Ad-Aware Total Security

Transcription

Ad-Aware Total Security
Ad-Aware Total Security
Table of Contents
Ad-Aware Total Security
Lavasoft Support
Installing the software
After the installation
On the first run
Internet
update wizard
...................................................................................................................................
5
Virus
check wizard
...................................................................................................................................
6
Ad-Aware Total Security
How...................................................................................................................................
do I improve the security status?
7
How...................................................................................................................................
is the Total Security Interface organised?
7
License
CPU load
......................................................................................................................................................... 8
......................................................................................................................................................... 8
Virus check
Options
(Virus check)
...................................................................................................................................
9
Options
(Monitor)
...................................................................................................................................
10
Last virus check
Virus
scan
...................................................................................................................................
13
Virus monitor
More
functions
...................................................................................................................................
14
Schedule ......................................................................................................................................................... 14
Job
.................................................................................................................................................. 14
Analysis ..................................................................................................................................................
scope
15
Scheduling
.................................................................................................................................................. 15
Virus check
.................................................................................................................................................. 16
User account
.................................................................................................................................................. 17
Quarantine......................................................................................................................................................... 17
Logs
......................................................................................................................................................... 17
Create boot
.........................................................................................................................................................
CD
17
Updates
Options
(Internet update)
...................................................................................................................................
18
Logon to update
.........................................................................................................................................................
server
18
Last virus update
Automatic updates
Program version
More functions
Options
(Web/IM)
...................................................................................................................................
22
Options
(E-mail check)
...................................................................................................................................
23
Incom ing m
.........................................................................................................................................................
ail
23
Outgoing m
.........................................................................................................................................................
ail
23
Scan options
......................................................................................................................................................... 23
Advanced......................................................................................................................................................... 24
Web protection
Define
exceptions
...................................................................................................................................
25
Phishing protection
Firewall
Configure
................................................................................................................................... 27
Status
......................................................................................................................................................... 27
Netw orks ......................................................................................................................................................... 28
Edit netw..................................................................................................................................................
ork
28
Rule sets ......................................................................................................................................................... 29
Create rule
..................................................................................................................................................
sets
29
Using the Rule
...........................................................................................................................................
w izard
30
Using the advanced
...........................................................................................................................................
dialogue
31
Rules
...................................................................................................................................... 31
Firew all alarm
.................................................................................................................................................. 32
Logs
......................................................................................................................................................... 33
Options (Firew
.........................................................................................................................................................
all)
33
Autom atic
.................................................................................................................................................. 33
Inquiry .................................................................................................................................................. 33
Attacks .................................................................................................................................................. 34
Miscellaneous
.................................................................................................................................................. 35
E-mail protection
Spam protection
Configure
................................................................................................................................... 38
Status
......................................................................................................................................................... 38
More filters
......................................................................................................................................................... 38
Add new ..................................................................................................................................................
filter
39
Statistics ......................................................................................................................................................... 41
No spam ......................................................................................................................................................... 41
Spam
......................................................................................................................................................... 41
Options (Anti-Spam
.........................................................................................................................................................
)
41
Spam filter
.................................................................................................................................................. 41
Spam OutbreakShield
........................................................................................................................................... 41
Use w hitelist
........................................................................................................................................... 42
Use blacklist
........................................................................................................................................... 42
Use real-time
...........................................................................................................................................
blacklists
42
Use keyw ords
...........................................................................................................................................
(email text)
42
Use keyw ords
...........................................................................................................................................
(subject)
43
Use content
...........................................................................................................................................
filter
43
Reaction ........................................................................................................................................... 43
Advanced ...........................................................................................................................................
settings
44
Settings .................................................................................................................................................. 44
More filters
.................................................................................................................................................. 44
Parental controls
Configure
................................................................................................................................... 45
Status
......................................................................................................................................................... 45
Create new
..................................................................................................................................................
user
45
Prohibited
..................................................................................................................................................
content
46
Perm itted
..................................................................................................................................................
content
47
Ad-Aware Total Security
Monitor Internet
..................................................................................................................................................
usage period
47
Block periods
........................................................................................................................................... 47
Monitor com
..................................................................................................................................................
puter usage period
48
Block periods
........................................................................................................................................... 48
Personal filters
......................................................................................................................................................... 48
Logs
......................................................................................................................................................... 49
Options (Parental
.........................................................................................................................................................
controls)
49
Log
.................................................................................................................................................. 49
Tuner
Configure
................................................................................................................................... 50
Status
......................................................................................................................................................... 50
Configuration
......................................................................................................................................................... 51
Define profile
.................................................................................................................................................. 51
Security .................................................................................................................................................. 51
Perform ance
.................................................................................................................................................. 51
Data Protection
.................................................................................................................................................. 51
Undo
......................................................................................................................................................... 52
Schedule ......................................................................................................................................................... 52
Nam e
.................................................................................................................................................. 52
Profile
.................................................................................................................................................. 52
Scheduling
.................................................................................................................................................. 52
Logs
......................................................................................................................................................... 53
Options (Tuner)
......................................................................................................................................................... 53
General .................................................................................................................................................. 53
Folder protection
.................................................................................................................................................. 54
File protection
.................................................................................................................................................. 54
Backup
Configure
................................................................................................................................... 55
Status
......................................................................................................................................................... 55
Backup ......................................................................................................................................................... 56
Standard..................................................................................................................................................
backup
56
Source files........................................................................................................................................... 56
Target
........................................................................................................................................... 57
Schedule ........................................................................................................................................... 57
Partial backups
...................................................................................................................................... 58
Advanced
..................................................................................................................................................
backup
58
File selection
........................................................................................................................................... 58
Select target
........................................................................................................................................... 59
Schedule ........................................................................................................................................... 59
Partial backups
...................................................................................................................................... 60
Options ........................................................................................................................................... 60
General archive
......................................................................................................................................
options
60
User details
...................................................................................................................................... 61
Compression
...................................................................................................................................... 61
Exclude files
...................................................................................................................................... 61
Reset to current
......................................................................................................................................
default options
62
Reset to Ad-Aw
......................................................................................................................................
are default options
62
Restore ......................................................................................................................................................... 62
Restore job
.................................................................................................................................................. 62
Select target
.................................................................................................................................................. 62
Actions ......................................................................................................................................................... 63
Adm inister
..................................................................................................................................................
online archives
63
FTP brow ser
........................................................................................................................................... 63
Burn archive
..................................................................................................................................................
to CD/DVD retrospectively
64
Im port archive
.................................................................................................................................................. 64
Logs
Options
......................................................................................................................................................... 64
......................................................................................................................................................... 64
What happens when my license
expires?
Tips for installation
Boot
scan prior to installation
...................................................................................................................................
66
Customized
setup or full installation?
...................................................................................................................................
68
Invalid
registration number?
...................................................................................................................................
68
Access
data invalid or missing?
...................................................................................................................................
69
Can
I use my old access data to obtain updates on a new computer?
...................................................................................................................................
