command line parameters ES Disk Protection uses command line parameters which specifies operation that should be performed If you don t specify any command line parameter then Disk Protection expects mounting request and runs Mount Wizard TrustPort Disk Protect
158. ime the malware will not install correctly on the computer Application Inspector may be run in three modes e Secure Mode in this mode the Application Inspector will automatically block all untrusted and unsigned applications without user intervention Notice will only be displayed on the desktop that the process was blocked e Recommended Mode in this mode the Inspector monitors the behavior of potentially dangerous applications all files less than 768Kb and if an attempt is made to intervene with protected system locations a dialog asking the user for further action will appear see figure above At the moment 95 of all detected viruses are in files less than 768kB Implicitly set barrier by TrustPort e User Defined Mode this mode allows the user to customize the behavior of Application Inspector This is done using the Advanced button This option is recommended only for advanced users By default the Recommended mode is active e Turn off Application Inspector Application Inspector will be temporarily disabled and potentially dangerous applications will not be monitored TrustPort Antivirus Application Inspector FP TrustPort Total Protection E Shields Real Time Protection Application Inspector Email Protection fd Firewall Web Browsing Protection E Access Control The Application Inspector automatically blocks all untrusted E Antivirus applications and all the applications without digital signa
159. imit SE You can choose the encryption algorithm which will be used for the new image It is not possible to change the encryption algorithm of already existing image so you have only one chance to choose it at this time You have two choices AES Rijndael and CAST128 algorithms Default option is AES Rijndael algorithm The last option what you can setup on this page is selection if you want to automatically mount the new created image at system startup If you check the option Mount it at startup wizard will add it to the list of automatically mounted images It is possible to add any image to this list later using auto mounts manager lt 16 6 2 Create Administrator s Account M This step is focused on creation of a new account in the image which will be used for authentication to this image Disk Protection automatically fills up the user name field with the user name gained from the Windows system You can also change it if you want Remember that the user name can contain an alphanumeric character and is case insensitive 2 TrustPort Disk Protection Create New Image Wizard jel Create Administrator s Account Please enter your user name password into the following fields These credentials will be used Gen new oe account creation Password Se Click Next to start creating About Manual Enter the password into relevant fields d It is crucial to choose a strong password It is possible to leave pas
160. ing i Secure Shredding i Encryption t Logs and Results H Network Utilities H Advanced Settings t About and Licenses Show categories placed in the The Quarantine is implicitly located in the quarantine directory in the installation directory You can change this location to any existing directory by clicking on the icon in the upper right corner 90 TrustPort Keep IT Secure 10 3 4 Scheduler Thanks to the scheduler you can make the On Demand scanner be launched automatically Users can choose the scanned area disks folders when the scanning starts how often is the task performed and some other options If you want to scan a particular disk or folder regularly you can create a task by the New task button For a new taks you can set the destination of scanning date and time of the first start and some more parameters If you want to learn more about creating new task go the Scheduler Creating new task There are no tasks when the TrustPort Antivirus is installed You can use the check box to enable disable launching the task All the created tasks are listed including Task name Next run time Last run time State indicates if the task is running or not Last result last action performed during on demand scanning including the result code Creator user who created the task TrustPort Antivirus Scheduler PP TrustPort Total Protection Shields E Access Control Task Name N
161. inistrator write format bat is also valid System variables c Ywindir system32 exe all exe files in the directory c Windows system32 are filtered Registry A list of all registry values protected by Application Inspector All registry branches are saved for better visibility into different categories like System Safety Autostart Internet Shell Browsers and User defined Right clicking the value can duplicate it and add it to restricted locations After clicking the Add registry button you can insert your own branch to registry and you can also choose a category to which it is assigned Formats of supported key names Classical HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Run the entire branch run will be filtered including all the strings Simplified entry HKLM SOFTWARE Microsoft Windows CurrentVersion Run a shortened entry of registry branches hives HKCR HKCU HKLM HKU HKCC HKPD Wildcard SOFTWARE Microsoft Windows CurrentVersion Run all the branches such as HKLM HKCU HKCR will be filtered Protection of selected string HKLM SOFTWARE Microsoft Windows CurrentVersion Run icq With symbol only one string is selected not the entire branch In this example only the string icq in branch run will be filtered 73 TrustPort B stPort Antivir Application Inspecto ge TrustPort Total Protection 2013 gasses _ ee Application Inspector Advanced
162. ion a modification of creation parameters used in the installation of Disk Protection application the name of file name with full path which will be used for 170 TrustPort Keep IT Secure the new Disk Protection image TDisk exe c am im f alg cast ua henry is 512 c Program Files TrustPort Disk Protection Images image00oo tdi e Edit an image file user account management increasing the limit etc file the file name with full path of an image that will be edited TDisk exe e c Program Files TrustPort Disk ProtectionlImageslimage000 tdi r Registration of Disk Protection driver It starts an administration utility that registers the encryption driver to Windows u unregistration of Disk Protection driver from Windows TDisk exe r u man Open Disk Protection user s guide Show window with quick help about command line parameters lt lt 16 5 Hotkeys E Image Editor Hotkey Meaning IN Mounts Manager Add a new image to the auto mount or recent mount list Dei Delete selected image from the auto mount or recent mount list Shift Up Move selected image file up in the auto mount or recent mount list Shift Down Move selected image file down in the auto mount or recent mount list 171 TrustPort Keep IT Secure 16 6 Create a new Disk Protection image Mi The Disk Protection Create New Image Wizard is an application that allows you to easily Create a new image Image
163. ion command line O TDisk exe params Mount image m ro am d p ua lt name gt unrs letter filename Quick mount q ro arn d p ua lt name gt letter filename Unmount u filename letter all Create image c am im f alg cast rijn d ua lt name gt is lt size in MB gt inst unrs filename Edit image e filename Register driver r u User s guide man page This help 7 Detailed description of parameters Each command and switch has to be introduced by a special switching character or In the following list are described all command line parameters of TDisk exe application m Mount an image using Mount wizard ro mount as read only am add the image to the auto mounts list 169 TrustPort Keep IT Secure ua name unrs letter file Quick mount of an image letter file file letter d ua name is size unrs inst file remove the image from the auto mounts list disable modifying mount parameters except user credentials given user account name will be used instead of account name taken from the Windows special parameter which makes TDisk exe to remove itself from the list of automatically started applications during Windows start up used during installation select the letter which will be assigned to the mounted image the file name of the Disk Protection image that shoul
164. ion for blocked devices E Secure Shredding Connectivity ports Encryption E Logs and Results E Network Utilities H Advanced Settings About and Licenses A USB Firewire Serial Bus protocol 2 Bluetooth F Show categories placed in the tree for easier orientation Specific device can be adjusted in the Categories tab or you can also make adjustments in terms of Connectivity ports By default all devices are allowed and thus the protection is not active This can be changed using the drop down menu for each item in which the user can choose from the following options e Block if the protection for a particular device is set to Block this device after connecting to the system is blocked without user intervention and by default a message is shown on the desktop e Allow if the Allow option is selected protection for this particular device will not be active e Ask user when inserting a particular device a dialog with a choice of actions will be displayed In the case of the device being blocked by default it will also be displayed as a message on the desktop If the Remember box was left selected this device is then added to the list of either blocked or allowed devices where you can further modify the settings for blocking the device TrustPort Total Protection 2013 DI New device USB Mass Storage Device is trying to connect to the system Technical description Device type USB device Device name
165. ions to take during the reparation e You can directly format an image if it is too corrupted 187 TrustPort Keep IT Secure Advanced mode is for experienced users only If you didn t understand something from this part of the manual it would be better to read the part of the manual about the simple mode first Ay 17 4 1 Check an image in advanced mode B Checking of an image consists of a few steps 1 Choose the image file from a standard file open dialog 2 Type in your authentication data necessary to open the image Information dialog appears that presents you the results of the performed check e Disk Protection Checklmage off D File View Help Info TrustPort Disk Protection File pa M INSTALL IMAGES advan A UNSTALL IMAGES advan A UNSTALL IMAGES advance I INSTALL SETUP SETUP ZI Image poskodenyIMG tdi Files 25 Disk size 32 50 MB Directories 5 6 About Manual rors dit For Help press Fl There is more information about errors found in the checked image on a line at the bottom of the window Basically there are three kinds of errors e Inconsistency in file allocation tables FAT FAT table copies are not exactly consistent CheckImage chooses for you the table by which less errors were found but you can later select the determining FAT table yourself When you choose to repair the image the selected FAT table will be
166. isk Protection Mount Wizard TrustPort Disk Protection lets you store your files and folders securely in encrypted volume images that can be mounted and unmounted at any time These volume images are normal files and can be stored on your hard drive on any removable media on USE flash disks or as read only images on the CD ROM for instance Click Next button to continue About Manual 16 7 1 Mounting Options Kl If you don t specify an image file name as command line parameter then you have to type the filename into the Location field or use the browse button The next parameter you can change is mounting letter You can select it from a list of available letters or you can leave the option Automatic which means that first available letter will be used 175 TrustPort Keep IT Secure TrustPort Disk Protection Mount Wizard iti x Mounting options C Program Files 86 TrustPort Disk Protection Images image O03 tdi Mount as letter Bead only access E Mount it at startup Enter Disk Protection image location or use the browse button You can select a letter that will be used for mounted image and choose if you want to mount image for reading and writing or for reading only Se Click Nest to continue About Manual Read only access means that image will be mounted as read only no matter the user rights defined by user account If you select Mount at start up option then selected image will be a
167. isting archives in CAR or SFX formats and convert between them add files and folders to an existing archive delete files and folders from the archive view selected file in the archive and much more 148 TrustPort Keep IT Secure Gi CAR Manager C Testing install car A AQ e GBaS3en28 48 Size Packed 77252 77188 76870 73544 77967 7686 81485 81008 Unselect All Ctrl Shift A Invert selection Gray Select group Gray Unselect group Gray Properties Alt Enter By clicking on the particular column you can sort the list by selected properties name extension size etc D CAR Manager C Testing install car File Edit View Options Help G aaenageral Address CO 152 152 18 05 21 T2532 ID 23 0421 File eae 76870 73544 25 04 21 EI File size v Packed size Date of last write v Date of archivation v Attributes w CRC value If you right click on the list header you will be able to select the information displayed on the list On the bottom of the window you can see the number of selected files and their size not packed size and also there are a red and a green light that indicates when the Manager is busy red or ready green In the navigation box you can see the directory tree of the CAR archive 149 ia TrustPort Keep IT Secure i CAR Manager C Testing install car File Edit View Options Help BeBe n200 In the File
168. it and how the infection was resolved Statistics always contains the Boot sectors and Files sections The Boot sectors section contains the number of scanned infected and repaired sectors The Files section contains the number of scanned infected repaired renamed and deleted files 35 TrustPort te TrustPort Total Protection 2013 ei TrustPort Data Security Options File types to scan All files Heuristic analysis Enabled Scan memory on startup Enabled Scanning compressed files Enabled Use excluded extensions Disabled Excluded extensions Not defined Use excluded objects Disabled Excluded objects Not defined Antivirus version TrustPort Antivirus 13 0 0 5046 Results Files File path Scanning result Virus name Cleaning action C Testing 333 eicar com Black listed EICAR Trustport Renamed Statistics 7 4 Console application Sometimes it is necessary to be able to execute scanning in the console mode which enables easier cooperation with other applications allows you to execute the service using batch files scheduled application executing and so on For these reasons application AVCC EXE executable in console mode was created besides the On Demand Scanner AVC EXE running in graphic mode Both applications can be configured with the same parameters Error levels which can be returned from on demand scanners List of error levels 0 No infection
169. ium tH Network Utilities H Advanced Settings Log source F About and Licenses On Access Scanner On Demand Scanner Internet Protection Updater Antivirus System Maximum Log Size Log files size limit 1000 El kilobyte kB al 10 7 Network Utilities PE Network Utilities include a set of useful network tools allowing users to trace network statistics network connections verify accessibility of certain IP addresses or to gain information about internet domains Network Utilities AL TrustPort Total Protection Shields Network Utilities D Access Control Unifies a set of network tools that can be used by E Antivirus administrators for displaying information about network traffic Secure Shredding and also for identification of problems with the network tl Encryption Network Statistics lt Logs and Results Displays an overview about incoming and outgoing packets Eg Network Utilities and bytes through a network interface in the computer k Network Statistics Traffic Watcher Dk Serves for dispalying the network connections Overview E Output can be optionally configured H Advanced Settings E About and Licenses Ping This small utility tests network availability WhoIs Utility displays the owners of Internet serwers or IP di i ami pa Show categories placed in the tree for easier orientation a Apply 124 TrustPort Ty Keep IT Secure 10 7 1 Network Statistics Page Network Statisti
170. k of 45 648 696 k free A Ge v Lnone_ 18 830 676k of 45 648 696 voNTestingiarchives e eN Testinglarchivesinewiiparchive car Name Et Size Date Attr Name EL lt DIR gt 05 30 2012 0745 at L new lt DIR 05 30 2012 07 45 config H Test exe 155 930 796 05 29 2012 13 24 install C config data 152022 05 18 2012 11 552 ll ipflog emm Ce ac Unpack files i Unpack selected 1 file s to cTestingarchivest 4 Unpack path names if stored with files The second way is to use the menu item Unpack specific files on the Files menu or pressing ALT F9 key combination 160 TrustPort Keep IT Secure This way you will be able to specify more options than in the first way lt lt Total Commander 7 57a AEC Ltd Files Mark Commands Wet Show Configuration Start elselzlgeseisalslaaleolsoeiezseal3 field Ge GF Ga Oh Qi Qi d n ic e Lnone_ 18 830 372 k of 45 648 696 k free Vo Ge Lnone_ 18 830 372k of 45 648 696 k free Name Et Sie Date r Name E E LI lt DIR gt 05 30 2012 07 45 E LJ 3 new data H Test exe config log pflog png stall Unpack specific files from archive to cATestingtarchives Files to unpack sud Unpack path names if stored with files Unpack each archive to a separate subdir name of the archive L o 1 Tee J Camel J me 14 4 7 View an archived file MA To view an archived file you need to open a CAR archive file fir
171. kies can contain sensitive data for example passwords for access to various internet pages but also information from visited web servers System Temporary Directory This item enables you to shred all files and directories placed in temporary directory of the system To shred the temporary system files is used the path to the directory that is defined by system parameter TMP If the system variable does not exist then is used the system parameter defined as TEMP Recycle Bin This item serves for shredding of the bin content of Windows system The bin can contain sensitive and secret data Internet History This item enables you to shred internet history Internet history contains information about visited internet pages written addresses to the address line of Internet Explorer and eventually other information Document History This item serves for shredding of recently opened documents The list of recently opened documents can be found in item Documents of Start menu Run history This item enables shredding of all records of all programs that have been run in the item Run in menu Start For correct changes we recommend to restart the system Windows once the deleting process is finished Wipe now When you press this button the process of shredding itself is started As parameters for shredding will be used the settings on the Configuration page To start the shredding process you must always choose at least one item lt lt 101
172. laced in the tree for easier orientation It is possible to edit the same parameters which are available during creating new task 93 _ TrustPort 10 3 5 Scanning engines The Engines Settings tab contains a list of all the items used to configure the scanning engines e Archive depth level determines whether the archive will scan the files with without limitation of the depth of immersion archive e g nested zip files inside zip file e Analyze packed executables if this option is enabled then all compressed files will be scanned Compressed file includes both archive files created without compression such as zip files and also executable files whose contents have been compressed using archivers at startup run time packers such as UPX ASPack e Scan e mail databases defines whether e mail databases should be scanned for all types of viruses e Scan all memory processes during memory scan sets when scanning the memory whether memory of all running processes should also be scanned All the processes and all the supporting libraries of these processes will be scanned This operation is very time consuming and can cause system slowdowns Scan inside SFX archives sets whether self extracting archives should be scanned Detect adware riskware enables scanning of adware riskware Enable second level heuristics analyzer activates the next level of heuristic analysis Enable third level heuristics analyzer acti