69
Notes
on uninstalling
...................................................................................................................................
69
Ad-Aware Total Security
1
Ad-Aware Total Security
This fast start guide will help you install your new Ad-Aware Total Security and gives you a few
practical, easy tips on how to use it to protect your computer optimally. The following sections will
give you additional help on installing, getting started with and general questions about the program:
Installing the software: This will show you how to install the Ad-Aware Total Security on your
computer.
After the installation: What's changed on your system since installing the software? What
options does the software offer? Find out here.
On the first run: Wizards will help you create the necessary settings to ensure that your system
is protected effectively as soon as the software has been installed. If you are an experienced user
of Ad-Aware Total Security you won't need these wizards anymore.
Total Security Interface: The actual Ad-Aware Total Security program interface. You can create
settings and find information here. Normally you only need to open the Ad-Aware Total Security
interface if you are advised to.
Tips for Installation Please consult this section for any questions about installing and registering
Ad-Aware Total Security
Do you have further questions? You can consult the online help in the software at any
time.
Just press the F1 key while using the program or click on the Help button. The answers to many
queries can also be found in the Online database for frequently asked questions (FAQ),
which can be accessed in the Support section on the Lavasoft website.
© 2010 - Lavasoft
2
Ad-Aware Total Security
Lavasoft Support
Installation and use of Ad-Aware Total Security is generally easy and self-explanatory. However,
should you encounter a problem, just contact Lavasoft Support.
Website: www.lavasoft.com
Support: Lavasoft Support Center
© 2010 - Lavasoft
Installing the software
3
Installing the software
Important note:
Ad-Aware Total Security includes full Anti-Virus, Anti-Spyware and Anti-Malware real-time
protection.
If you use more than one real-time Anti-Virus or Anti-Spyware program at the same time, your
computer may experience decreased performance, become unstable, or restart unexpectedly.
Before you install Ad-Aware, we recommend that you disable or uninstall other security-related
programs.
To ensure that Ad-Aware Total Security functions smoothly, your computer should meet the
following minimum requirements:
PC with one of the following operating systems: Windows 7, Windows Vista, Windows XP (SP2 or
higher)
At least 512 MB RAM memory, Internet access, Internet Explorer 6 or higher
Please install Ad-Aware Total Security as follows:
Start Installation
If you downloaded your copy of Ad-Aware Total Security, locate and double-click on the
downloaded file to start the installation.
If you received a Boot CD, insert the CD and the installation should start. If installation doesn't
start by itself, open the CD and double-click Autostart
Welcome Screen
Please read the welcome screen and click "Next" to continue.
Installation
Please read the End User License Agreement before you proceed. When you have
completed reviewing the agreement and if you agree to the terms, check the box next to "I
accept the terms of license agreement", and click “Next” to continue with the standard
installation of the software.
Choose to do a Complete install or to customize the installation, click "Custom." Click
"Next" to continue with the installation.
Additional Modules
Select whether to install Parental Controls and the Ad-Aware Shredder.
Schedule
Select whether to use automatic updates.
Click Next and then Install to continue with the installation.
After the files finish copying, you will receive a confirmation message that the installation
was successful.
Installation Complete
Your computer must be restarted to complete the installation. Choose to Restart Now or
Restart Later.
Click "Finish" to complete the installation process. Your computer will restart and AdAware Total Security will be completely installed.
© 2010 - Lavasoft
4
Ad-Aware Total Security
After the installation
To open your Ad-Aware Total Security program interface, just click on
the icon on your desktop pictured here. To read about how you use the
Total Security Interface, read the section: Ad-Aware Total Security
Please be aware of the following after you have installed Ad-Aware Total Security:
Security icon: Ad-Aware Total Security will protect your computer from viruses and malware. An
icon appears in the taskbar at the bottom next to the clock, so you can see that the protection is
active.
Fast check: Is there a suspicious file on your computer? Do you want to scan a download for
viruses? Fast check enables you to check a file or folder with great ease, and without having to
run Ad-Aware Total Security. Just use your mouse to select the file or folder in e.g. Windows
Explorer. Right-click and select Check for viruses (Ad-Aware Total Security). The affected files
will now be automatically scanned for viruses.
© 2010 - Lavasoft
On the first run
5
On the first run
When you run Ad-Aware Total Security, two wizards automatically open one after the other. They will
help you create important settings for the software. As soon as this is done and you are familiar with
how the software works, you can disable these wizards and create settings in the software yourself.
?
To disable an assistant, simply check the box next to Do not show
this message again.
Internet update wizard
If you are running the software for the first time after installing it, a wizard opens which you can use
to update Ad-Aware Total Security directly over the Internet. As new viruses are constantly being
developed, it is crucial that Ad-Aware Total Security is up to date! Therefore you should run the
Internet update as quickly as possible.
1
To do so, click on the Perform updates button. A window will now
appear requesting the access data for Internet updates.
2
To get this access data, just click on the Register with server button.
Then you will see a new window where you can enter your registration
number and customer data.
?
Unable to log onto the server?
If you cannot log onto the server, please first make sure that you have
an Internet connection (that is, whether you can access a website via
your browser). If you can and Ad-Aware Total Security still cannot
register with the server, please click on the Internet settings button.
Here you can then check the settings for your Internet connections.
3
You can find the registration number on the back of the printed
manual. If you bought Ad-Aware Total Security online, you will receive
your registration number in a separate e-mail.
© 2010 - Lavasoft
6
Ad-Aware Total Security
If you click the Login button, your access data is generated on the
Lavasoft UpdateServer. If the registration was successful, an
information screen appears in which you can click on the OK button.
4
The actual updating of the data will now follow. An information screen
will tell you about the progress of the update and about which data is
being transferred to your computer. You can then exit the update
window by clicking on the Close button. You have now updated your
Ad-Aware Total Security.
Virus check wizard
As soon as you have installed Ad-Aware Total Security on your computer, it is protected from
malware. However, you should verify whether a virus could have nested itself on your computer
BEFORE the installation. You can use the virus check wizard, which appears when you start the
software for the first time, to directly carry out this scan.
You can choose between the Quick virus check (recommended) and Intensive virus check
options. An intensive virus check is generally preferred, but depending on your hardware
configuration it can take more than an hour. If you are pressed for time, at least run the quick virus
check.
© 2010 - Lavasoft
Ad-Aware Total Security
7
Ad-Aware Total Security
After installing Ad-Aware Total Security your virus protection should run automatically. You only
actually need to consult Ad-Aware Total Security if you want to access the virus check or one of the
software's many additional features.
In rare circumstances, it may also be necessary to access Ad-Aware
Total Security if the security icon in the task bar displays a warning
sign indicating that you need to intervene.
In the Total Security Interface you can see all key information at a glance and can intervene
directly if a protection function needs updating or checking.
How do I improve the security status?
Security does not have to be complicated. You can get possible threats to your computer out of the
way with just one click. You can use the Security status icon and the Correct button for this.
If there is a green cross next to the Security status entry, your system
is secure.
A red light indicates that your system is in immediate danger. You
should then undertake immediate measures so that the protection of
your data remains ensured.
If you click on the Correct button, Ad-Aware Total Security will suggest to you what actions you
should take in order to optimally protect your system again. Simply select the actions displayed one
after the other until the security status displays a green light again. The Correct button then
automatically changes to inactive and can only be used again if the security status should get
worse.
Your Ad-Aware Total Security is then up to date and you can close the interface again. All functions
and settings you can see under the Security Status icon (such as Virus check or Updates) can be
used if you want to actively configure the security of your system. You decide to what degree you
would like to be involved with the virus protection. Ad-Aware Total Security gives you that choice!
How is the Total Security Interface organised?
In the relevant subsections (such as Virus check or Updates) you can see precisely which areas
of Ad-Aware Total Security are optimally set up and which could be improved. The following icons
indicate the security status of the respective area.
© 2010 - Lavasoft
8
Ad-Aware Total Security
Green checkmark = everything is ok
Yellow exclamation mark = intervention needed soon
Red exclamation mark = immediate intervention required
Wildcard = This security function was not enabled by you.
If an area should be marked yellow or red, simply click on it with the mouse. This will take you
directly to the program area where you can carry out the required settings. Additional functions can
be invoked via the blue entries. Do you want to make an unscheduled check of the computer for
viruses? Do you want to reset the schedule? Is a check of the settings needed? Simply click on the
blue actions.
If you click the info icon in the top right, you will receive information
regarding the program version. This information may be useful when
talking to Lavasoft Support .
License
Under the License entry on the left-hand side of the program interface you can see how long your
virus update license is valid for. Constant updates are more important for anti-virus software than for
any other type of software.
CPU load
This small chart shows you how much speed Ad-Aware Total Security costs you when in use on
your computer. If heavy CPU load occurs regularly in relation to a specific application (e.g. when
using video processing programs), it may help to define the relevant application as an exception.
You can find additional information on this in the online help for the Virus monitor.
?
Under the Ad-Aware Total Security header, you can view the current
load Ad-Aware Total Security is placing on your computer. The total
current load on your computer is displayed under the System header.
During virus checks the system load caused by Ad-Aware Total
Security can be very high; however, under normal use Ad-Aware Total
Security should only use up very little processing power. So if your
computer is responding more slowly than usual, you can see at a
glance here if Ad-Aware Total Security is carrying out a detailed scan
or if your computer is being slowed down by something other than a
virus check.
?
You can also configure Ad-Aware Total Security so the virus check can
be automatically interrupted if your computer is under a heavy load from
other applications. For more information please read the section
Options (Virus check).
© 2010 - Lavasoft
Virus check
9
Virus check
In this area, you can undertake all settings involved with the protection of your computer against
virus infection. Use the Options button to obtain access to the program parameters affecting this
area.
Options (Virus check)
Here you can create basic program settings for Virus check. However, in normal operation this is
not required.
Use engines: Ad-Aware Total Security works with multiple engines, in other words, two virus
check modules in addition to the other Lavasoft technologies that work essentially independent of
each other. Each engine by itself would provide you with a high degree of protection against
viruses, but it is precisely the combination of all engines that gives the very best results. You can
accelerate the virus check in older and slower computers by using an individual engine, but
normally you should keep the setting Both engines.
In the case of an infection: Ad-Aware Total Security detected a virus? In the standard setting,
the software now asks you what you would like to do with the infected file. If you would always like
to perform the same action, you can set this here. The highest protection for your data is offered
here by the setting Disinfect (if not possible: place in quarantine).
Infected archive: Here you determine whether archive files (e.g. files with the extension RAR,
ZIP, or PST) should be handled differently from normal files. As viruses stored in an archive can
only cause damage when they are unzipped, you may choose to completely deactivate the
archive scan under certain circumstances. If your virus monitor is permanently enabled, this will
prevent an infection as soon as an infected archive is unzipped.
Pause the virus check at times of high system load: A virus check should normally be carried
out when the computer is not being used. If you then need to use the computer, the virus check is
paused so that your computer can run at normal speed for you. This virus check will then carry on
when you stop working.
You can create more settings for virus checks by clicking on the Advanced button. In most cases,
however, it is completely adequate to use the specified default settings.
File types: You can specify here which file types should be inspected by the software for viruses.
Selecting the option Program files and documents only entails certain speed benefits.
Priority scanner: Via this setting you can specify the degree to which a virus check influences
the processing power of your computer. If you want to run a virus check when you are not using
the computer, the setting High (short run time) is recommended.
Heuristics: In the heuristic analysis, viruses are not only detected by the virus database, which
you receive with every update of Ad-Aware Total Security, but are also identified on the basis of
particular characteristics typical of viruses. This method increases the level of security, but in rare
cases may also generate a false alarm.
Check archive: Checking compressed data in archives (these can be recognized by their file
extensions such as ZIP, RAR or PST) is very time-consuming and can normally be omitted if the
virus monitor is generally active on the system. The monitor can detect a previously hidden virus
while the archive is being unzipped and can automatically prevent it from spreading.
Check e-mail archive: Because Ad-Aware Total Security already checks incoming and outgoing
e-mail for virus infections, it is usually a good idea to omit regular checks for e-mail archives since
this process may take several minutes, depending on the size of the e-mail archive.
Check system areas: In general, system areas (for example boot sectors) in your computer
should not be excluded from virus checks.
© 2010 - Lavasoft
10
Ad-Aware Total Security
Check for dialers / spyware / adware / riskware: You can also use this function to check your
system for dialers and other malware (spyware, adware and riskware). These are e.g. programs
that establish expensive, unwanted Internet connections, of which the potential for financial
damage is no less significant than that of the virus. They may for example secretly record your
surfing habits or even all the keyboard entries you make (including your passwords) and forward
these to third parties via the Internet at the earliest opportunity.
Check for rootkits: Rootkits attempt to evade conventional virus detection methods. Additional
monitoring for this malware is always advisable.
Only check new and updated files: If you enable this function, the virus check will run
significantly faster, but will restrict itself to just files that have changed or been newly created
since the last virus check. You should therefore only use this option if your computer is routinely
protected using the Virus monitor , so regular virus checks are still additionally carried out.
Generate log: By checking the Generate log box, you can specify that the software creates a
log of the virus check process. This log can be viewed in the Logs area.
Options (Monitor)
In the Options dialogue for the Virus monitor you have the following setting options. Changes only
need to be made here in the event of exceptions occurring:
Use engines: Ad-Aware Total Security works with multiple engines, in other words, in other
words, two virus check modules in addition to the other Lavasoft technologies. Each engine by
itself would already provide you with a high degree of protection against viruses, but it is precisely
the combination of all engines that gives the very best results. You can accelerate the virus check
in older and slower computers by using an individual engine, but normally you should keep the
setting Both engines - performance optimised.