173. le General settings Enable volume security List of Profiles User profiles list Default profile Settings Remove Show categories placed in the tree for easier orientation Afterwards it is possible to start managing the permissions setting personally This can be done through user profiles By default the Default profile is present other profiles can be defined using the Add button The process of adding new profile is similar as in case of Parental Lock By selecting the required profile and clicking on the Settings button access rights to selected directories can be defined At first the directory or disc which should have protection applied is selected using the Add button in the Access Control dialog TrustPort Antivirus Access Control Volume Security F Shields Access Control Parental Lock Antivirus Secure Shredding Logs and Results Network Utilities Advanced Settings About and Licenses irectories which can have ng own user profile Remove Show categories placed in the tree for easier orientation Then by choosing the particular button it can be defined whether the user should have full access to the directory including writing or whether the content of the directory should be displayed without changes permitted or the user can be denied complete access to the selected directory System paths 78 TrustPort Keep IT Secure and directories su
174. le drag and drop Compression options 6 Logs and Results Compression level Normal compression E Network Utilities 9 Best compression E Advanced Settings i Fastest compression GL About and Licenses a 2 No compression Show categories placed in the tree for easier orientation Apply Drag and Drop function allows you to move files or folders automatically encrypting or decrypting them when you move them from and to encrypted archives When you want to view an encrypted archive you can select the file in the CAR Manager and click on the View file toolbar button or press F3 and CAR Manager will allow you to view the file using the selected viewer indicated in the Set up configuration box or in Advanced Configuration Manager When you open a file this way it will be extracted to a temporary folder and after closing it the temporary file will be securely deleted from there so no traces of the extracted file will remain in the computer The user can choose any viewer but TrustPort recommends the use of Lister viewer free download at http www ghisler com lister If you want to set or change the viewer click on the External viewer path in the Set up configuration box and a new window will pop up where you can browse for and select the desired viewer lt 10 6 Logs and Results On the Logs and Results tab users can browse through all logs informing about activities performed by the Antivirus or Firewall 119
175. les or disables protection against the automatic launching of removable media All currently connected FAT type removable media are automatically added to the Autorun protection list which can be updated with the Refresh button Enabling or disabling the protection can be done in the media using the checkbox Enabled column After enabling the protection the autorun inf file is blocked in the removable media and cannot be used to read or write until the Autorun protection is disabled again F Shields Autorun protection E Access Control List of all connected removable media of FAT type which can have applied protection against automatic launching Option Enable Windows autorun feature disables or enables function of autorun for all media and devices in Windows General settings Enable Windows autorun feature requires reboot E Secure Shredding List of removable devices H Logs and Results H Network Utilities H Advanced Settings E About and Licenses Show categories placed in the tree for easier orientation In order for the device protection settings on current computers to function properly the Windows autorun function has to be enabled which can be done using checkbox Enable Windows autorun feature in the upper part of the window Reboot is required afterwards lt lt 82 TrustPort Keep IT Secure 10 2 5 Password Settings The Settings tab allows users to set password to restrict access
176. ll files all types of attachments will be scanned for viruses e Selected files with following extensions only attachments with extensions specified in the list will be scanned they can be edited by clicking on Modify button e Exclude files with following extensions if you don t want to scan some attachment types you can specify them in the list if you enable the check box e Quarantine infected files all infected emails and attachments will be moved to quarantine where you can handle them In the other case all infected files will be deleted right away By clicking on the Advanced button following window will appear 52 TrustPort Firewall Web Browsing Protection H Antivirus H Secure Shredding E Logs and Results Subject Modification E Network utilities Ass H Advanced Settings i E About and Licenses File Name ReplacedBlockedFile txt About Manual Show categories placed in the tree for easier orientation okoo Apply e Add Header you can specify a header that will be added to an email in case of being infected e Subject Modification text specified here will be put to the subject in front of the original text e File Name you can specify a name of a text file which will be attached to an email instead of an infected attachment lt lt 10 1 2 3 Mail Antispam settings p By enabling the Check emails for spam option you can enable scanning your email communication exc
177. llowing window will appear CAR archive properties TrustPort Archive Encryption CAR Encrypted Archive 13 0 0 5047 You can see some important information like current version of the product current version of supported CAR archive file format used encryption algorithm total number of files stored in the archive total and packed size of these files compress ratio and size of self extracting module if present lt lt 14 2 5 Add Edit archive comment BW From TrustPort Encryption version 1 1 you can add comments to the CAR archive file Comment is public information and therefore it is not protected It means that anyone can read this comment without needing a password The maximum number of alphanumeric characters in a comment is 63999 Add edit comment TrustPort Archive Encryption Comment Public information Comment is public information and therefore it is not protected It means that anyone can read this comment without needing a password The maximum number of alphanumeric characters in a comment is 63999 About Manual There is the possibility to load file s comment If you want to do it click on the small folder icon on the upper right corner of this dialog window TPE will open a window where you can select the file you want to read the comment from lt lt 14 3 Archive management CAR Manager BJ CAR Manager is main CAR archives management utility It allows you to create new archives open ex
178. long path Description The complete path to this file or directory is longer than 255 letters which is illegal in Windows There are two ways how this can happen 1 This is an error in some parent directory which implicates that that directory contains many nested files and directories with unreadable names and enormous sizes These files including the one with Too long name error haven t most likely ever existed this is just an error in that directory 2 This file or directory is really valid but the path to this file has been extended over the limit after that this file was created Maybe some parent directory has been renamed or moved into a directory with longer path Solution 1 case There s no reason to repair this item You should either delete the whole wrong directory or all it s invalid content if it contains some additional valid files 2 case If you want to save this file you must change the method to Do nothing otherwise it would be deleted by repairing After the repair you must shorten the path to this file manually but you can t rename this file directly If this is a directory all its opportune content will be deleted although you set its action as Do nothing when you repair it You must shorten the path to this directory before you repair this image 182 TrustPort Keep IT Secure e Self LFName Description In the FAT filesystem used in TDisk images has each file since the MS DO
179. mes are simply deleted e Dots error Description Each directory except for the root directory contains two special items One item with the name that points to the parent directory and the other that points to itself This error means that these items are somehow corrupted Solution To repair this error is rather simple if the item doesn t contain any more serious error These two directory items are plainly repaired e Invalid size Description This directory has too much allocated space Either there are many redundant deleted items at the end of this directory that s no weighty error or is this directory also Crosslinked Solution If the directory is Crosslinked it must be deleted Else it s easy to repair it by deleting the unnecessary end of the directory 17 3 Simple mode i Simple mode is designed for intuitive and easy to use interface You won t get lost in plenty of features and functions All the complexity is hidden inside When you start the program there are just two possible actions you can check an image or eventually switch to the advanced mode le Disk Protection Checklmage air File View Help OCE No image is openec File path 184 TrustPort Keep IT Secure When you choose to check your image CheckImage performs all necessary control procedures and shows you the results After this you just have to press one button to repair all errors If you do
180. methods it uses 35 overwriting cycles It is a very effective method how to shred data on magnetic media 99 TrustPort Keep IT Secure Report options Generate report If this option is selected a file of reports will be created The created report file contains information about time and date of the start and the finish of the shredding process list of deleted files or folders and the list of shredded items The name of currently logged user of the system Windows is also recorded Overwrite report file If you select this option DataShredder overwrites the report file before each start of shredding If this option is not selected TrustPort DataShredder adds new information about shredding process to the existing report file Ask for report file Select this option if you wish before each shredding to choose eventually create name before wiping a report file If this option is not selected the predefined report file will be used If you wish to use the predefined report file you have to choose it eventually create in window Open that is displayed after clicking on directory icon that is placed on the right side on the bottom next to Use this file name If you do not enter your own suffix during the entering the name then the default suffix will be appointed to it rpt The same window will be displayed when the shredding is started with the option Ask for the name of the report file before shredding lt lt Sa
181. mit log file It is possible to preset how many records can be stored as maximum TrustPort Personal Firewall Firewall Log Si Shields Firewall Log E Access Control H Antivirus EE Secure Shredding Enable logging H Encryption Maximum Log Size El Logs and Results C Preasl i i b External Log Viewer E Antivirus E Network Utilities H Advanced Settings H About and Licenses Limit log file to Show categories placed in the tree for easier orientation Apply 10 6 1 2 External File Viewer A Page External Log Viewer enables to view any file with logged records of TrustPort Personal Firewall application The newest log records are displayed in the highest position on the list 121 TrustPort Keep IT Secure F Shields H Access Control H Antivirus H Secure Shredding i Encryption l Logs and Results E Firewal H Network Utilities tH Advanced Settings d About and Licenses D TrustPort Total Protection External File Viewer TrustPort Personal Firewall Firewall Log External File Viewer Event Description Denied Process NA Direction Incoming E Connection Connection Connection Connection Connection Connection Connection Connection Connection Connection Connection Connection Connection Connection Connection r Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Pr
182. n Maintenance H About and Licenses Show categories placed in the tree for easier orientation In the list of languages all available language versions are displayed If you change the selected language it is necessary to save the setting by pressing Apply or OK After this occurs a window will appear stating that the computer needs to restart This procedure is necessary for correct implementation of the selected language to all parts of the product Language EICHER ES TrustPort Total Protection Manual EE Language H Access Control H Antivirus H Secure Shredding r Encryption This page serves for switching language of all software included in TrustPort C DCT ae trom ceweral available LD change i neccessary to j Config Manager Language of all part TrustPort was successfully changed This change will be fully applied after the computer restarts H About and Lice Show categories placed in the tree for easier orientation 130 TrustPort Keep IT Secure 10 8 2 Proxy Proxy server access settings can be done by checking the checkbox Use a proxy server Next it is necessary to enter the proxy server address and port which will be used to communicate with the server hd Proxy E e Ss Prox H Access Control xy SH virus Proxy settings are used for informing applications about access to the Internet and if t Secure Shredding they are accesible only by the intermediary server This
183. n advanced configuration TrustPort Total Protection The simplified interface header contains the name of the installed product along with its version number At the top of the interface window the current state of computer protection is also displayed Text informing about the state of protection against viruses and hackers is also accompanied by an icon that changes color depending on the current state of protection The same icon is then displayed in the Windows notification area Protection against viruses Antivirus Internet Security Total Protection E Protection against hackers Internet Security Total Protection TrustPort Total Protection 2013 13 0 0 5037 E 3 against viruses PROTECTED against hackers The interface also contains several buttons for setting up quick protection of your computer With one click the user can easily enable or disable on access protection application inspector parental lock run the updates set the level of firewall protection etc The number of buttons varies depending on which type of product is currently installed 30 g TrustPort On Access Scanner Application Inspector Check for updates Antivirus Internet Security Total _ Protection HE E mail Scanner Parental lock Web Scanner Firewall Internet Security Total Protection e GG Fi SG e E y OnAccess Application Email Scanner Parental Lock Web Scanner Use Firewall Check For Scanner Inspect
184. n t want to do it immediately you can close the opened image without any repairs of course lt lt le Disk Protection Checkimage ar d INSTALL IMAGES advanced03 png Crosslinked Too long 5 Delete this item a VINSTALLAIMAGES advanced04 png Too short 2 KB Invalid Repair it d INSTALL SETUP SETUP ZIP 4 16MB Crosslinked Too short Delete this item 17 3 1 Check an image in simple mode ES When you click on the button Check image on the toolbar or select appropriate command in the File menu the standard open file dialog appears After you select an image to repair the program requests your authentication E File View Help ALE No image is opene File path Please type your user name and password into the following fields UserName admin Password anet s Click OK to continue About Manual For Help press Fl If your authentication is valid the disk is checked An information dialog appears that brings the results together 185 TrustPort Keep IT Secure E Disk Protection Checklmage File View Help Info File path TrustPort Disk Protection A INSTALL SETUP SETUP ZI Image poskodenyIMG tdi Files 25 sk size 488 MB Directories 5 di SN 258 KB Errors count 3 ize 2 81 MB About Manual For Help press Fl If the image contains no errors it is closed finally and you can continue to check other images lt 17 3 2 Errors an
185. n technologies Harddisk failures may lead to irrevocable loss of data backup backup and once more backup but it is not always the consequence of a malicious code attack Moreover viruses are not able to damage the hardware physically even if they can simulate 12 g TrustPort its defect So if you see some strange colors on the screen first check the graphic card and its functionality sooner than you start to revile the virus authors or the antivirus software developers e Software damages A software damage being a typical sign of computer viruses can be caused by many other ways For example an incorrect program can terminate for example due to short term power cut during saving data file Not every data or software damage is a result of a work of a computer virus But it is convenient to be cautious so scan the computer properly and try to find the source of problems at any rate At least in order to avoid the same situation in the future e False alarms The illness of all antivirus programs Despite there are less and less false alarms situations when the scanning program classifies a clean file or area as infected or suspicious they will never disappear False alarms are sort of the tax on security when the antivirus software developers try to reach the optimal price performance ratio in this case it is more the scanning quickness user s security ratio 2 2 Computer viruses classification Computer viruses
186. nd you will be asked for entering your credentials Then you can edit the opened image add user accounts change passwords increase image size limit and more Next option is to click Mount button After this Disk Protection displays mounting dialog where you enter your credentials and then it mounts the selected image Unmount option is available only when selected image is mounted If you click Unmount then Disk Protection immediately unmounts the selected image file When you press the Display image file properties button Disk Protection displays a window with information about the selected image file image version status encryption algorithm key length used file system actual and maximum size limits etc This window contains more detailed information about the selected image file than the short info at the bottom part of the auto mount manager tab The button Remove missing files allows you to check all image files in the list and purge non existing images from the list It is useful if you have moved renamed or deleted an image file The Toggle Single Sign on button enables or disables the Single Sign on or passwordless automount feature for the selected image Upon enabling this feature you will be asked to enter the credentials with which the image was created These will then be stored in an encrypted form within TrustPort Disk Protection configuration files and used automatically when the image is mounted at system startup witho
187. ndow serves for adjustment of addresses and ports that were allocated to the rule For all control elements are valid the same rules as for the control elements on page Selection of local endpoint New Rule Wizard 66 TrustPort Keep IT Secure Remote endpoint dialog window Edit rule Remote endpoint serves for address and ports adjustment that were allocated to the rule For all control elements are valid the same rules as for the control elements on page Selection of remote endpoint of the New Rule Wizard Application dialog window Edit Rule Application serves for definition of application that was allocated to the rule For all control elements are valid the same rules as for the control elements on page Selection of application of the New Rule Wizard ICMP dialog window Edit Rule ICMP serves for adjustment of types and codes of ICMP protocol that were allocated to the rule For all control elements are valid the same rules as for the control elements on page Selection of ICMP types and codes of the New Rule Wizard 10 1 4 Web Antivirus A Web Antivirus serves for protection of your computer against viruses when surfing the Internet You can enable disable its function by using the Use Web Antivirus option You can set whether to display an icon in tray if download of a certain file lasts more than the specified number of seconds By clicking this icon you can see the download progress It is also possible to enable di