In the case of an infection: Ad-Aware Total Security detected a virus? In the standard setting,
the software now asks you what you would like to do with the infected file. If you would always like
to perform the same action, you can set this here. The highest protection for your data is offered
here by the setting Disinfect (if not possible: place in quarantine).
Infected archive: Here you determine whether archive files (e.g. files with the extension RAR,
ZIP, or PST) should be handled differently from normal files. As viruses stored in an archive can
only cause damage when they are unzipped, you may choose to completely deactivate the
archive scan under certain circumstances. If your virus monitor is permanently enabled, this will
prevent an infection as soon as an infected archive is unzipped.
System protection and autostart monitoring: When system protection is on, the Windows
registry and the system folders are checked each time the system is started. This way, the
HOSTS file is protected against manipulation.
The HOSTS file is a text file on your computer which compares host
names with IP addresses. If this file is modified by malware, users can
unwittingly be diverted to phishing websites, for example.
By clicking the exceptions button, you can exclude certain drives, directories, and files from the
virus monitor check and in this manner sometimes significantly accelerate virus detection. To do
this, proceed as follows:
1
Click the Exceptions button.
2
Click New... in the Monitor exceptions window.
3
Now select whether you want to exclude a drive, a directory, or a file
and/or a file type.
© 2010 - Lavasoft
Virus check
4
Underneath this, select the directory or the drive you would like to
protect. In order to protect files, enter the complete file name in the
entry field under file mask. You can also work with wildcards here.
?
Wildcards work as follows:
11
The question mark symbol (?) represents individual characters.
The asterisk symbol (*) represents entire character strings.
For example, in order to protect all files with the file extension ".sav,
enter *.sav. In order to protect a special selection of files with
sequential file names (e.g., text1.doc, text2.doc, text3.doc), enter
text?.doc
5
Now, click OK. The exception will be displayed in the Monitor
exceptions window.
6
Also click OK in the Monitor exceptions window.
You can repeat this procedure as often as desired and also delete or modify the existing exceptions.
Furthermore, you can click the button Advanced to specify which additional tests should be
performed by the virus monitor. Normally you do not have to enter any more settings here.
File types: Here you can specify which file types are to be inspected by the Ad-Aware Total
Security for viruses. With Program files and documents only, only the files that can generally
contain executable malware are checked. This gives a speed advantage during monitoring.
Check during writing: Directly after a file has been created, the virus monitor will check whether
a virus has latched on to the process.
Check network access: If your computer has a network connection to unprotected computers (for
example, other laptops), it is a good idea to check the network accesses to see if any malicious
programs are being transferred. If you use your computer as a stand-alone computer without
network access, you don't need to enable this option. If you have installed virus protection on each
computer in the network, it is recommended that you turn off this option. Otherwise, some files will
be checked twice, which negatively affects speed.
Heuristics: In the heuristical analysis, viruses are not only detected by means of virus updates
that you regularly receive from us online, but are also identified on the basis of certain
characteristics typical of viruses. This method increases the level of security, but in rare cases
may also generate a false alarm.
Check archive: Checking compressed data in archives is a very time-consuming process and
can generally be omitted if the virus monitor in your system is always active. The monitor can
detect a previously hidden virus while the archive is being unzipped and can automatically prevent
it from spreading. To avoid decreasing performance with unnecessary checks of large archive files
that are rarely used, you can set a size limit (number of kilobytes) for archives to be checked.
Check e-mail archives: Because the software already checks incoming and outgoing e-mail for
virus infections, it is usually a good idea to omit regular checks for e-mail archives since this
process may take several minutes, depending the size of the e-mail archive.
Check system areas during system start: In general, system areas (for example boot sectors)
in your computer should not be excluded from virus checks. You can specify here whether you
want to run a check on system start-up or during a media exchange (e.g., new CD-ROM).
Generally you should have at least one of these two functions activated.
Check system areas during change of medium: In general, system areas (for example boot
sectors) in your computer should not be excluded from virus checks. You can specify here
whether whether you want to run a check on system start-up or during a media exchange(e.g.,
new CD-ROM or similar). Generally you should have at least one of these two functions activated.
© 2010 - Lavasoft
12
Ad-Aware Total Security
Check for dialers / spyware / adware / riskware: You can use Ad-Aware Total Security to
check your system for dialers and other malware programs (spyware, adware, riskware). These
are e.g. programs that establish expensive, unwanted Internet connections, of which the potential
for financial damage is no less significant than that of the virus. They may for example secretly
record your surfing habits or even all the keyboard entries you make (including your passwords)
and forward these to third parties via the Internet at the earliest opportunity.
Only check new or modified files: When you activate this function, a virus check executes
significantly faster; however, it only extends to files that were modified or newly created. You
should use this option if your computer is generally always protected by the virus monitor and
does not come into contact with networks, questionable websites (unknown shops, lottery sites,
etc.), or data carriers (CDs, USB sticks, removable disks) that can often come from infected
sources.
© 2010 - Lavasoft
Last virus check
13
Last virus check
This is where you can see when your computer was last fully checked for viruses. If this entry is
highlighted in red, you should run a virus check as soon as possible. To do so, just click on the
entry and start the checking process by pressing the Check computer now button. After the scan,
the entry is highlighted in green, meaning that the virus check was run sufficiently recently.
Virus scan
If you have a specific concern and only want to check certain areas of your computer for malware,
please select which areas you want to check here.
Check computer: If you want to check your computer independently of the automatic scan (e.g.
because you currently have a suspected virus), just click on the Check computer entry. Your
computer will now be checked for viruses.
Check memory and Startup: All running processes the program files and DLLs (program
libraries) will then be checked. In this way malware can be directly removed from the memory
and Autostart area. Active viruses can be directly removed without searching through the entire
hard drive. Since this check can be done relatively quickly, it is recommended that it is performed
regularly (e.g. as part of an automatic virus check). This function, however, is not a replacement
for regular virus control of saved data, but rather an extension to it.
Check directories/files: This enables you to scan selected drives, directories or files for
viruses. If you double-click on this action, a directory and file selection dialogue will open. You can
scan specific individual files or entire directories for viruses here.
?
Select directories/files
In the directory tree, you can open and select directories by clicking on
the plus symbols. Their contents will then be shown in the file view.
Each directory or file that you mark with a check will be scanned by
Ad-Aware Total Security. If not all files in a directory are checked, this
directory is marked with a gray checkmark.
Check removable media: Use this function to check CD-ROMs or DVD-ROMs, diskettes,
memory cards or USB sticks for viruses. If you click on this option, all removable media
connected to your computer will be checked (including CDs in the tray, inserted memory cards,
hard drives connected via USB or USB sticks). Please note that Ad-Aware Total Security cannot
of course remove viruses from media that do not have write access (e.g. burned CD-ROMs). In this
case, virus discoveries are logged.
Check for rootkits: Rootkits attempt to evade conventional virus detection methods. You can use
this function to specifically search for rootkits, without checking all the hard drives and saved
data.
© 2010 - Lavasoft
14
Ad-Aware Total Security
Virus monitor
The virus monitor should always be active. If you would like to switch off the monitor or would like to
change something in the settings, click the entry Disable virus monitor. In addition, by clicking
the Advanced button, you can customise the settings of your virus monitor.
More functions
Here you will find details relating to program areas of Ad-Aware Total Security which you might not
use so regularly.
Schedule
You can choose to have the most important functions of Ad-Aware Total Security run automatically
at regular intervals. This is highly recommended. The procedures for customizing automatic updates
and automatic virus checks are very similar.
Automatic updates: Virus definition updates occur hourly in the default setting. If your computer
is not connected to the Internet with a data flat-rate, it would be advisable to perform the automatic
update either less frequently or always set it so that it occurs as soon as you access the Internet.
Automatic virus checks: Your computer should be completely checked for virus infection
regularly. Depending on how you use your computer and depending on whether the virus monitor
is used, you can change the interval between these automatic virus checks.
?
Various virus checks
In many cases it suffices if the computer is completely checked at
regular intervals. Via the New virus check button you can issue
various automatic virus checks that are independent of one another. It
is thus possible that you check the folder Downloads daily while you
check your MP3 collection only once a week, for example.
To edit an automatic update or a virus check, select it and click on the entry Edit. A window with
tabs then opens in which you can undertake the corresponding changes:
Job
Enter the name you want to give the newly created job here. It is a good idea to use meaningful
names to differentiate between the various jobs, for instance, Local hard disks (weekly scan) or
Archive (monthly scan). If you check Switch off the computer after completion of the task, the
computer will automatically shut down once the automatic virus check has been completed. This is
useful if for example you want to run a virus check when your day at work has finished. If the
computer can switch itself off automatically after the scan, this avoids wasting energy unnecessarily.
?
What is a "job"?
Each individually executed, automatic task for updating the virus data
or scanning the computer is called a "job".
?
Automatic update
By checking Generate log you can make sure that the software
creates a log whenever it updates. This log can be viewed in the Logs
area.
© 2010 - Lavasoft
Virus monitor
15
Analysis scope
Here you can define whether the virus check should be run on the local hard drives, whether
memory and autostart areas should be tested, or whether you only want to test certain directories
and files. If this is the case, use the Select button to specify the directories you want.
?
Select directories/files
In the directory tree, you can open and select directories by clicking on
the plus symbols. Their contents will then be shown in the file view.
Each directory or file that you mark with a check will be scanned by
Ad-Aware Total Security. If not all files in a directory are checked, this
directory is marked with a gray checkmark.
?
Automatic update
This tab is not required for automatic updates.
Scheduling
This tab allows you to specify when the automatic update should run and how often. You set up the
default schedule under Run and then specify it in more detail under Time. Of course, if you select
On system start-up, the scheduling defaults no longer apply and the software will run the scan each
time your computer starts up.
?
If you select the option Idle mode, the job will only be run if the
computer that is turned on at this time is not being used. If this is the
case, the job will first start when the computer is no longer being used.
?
Automatic update
If you select the Internet connection setup option under Time, the
scheduling defaults no longer apply and the software will run the update
each time your computer connects to the Internet.
© 2010 - Lavasoft
16
Ad-Aware Total Security
Virus check
This area allows you to define which settings should be used for the automatic virus check.
Use engines: Ad-Aware Total Security works with multiple engines, in other words, two virus
check modules in addition to the other Lavasoft technologies that work essentially independent of
each other. Each engine by itself would already provide you with a high degree of protection
against viruses, but it is precisely the combination of all engines that gives the very best results.
You can accelerate the virus check in older and slower computers by using an individual engine,
but normally you should keep the setting Both engines.
In the case of an infection: Ad-Aware Total Security has detected a virus? In the standard
setting, the software now asks you what you would like to do with the infected file. If you would
always like to perform the same action, you can set this here. The highest protection for your data
is offered here by the setting Disinfect (if not possible: quarantine).
Infected archive: Here you determine whether archive files (e.g. files with the extension RAR,
ZIP, or PST) should be handled differently from normal files. As viruses stored in an archive can
only cause damage when they are unzipped, you may choose to completely deactivate the
archive scan under certain circumstances. If your virus monitor is permanently enabled, this will
prevent an infection as soon as an infected archive is unzipped.
?
Automatic update
This tab is not required for automatic updates.
Furthermore, you can click the button Advanced to specify which additional virus checks should be
performed or omitted.
In most cases, however, it is completely sufficient to use the specified default settings.
File types: You can specify here which file types should be inspected by the software for viruses.
Selecting the option Program files and documents only entails certain speed benefits.
Priority scanner: Via this setting you can specify the degree to which a virus check influences
the processing power of your computer. If you want to run a virus check when you are not using
the computer, the setting High (short run time) is recommended.
Heuristics: In the heuristic analysis, viruses are not only detected by the virus database, which
you receive with every update of the Ad-Aware Total Security, but are also identified on the basis
of particular characteristics typical of viruses. This method increases the level of security, but in
rare cases may also generate a false alarm.
Check archive: Checking compressed data in archives (these can be recognized by their file
extensions such as ZIP, RAR or PST) is very time-consuming and can normally be omitted if the
virus monitor is generally active on the system. The monitor can detect a previously hidden virus
while the archive is being unzipped and can automatically prevent it from spreading.
Check e-mail archive: Because Ad-Aware Total Security already checks incoming and outgoing
e-mail for virus infections, it is usually a good idea to omit regular checks for e-mail archives since
this process may take several minutes, depending on the size of the e-mail archive.
Check system areas: In general, system areas (for example boot sectors) in your computer
should not be excluded from virus checks.
Check for dialers / spyware / adware / riskware: You can also use this function to check your
system for dialers and other malware (spyware, adware and riskware). These are e.g. programs
that establish expensive, unwanted Internet connections, of which the potential for financial
damage is no less significant than that of the virus. They may for example secretly record your
surfing habits or even all the keyboard entries you make (including your passwords) and forward
these to third parties via the Internet at the earliest opportunity.
Check for rootkits: Rootkits attempt to evade conventional virus detection methods. Additional
monitoring for this malware is always advisable.
© 2010 - Lavasoft
Virus monitor
17
Generate log: By checking the Generate log box, you can specify that the software creates a
log of the virus check process. This log can be viewed in the Logs area.
User account
Here you can specify the user account on the computer on which the virus check should take place.
This account is required for access to network drives.
?
Automatic update
Here you can specify a user account on the computer for which the
Internet access has been configured.
Quarantine
During the virus check, you have different options for dealing with any viruses found. One option is
to move the infected file to quarantine. Quarantine is a secure area in the software where infected
files are encrypted and stored so they cannot transfer the virus to any other files.
Logs
The log area lists the logs made by the software. Click the Start time, Type, Header, or Status
column headers to sort the available logs accordingly. The Save as and Print buttons can be used
to save log data as text files or print them out directly. To delete a log, highlight the entry in the table
using the mouse and either press the Del key or click on the Delete button.