188. ne number of selected files size etc The possibility to set Compression rate lt 14 2 In Shell context menu E TrustPort Archive Encryption is fully integrated with the shell context menu When right clicking on any file folder or disk item Encrypt archive appears in the menu 144 TrustPort Keep IT Secure Se y i Home Ke Favorites BR Desktop Je Downloads E Recent places Libraries En Documents a Music El Pictures E Videos Homegroup li Computer ii Local Disk C a Local Disk Dr View Name 00 Common i H p Open in new window Pin to Start a Encrypt archive 4 i Taint DataShredder i Share with Scan for viruses Include in library Send to Cut Local Disk C3 Date modified 5 29 2012 9 11 AM 3 23 2012 3 52 PM 4 25 2012 12 50 PM 2 18 2012 1 32 AM 4 23 2012 12 49 PM 5 29 2012 9 11 AM 113 23 2012 3 43 PM 5 29 2012 10 18 AM 3 23 2012 3 03 PM 3 7 2012 1 28 PM 5 29 2012 1 04 PM 4 23 2012 1 29 PM 4 25 2012 1 50 PM a T al pm Computer Local Disk C ta Search Lo Type File folder File folder File folder File folder File folder File folder File folder File folder File folder File folder File folder File folder Text Documer If you select any encrypted file or archive then the Decrypt menu item appears The context menu also will be different depending if you right click on a folder file or on
189. network administrator Go back to the previous page Powered by TrustPort Antivirus TrustPort a s When downloading files Web Scanner downloads the file and scans it for viruses before passing it to the target application most likely your browser This might take a long time in case of using slow connection or downloading a large file Thus if you want to get information about download progress you can click the Internet Scanner tray icon which appears if downloading lasts longer than a specified interval In case of using an encrypted connection HTTPS scanning for malicious codes is not technically possible 8 4 Parental Lock PE This feature blocks the browsing of inappropriate Web content These sites can either be defined by a self created list of unauthorized sites or you can simultaneously monitor the pages by the content or category such as drugs violence spyware pornography etc If the lock evaluates the site as inappropriate the web browser will show an error page with basic information about the URL and the reason for blocking 40 _ TrustPort Page was blocked TrustPc GC O chaticq com WW fe e TrustPort PAGE WAS BLOCKED Data Security Access to requested page was blocked by TrustPort Antivirus application Loading has been interrupted Technical data Requested URL http chat icq com Requested HTTP method GET Requested ContentType text html char
190. ng to the system The mounting letter is chosen automatically in this case in the system for mounting an image mounting operation will fail The image that is going to be mounted mustn t be compressed or encrypted by the NTFS file system If Disk Protection detects that the mounting image is compressed then decompresses it automatically gt The number of available disk letters is limited to 26 A Z If there is no available letter 114 TrustPort Keep IT Secure TrustPort Disk Protection Uncompressing Uncompressing operation is being processed please wait If the image file is encrypted by the EFS then Disk Protection displays a warning message and mounting procedure is cancelled In this case you have to decrypt it manually TrustPort Disk Protection x File is encrypted by EFS The mounted image can be unmounted at any time by clicking Unmount button in the toolbar or pressing proper keyboard shortcut see hotkeys There is an exception when the mounted image cannot be unmounted It can occur if there are some opened files in the mounted drive You can modify this behaviour by setting up the force unmounting option But be careful setting this option because you can lose your data in not saved documents in this case lt lt 10 5 1 4 9 Set Image Limit Eq Each image that you have created has a small amount of size as reserve It can be usable when you realize that you disk is nearly
191. ngs which were used during product installation is performed by Restore button The process needs to be confirmed in the following dialog window D Configuration Maintenance TA TrustPort Total Protection l Shields Configuration Maintenance t Access Control H Antivirus H Secure Shredding i Encryption H Logs and Results E Network Utilities l Advanced Settings Import Export Configuration TrustPort Total Protection 2013 Are you sure you wish to continue The configuration will be permanently overwritten About and Licenses Si Show categories placed in the tree for easier orientation To finish the configuration restore successfully it is necessary to restart the computer 133 TrustPort Keep IT Secure 10 9 About and Licenses This tab displays information about the product including its version as well as information about the current license Ta TrustPort Total Protection Shields About and Licenses Access Control Here it is possible to display information about the program E Antivirus and licensee details E Secure Shredding Es Encryption License Information lt Logs and Results This page dispalys the products licensee details and also E Network Utilities product registartion details E Advanced Settings E About and Licenses agreement and information about 3rd parties used by the Show categories placed in the tree for easier orientation 10
192. nnnnnnnes 156 E EN Packer conducido rodada 156 Tae Create NeW en 157 14 4 3 Open an existing CAR archive sssssssssssssssnsssonsssnnssnnnsensnsnnsnsonsnrenennenesnenee 158 14 4 4 Add files to CAR arcnIVO iria edi 159 14 4 5 Delete files from CAR AFC sico Eet BEE die 160 14 4 6 Extr ct files from CAR Ten 160 14 4 7 View an archived CN 161 14 4 8 Test CAR archive consistency sssssssssssonesrnnsunonennnnsensnsnnsnronenrnnsenneneennnne 161 RE ARCHIVE ENCRYPTION FA E 162 15 DATASHRED DER ou 163 Ted F ODUCT OV RVE WN ee 163 PO INSEL COVE MENU tala 163 LS DATA HR DDIN EE 164 TrustPort Keep IT Secure TO CON OCE APL er E 165 DDD ATA OAC see evs a eee ee nid oe eee egos ees a eee ee ee eee 166 6 DISK PROTECTION ositos 167 Ll PRODUCT OVERVIEW ean E E E EE A E A A 167 16 2 INTHE SHELE CONTEXT MENO tirita 168 EE EE 169 160 4 COMMANDAINE PARAMETER Sarna iia 169 10650 PIOUS corroe io PO IES APTO ATEO ANT AE ANS 171 16 6 CREATE A NEW DISK PROTECTION IMAGE AAA AAA 172 TOD New made OO COINS sec elite iodo ai 172 16 6 2 Create Administrator s ACCOUNT score 173 16 6 3 Create Image Processing A PP yg 173 16 6 4 Finishing Create New Image Wizard nn 174 107 MOUNT EE 175 LOL MOUNUNT Eegen LEE 175 16 7 2 Volume image authenticatton ENEE REENEN 176 16 7 3 Completing MOUNT Wizard EE 176 PoS UIC MOOT E 177 e et OUICK MOUNE ODT ONS sortear oro oo 178 E DISK PROTECTION TA ee 179 17 CHECK EMA GE E 181 fal lee ge 181
193. ntemporary viruses belong to this category The main reasons are two Firstly classical computer viruses using a host file for their spread are almost moribund present codes create their own files Secondly programmers do their best to hide their work because not hiding it would mean a cleanup by the attacked user Data destruction in the whole computer means a retreat from the seized control e Destructive viruses This category should be split into two subcategories purposely destructive viruses and inadvertently destructive viruses For purposely destructive viruses it is their job specification to destroy they delete files damage data etc Viruses destructive inadvertently do harm as a side effect due to an error in the program code or due to some other defect But from the user s view the result is the same in both cases the loss of data According to the infected region e Boot viruses Boot sector viruses infect the executable code stored in certain parts of system region on the disk It can concern floppy disk boot sectors harddisk partition table or harddisk boot sector Boot sector exists on every floppy disk that has been formatted using MS DOS no matter if this floppy disk is a system disk or data disk Boot sector contains a short program that uses DOS for executing the system before passing control to other system programs or command compiler There are very important instructions in the boot sectors that load operating system
194. ntivirus tray icon is an indication that the program is running and is only suspended if TrustPort Antivirus is already installed The tray menu of the USB Antivirus contains all the options available with a standard installation in addition an option to run the USB scanner in the background Show Background Scanner Quick scan Scan All Disks Scan All Local Disks Scan All Removable Media Scan Registry Scan Selected Target Toggle On Access Scanner Toggle Internet Scanner Show Hide statistics Antivirus Ae ae USB Antivirus The background scanner window is very similar to the standard on demand window scanner It shows the ongoing status and statistics of the USB scanner throughout the use of the inserted USB drive TrustPort Antivirus USB Scanner On Demand Scanner Scanning Scanning files Directory Target K TrustPort USB Antivirus conf avctg conf z On the whole 179 files were scanned 0 infections were found and O of them were Cf successfully solved E Shutdown automatically after the scan has been completed About Manual The files are monitored by the USB scanner as opposed to residential protection only in the case of their registration on to the disk This means that an infected file can be run from the USB drive It is therefore appropriate during the copy of data on a drive without the USB Antivirus to firstly request on demand scanning Scanner configuration
195. ocal address test_win8 aec cz 192 168 30 152 L Local port 50647 50647 L Remote address 178 33 111 6 kimsufi com 178 33 111 6 Remote port http 80 H II 13 4 Finding of IP addresses in the computer It is necessary to startup Command Prompts if you want to find out what IP addresses there are in the computer This can be done by selecting Start Run and writing cmd exe A window will open where you write command ipconfig exe without parameters Example Cr tee ig Windows 2000 IP Configuration Ethernet adapter Local Area Connection Connection specific DNS Suffix IP Address 4 s s s a amp a a a amp 192 1608 0 192 Girres MaSK s e Else 2o EE Default Gateway e e Y 192 168 0 1 It results from our example that our IP address is 192 168 0 192 and the subnet mask is 255 255 255 0 This IP address is allocated for network connection Local Area Connection 143 TrustPort Keep IT Secure 14 Archive Encryption 14 1 Product overview E Overview TrustPort Archive Encryption provides secure on demand encryption to protect user s data against unwanted disclosure This application uses the strongest encryption decryption algorithm available to protect confidential and personal information stored in any data storage This software can be also used for sending secured files to someone who does not have encryption software installed on his her PC The passphrase for decryption is in
196. ocess NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming Denied Process NA Direction Incoming F F F F F ES Log file name C Testing pflog log Show categories placed in the tree for easier orientation Button Open log serves to open the file with logged records and for the list loading During the file loading there is displayed a dialog window with the process indication Button Save as serves for storage of the list of the log records to the file The records are stored to the output file in text form separated by semicolon it is so called CSV format A file created by this way can be further processed or viewed in another program that supports CSV format file for example Microsoft Excel 10 6 2 Antivirus The Log is the antivirus software feature that enables gaining detailed information about activities and tasks that were done You can return to them and check them in order to check the computer or the antivirus software status All the logged information is stored into files in the log directory in the installation directory The list of logs of the selecte
197. ocess will be displayed only as a name of an executable file without the complete path to the file The name display is allowed only on systems Windows XP and higher e Show whole pathname there will displayed a complete path by the names of communicating processes The display of names of communicating processes will be permitted only on the system Windows XP and higher e Update frequency Slow sets slow refreshing frequency The list will be refreshed each two seconds e Update frequency Normal sets normal refreshing frequency The list will be refreshed each second This option will be set as default one e Update frequency Fast fast refreshing frequency The list will be refreshed twice in one second 10 7 3 Ping A Page Ping is a part of the network utilities and it serves for verification of a certain IP address or host machine accessibility The tool Ping can find out even the numbers of the wrong non deliverable transmitted via the network It is also possible to find out the time required for reach of the host computer Tool Ping sends ICMP packets requirements of certain size in certain time intervals The host computer receives these packets and sends them back as answers If everything is all right then there is the same number of the returned answers as of the sent requirements If the answer is not given back in a certain time limit this requirement is taken for lost The editing field Host name or IP address
198. of this method is difficult distinguishing between illegal and legal programs e Nonresident viruses Viruses do not need to be permanently loaded in memory for their malign activity It is enough if they are activated together with the host program Then they take control as first do their activity most often replicate and then pass the control back to the host program This is just the case of nonresident viruses or direct action viruses Nonresident viruses are mostly file viruses It is quite an extensive group These viruses are not very expanded because they cannot due to the absence in the memory apply advanced techniques such as a stealth technique see below and therefore cannot hide If they are not loaded in the memory they cannot monitor and analyze functions leading to their revealing According to the activity e Stealth and substealth Invisible viruses hide their modifications of files or boot sectors They monitor system functions used by the operating system for reading files or sectors from a memory medium and then they simulate the results by calling these functions It means that the program trying to read the infected file or sector reads the original unchanged one Antivirus program would not necessarily reveal the modification To avoid detection such a virus has to be loaded into the main memory during the run of antivirus software A good antivirus program should be able to recognize any infection on the instant
199. og records Denied Process C Users tester AppData L Denied Process C Users tester AppData Denied Process C Users tester AppData L Denied Process C Wsers tester AppData Denied Process C Wsers tester AppData L Denied Process C Users tester AppData L Denied Process C Users tester AppData L Denied Process C Users ltesterAppData Denied Process C Users tester AppData L Denied Process C Windows explorer exe 120 TrustPort Keep IT Secure Button Clear log deletes all log records from the list When the button is pressed a dialog window is displayed so as the list cannot be deleted by mistake Button Save as serves for storage of the list of the log records to the file The records are stored to the output file in text form separated by semicolon it is so called CSV format A file created by this way can be further processed or viewed in another program that supports CSV format file for example Microsoft Excel If the file already exists a confirm dialog window is displayed for file overwriting lt 10 6 1 1 Firewall log configuration A Page Firewall logging serves for feature setting of logging Option Enable firewall logging determines if TrustPort Personal Firewall should log the messages or not This option is set by default and the firewall carries out the logging of all necessary events The number of logged records for storage can be influenced by the option Li
200. ome page TrustPort Internet Security and TrustPort Total Protection integrate themselves into e mail clients and therefore enable the scanning of incoming and outgoing e mails for viruses and spam Supported clients include Microsoft Outlook Microsoft Outlook Express Windows Mail Mozilla Thunderbird and The Bat Integration to the default e mail client is chosen automatically 24 TrustPort Keep IT Secure ie Setup TrustPort Total Protection Antivirus protection for email clients For which email dients should the antivirus protection be allowed From the following list of installed email cients select those for which to enable the antivirus protection You can also enable disable the antivirus protection for any cient later in the Antivirus configuration Microsoft Outlook Express L Windows Mail Mozilla Thunderbird The Bat TrustPort 4 5 Product home page Integration to more e mail clients is possible by checking the checkbox next to the name of the required client their number is not limited If some e mail client is not supported by the operating system then it is not possible to choose this client from the list and support for this client will not be installed If some e mail client is supported by the operating system but isn t installed on the computer in the installation time or its current version is not supported then it is not possible to choose this client from the list but support for
201. ond option and enter the path to the license key file e g c Downloads keys antivir key If you have an activation code which you have acquired by purchasing the product choose the first option and insert it into the field for registration The Registration Wizard will liaise with the company server to confirm the activation code 135 TrustPort Keep IT Secure Registration Wizard Select a method to register Select a method to register your product Selection of registration Enter a valid activation code you receive this code when purchasing the product Enter path and Filename of license key File Path to the license key eledi If the product has been registered with an activation code here is the opportunity to extend its validity with the help of a renewal code This code can be purchased from TrustPort partners current list can be found on the TrustPort company website Under the field where the code is written the activation code whose validity is to be extended is also listed Registration Wizard Select a method to register Select a method to register your product Selection of registration Activation code registration Enter a renewal code to renew your licence Registered activation code TPES Enter path and Filename of license key File Path to the license key CS Trial version If for some reason you do not want to extend your current license and have purchased a new activation code us
202. oo RS New Image Options Location C Program Files x86 TrustPortiDiskProtectionImages limage004 tdi mm 25 208 Some Mount it at startup Enter Disk Protection image location or use the browse button Set limit size in megabytes for the image file and choose an encryption algorithm Check Mount it at startup button if you want to mount this image automatically during startup Click Next to continue About Manual The wizard presets the image size 256 MB or 64 MB but it can be changed in the Size limit field There are just three conditions e You can t create a larger image than the free amount of space on the target location e Disk Protection can t create an image larger than size limitation of used file system in newly created image Disk Protection internally chooses the best file system depending on the limit size you have setup There are three supported systems FAT 12 FAT16 and 172 TrustPort T i i Keep IT Secure FAT32 Therefore the size limitation of the new image is 32 GB what is the limitation of FAT32 system e You can t create an image larger than 4095 MB on target disk if the target disk uses any FAT file system because the maximum file size on FAT systems is limited to 4 GB approximately 4095 MB This last mentioned limitation is not relevant on NTFS file systems where is no problem to create a file larger than 4 GB For more details please go to Set image l
203. or Rules Updates Antivirus Network General Settings These buttons change the colour depending on the current protection status from green active to red disabled Below the buttons are drop down menus with other antivirus options Antivirus From the menu Antivirus scanning can be started by selecting a specific target to be scanned for viruses You can also view the quarantine contents show report of the last on demand scan view the logs with a list of recent antivirus activities create a USB Antivirus plug in for BartPE or Windows PE CD set the behavior of on access and on demand protection when an infection is found and finally set the interval of virus definition updates PE Network Use the drop down menu to view network logs informing about recent firewall and internet protection activities and to adjust some settings for e mail protection parental lock and the firewall Parental Lock allows you to change the level of blocking for certain websites You can select a preset profile with a selection of categories blocked block all allow all or customize the categories and blocked addresses Parental Lock setting is password protected lt TrustPort Total Protection 2013 Parental Lock Configuration Here you can select the types of web pages which will be blocked and those which will be always allowed Using the slider selects the level of blocking Preferred E There are blocked groups in this profile
204. ording to your demands Continuously watches your computer by the means of the On Access Scanner Provides the on demand scanning Offers the heuristic analysis function which enables the antivirus software to reveal new and unknown viruses as well Enables checking the activities of the suspicious objects by the means of the virtual computer functions which is effective for revealing new and unknown viruses Enables scanning archives zip arj cab It is suitable for scanning harddisks mapped network disks and various removable media including flash disks Enables files scanning before reading and after writing which protects them from malicious codes attacks Creates a detailed well arranged and fully compatible report of the scanning history Contains a safe region quarantine where suspicious and infected files are put aside It is built on the base of multiengine core Enables both scheduled automatic updates without user s intervention and the immediate on demand update Enables setting more update servers and routing to another one in case of failure without user s intervention It is integrated into both the shell context menu and the Windows status bar It is integrated into the Windows Security Center The Security Center watches if the antivirus program is installed and checks if the On Access Scanner is running and if your computer is secured against a virus infection or not The Security Center automatically warns y
205. ormal mode e 2 verbose mode AVUPDATER exe 2 Read configuration from a file loads the configuration from an external file Ask Asks the user whether to start the update In that case the user has a chance to make the Internet connection available ATTENTION This option can be used only if the user is currently logged in Windows Opens the TrustPort Antivirus User Guide 12 Program License 12 1 Trial license If only the Trial license key is installed the use of all functions of the antivirus software is limited to 30 days from the installation Within this period the user is announced about this fact by the information window when using the On Demand Scanner and during the update This window pops up only in the common user interface not when executing the antivirus program from the command line or as a plug in The behaviour of the software after the Trial licence key expiration is summarized here TrustPort Total Protection 2013 License Key Report TrustPort Total Protection 2013 is running in Trial mode Time dimited trial license key has been detected To get a full license key please contact your local reseller This trial license expires on 6 28 2012 9 13 09 AM About Manual 12 2 Temporary support It is a full version of the antivirus software with the full functionality during the purchased period If the payed period finishes the program update will no more be possible The user is warned about thi
206. ors from File menu When you set a directory to be deleted new check in the background is performed excluding the content of that directory Any of your changes won t get lost Similarly when a directory is set to be deleted and you choose another action the image is checked again including the content of that directory You can also select more list items at once If you are in the Crosslinked groups view and if you right click on an item which is selected to be repaired you get two more menu items for changing the repairing priority Move up to higher priority and Move down to lower priority lt lt 191 TrustPort Keep IT Secure E Disk Protection Checklmage _File View Help Not crosslinked files Al Crosslinked group 1 A NINSTALL IMAGES advancedd Move it up Pag d INSTALL IMAGES advanced0 Move it down Page Down 17 4 5 Repair errors E When you are ready with editing of repairing actions you can finally do the actual repair by clicking the toolbar button or File gt Repair errors menu item If you don t want to do it right now you can of course close the image without repairing it After repairing the image remains opened All changes made in this image are logged into the file CheckImage log located in the log directory lt 17 4 6 Format an image E This action is accessible only in advanced mode If you find out that an image is too corrupted you c
207. ou if your antivirus definitions are not up to date P Contains Internet Scanner a powerful utility which prevents your computer from getting infected from the network or through email communication and helps to isolate spam from solicited emails lt lt 1 2 Minimum System Requirements The TrustPort Antivirus requires at least the following hardware and software configuration Windows 2000 2003 XP Vista Win7 Pentium III or higher Pentium compatible CPU At least 512 megabytes MB of RAM more memory generally improves the responsiveness 400 megabytes MB of hard disk space The TrustPort Server Antivirus requires at least the following hardware and software configuration Windows 2000 2003 2008 SBS 2008 Pentium III or higher Pentium compatible CPU At least 512 megabytes MB of RAM more memory generally improves the responsiveness 400 megabytes MB of hard disk space 10 TrustPort Keep IT Secure 1 3 What is new in this version TrustPort Antivirus 2013 Improved Application Inspector new default modes Secure Mode Recommended Mode and User Defined Mode applications are divided into groups allowed restricted and blocked option to run user defined application with special restricted mode sandbox option to divide applications into groups with different rules option to protect specified parts of filesystem and Windows registry optional maximum size of checked files check of digitally signe
208. our web browser In case it doesn t work contact your internet service provider If everything works fine maybe there s a proxy server in your network and you haven t configured the updating correctly Ask your network administrator what are the settings for connecting through your proxy server and fill it in the proxy server settings e After installing the TrustPort Antivirus several programs are freezing all the time What s the problem It seems that you have overlooked the installation instructions and you have got one more antivirus product together with TrustPort Antivirus installed When you uninstall the other product everything should work fine e Why is it impossible to have the TrustPort Antivirus with some other antivirus software on a computer at the same time installed This is impossible because of the technical details of the solution of the On Access Scanner Any two antivirus programs can t be run simultaneously so this is no special requirement of the TrustPort Antivirus e I ve installed TrustPort Antivirus It seems like my computer works slower than before How is it possible One part of the antivirus solution is also the On Access scanner It means that this program runs in the background and checks for viruses all the data you are working with Such a protection slightly slows down the computer of course For the highest performance while keeping reasonable level of security set the On Access Scanner this way
209. p IT Secure Common Queries C Disabled accounts C Non expiring password Dave since last logon e Administrator TEST_WIN8 Pj Guest TEST WINS SL HomeGroupUiserg TEST WINS d tester TEST WINS Profiles in the list can be edited with the Settings button In this window you can choose the categories you want to block from the children or specific URL s whose access will be denied An example of an URL may be www sex com http sex com However we recommend using the star convention sex com or sex because of the relative links to these pages In the Exceptions tab then define the URLs that TrustPort Antivirus will ignore in the setting of blocked content lt Categories 4 Gamble C Redirector 4 Violence Y Spyware 4 Porn 4 Phishing Malware W Warez 4 Hacking About Manual 10 2 2 Volume Security I The Volume Security tab is used to set access permissions to selected directories or discs Volume security protection is activated by checking the checkbox Enable volume security 77 TrustPort Keep IT Secure t Shields 3 Access Control Parental Lock Volumes and Directories Secure Shredding Encryption Logs and Results Network Utilities Advanced Settings About and Licenses Volume security After enabling volume security itis possible to add discs or directories which can have set access permissions through the default profile or by adding own user profi
210. plorer etc All these items are listed in the table Protected locations Filesystem e Protection of processes threads If malware or other untrusted applications will try to access another process thread other than itself Application Inspector will evaluate this behavior as considered dangerous and will warn the user that the program can be harmful e Protection of system services Application Inspector monitors whether there is any modification creation deletion of system services by untrusted processes Some Trojan viruses are able to remotely connect to a system service or create its own by which after rebooting the computer a malicious code is run e Protection of system hooking Windows hooking is a feature that allows applications such as media players programs to extend the keyboard etc put the executable file e g DDL into another application They are also often used by malware to record keystrokes screen capture or control legitimate applications Application Inspector monitors system hooking and with potentially dangerous software it can detect this feature as harmful e Protection from switching off the system Application Inspector monitors all attempts of illegitimate applications to shut down restart your computer Malware or 69 TrustPort other malicious program may try to restart as part of the infection or turn off the computer and insert the malicious code as part of the next reboot If the user acts in t
211. proxy settings restoring default settings About and Licenses information about the product including its version information about the current license 44 TrustPort Keep IT Secure y p p Y Shields A i P TrustPort Total Protection El Shields l Shields Real Time Protection Enables the changing of basic shield settings which together po Email Protection serve by protecting your computer Each of them protect Firewall individual areas of potential attacks be Web Browsing Protection Real Time Protection u Provides realtime protection against viruses and malicious EI Antivirus software by examining all performed file system operations E Secure Shredding tl Encryption Email Protection 2 Logs and Results This shield checks viruses malware and spam in e mails during H Network Utilities POP3 protocol downloading E Advanced Settings E About and Licenses Firewall Firewall protects the computer by checking all network connections of the computer with the neighbourhood network Web Browsing Protection Protects against viruses and malware during internet browsing and during downloading of files Application Inspector Checks the behavior of applications and verifies potential harmful operations Show categories placed in the tree for easier orientation a Apply You can reach individual settings pages from the tree like list on the left side of the window After clicking on one of the configura
212. r into your computer and at the same time blocking unrequested or unwelcome operations attacks from hackers or viruses etc Many current malicious codes spread through the Internet These codes use security defects and software weak points for attacking poorly protected computers directly from the Internet The problem is that antivirus programs usually cannot deal with such codes A net worm uses a network to get into the computer but lives only in the computer memory If it does not create any file on the disk antivirus software ignores it Even if the user removes it from the computer memory the malicious code is settling in the computer immediately again The whole process could last for ages getting and removing the worm Personal firewalls can help us just in these situations 6 Use the electronic signing and encrypting Using the electronic signing contributes to an excellent prevention because it enables warning about any changes in documentation or files and if they are infected by virus they are of course modified The electronic sign used in communication can help to the authentication of the message sender The data encryption technology ensures that even if an attacker gets the data she or he can see only a nonsensical group of characters instead of the usable information Therefore encrypting protects data not only against viruses that steal documents from computers but also against other inquisitives and unauthorized people 7
213. r or company Server On Demand Protection On Demand Protection A highly powerful scanning utility that uses many different procedures to detect viruses and other malicious software in your computer Quarantine t works as a safety box for infected and potentially harmful files H Encryption H Logs and Results E Network Utilities Scheduler H Advanced Settings Enables scheduled scanning of selected files and folders ata About and Licenses specific time Engines Enables the setting of individual scanning engine parameters their cascade and usefulness Update This tab enables settings for automatic updates of virus definitions and engines to be changed show categories placed in the tree for easier orientation Apply 10 3 1 On Demand Scanner On this page you can set options for the On Demand Scanner In the Requested action setting you can select the software action after finding a malicious code These possibilities are available e Report only the user is informed about finding an infection by a dialog window and the notice is also displayed in the final report No other action is performed e Ask user in case of detecting an infection there will be a possibility to decide which action the antivirus program shall perform There are the same options as in case of finding an infection do nothing repair rename move to quarantine or delete e Repair the antivirus software tries to restore the infecte
214. r protection e Enable heuristic analysis antivirus software will not only scan objects for known viruses but it will also try to identify unknown malicious codes suspicious routines suspicious features etc By the help of heuristics program can reveal new or unknown viruses This option slows the scanning down but on the other hand increases the computer protection 10 3 3 Quarantine If an infected or suspicious object is moved to the Quarantine which can be determined in the setting of the On Access Scanner or On Demand Scanner you can find this object on this tab Quarantined objects are stored in a special format and therefore do not represent any danger for the computer Implicitly the Quarantine content is not loaded immediately after the software launching It is necessary to use the Refresh button to load its content This behaviour has been changed because of the situation when the quarantine contains many files TrustPort Antivirus Quarantine Shields Quarantine D Access Control Antivirus ee Location C Program Files x86 TrustPort Antivirus quarantine _ Internet Protection i Date and time Original location Infection Scheduler E eicar com 5 18 2012 8 56 C Testing EICAR Trustport i eicar_com zip 5 18 2012 9 11 C Testing 333a infected archiv E i Advanced Settings E Secure Shredding H Encryption E Logs and Results E Network Utilities H Advanced Settings E About an
215. r scanning is completed they are automatically deleted This directory will also contain files restored from quarantine This option it is set to directory Restore in the installation directory of TrustPort Antivirus by default Warning This path is stored to a record during the saving process into quarantine i e if from that time there has been a change in directory for the file restoration the original directory will be used 10 1 2 2 Mail Antivirus settings A On this page you can manage your Mail Antivirus settings By the Scan incoming emails check box you can enable disable scanning for malicious codes in incoming emails and their attachments Implicitly it is enabled and it is strongly recommended to have the Mail Antivirus always turned on Warning This option affects the monitoring of post in all used e mail clients 51 TrustPort Keep IT Secure E Shields e Real Time Protection E Antivirus D Secure Shredding 5 Scan only files with the following extensions Modify H Logs and Results E Exclude files with the following extensions E Network Utilities a Advanced Settings d E About and Licenses Quarantine infected attachments More details to customize Tf you want to customize the advanced settings click on the button Show categories placed in the tree for easier orientation Settings In this part you can edit the basic options of the Mail Antivirus e A
216. r undetected viruses that might be active at the time of their execution e Armored viruses Armored viruses protect themselves with a special program code that makes tracing reverse compiling and virus code understanding difficult for the antivirus software Armored virus can be shielded for example by an envelope code that draws away watcher s attention Another possibility is to hide with a help of a load code that simulates being at a different location e Multipartite viruses Multipartite viruses affect executable files disk boot sectors and sometimes also floppy disks sectors Their name comes from the fact that they do not restrict to any specific disk region or any specific file type but infect computers in several ways If you execute any application affected by the multipartite virus the virus infects the boot sector of your machine The virus is activated on the next system load and infects any suitable program that you execute According to the spread rate e Fast infectors By fast infectors we mean file viruses that infect not only executed files but also opened files when copying moving etc e Slow infectors Slow viruses are hard to reveal as they infect files that are modified or copied by operating system In other words slow virus affects only file user works with For instance it affects floppy disk boot sector when the boot sector is written by the FORMAT or SYS command A slow virus can infect only a file