Create boot CD
The Ad-Aware Total Security boot CD is a useful tool for rendering computers that have already
been compromised virus-free. Use of a boot CD is particularly recommended for computers that had
no virus protection prior to installing Ad-Aware Total Security. Read how to create and use a boot
CD in the section: Boot scan prior to installation
?
Are described functions such as creating a boot CD not available
to you?
It may be possible that the Create boot CD option was not installed
during the installation of Ad-Aware Total Security. This can easily be
installed retrospectively by reinserting the Ad-Aware Total Security
CD and running the installation with the boot CD option or by running
the installation file you downloaded.
© 2010 - Lavasoft
18
Ad-Aware Total Security
Updates
In this area, you can undertake all settings involved with the updating of your virus protection. Use
the Options button to obtain access to the program parameters affecting this area.
Options (Internet update)
If updating the software via the Internet does not work, you can perform all the operations necessary
to enable updates to take place automatically in this area. In the options, enter the access data (
user name and password) that you received when you registered your Ad-Aware Total Security
online. The Lavasoft update server will use this data to recognize you so updates can now run
completely automatically.
?
You should only disable the version check in the event of problems
with the virus signatures (e.g. if you have accidentally deleted files
here).
Logon to update server
If you have not registered with the server yet, you can do this now by clicking the Register with
server button. A new window appears in which you can enter your registration number and
customer data.
?
You can find the registration number on the back of the printed
manual. If you have purchased the software online, you will receive the
registration number in a separate e-mail.
Click the Log in button and your access data is generated on the Lavasoft UpdateServer. If the
login is successful, an info screen appears with the message Logged in successfully, which you
can exit using the Close button.
?
Warning: you will also receive access data for your documentation and
for any software reinstallations by e-mail. Therefore please make sure
that the e-mail address indicated in your online registration is correct;
otherwise you will not receive the access data.
Your access data will then be automatically transferred into the original input screen, and you can
start the actual process of updating by clicking on the OK button.
?
© 2010 - Lavasoft
Unable to log onto the server?
If you cannot log onto the server, please click on the Internet Settings
button. Here you can then check the settings for your Internet
connections.
Last virus update
19
Last virus update
This is where you can see when your computer last received updated anti-virus information from the
Internet. If this entry is highlighted in red, you should run a virus update as soon as possible. To start
the update, just click on the Update entry next to it.
?
Are you having problems with the Internet update? Detailed information
can be found in the section: Options (Internet update)
© 2010 - Lavasoft
20
Ad-Aware Total Security
Automatic updates
You can update Ad-Aware Total Security regularly via the Internet. This is highly recommended. If
you have set up an automatic update you will never have to worry about updating again. If you don't
want to use automatic updates, click on the entry and select the Disable automatic updates
option.
?
© 2010 - Lavasoft
Read how to set up or, if necessary, change an automatic check or
update, in the section entitled Schedule.
Program version
21
Program version
When new program versions of Ad-Aware Total Security are available, you can easily update these
with a click, as with the virus information. If you receive anotification here that an update is available,
simply click on the entry Update.
?
Are you having problems with the Internet update? Detailed information
can be found in the section: Internet update
© 2010 - Lavasoft
22
Ad-Aware Total Security
More functions
In this area you can create settings for safe surfing on the Internet.
Web protection
Phishing protection
Firewall
This is where you can manage protection for your mailbox.
E-mail protection
Spam protection
Here, the program functions that go beyond pure virus protection are available to you.
Parental controls
Tuner
Backup
Use the Options button to obtain access to the program parameters affecting this area.
Options (Web/IM)
You can create the following settings here.
Internet content (HTTP): In the web options, you can determine that all HTTP web content is
checked for viruses while browsing. Infected web content is not run at all and the corresponding
pages are not displayed. To set this option, please check Process Internet content (HTTP).
Avoid browser timeout: Since Ad-Aware Total Security processes web content before it is
displayed in the Internet browser, it requires a certain amount of time to do so depending on the
data traffic. Therefore it is possible for an error message to appear in the Internet browser because
the browser does not receive data immediately, due to the anti-virus software checking it for
malicious routines. By activating the checkbox Avoid browser timeout, you can disable this
error message and as soon as all browser data has been checked for viruses, the data will appear
as normal in the Internet browser.
Send addresses of infected websites Through this function you can automatically anonymously of course - report Internet sites that were deemed unsafe by Ad-Aware Total
Security. With that, you optimize security for all users.
Download size limit: With this function you can interrupt the HTTP check for web content that is
too large. The contents are then monitored by the virus monitor as soon as suspected malicious
routines become active. The advantage of the size limit is that there are no delays caused by virus
checks when surfing the web.
Instant Messaging: Since viruses and other malware can also be spread via Instant Messaging,
Ad-Aware Total Security can also prevent infected data from being displayed and downloaded in
advance. If your Instant Messaging applications do not run using standard port numbers, please
enter the corresponding port addresses under Server port number(s).
Instant Messaging (integration into IM application): If you use Microsoft Messenger (version
4.7 and later) or Trillian (version 3.0 and later), you can set the checkmark for the respective
program to define a context menu in which you can directly check suspicious files for viruses.
© 2010 - Lavasoft
More functions
?
23
If you do not want to check the Internet content, the Virus monitor
naturally takes action if infected files are started. That means your
system is also protected without checking Internet content as long as
the virus monitor is active. However, if you want to use parental
controls (e.g. as part of Ad-Aware Total Security), the checkmark for
Process Internet content (HTTP) must be set because the parental
controls will not work correctly otherwise.
Options (E-mail check)
The e-mail check enables you to scan incoming and outgoing e-mails and file attachments for
viruses and eliminate possible infections at the source. Ad-Aware Total Security can directly delete
file attachments or repair the infected files if viruses are found.
?
In Microsoft Outlook e-mail checks are carried out by using a plug-in
. This offers the same protection as the POP3/IMAP-orientated
protection function in the Anti-Virus options. After installing this plugin, you will find the function Scan folder for viruses in the Outlook
menu Tools, with which you can check your e-mail folders individually
for virus contamination.
Incoming mail
In the case of an infection: Here you can specify what is supposed to happen if an infected e-mail
is discovered. Depending on the purposes for which you are using your computer, different settings
apply here. Generally we recommend using the Disinfect (if not possible: delete attachment/
text) setting.
Check received e-mail: By activating this option, all the e-mail you receive while you are
working on your computer are checked for viruses.
Check unread e-mail on program start-up (Microsoft Outlook only): Only for Microsoft
Outlook: This option is used to scan for viruses in e-mail you receive while you are offline. All
unread e-mail in your Inbox folder and subfolders will be checked as soon as you open Outlook.
Append report to received, infected e-mail: When you enable the report option and a virus is
found, the virus will be removed and the e-mail will be replaced by text.