217. ration and can be used for any user account in the image Because of this you need an administrator privileges to perform this operation It is available when the opened image is not mounted only 112 TrustPort Keep IT Secure TrustPort Disk Protection Image Editor Shields Image Editor E Access Control Antivirus 2 ep Se sw D S BR G H Secure Shredding E Logs and Results E Network Utilities H Advanced Settings H About and Licenses Cu WrustPort DiskProtection images image00 1 tdi tester 2 Show categories placed in the tree for easier orientation The name of a user account has to be unique in the whole opened image Disk Protection doesn t distinguish the letters case in the user account name so it means that accounts named Robert and robert are the same National characters are also supported The length of a user account name is limited to 31 characters 10 5 1 4 6 Change Password Ei Changing password operation allows you to change your password Name of this account is displayed in the status bar It isn t possible to use this operation when the opened image is being currently mounted If it is mounted it is necessary to unmount this file and then change the password 113 _ TrustPort E L o ALL OO t Shields H Access Control H Antivirus H Secure Shredding l Encryption Dives Type your old password the new password and its confirmation into the following fields
218. red in the given time limit then information about this event is displayed When the Ping requirement sending is finished the tool Ping analyses the sent requirements and the received answers and displays a brief statistics The statistics contains the number of sent and received packets and the number of lost packets including the percentual formulation Next there is displayed the shortest time between the sent requirement and the answer reception There is also displayed the longest time and the medium time Note If the TrustPort Personal Firewall configuration does not permit the sending and receiving of ICMP connections then the tool Ping will not work If you want to use this service create Firewall rule that enables you to receive and send the ICMP connections to allow incoming and outgoing connection with the help of ICMP protocol 10 7 4 WhoIs A Page Whols is a part of network tool pack and it serves for acquiring information about Internet domain Each Internet domain has its owner and technical administrator and it must be registered in domain register of the highest level Each register have a database of registered domains with information about the owners and more All these information are public and accessible via the service Whols Client Whols is a tool that connects to Whols server and it gets from here information about the given domain or object Some domains or objects can be removed out of Whols database but these are
219. redding l Encryption Drives y i Mount Managet H Network Utilities tH Advanced Settings d About and Licenses About Manual Cu TrustPort DiskProtection Images limage00 1 tdi tester 2 Show categories placed in the tree for easier orientation _ Apply This function is available only when opened image is not mounted Take care of changing or deleting all administrator accounts from the image If you change the last account with administration privileges to non admin account then this file becomes uneditable so there won t be possible to create a new account change account type or increase the size limit lt 10 5 1 4 4 Delete a user account BW Deleting user accounts is an administration operation and can be used for any user account in the image Because of this you need an administrator privileges to perform this operation It is available when the opened image is not mounted only Disk Protection ensures that it isn t possible to delete all user accounts from the image When a user tries to do this then Disk Protection displays an error message A A Take care of deleting all administrator accounts from the image If you delete all accounts with administration privileges then this file becomes uneditable so there won t be possible to create a new account change account type or increase the size limit 10 5 1 4 5 Rename a user account MH Renaming user accounts is an administration ope
220. ress depends on other errors that this file contains e g the length of a file with a Too short chain will be shortened to fit the chain length A directory with this error has to be deleted e Loop error Description This error is very similar to the Invalid FAT index error But in this case a bad reference points from one cluster to another cluster that is already somewhere earlier in the chain of this file So the file has in its chain an endless loop Solution The file has to be trimmed on the position of the bad reference The repair methods also depend on other errors in this file A directory with this error has to be deleted e Duplicate name Description Path to each file must be unique This implies that a directory can t contain more files with the same name Solution You can save only one file from such a group of files with the same name You must delete all other files from this group If you don t do this you won t be able to accede to these files except for one except for the file that is in the parent directory as the first from this group TrustPort Keep IT Secure e LFName Description Long filenames see the description of Self LFName are stored in the parent directory of corresponding files This error indicates that there are some long filenames in this directory that don t belong to any files Solution If you choose to repair this error these redundant long filena
221. ription y Filter Administration amp Factory default Any address Default rule set for TrustPort Perse Filter Definitions Web Browsing Protection Application Inspector H Access Control E Antivirus H Secure Shredding H Encryption H Logs and Results Network Utilities GL Advanced Settings H About and Licenses Remove Export Show categories placed in the tree for easier orientation a Apply A new rule set can be added by pressing New It is possible to adjust rule sets with the help of button Edit The rule sets that are not necessary any more can be deleted by button Remove After pressing Remove a dialog window is displayed Here you are asked if you are sure to delete the specified rule set If you select Yes the chosen rule set with all the rules are deleted Import of the existing rule sets is done by the button Import After pressing Import you are asked to select a rule set that you want to import If you have chosen the right file unbroken and with the right data format a dialog window is displayed Here it is possible to adjust the name of the rule set and the IP address to which it will be tied to Export of rule sets is done by the button Export To make the button Export functional it is possible to have some rule set specified When we click on this button a dialog window is displayed where it is possible to define the file destination and the name where you want to export the rule set The following items
222. rmat data configuration is selected from the computer using the Select button uw E Shields E Access Control E Antivirus E Secure Shredding E Encryption Logs and Results E Network Utilities E Advanced Settings y About and Licenses PP TrustPort Total Protection E Configuration Maintenance Manual O Y O al Protection 2013 Import Export configuration Selection of operation Import configuration Path to the file with configuration in TrustPort Management format 5 Export current settings Path to the output file L Select OK WS During the export a location where the file should be stored in the computer is selected and a required name is entered into the dialog window The import or export itself is performed after clicking on the OK button 132 TrustPort Keep IT Secure wg ei Configuration Maintenance PP TrustPort Total Protection 2 geg Manual geren GG i TrustPort Total Protection 2013 Access Control Antivirus Import Export configuration Secure Shredding Encryption Logs and Results Selection of operation Network Utilities Import configuration Advanced Settings E Path to the file with configuration in TrustPort Management format About and Licenses Select 8 Export current settings Path to the output file CiTestinglconfig data Restoring default configuration restoring default setti
223. rotection Firewall Web Browsing Protectio E i Application Inspector oe Add Edit Content Type t Antivirus E i i Secure Shredding Encryption Content type Logs and Results a Ivideo H Network Utilities H Advanced Settings Subtype t About and Licenses mpeg About Manual About Manual Show categories placed in the tree for easier orientation 10 1 5 Application Inspector Using the Application inspector you can manage potentially dangerous behavior of applications and untrusted programs from unverified third parties that seek to modify the system Application Inspector is a powerful weapon for the detection of Zero day viruses which antivirus companies have not yet detected but also for walking mutating viruses which often changes its structure and also for not updated anti virus solutions Modern Malware has become so sophisticated that antivirus programs can no longer only rely on detection methods which are based on file signatures By default the inspector monitors the running of all processes running under user accounts and after running an untrusted application that tries to modify protected system locations the user is asked whether the operation should be allowed restricted or blocked whilst the application is terminated If the user checks the Remember box with this rule it will then be added to the list of User rules and the user will not be asked again If the user does not check this box
224. rs After clicking the Advanced button the following options will appear Exclude from scanning e Objects files folders You can select this option if you want to exclude some objects from scanning By pressing Manage you can set these objects We recommend this option to use to experienced users only Scanning options e Enable heuristic analysis antivirus software will not only scan objects for known viruses but it will also try to identify unknown malicious codes suspicious routines suspicious features etc By the help of heuristics program can reveal new or unknown viruses This option slows the scanning down but on the other hand increases the computer protection e Scan memory on startup enables scanning of memory when the on demand scanner is launched time consuming 85 TrustPort rt Total Prot TrustPort Total Protection 2013 mi Advanced settings Fl Objects files folders Manage Enable heuristic analysis Modify Scan memory on startup Removable volumes scanning Scan newly inserted removable volumes CD ROM USB Logs and Results E gs an Ask before scanning of removable volumes EI Network Utilities fH Advanced Settings Additional features H About and Licenses Prepare TrustPort USB Antivirus Prepare BartPE plugin Prepare Windows PE CD Show categories placed in the tree for easier orientation Removable volumes scanning e Scan newly inserted removable vol
225. rule from selected log message You can select the creation you can also edit mle parameters 5 Create a new custom mule F you choose this method you can bear all rule parameters This option is designated for Manual Choose a log message On page Choose a log message it is possible to choose the log message of TrustPort Personal Firewall to which the new rule should be created The wizard from the marked message uses all the information as parameters for a new rule The marked message is highlighted in the bottom part of the wizard page In the list with logged messages are displayed only those messages that can be used as information parameters for new rule creation The rest of logged messages is automatically hidden This page is displayed only in case that on the previous page the method Create a new rule from log was chosen a Create a New Rule Choose a log message Choose a log message for your new rule Event Description Connection Denied Process NA Direction Incoming Fest Connection Denied Process NA Direction Incoming Protoc Connection Denied Process NA Direction Incoming Protoc Connection Denied Process NA Direction Incoming Protoc Connection Denied Process NA Direction Incoming Protoc Connection Denied Process NA Direction Incoming Protoc R Da I 2 58 58 Connection Denied Process NA Direction Incoming Protoc A 4 24 2012 Connection Denied Process NA Direction Incomin
226. rustPort Disk Protection Creation Wizard Image CA ADiskProtection Images image004 tdi Account admin Limit 256 MB Max size 285 MB Volume image 004 Algorithm AES Rijndael E Click Finish button to close the wizard About Manual lt Back The last page displays summary of information about created image including new file name name of the administrator account size limit selected algorithm etc After clicking on Finish the image is mounted and the wizard is closed If there is an error during mounting the image the program will display an error message If you press Esc or close the wizard then the wizard won t mount the created image to the system A Total number of available letters is limited to 26 A Z If there is no letter available for A mounting the image the mounting process will fail and a warning message will be displayed lt lt 16 7 Mount Wizard EA Mount Wizard allows you to mount an image in a very easy way Mount Wizard expects that you have an already created image see Create a new Disk Protection image wizard There are more ways how to start Mount Wizard You can do this by clicking on an image file or by running application TDisk exe without parameters or with parameter m see command line parameters Mount Wizard allows you to mount an image from various places e g harddisk network CD ROM USB device etc lt lt x TrustPort Disk Protection Mount Wizard Si Welcome to the D
227. s Tools Ka allows operation with encrypted disks and also activates the CAR Manager which allows you to create encrypted archives o Also allows you to launch Portunes the password manager and Skytale for encryption of messages lt lt Update e Update virus definitions is used to start an immediate update of virus definitions i e the antivirus databases will be updated with the latest known viruses Use this function only in exceptional cases it is preferable to set up automatic updating of the database in the Update tab e Update Antivirus is used to check for new versions of the TrustPort product which is currently installed Presets allows mass enabling or disabling of individual items to protect your computer by predefined profiles Based on the selected profile the below items are active High PJ Medium Low Game Mode Security Security Security Real Time Yes Yes Yes Yes Protection Application Inspector Pl Internet Protection web Antivirus E mail Yes Protection P Parental Yes Yes No Lock Enable Enable Enable SC Outgoing Outgoing Outgoing re CH Connections Connections Du 27 TrustPort Keep IT Secure If the user changes the protection settings manually in the user interface this new status will be indicated as Custom status in the quick launch menu Configure is used to run the configurator with which you can change the behavior of the antivir
228. s About and Licenses Devices Enables active management of user access to devices such as USB flash drives CO DAFD Bluetooth memory card readers and another multimedia storage devices Autorun List of all connected FAT type removable media where applied protection against automatic launching can be enabled Settings Enables the setting of common properties for all Access Show categories placed in the tree for easier orientation 10 2 1 Parental lock A Parental Lock s function is to block children s access to inappropriate web content However it allows pages that are appropriate for the child and basically prohibits those that could have an adverse effect TrustPort Antivirus can be set to filter either on the base of a preset database of inappropriate Web sites or you can create a specific list of URLs of sites to block With Use Parental Lock button the Parental Lock and all its functionality is either enabled or disabled Using the heuristic method TrustPort Antivirus seeks to classify the site according to forbidden words This method is slower and we recommend that you set it unless you are using filtering by category 75 TrustPort Shields Access Control ES Parental Lock E a deg Parental Lock enables blocking of inappropriate website content using particular user l umes and Directories profiles Websites can be blocked by specific URL address or by categories such as porn violence gamble
229. s E Network Utilities E Advanced Settings H About and Licenses TrustPort Antivirus On Access Scanner ProgramData y System Volume Information y temp Testing y totalcmd Users y Windows AnView C inview Excluded objects Remove About Manual Show categories placed in the tree for easier orientation ime scanner click the 48 TrustPort Keep IT Secure mm 7 e Processes This functionality could be potentially dangerous and it is recommended only for experienced users When you add new process image changes will be applied immediately even for already running processes After removing of process image currently excluded processes will remain excluded until its termination For correct function it is necessary to select executable process file Process exclusion benefits it is possible to use more antivirus products on single computer simply by excluding other antivirus scanner process it provides compatibility fix for other file system filtering software installed on same machine it could increase overall system performance by excluding some safe system processes indexing service for example Scanning options e Enable heuristic analysis antivirus program will not only scan objects for known viruses but it will also try to identify unknown malicious codes suspicious routines suspicious features etc By the help of heuristics program can reveal new or unknown viruses T
230. s possible to use any port one port range of ports or a list of ports By a change of roll list Address type it is possible to specify the address type and therefore the way how the local addresses will be entered With each change of the roll list is also changed the page content The local addresses are entered as IP addresses in format X X X X or as the domain names For address entered as domain names are certain limitations the characters can be only alphanumeric and they also contain these signs During entering local addresses as range of addresses or as an address with subnet mask it is not possible to use domain names as addresses there are allowed only the correct IP addresses By a change of roll list Port type it is possible to determine the port type and therefore the way how the local ports will be entered For each change of the roll list is also changed the page content The ports are entered as full number values and they must be from 1 to 65535 A Create a New Rule Select a local endpoint Select an address and port number for your local endpoint Seed Select a remote endpoint Page Select a remote endpoint serves for determination of the remote address and port If the ICMP protocol is specified then the control elements are not available for port determination because with the ICMP protocol does not occur the packet directing to certain ports but to address as such For the determination of the remot
231. s Configuration E Access Control E Antivirus E Secure Shredding l Encryption Ef Drives Mount Manager Image Editor 4 Unmount when machine is suspended or locked E Unmount after 20 2 minutes of inactivity 5 Logs and Results E Network Utilities Quick unmount E Advanced Settings None E About and Licenses Hotkey Forced unmount E Allow forced unmounting of all mounted disks Don t ask before unmounting Forced unmount can cause unsaved data loss therefore use Show categories placed in the tree for easier orientation The second functionality you can set on this page is force unmount If you have mounted an image and opened some document in this image then system has to close this document when it is going to unmount this image When this situation occurs Disk Protection displays a warning message and asks you for closing affected applications If you check Allow forced unmounting of all mounted disks Disk Protection will not ask you for closing all affected applications and unmounts the image by force If you select Don t ask before unmounting option then Disk Protection will not display any warning message CM Beware Forced unmount can cause unsaved data loss therefore use this option d cautiously You can also setup a hotkey for quick unmounting all currently mounted disks when pressed lt lt 10 5 1 2 General options Mi You can set up searching options and recent options here In t
232. s and other malicious code from Web environment From this page you can enable disable Internet Protection and modify additional settings of Internet protection using the Advanced button 86 TrustPort TrustPort Antivirus Internet Protection FB Shields Internet Protection G Access Control E Antivirus Internet Protection Active More details to customize Tf you want to customize the advanced settings of real time scanner click the button i Secure Shredding i Encryption H Logs and Results H Network Utilities H Advanced Settings H About and Licenses Show categories placed in the tree for easier orientation MID Apply Advanced settings Port list You can edit a list of ports which you want to be scanned separately for email and web communication By clicking on the appropriate button you can display the list of ports TrustPort Antivirus Internet Protection i Secure Shredding i Encryption H Logs and Results H Network Utilities H Advanced Settings H About and Licenses Edit E Delete About Manual Show categories placed in the tree for easier orientation On the left side of the window there is a list of ports and protocols that are going to be checked On the right side there are three buttons which serve for managing the list By clicking on the Add button you 87 Keep IT Secure nr p TrustPort Keep IT Secure can add a new item to the list If you click
233. s created by this wizard are normal files and you can store them on your harddisk any removable media or also as for example read only files on CD ROM Image created by this wizard is automatically mounted when this wizard successfully finishes TrustPort Disk Protection Create New Image Wizard mE Welcome to the Disk Protection Image Creation Wizard ear TrustPort Disk Protection lets you store your files and Te u st PO i folders securely in encrypted volume images that can be mounted and unmounted at any time These volume images are nomal files and can be stored on your hard dive on any removable media such as USE flash disks or as read only images on the CD ROM for instance To create a new volume image you have to enter a passphrase that will be used for the encryption key you will also be required to enter a file name and desired size of this image and some other parameters This wizard will guide through this process To continue click Next button About Manual This wizard can be started from the Start menu or using Disk Protection Quick Launch or through command line parameters of TDisk exe program lt lt 16 6 1 New Image Options MN At this page you have to specify a name of the new image The image can be located any place on your hard drive or removable media where you have writing access or on the network drive with the capacity at least 5 MB TrustPort Disk Protection Create New Image Wizard
234. s fact The On Access Scanner and the On Demand Scanner will be working further Attention After importing the full key the application needs executing again for example Settings in order to load all its components with the right settings 140 TrustPort Keep IT Secure 12 3 Trial license temporary support expiration Trial license After 30 days of the trial licence period the functionality of the antivirus program will be restricted Using the On Demand Scanner will not be possible anymore the update will be disabled and the On Access scanner will stop working Trial license key expiration is announced by this window TrustPort Total Protection 2013 License Key Report Your trial license has expired TrustPort Total Protection 2013 is not licensed program will be aborted Please contact your local reseller to get a new valid license key About Manual Temporary support When the temporary support expires some functions of the antivirus software will be restricted like in the case of the trial licence The restrictions do not concern the On Demand Scanner but only the antivirus update The user is warned about this fact by the following dialog window which will be displayed at executing the On Demand Scanner and at an attempt of starting the update TrustPort Total Protection 2013 License Key Report Your time limited support has expired TrustPort Total Protection 2013 time limited license h
235. s from the internet which can then be applied on the required computer Virus definitions are downloaded to the computer using the Download packages button 95 Keep IT Secure TrustPort E Access Control Antivirus b On Demand Protection This page serves for manual offline updates of virus definitions for the TrustPort product range Please follow the next steps 1 Click on the Download packages button and download the update package Make sure your internet connection is operational Sartre _ Download packages _ Download t Encryption t Logs and Results Network Utilities 2 Click on the Apply packages button at the computer where you want to H Advanced Settings implement the offline updates 0 About and Licenses Show categories placed in the tree for easier orientation A folder where the updates will be stored is selected in the dialog and by clicking on OK the downloading Starts i Erowse for Folder Select a folder to save update packages Mi Computer gt E Local Disk C b ga Local Disk D b ga Rezervov no syst mem E b El DVD CD RW Drive F b a BD ROM Drive G OFFICE14 t CD Drive H U3 System Downloading packages gt USB 1 Packages downloaded successfully f Downloaded virus definitions are applied on the required computer using the Apply packages button The user is asked for the location of the update package on the comput
236. s not expect password protected archives and if the password does not match or the user presses ESC then it displays an error message It does not mean that CAR archive file is damaged 14 4 4 Add files to CAR archive Mi You can add files and folders only to an open archive Open a CAR archive file in one pane and select the files and or folders that will be added in the other pane Then press F5 key Total Commander recognizes that the copying operation is actually a packing operation and calls the CAR plug in Total Commander 7 57a AEC Ltd Files Mark Commands Wet Show Configuration Start e ama sjaj e s S p d a volo Bejed Ge Or s On i Qi Em Ge v Lnone_ 18 830 852 k of 45 648 696 k free o Ec v none 18 830 852 k of 45 648 696 k free ae re Testingharchivesinewtparchive car j Name Et Sie Date Atr Name Siz L lt DIR gt 05 30 2012 07 43 481 C 3 new SDR 0530 2012 07 414 confi data 15 H Tesh Pack files xe T7 ka Pack 1 file s to the archive E eng caro Testing archives new tparchive car Packer ae Bosa Y Also pack path names only recursed ae sid A Recursively pack subdirectories LHA A ACE TGZ 7 Multiple disk archive ZIP ARJ RAR ACE S E Move to archive a E Create self extracting archive needs extemal packer Create separate archives one per selected We Air _ Encrypt 159 TrustPort Keep IT Secure On the Pack files window you c
237. s that normally cannot be met Only test samples or technological specimens are denoted by this term 3 Installation and uninstallation of TrustPort products Installation of applications TrustPort Antivirus TrustPort Internet Security and TrustPort Total Protection is set up by the starting program setup exe the program icon is figured below Installation program is a transparent wizard that enables the installation even for the less experienced users iP setup exe Installation can be performed in two modes standard intended for common users when the product is installed with recommended settings or advanced when users themselves can select further parameters of installation such as selection of target directory shortcut location in the Start menu advanced settings regarding computer protection proxy settings 23 TrustPort If the user has bought the licence key he can use this key already during the installation Just copy a license key file named according to the type of the product antivirus key internetsecurity key totalprotection key to the installation file setup exe and launch the setup file You can modify the type of installation by command line parameters SILENT VERYSILENT NOCANCEL DIR x directory name GROUP group name SN activation code LICKEY path to licence key P Integration to e mail clients Setup TrustPort Total Protection TAL PRUTECTION
238. sable displaying balloon tip above this icon which explains you why you can t see any download progress information in your browser By checking the Exclude the following content types option you can activate the list of mime types which you don t want to scan for malicious codes It will be displayed by clicking on the button Modify TrustPort Antivirus Internet Protection Web Antivirus clara Web Antivirus Real Time Protection Email Protection o E Firewall Use Web Antivirus EES Web Browsing Protection S z s Notification Application Inspector Ggs E Access Control Add an icon to the system tray if a download is not finished within D Antivirus Secure Shredding Sei on 2 Encryption Display a balloon tip above the tray icon E Logs and Results E Network Utilities Advanced settings NEA Biama Exdude the following Content types Show categories placed in the tree for easier orientation In the List of excluded content types you can add a new item by clicking on the Add button A new window where you can specify the content type and subtype will appear Wild cards are not allowed By double clicking on a particular item of the list or selecting an item and then clicking on the Edit button you can edit the particular type You can delete any item by selecting it and then clicking on the Delete button 67 _ TrustPort Ode i lanagel Manual E Shields Real Time Protection Email P
239. se files without a password All files and folders are stored in one archive file and are compressed and encrypted In comparison with this each CPH file contains only one encrypted file and doesn t use compression e Why TPE enables packing SFX archives to ZIP format If you need for instance to send an e mail with an attachment to your colleague in other office over the internet and don t want the file to be opened by anyone but your colleague then we recommend you to use a CAR archive But if you colleague doesn t have TPE installed on his computer to extract the received CAR archive then you can add a self extracting EXE form to the CAR archive If your company has installed an anti virus system on the mail server then there could be problems with EXE attachments which could be automatically removed To solve this problem TPE allows you to pack SFX archives to ZIP format that usually can pass thru this anti virus protection without problems lt lt 162 TrustPort Keep IT Secure 15 DataShredder 15 1 Product overview MH The TrustPort DataShredder is a small utility for secure unrecoverable deletion of your electronic data You can easily delete your sensitive files folders free space on drives Cookies Internet temporary files Recycle Bin System temporary directory Internet and Document history Key features e support of Microsoft operating systems Windows 2000 and higher e possibility to choose from eight shred
240. serted The protocol numbers can be entered in interval from 1 to 255 Option Action serves for definition what should be done with the connection if it complies with all the rule features The connection can be permitted or denied You can set the option to log information about denied or permitted connections You can create log rules by specifying Ask user even if rule is fired Log rule is not making final packet decision but is present only for logging During creation of rules it is necessary to take in consideration the fact that all connections that do not satisfy any rule are automatically denied providing that there is not configured the opposite logic of firewall operation in advanced options on page Global Firewall Settings a Create a New Rule Select direction action and protocol for your new rule Permit i Deny Ask user even if rule is fired Log when this rule matches i E Select a local endpoint Page Select a local endpoint serves for determination of the local address and port If the ICMP protocol is specified then the control elements for port determination are not available because with the ICMP protocol does not occur the directing the packets to specified ports but to an address as such 63 _ TrustPort For the determination of the local address there is possible to use any address one address a range of addresses address with network mask or list of addresses For determination of local port there i
241. set iso 8859 1 Requested IP 192 168 0 1 chaticq com Reason for url blockade Url was evaluated as blocked in these groups Chat Possible solutions You can contact your network administrator Go back to the previous page Powered by TrustPort Antivirus TrustPort a s 9 USB Antivirus In cases where for example we use portable applications on USB keys we do not have data protected throughout the entire use as is the case with the use of resident scanner The solution in such situations is offered by the USB Antivirus that automatically monitors any data written to the protected USB drive Conduct of the USB Antivirus is very similar to that of the residential scanner All written data is continuously monitored and if a virus is found an action determined by you is carried out Unlike the resident scanner that is integrated into the system the launch of the infected file cannot be prevented 9 1 USB Antivirus creation Creating USB Antivirus can be achieved from the advanced settings dialogue of the on demand scanner through the Prepare TrustPort USB Antivirus button This button is accessible only in a licensed installation on a desktop computer It is not possible to create an additional USB Antivirus for example from a previously created one 41 TrustPort Keep IT Secure E Objects files folders Enable heuristic analysis 4 Scan memory on startup Scan newly inserted r
242. settings is mainly used in aie corporate networks t Logs and Results i Network Utilities W Use a proxy server Proxy server address Address 192 168 30 5 W E 3128 E Port Ss Proxy server authentication 4 Log on to proxy server User name eme Confirm password A Passwords match Show categories placed in the tree for easier orientation If identification with a username and password is required these details are entered into the Log on to proxy server part This setting is applied mainly in secured corporate networks 131 TrustPort Keep IT Secure 10 8 3 Configuration Maintenance H Shields E Access Control E Secure Shredding EI Encryption E Logs and Results E Network Utilities Advanced Settings F About and Licenses Configuration Maintenance Configuration Maintenance Import Export Configuration This button launches the Migration Tool Wizard which allows the importing and exporting of configurations Itis possible to use such configurations on various computers etc Execute Wizard Restore Default Configuration This button restores the default configuration which is set when product is installed Reboot of computer is needed to finish the restore process Show categories placed in the tree for easier orientation Configuration Import or Export is done through the Execute Wizard button During the import a file containing TrustPort Management fo
243. should check your images after each incorrect shutdown AN You can t check an image that is at the same time mounted to your computer or edited d by utilities like Image Editor You have to unmount it or close it first and then you can et 8 e check that image and finally remount it e CheckImage has two different difficulty levels to make it easy to use and powerful together CheckImage finds the errors and chooses appropriate solution automatically using sophisticated logic You can change the method used by repairing for each wrong item You can choose the FAT table on which will be the repairing based You can also format an image using CheckImage CheckImage logs all repairs into a file lt lt 17 2 Description of error types and repairing A This page contains information about error types as CheckImage detects them These error names use CheckImage in the Error column e Crosslinked Description Each file and directory consists of several clusters the whole image is divided into clusters their size is fixed by formatting that aren t in the image always one after another Each cluster of such a file has its unique index and in the FAT there is for this cluster a reference to the next cluster where that file continues for the last cluster there is a mark that the file ends here Clusters of a file create this way a chain But when the FAT goes wrong and a reference from one link of a chain points to a comple
244. shred internet temporary files cookies system temporary directory Recycle Bin internet history run history and document history Panic Shredding This option enables fast run shredding of files and directories that are defined ahead Shredding is started by pressing a combination of hot keys which are defined ahead er orientation 98 TrustPort Keep IT Secure 10 4 1 Configuration I Page Configuration serves for configuration selection for all parts of the application This configuration will be used in shredding process You can set here the shredding method and the possibility to generate record file The method is selected in the dropdown menu When the method is chosen its description is shown below the list This description contains the basic information about the method and how many passes of shredding will the file be overwritten There are following methods possible Quick Russian GOST TrustPort U S DoD Bruce Schneier German VSITR and Peter Gutmann H Access Control H Antivirus Secure Shredding 38 Configure i Encryption i Logs and Results H Network Utilities i Advanced Settings H About and Licenses TrustPort DataShredder Configuration Configuration Select wiping method _ _ _ _____ gege Number of passes 3 Description This method is based on TrustPort company research It uses a verification in the last pass Itis secure and should
245. so shown During enabling or disabling a blue TP icon appears During the update of the virus database the icon also displays the download progress Clicking on the quick launch icon the following options appear number of items depends on the installed product Quick scan Scan All Disks Scan All Local Disks Scan All Removable Media Scan Registry Scan Selected Target Disable On Access Scanner Antivirus DES GQ K Permit all connections Enable outgoing connections Use firewall rules Deny all connections Enable Internet Scanner D Tr F F de e E fin Total Protection TrustPort Antivirus TrustPort Total Protection 26 TrustPort Keep IT Secure Antivirus Enables the user to activate on demand scanning in different modes For example e Scan all disks engages the on demand scan of all local and mapped network drives e Scan all removable media runs on demand scan for all removable media connected to your computer such as floppy disks CDs external drives ZIP drives USB tokens etc e Scan selected target runs on demand scan of your chosen directory Also allows you to temporarily disable on access or internet protection and also view brief statistics of scanned infected files PE Network allows setting the desired degree of firewall protection such as allowing all connections allowing only outgoing connections or using firewall rule
246. st E Disk Protection Checklmage File View Help kk I Not crosslinked file ran Method RA VINSTALLAIMAGES advanced04 png 20KB Too short 2 KB Invalid Repair it e All files This view is intended for browsing through the entire disk It shows you not only the erroneous items but also the others For simpler browsing there is a tree view on the left side showing the directory structure Each directory has an icon indicating whether it contains any errors inside eventually that the directory is wrong itself lt lt 190 TrustPort Keep IT Secure Loi Disk Protection Checklmage File View Help Pr ae a o INSTALL E IMAGES 17 4 4 Change the repair settings Ki In advanced mode it is possible to change the action that will be carried out by repairing When you right click on an item in the list a context menu appears where you can select the action to make In the All files view you can set also an errorless file or directory to be deleted E Disk Protection Checklmage File View Help ta BS Bf IN INSTALLAIMAGES advanced02 png 23KB Crosslinked Too long 1 Delete this tem SN MINSTALL IMAGES advanced03 png 21 KB Ee Too long 5 Delete this item 2 KB Invalid Repair it Delete this item When you change selected action for a damaged item no data is deleted or repaired or any other action made at that moment but after clicking on Repair image from toolbar or Repair err