Outgoing mail
Check e-mail before sending: Ad-Aware Total Security also allows you to scan your e-mail for
virus infection before you send them, to ensure you do not inadvertently send viruses yourself. If you
try to actually send a virus (unintentionally), the message The e-mail [subject header] contains the
following virus: [virus name] appears. The e-mail cannot be sent, and the corresponding e-mail
will not be sent.
Append report to received, infected mails: a scan report is displayed underneath the actual
text of every outgoing e-mail. Here you can also specify whether this report contains information
about the version used (Version information).
Scan options
Use engines: Ad-Aware Total Security uses multiple anti-virus engines, two generally independently
operating analysis units in addition to the other Lavasoft technologies. In principle, use of all engines
should guarantee optimum virus protection results.
© 2010 - Lavasoft
24
Ad-Aware Total Security
OutbreakShield: This option lets you activate the OutbreakShield. With the activated
OutbreakShield, Ad-Aware Total Security creates checksums of e-mail, compares these with
current anti-spam blacklists and, as a result, it is able to react to a mass-mailing before the
relevant virus definitions become available. OutbreakShield uses the Internet to monitor increased
volumes of suspicious e-mail, enabling it to close the window between the mass mail outbreak
and its containment with specially adapted virus definitions, practically in real time. The
OutbreakShield is an integral part of the e-mail virus blocker.
?
If you use a proxy server, click on the Internet settings button and
carry out the settings. You should change these settings only if your
OutbreakShield doesn't function. If necessary, consult your system
administrator or Internet service provider about the proxy address.
Advanced
Ad-Aware Total Security also automatically protects your e-mail once installed. To do so, it uses a
special plug-in for Microsoft Outlook and a special client for POP3/IMAP-based e-mail programs (e.
g. Outlook Express, Thunderbird, Pegasus, Opera etc.) that scans e-mail before they are sent or
received by your e-mail program. By checking the relevant checkbox, you can also disable
protection for incoming e-mail (POP3/IMAP) and outgoing e-mail (SMTP).
Since Ad-Aware Total Security processes incoming e-mail before the e-mail program itself, you may
get an error message if there is a large quantity of e-mail or if the connection is slow. This is
because it is not receiving the e-mail data immediately, as it is being scanned for viruses by AdAware Total Security. If you check the Avoid timeout in mail client box, this type of error
message is suppressed and Ad-Aware Total Security will forward the messages to the e-mail
program as usual as soon as all the e-mail data has been checked for viruses.
?
If you do not use the default ports for your e-mail programs, you can
enter the port you use for incoming or outgoing e-mail under Server
port number. Click on the Default button to automatically restore the
default port numbers.
?
You can also enter multiple ports. Separate each of these with a
comma.
?
Microsoft Outlook is protected by a special plug-in that allows you to
scan folders and e-mail directly from Outlook. To scan an e-mail or
folder for viruses in Outlook, simply select the Tools > Scan folder for
viruses command from the Outlook menu bar and the current e-mail
folder will be checked.
© 2010 - Lavasoft
Web protection
25
Web protection
In this area, you can enable or disable web protection. By means of the Advanced button, you can
set basic settings for handling web content and messaging services.
Define exceptions
Web protection ensures that you do not fall victim to infected or fraudulent websites on the Internet.
However, in rare cases it may occur that a website is not displayed properly, even though it is
supplied by a safe provider. In such a case, you can add this web address to the Whitelist, i.e. you
can define it as an exception and Web protection will no longer block this site. To add a website to
the exceptions in the Whitelist, please proceed as follows:
1
Click on the Define exceptions button. The Whitelist window will
appear. This will display the websites that have been categorized as
safe and entered here.
2
To add another website, please click on the New button. An input
screen will appear. Enter the name of the website (e.g. www.lavasoft.
com) under URL and, if necessary, enter a comment under Note about
why you have included this website. If you click on OK now , the
website will be transferred to the whitelist and will no longer be checked
by Web protection.
3
An information window will confirm that the website has been added to
the Whitelist. You can then exit the Whitelist window by clicking on
the Close button at the upper right corner.
?
To remove a website from the Whitelist, highlight it in the list using your
mouse and then click on the Delete button.
© 2010 - Lavasoft
26
Ad-Aware Total Security
Phishing protection
With so-called phishing, scammers on the Internet attempt to redirect customers of a particular
bank or shop to fake websites in order to steal their data there. The Webfilter is constantly updated
online with the latest information about new phishing websites and blocks these automatically.
Activating the phishing protection is highly recommended.
© 2010 - Lavasoft
Firewall
27
Firewall
A firewall protects your computer from being spied on. It checks which data and programs from the
Internet or network reach your computer and which data is sent from your computer. As soon as
there is an indication that data is to be installed or downloaded on your computer without
authorization, the firewall alarm sounds and blocks the unauthorized data exchange. It is generally
advisable to use the firewall in Autopilot mode. It then virtually runs in the background and protects
you without you having to undertake major settings.
?
If you are using the firewall in Autopilot mode, this will remain
completely in the background and operate independently. If you are
using the firewall with user-defined settings, a dialogue window will
appear in the event of doubt in which you can gradually optimize the
firewall for your system environment. Autopilot mode is included as
standard when installing the firewall.
The firewall starts tracking your computer's network activities from the
moment it is installed. When you are working locally with your
computer, you will only be aware of the firewall from the Security icon
on the Windows taskbar.
You can use the Configure buttons to set the firewall individually if you do not want to use Autopilot
Mode.
Configure
The firewall usually operates in Autopilot mode. It is only advisable to change the firewall settings if
you have sufficient knowledge of processes involving networks, Internet access and data transfer. If
you want to customise the firewall settings, you can use the firewall program interface to do so.
Click on the icons on the left of the firewall screen to select various tabs that will take you to the
relevant program area where you can carry out different actions, select default settings and check
connection data.
Status
In the status area of the firewall, you will find basic information about the current status of your
system and the firewall. You will find this to the right of the relevant entry as either text or numerical
data. In addition, the status of components is also displayed graphically. By double-clicking the
relevant entry (or selecting the entry and clicking the Edit button), you can directly select actions or
switch to the relevant program area. As soon as you have optimized the settings for a component
with a warning icon, the icon in the Status area will revert to the green check icon.
Security: As you use the computer for your daily tasks, the firewall gradually learns which
programs you do or do not use for Internet access and which programs represent a security risk.
Depending on how familiar you are with firewall technology, you can configure the firewall to
provide either highly effective basic protection without an excessive number of inquiries or
professional protection customised to your own computing habits, but which also requires
knowledge of firewalls. Double-click on Security to call up a range of security versions:
Autopilot mode (recommended): Here the firewall works fully
autonomously and automatically keeps threats from the local PC. This
setting offers practical all-around protection and is recommended in
most cases.
© 2010 - Lavasoft
28
Ad-Aware Total Security
Manual rule creation: If you would like to individually configure your
firewall or do not want particular applications to work together with
autopilot mode, you can adjust your firewall protection entirely to your
requirements via the manual rule creation.