247. st Then you can select file that you want to view and press F3 key or right click on the file and select View from the context menu Total commander will call the CAR manager plug in to extract the selected file to the temporary folder and then you can view it The window can be closed pressing ESC as well Warning because Total Commander closes the viewed file by itself CAR manager plug in is not able to securely delete the temporary extracted file o 14 4 8 Test CAR archive consistency WH Testing of archive consistency can be done by pressing SHIFT ALT F9 key combination or selecting Test archive s on the Files menu If archive is opened then the checking procedure starts immediately if not then the CAR plug in will ask you for the password It is possible to select more than one CAR archive file to check D Total Commander 7 57a AEC Ltd Files Mark Commands Net Show Configuration Start elelzleeeisalslaaleeolsoalesaalz E od SG G Gs Oh Gi Gi d i ic v Lnone_ 18 830 306 k of 45 648 696 k tree XA o Ge none 18 830 306 k of 45 648 696 k free y Oe Total Commander Wenfy CRC check car 161 TrustPort Keep IT Secure 14 5 Archive Encryption FAQ e Can I open an archive stored on a non writable media like a CD ROM Yes it is possible But remember that it is not possible to modify this archive in this case you will not be able to add files delete files or modify an archive comment e
248. sure to remove the specified rule 10 1 3 2 1 New Rule Wizard PE welcome to the New Rule Wizard When the New Rule Wizard is started this first page is displayed The user is informed here what can be done with the help of this wizard By pressing button Next it is possible to continue to next wizard page Create a New Rule e TrustPort Welcome to the New Rule TOTAL en Wizarel RU TEC IIL This wizard helps you create a new firewall mule lt can be created from a predefined rule or you can create your own custom rule To continue click Next button Manual lt Back Choose a method Page Choose a method serves for choosing a method of the new rule creation There are two methods for the new rule creation e Create a new rule from log This method serves for new rule creation from the logged records of TrustPort Personal Firewall application By use of this method the user gains the possibility to create the rule exactly according the logged message and it is not necessary to write down manually all the parameters e Create a new custom rule The last method is designed for the advanced users and it enables to create a new rule exactly according their requirements The user must fill in all important parameters of the new rule 61 TrustPort Keep IT Secure Create a New Rule Choose a method Choose a creation method for your new rule Create a new rule from log Use this option to create a new
249. sword fields blank but we strongly recommend using combination of small and capital letters and numbers in the minimum length of 8 characters lt lt 16 6 3 Create Image Processing Mi The first step of image creating procedure is collecting of random data needed for data encryption key generating Please keep moving mouse pointer over the window clicking or pressing any key 173 TrustPort Keep IT Secure 8 TrustPort Disk Protection Create New Image Wizard EI gf Create Image Processing Collect random data Collecting random data for encryption key generation Please keep E About Manual lt Back TrustPort Disk Protection creates a new image file You can interrupt this process by clicking Cancel button or by Esc key TrustPort Disk Protection Create New Image Wizard aaa Create Image Processing Creating anew volume image been created vie Click Nest to continue About Manual The process of creating formatting and encrypting of the image may take some time Time needed for this operation depends on the image size selected method used file system etc lt lt 16 6 4 Finishing Create New Image Wizard MI After the process is finished new image is created on the target disk and is ready for use 174 TrustPort TrustPort Disk Protection Create New Image Wizard RE Completing the Disk Protection Image Creation Wizard You have successfully completed the T
250. t is being modified changed or created i e after it could be infected because the virus attack is also a modification of current file or producing a new one The Scanning statistics window is displayed just to inform the user It displays statistics related to the On Access scanner from the moment of its execution The numbers of scanned infected repaired renamed quarantined and deleted files and boot sectors for the first three groups are shown 10 1 1 2 Options The most important feature is the Requested action by which you can set an immediate action performed by the scanner The program s behavior after finding a malicious code can be one of the following e Ask user this mode causes that the On Access Scanner asks a user about a possible action if a virus infection is found e Deny access the file will physically remain on its position but the antivirus software blocks any access to it It is unable to execute the file or to do any harm through it 46 TrustPort Repair the antivirus software will try to restore the infected file if it is possible or efficient some files are malicious software themselves so there is no sense in repairing it Rename the infected file is left on its place but its extension is changed to some other which is not associated with any activity in the system e Move to quarantine the infected file is moved into a safe directory controlled by the antivirus software where it cannot
251. t limit size 20 MB Maximum limit size 26 MB EEEE Show categories placed in the tree for easier orientation Functionality of individual buttons is described in the chapter Auto mounts lt lt 10 5 1 3 3 Search Mi You can search for image files on the local disk or a network You are able to specify one or more searching locations into Search in combo box They have to be separated by semicolon if you want to search in more than one in the same time Other possibility is to use browse button or choose from the searching history If you leave the searching location blank and start searching then Disk Protection will search in the images subfolder of the installation folder 107 TrustPort Keep IT Secure Image path C Program Files x86 TrustPort DiskProtection Images C Program Files x86 TrustPort DiskPro images Network Utilities C Program Files x86 TrustPort DiskProte images d About and Licenses Status Unmounted Encryption algorithm AES Rijndael File system FATI6 Current limit size 10 MB Maximum limit size 15 MB PaRa Show categories placed in the tree for easier orientation Running searching procedure can be independently interrupted by clicking Stop button You can also use the context menu available after right mouse click on any found image file item Use Add to auto mount list or Add to recent mount list buttons to add selected image file to the proper list Functionality of other
252. t look like operating system alarm when executing the malicious code The user is announced that a file has been corrupted that this and that driver is missing or that she or he does not have the actual version of programs used and so on In the meantime the dangerous program is being installed The user thinks that some other software has initiated a defect that cannot be easily influenced and discards it e Viruses with a special exhibition Some malicious codes exhibit in a special way that shows evidence of their authors sense of humor For example there are programs that force the system clock to go counterclockwise Funny Not so much when thinking of the problem to decide which data backup is the older and which is the newer According to the way of spread e Computer viruses e Trojan horses e Backdoors e Net worms We can say that they are computer viruses that use services of any network both local and global for their spread But it is not as simple as that While a computer virus needs host applications for its spread with the exception of so called accompanying viruses which adopt the name of exe files but they have the com extension and presume on the fact that this extension is preferred by operating systems a worm is generally malicious by itself 13 _ TrustPort According to exhibition time e Viruses activated immediately The times when rules like do not start your computer that particular day were held are gon
253. te a new account you must create a new image and copy all the data files to it e I can t increase limit size of an image Why Check if this image file is not mounted If it is unmount it and try this operation again If this image is unmounted then look at the information and check if there is available free space in size limits maximum limit and actual limit mustn t be the same If none of these procedures helped you then there is no other possibility to increase this image size You have to create a new image and copy your data to it e I want to create a new image but Disk Protection Create Wizard doesn t allow creating an image greater than 4095 MB even if I have enough free space on the destination disk What s wrong You have probably reached the limitation of FAT file system The destination disk where the new image should be created uses FAT or FAT32 file system One of the limitations of FAT system is that there isn t possible to create a file larger than 4 GB 4095 MB If you need larger image file you have to create a new image on disk with NTFS file system lt lt 180 TrustPort Keep IT Secure g m 17 CheckImage 17 1 Product overview EA CheckImage is a powerful tool for checking your encrypted images and repairing of opportune errors that can occur for instance because of wrong computer shutdown When you encounter a problem in your image you are strongly recommended to check it using CheckImage But you
254. ted archive file 1t means that in the last step of the archivation procedure all original files will be securely deleted 145 TrustPort Keep IT Secure e Create self extraction SFX EXE archive To do this you need to check Create EXE archive option In this case TrustPort Archive Encryption creates classic CAR archive file but adds special self extraction header to the archive file and renames it to the EXE extension Self extraction archives can be extracted by running them as normal Windows programs or by the same way as normal CAR archives e Pack to ZIP archive Self extraction archives can be zipped into a ZIP file in order to better pass through firewalls and antiviral gateways To do this select Pack to ZIP archive option e Create Installer See Create installer CAR SFX The option Add Remove SFX on the Edit menu allows the user to simply add or remove the EXE extension on any file without the need of decrypting it as in previous versions lt lt 14 2 2 Create CAR SFX installer BI CAR SFX installer allows you to encrypt files into a self extracting format If you want to use SFX Installer you must check the Create an EXE Archive box and then check the Create Installer box both in the Encrypt Archive window Encrypt Archive Ea TrustPort Archive Encryption Archive C Testing Test 11 exe E Move to archive Create EXE archive _ Pack to ZIP archive Create Installer About Manual
255. tely different file the previous continuing of this chain gets lost and the chain the file joins a foreign chain So now two different files have joint ends This situation can also simply happen to more than two files at once they create a crosslinked group It s almost impossible to make out to which file belonged the joint end before One clue to this problem is the file length information in the parent directory entry that logically hasn t been affected by an error in FAT When a file stoles its end from another file it s possible that this new end hasn t the same chain length as the former end had In this case the file length doesn t consist with the real length of the file chain On the other hand if the file length and the length of the chain have the same value it is most likely that this file has its own end that other chains joined Solution If the crosslinked item is a directory there is no way to repair it and it has to be deleted A crosslinked file is by default set to be deleted Only if there is just one file in a crosslinked group that has correct chain size in this case this file is set to be corrected You can t select do nothing option for a crosslinked file 181 TrustPort You can repair more files from one crosslinked group The repairing then proceeds according to specified priority The file with the highest priority occupies its whole chain including the joint part the others take in sequence as muc
256. ter 165 TrustPort Keep IT Secure inettemp i Shredding of temporary internet files Shredding the list of started applications by Start all a This parameter is a combination of parameters inettemp cookies systemp recbin inethist dochist and runhist When the shredding is finished there is displayed a report how many files and directories were shredded and the operation was done successfully Example of use dshrcon exe method usdod3 all It shreds by method U S DoD all the accessible temporary files directories and history dshrcon exe method german c data private txt It shreds by method German VSITR file c data private txt dshrcon exe m quick g r c report rpt o a It shreds by method QUICK all the accessible temporary files directories and history with creation of report file c report rpt which will be overwritten lt lt 15 5 DataShredder FAQ e How can I shred disk with TrustPort DataShredder Which possibilities offers TrustPort DataShredder for users Run some window manager e g Windows Explorer Total Commander Select some drive push the right button of the mouse and the shell context menu appears In this menu is a new item TrustPort DataShredder and inside this item are three possible actions Shred data on the disk Shred free space and Shred whole disk all data and free space together e Can I select multiple files and shred them with Trust
257. that case delivered on an independent way Files and directories are encrypted into cph files and the passphrase is used as a base for the encryption key Encrypted files in PDA are automatically associated with the TrustPort Archive Encryption application and decrypted when the passphrase is entered Key features Support most of Microsoft s operating systems Windows 98 ME NT 4 0 2000 XP Vista 7 File encryption with possibilities of compression and secure original file deletion Encrypted files format compatibility with PDA devices Files and folders encryption to archives TrustPort Archive Encryption uses strong algorithms Files to decrypt can be selected from the archive Files and directories can be encrypted into a self extracting exe file which can then be packed into a zip file in order to pass through firewalls and antiviral gateways Shell context menu integration Files Folders Drives Management of files stored in CAR archive Viewing files from the archives with secure delete of temporary files after The possibility of work with group of selected files by the extension etc inside of archive Transformation of the archives CAR to self extract EXE or the other way The possibility to use archive as installer creating SFX archive that during its extraction creates temporary folder places its content into it and launches defined file Drag amp Drop functions Statistics in status li
258. the up dir icon lt lt 14 2 1 Create new archive create a new archive using the context menu right click on the desired file and select Encrypt Archive on the context menu TPE will ask you to type the new archive file s name and password and you can choose some additional archive creation options See the following dialog window Encrypt Archive Encrypting archive TrustPort Archive Encryption Archive C Testing install car Options Security Move to archive a a e deeg Total size 78 549 552 bytes Create EXE archive Compress ratio 100 Pack to ZIP archive _ Pack to eee C Testing gimp 2 8 0 c1 setup exe Create Installer 39 Creating archive Confim gege Ip Een Encrypting Warming lf you cancel encryption process then archive will be About Manual deleted Cancel Select among the options type and confirm the password choose an encryption algorithm and press OK TPE will start the archive creation process and after finishing it an information box will appear Please note that in order to extract this archive TrustPort Archive Encryption must be installed hence if you want to send an encrypted archive file to a computer where TrustPort Archive Encryption is not installed you will have to check Create EXE archive box on the Encrypt Archive window Archive creation options e Move to archive If you select this option then all selected files will be moved to the crea
259. the dialogue window will appear again asking the same options Descriptions e Allow This option allows for the process queried performing all system modifications and the process is not limited in any way This option is only recommended for applications and processes the user trusts e Restrict This option is useful for applications that the user does not know but needs to run The application then runs in a restricted mode sandbox the inspector shall prohibit applications which want to modify critical system locations listed in the table of Restricted locations but will allow others Useful for example with keygens and other harmful applications e Block This option eliminates the entire process and the forthcoming operation Suitable for unknown applications where the user does not know the origin or suspects that they may be dangerous Example title of hazardous application 69W_OS859cc8 exe 68 TrustPort Total Protection 2013 Application Inspector A UNLOCKERASSISTANT EXE is trying to install a system wide hook This application is not trustful and could be potentially danger Select an action 5 Allow Allow this application full access without further restrictions GN R t t Allow this application but block all critical system modifications Block Block this application Program will be terminated Remember choice About Manual 4 More details WD Process operation WW Process ID An e
260. tings 7 2 Choosing action for an identified virus If a virus is found by the On Demand Scanner the antivirus program behaves according to the settings Implicitly program tries to clean the virus If the Ask user action is set you can select one of the following actions Do nothing Repair Rename Move to quarantine Delete The selected action is used for repairing the virus infection If you select action that cannot be performed for any reason you are asked for selecting another action Now you cannot select any action which has been tried on the infected file before 34 TrustPort Keep IT Secure d TrustPort Total Protection 2013 Choose action k VIRUS ALERT H An infection has been found Please choose an action that should be done to handle the C Testing 333 eicar com Infected EICAR TrustPort Name Action successfully solved Do nothing Repair Disinfect A Shutdown autor Rename 5 Move to quarantine About Manual Delete E Next time do not ask for this particular infection About Manual In case that the Ask User mode is not selected the user is kept posted by statistics You will get to know which files were infected and how the infection was resolved from the results in the report 7 3 Scanning report The scanning report is an output of the On Demand Scanner It is saved in the XML format in the report xml file in the docs dire
261. tion sections the corresponding page is displayed in the right part of the window Another way to navigate to the configuration section is to click on the respective link on the start page Every configuration change must be confirmed by pressing Apply in order to take effect In the upper part of the window there is the Manual button and after clicking on it it opens page with the possibility to download PDF manual to the installed TrustPort product 10 1 Shields Shields category enables to modify settings of shields which serve as protection against viruses malware spam through the real time protection monitoring network connections and checking behavior of untrusted applications 10 1 1 On Access Scanner On the On Access Scanner tab you can modify settings for the scanner that is running in the background and protects your computer against virus infections This scanner is the cornerstone of the protection of your computer and therefore it is necessary to have it activated all the time 10 1 1 1 General settings The On Access scanner can be enabled or disabled here and its basic parameters are shown You can also find here the basic statistic information about the On Access scanner Only a user with administrator rights is allowed to make any changes here Checking the Real time virus protection indicates that on line computer protection is on Because of being a very important part of the computer protection the actual status
262. ture The E Se cure Shredding ask dialog will not be displayed E Encryption Logs and Results Recommended Mode Es Network Utilities The Application Inspector monitors most potentially dangerous H Advanced Settings applications When an application attempts to modify a protected E About and Licenses system location the ask dialog will be displayed User Defined Mode Application Inspector behaves according to the custom settings It is designed for advanced users Turn Off Application Inspector Show categories placed in the tree for easier orientation After clicking the Advanced button the advanced configuration dialog box of Application Inspector will appear In the User Rules tab a list of rules for all applications that have been blocked restricted or allowed based on user selection Recommended Mode are displayed This list can be edited through the items in the Action menu You can add to the list manually through the Add allowed restricted blocked items You can delete an item from the list of items by clicking on Remove Remove inactive entries from the list for example already uninstalled applications can be done by selecting Purge 70 TrustPort Keep IT Secure TrustPort Antivirus Application Inspector E Access Control E Antivirus E Secure Shredding E Logs and Results 7 Network Utilities C PROGRAM FILES X86 GRETECH GOMPLAYER GRLAUNCHER EXE E Advanced Settings 2K C PROGRAM FILE
263. umes CD ROM USB antivirus program will begin to scan removable media USB CD ROM automatically after being inserted into the computer e Ask before scanning of removable volumes after insertion of removable media the antivirus will firstly ask whether it should scan it Additional features e Prepare the BartPE plugin use this button to create a BartPE disk plugin e Prepare TrustPort USB Antivirus This button shows a list of attached USB devices where a USB Antivirus can be installed e Prepare Windows PE CD By using this button it is possible to create a boot ISO image that contains the Windows PE system and TrustPort Antivirus plugin To create a Windows PE image it is necessary to have an installed set of Windows tools and documentation called the Automated Installation Kit AIK With this tool users can create images of the Windows PE system migrate user profiles etc The finished ISO image can be burned on to a CD USB or other removable media and then the computer can be booted from it Windows Automated Kit for Windows XP SP2 Windows Vista and Windows server 2003 http www microsoft com downloads en details aspx FamilyID c7d4bc6 d 15f3 4284 9123 679830d629f2 Windows Automated Kit for Windows 7 and Windows server 2008 http www microsoft com downloads en details aspx FamilyID 696DD6 65 9F76 4177 A811 39C26D3B3B34 10 3 2 Internet protection A Internet Scanner protects your computer from attack by viruse
264. updates and the use of engines does not vary from the current installation of TrustPort Antivirus Some settings are not accessible such as resident protection application inspector scheduler etc 43 TrustPo ED against viruses Ki d Scan Now Quarantine Show Logs Check For Updates Antivirus General Settings v Help About Open advanced configuration 10 Advanced Configuration Manager Serves for control of program settings for users with advanced knowledge In this interface it is possible to configure all configuration items Configuration is divided into the following sections Shields setting of shields which serve as a protection of computer against viruses malware and spam Access Control setting of user access to some removable devices files and folders blocking of inappropriate websites Antivirus setting of on demand scanner scheduling of files and folders scanning quarantine settings scanning engines and updates Secure Shredding shredding of temporary system files sensitive data cookies panic shredding option Encryption creating and managing of encrypted drives and archives Logs and results logs informing about all activities performed by Antivirus or Firewall Network Utilities network statistics network activities checking availability of some IP address getting information about Internet domains Advanced Settings setting the language import or export configuration
265. us program Exit ends and closes the quick launch application If you have a program running under On access Protection then closing this application does not mean the antivirus program is aborted 4 2 Launching the TrustPort Antivirus from the Start menu You can get to the antivirus program through the button Start Programs All programs Select the TrustPort Antivirus Internet Security Total Protection item and the following menu displays e TrustPort Antivirus Internet Security Total Protection can be used to launch configurator which is used to change the behavior of the antivirus program e TrustPort Home Page contains link to TrustPort website e Buy Now contains link to website where you can buy TrustPort products e Uninstall TrustPort Antivirus Internet Security Total Protection executes uninstaller which helps you to remove currently installed TrustPort product from your computer e Register executes registration wizard which helps you to register TrustPort products using activation code or licence key e Start TrustPort Tray executes quick launch application in the Windows status bar This application is automatically started after user is logged on to Windows 4 3 Integration into the Windows Security Center The TrustPort Antivirus is fully integrated into the Windows Security Center available in Windows XP SP2 This feature keeps the user informed about the antiviral protection of his computer We
266. ustPort Disk Protection images image 001 tdi Version 1 16 Encryption algorithm AES Rijndael Encryption key size 256 bits File system FAT16 Allocation unit size 8 192 bytes Current limit size 262 MB Maximum limit size 291 MB Status Unmounted About Manual the image file version number encryption algorithm which has been selected at the time of image creation encryption key size it depends on selected encryption algorithm file system used for this image file which depends on image file size Image file with size equal or less than 8MB uses FAT 12 file system an image with size equal or less than 256MB uses FAT16 file system and image up to 32GB uses FAT32 file system e allocation unit size depends on used file system and selected image size e actual limit size which is current size of the image in megabytes and can be increased with use of Image Editor e maximum limit size is maximum size that the image can be increased to e status is the state of the image and can be Unmounted or Mounted 10 5 2 Archives Mi You can edit the configuration of the TrustPort Archive Encryption You can set up Drag and Drop Properties for the CAR Manager window choose between different compression levels or set the default viewer for encrypted files 118 TrustPort TrustPort Archive Encryption Configuration FB Shields Configuration D Access Control E Antivirus i E Secure Shredding Common options ae Encryption Enab
267. ut asking you for your user name and password again If you attempt to turn Single Sign on off and you are not the same user who created the image and consequently turned the feature on first you will again be asked for your user name and password The current state of the feature for each image is indicated in the rightmost column of the image list table above Also note that the Single Sign on feature cannot be turned on or off for images that are currently mounted lt lt 106 TrustPort Keep IT Secure 10 5 1 3 2 Recent mounts E At this page you can manage Disk Protection recent mounts Disk Protection remembers the file path and letter of the recent mounted images and you can manage these images here You can also add and remove images change their mounting order mount and unmount them run editation tool for editing images and display image file properties You can select a mounting point to the selected image will be mounted on Automatic selection of mounting point is also available TrustPort Disk Protection Mount Manager ES imageooo C Program Files x86 TrustPort DiskProtection Images ES image001 C Program Files 86 TrustPort DiskProtection images ES imaged02 C Program Files 86 TrustPort DiskProtection Images i Logs and Results t Network Utilities H Advanced Settings d About and Licenses Mount point j k Status Mounted M Encryption algorithm AES Rijndael File system FAT16 Curren
268. utton or press CTRL E key combinations or from the Edit menu and the following dialog box will appear Decrypt Archive B TrustPort Archive Encryption Extract files to folder Ca Testina fe MSOCache GO PesfLogs DACH ProgramData EH temo EHCQ Testing tex E C L beech rahaleo T o Pe d About Manual This dialog box is the same as the one used on Windows shell archive extraction decryption but with one exception you don t need to type the password because you already typed it when you opened or created the archive file lt lt 14 3 6 Test archive consistency Mi Tre uses CRC algorithm to verify that the files stored in the archive are not damaged If you want to test the consistency of an archive then simply use the Test archive toolbar button or select item from the File menu or use CTRL T key combination 152 TrustPort Keep IT Secure D CAR Manager C Testing install car File Edit View Options Help TrustPort Archive Encryption TrustPort Archive Encryption amp Checking archive CRC After that TPE starts the checking procedure and if there are no damages an information dialog box will appear 14 3 7 Display archive properties E If you click on the Show info toolbar button or select it from menu item on the File menu or press F5 then you will see some important information about the archive like TrustPort Archive Encryption current version the current format version of the CAR
269. vates the next level of heuristic analysis Enable excessive scanning mode this setting activates the paranoid mode Due to high demands on system resources it is recommended to have this off Scan for Scripts enable scanning of scripts e Scan for Macros allows scanning of macros TrustPort Antivirus Engines T Tru stPo rt Tota Protectio n Shields Engines Settings E Access Control Antivirus On Demand Protection Archive depth level 8 No limit FC limitto 10 Advanced Settings Options H Secure Shredding Analyze packed executables Scan email databases H Encryption tH Logs and Results Network Utilities Scan all memory processes during memory scan very slow H Advanced Settings Scan inside Sfx Archives Hl About and Licenses out and LICENSES E Detect adware riskware Enable second level heuristics analyzer Enable third level heuristics analyzer Enable excessive scanning mode Scan for Scripts Scan for Macros Show categories placed in the tree for easier orientatio If the item is dimmed in the list it means that the appropriate scan engine is not installed and is therefore not possible to carry out its configuration 10 3 6 Update This tab enables users to let the antivirus software check for update by itself This ensures having the actual antiviral signatures scanning engines etc 94 TrustPort Keep IT Secure The most important option on this page is the
270. ve As i Ve A e DataShredder Report e E Search Report Jee nal Organize New folder H e al Music Date modified Es Pictures j 4 25 2012 12 13PM RPT File E Videos 2 Homegroup du Computer Es Local Disk C Ga Local Disk D Ca Rezervovano syst al BD ROM Drive USB 1 El Network Save as type Report Files rpt x A 10 4 2 Wipe Now Mi The page Wipe Now serves for temporary files system directories and history discard By selecting the relevant items you can easily mark the temporary files directories or history that you want to shred After clicking the button Wipe now TrustPort DataShredder shreds the specified items 100 TrustPort Keep IT Secure SS TrustPort DataShredder Wipe Now Shields Wipe Now D Access Control E Antivirus Select items to be wiped deleted Internet temporary files Cookies Ea Encryption System temporary directory CH Logs and Results Recycle Bin E Network Utilities Internet history E PEEL TER Document history LO About and Licenses Run history Show categories placed in the tree for easier orientation Internet Temporary Files If you choose this item TrustPort DataShredder application shreds the content of Temporary Internet Files Your internet browser uses the Temporary Internet Files to store web pages pictures and other files Cookies By marking this option you delete all files in directory Cookies Coo
271. ven set of rules The rule movement is done by buttons Up and Down or by Shortcut keys The sequence of individual rules in the set influences the sequence of rules that are checked by TrustPort Personal Firewall during searching for the right rule in case of connection attempt TrustPort Personal Firewall Filter Definitions lag a Total Protection Advanced Configuration Manager J Shields Filter Definitions i be Real Time Protection Email Protection i Firewall i filter Administration E Wika EE W RPC endpoint mapper sass lt Permit Outgoing TCP gt Web Browsing Protection iW RPC endpoint mapper dynamic port allocation sass lt Permit Dua plan cir ll RPC endpoint mapper services lt Permit Outgoing TCP gt i rai Es RPC endpoint mapper dynamic port allocation services lt Permit Qui di See i 17 gt RPC endpoint mapper userinit lt Permit Outgoing TCP gt ee EE Ba RPC endpoint mapper winlogon lt Permit Outgoing TCP gt ees ill Allow outgoing RPC calls svchost lt Permit Outgoing TCP gt Fee i RPC endpoint mapper dynamic port allocation svchost lt Permit Out Netwo rk Utilities Mi Block incoming RPC calls svchost lt Deny with logging Incoming TCF Mis Lightweight Directory Access Protocol over UDP svchost lt Permit Bi Y p Lightweight Directory Access Protocol over TCP svchost lt Permit O i Kerberos over TCP sass lt Permit Outgoing T
272. version of TP CheckImage requires Read Write access to take control of the image However CD ROM device is designed for read only usage therefore you can t repair images stored on CD ROM If you need to do this copy your image to writable media and try the operation again 18 TrustPort Antivirus FAQ e Why do I need to restart the computer after the installation For higher security of your computer it is better if the computer is restarted and the On Access Scanner is loaded into the memory right after rebooting 193 TrustPort Keep IT Secure e The On Access Scanner does not work after start What shall I do Go to the Antivirus Settings and check if the On Access Scanner is active If not activate it Another possibility is that your license of this product has expired in that case contact our technical support e When executing the On Demand Scanner a window announcing that I have a trial version pops up Can I switch it off somehow No this window cannot be switched off but if you buy the full version of this software this window will not appear e How often is the update needed It is recommended to perform the update every day preferably using the scheduler This way the update will be done automatically e When I launch the update an alert that connection to a server failed is shown What shall I do Check whether your internet connection works e g you can load the www trustport com webpage in y
273. w you cannot select any action which has been tried on the infected file before TrustPort Total Protection 2013 MMS ction A VIRUS ALERT An infection has been found Please choose an action that should be done to handle the Affected file C Testing eicar com Reason Black listed Name EICAR Trustport Repair 5 Rename gt Move to quarantine 5 Delete About Manual If the Ask user mode isn t selected in the On Access Scanner settings the antivirus program always performs one of the following actions Deny access Repair Rename Move to quarantine Delete 7 User s On Demand Scanner The computer is constantly protected by the On Access Scanner but it is convenient to use the On Demand Scanner from time to time It concerns scanning the whole computer or selected area directory file on user s demand It can happen that in specific cases a malicious code gets into a computer without being detected by the On Access Scanner it did not know it at the time of infection a short time failure of the antivirus protection occurred and so on 33 TrustPort Keep IT Secure 7 7 1 On Demand Scanner The On Demand Scanner is used for scanning viruses and other malicious codes in the selected directory on the hard disks or removable media It can be executed from the Start menu shell context menu or through the quick launch If the On Demand Scanning is running an information window with some
274. ware will scan only files with specified extensions The predefined list contains dangerous extensions we recommend modifying it to experienced users only e Exclude files with following extensions antivirus software will not scan files with extensions that you select We recommend this option to use to experienced users only Scanning options e Scan compressed files zip arj cab archive files e their contents are scanned searched for malicious codes This option slows the scanning down but on the other hand increases the computer protection e Scan network drives defines if network drives should be scanned 47 TrustPort Keep IT Secure Firewall H Web Browsing Protection H Antivirus H Secure Shredding H Logs and Results H Network Utilities H Advanced Settings t About and Licenses Show categories placed in the tree for easier orientation Exclude from scanning F Objects files folders Manage Processes Manage Scanning options E Enable heuristic analysis E Scan modified files after dose About Manual e Objects files folders You can select this option if you want to exclude some objects from scanning By pressing Manage you can set these objects We recommend this option to use to experienced users only Email Protection E Firewall Web Browsing Protectio E Access Control Ei Antivirus H Secure Shredding E Encryption GL Logs and Result
275. xample of system location modification can be the editing of protected registries running other untrusted processes an attempt to shut down the computer obtaining system permission or shutting down system services and more NOTICE The credibility of the application when asked by Application inspector must be evaluated by the user After blocking the operation correct behavior of the application is still not guaranteed We also recommend avoiding conflicts with programs using a similar technology monitoring system such as firewalls of other software companies In this case we recommend turning Application Inspector off List and description of some system locations which Application Inspector protects against modification e Protection of system registers Application inspector monitors and records all changes to the registers listed in the table Protected locations Regjistry These registers store sensitive information for the running of the system and to maintain system integrity Most malware begins infecting systems by writing to these registers e File System Protection Application inspector monitors whether the untrusted process tries to access files and directories that may contain crucial system information such as the c Windows or C Program Files etc This feature protects all important system files that are implicitly included in Windows dll exe autorun inf as well as other software such as Mozilla Firefox Internet Ex

Download Pdf Manuals

image

Related Search

Related Contents

User Manual - Vinpower Digital  KS-200B User`s Manual  Eurofase 22916-013 Installation Guide  Conceptronic 40GB Multi Media Photobox 2.5"  Samsung 2443DW Bruksanvisning  MANUAL DE INSTALAÇÃO E UTILIZAÇÃO UST PRO II  Trust GXT 16  Guía de Wi-Fi Direct™  TU3-5-04  SEC-950manual0805ol [更新済み]OL.ai  

Copyright © All rights reserved.
Failed to retrieve file