Mode: Here you are informed of which basic setting your firewall is currently operating in. Either
the manual rule creation or automatic (autopilot) are possible here.
Networks: Naturally, the firewall monitors all network activities such as a DTN (data transmission
network) and a LAN connection. If one or more networks are not protected, for example,
because they were manually excluded from firewall monitoring, a warning icon will alert you of this.
Double-clicking the respective entry opens a dialogue box via which you can individually configure
the rules and settings for the selected network. Here, under Rule set simply select whether the
respective network is supposed to belong to the Trustworthy networks, the Untrustworthy
networks, or the Networks to be blocked.
?
The Direct Internet connection setting is, for the most part, based on
the settings that also apply to Trustworthy networks.
?
Each network can be assigned a special rule set. While the
Networks area tells you which networks are available on your
computer, the Rule sets area tells you which automatically created or
user-defined rule sets are available in the firewall.
Registered attacks: As soon as the firewall registers an attack on your computer, it is logged
here and you can obtain further information by clicking the menu item.
Application radar: The application radar shows you which programs are currently being blocked
by the firewall. If you still want to allow one of the blocked applications to use the network, simply
select it and then click the Allow button.
Networks
The Networks area lists the networks (e.g. LAN, data transmission network etc.) to which your
computer is connected. Also shown here is which rule sets (see section Rule sets) are protecting
the respective network. If you uncheck the relevant network it will no longer be protected by the
firewall. However, you should only disable this protection in specially justified circumstances. If you
use the mouse to highlight a network and click on the Edit button, you can view and/or change the
firewall settings for this network.
Edit network
When editing network settings, you have a choice of using the rule wizard or the advanced
dialogue. We generally recommend using the rule wizard since it helps the user create rules and
settings.
About network: This is where you can find information about the network - where this is available
- concerning the IP address, subnet mask, default gateway, DNS, and WINS server.
Firewall enabled on this network: You can use this option to disable the firewall's network
protection, but you should only do this in specially justified circumstances.
Internet connection sharing: If your system connects directly to the Internet you can determine
whether all computers connected via a TCP/IP network should have access to the Internet or not.
This Internet connection sharing (ICS) can generally be activated for home networks.
Enable automatic configuration (DHCP): When you connect your computer to the network, a
dynamic IP address (via DHCP = Dynamic Host Configuration Protocol) is assigned. You
should leave this option checked if you are connected to the network using this default
configuration.
© 2010 - Lavasoft
Firewall
29
Rule set: You can very quickly choose from predefined rule sets and determine whether, in terms
of firewall monitoring, you are dealing with a network which can be e.g. trusted, not trusted, or
should be blocked. Clicking the Edit rule set button gives you the option of configuring rule sets
individually. Please also refer to the section Rule sets.
Rule sets
In this area you can create special rules for different networks. These rules can then be grouped
together to form a rule set. There are default rule sets for a direct connection to the Internet,
untrustworthy networks, trustworthy networks, and networks to block. The relevant rule set is
listed with names and stealth mode status in the overview. You can change existing rule sets or add
new ones using the New, Delete, and Edit buttons.
?
Stealth mode (hidden, secret) is used for not answering requests to
the computer that verify the relevant port's accessibility. This makes it
difficult for hackers to obtain system information in this manner.
?
The default rule sets for Direct Internet connection, Trustworthy
networks, Untrustworthy networks, and Networks to be blocked
cannot be deleted. You may, of course, delete additional rule sets that
you yourself have created at any time.
Create rule sets
You can allocate every network its own rule set (i.e. a collection of rules specially matched to it). In
this manner you can protect networks with different levels of danger in different ways using the
firewall. For example, a home network surely requires considerably less protection (and
consequently less administrative effort) than a data transmission network directly connected to the
Internet. The firewall contains three default rule sets for the following network types:
Rule set for an untrustworthy network: This generally covers open networks (e.g. data
transmission networks) with Internet access.
Rule set for a trustworthy network: Home and company networks are generally trustworthy.
Rule set for a network to be blocked: This setting can be used if the computer's access to a
network is to be blocked on a temporary or permanent basis. This is advisable, for instance, when
you are connected to external networks with an indeterminate level of security (e.g. at LAN
parties, external corporate networks, public workspaces for notebooks, etc.)
Newly established networks on your computer can be assigned an appropriate rule set. Furthermore,
you can also create individual rule sets for networks by clicking the New button. To do this, click
the New button in the Rule sets area and enter the following details in the dialogue window:
Rule set name: Enter a meaningful name for the rule set here.
Generate an empty rule set: This allows you to generate an empty rule set and enter customdefined rules.
Generate a rule set which contains a number of meaningful rules: This option allows you to
specify if you want the new rule set to include a few basic default rules for untrustworthy,
trustworthy networks or for networks to be blocked. You can then make individual adjustments
based on these defaults.
The new rule set now appears in the list in the rule sets area under the relevant rule set name (e.g.
new rule set). If you then click on Edit - depending on the setting you made under Miscellaneous
(see the section with the same name) - the Rule wizard or the Advanced dialogue for editing the
individual rules of this rules set will open. You can learn how to assign new rules in the rule sets in
the sections entitled Using the Rule wizard and Using the advanced dialogue.
© 2010 - Lavasoft
30
Ad-Aware Total Security
?
In addition to directly entering rules yourself, you can also create rules
via the firewall alarm info box. This learning process of the firewall is
explained in the section entitled Firewall alarm .
Using the Rule w izard
The Rule wizard allows you to define specific additional rules to the relevant rule set or modify
existing rules. We recommend that users unfamiliar with firewall technology use the Rule wizard
rather than the advanced dialogue.
?
Using the Rule wizard you can change one or more rules in the
selected rule set. Thus you always create a rule within a rule set that
contains various rules.
?
Depending on which rule set you have specified for the relevant
network, one rule set (e.g. for untrustworthy networks) may block an
application while another (e.g. for trustworthy networks) could grant it
full network access. This means you can use a strategic combination
of rules to restrict a browser in such a way that, for example, it can
access websites available within your home network but cannot access
content from the data transmission network.
The following basic rules are available in the Rule wizard:
Allow or deny access to a specific application: This allows you to select a specific application
(program) on your hard disk and explicitly permit or deny it access to the network governed by the
rule set. Simply use the wizard to select the required program (program path) then indicate
under Connection direction whether the program is to be blocked for incoming connections,
outgoing connections or both incoming and outgoing connections. This enables you, for example,
to prevent your MP3 player software from forwarding data about your listening habits (outbound
connections) or to ensure that program updates are not downloaded automatically (inbound
connections).
Open or disable a specific Internet service (port): A Port is a specific address area that
automatically forwards data transferred over a network to a specified protocol and then on to
specified software. For example, standard websites are transferred via port 80, while email is sent
via port 25 and received via port 110, etc. Without a firewall, all ports on your computer normally
remain open, although the majority of users do not need most of these. Blocking one or more of
these ports is a quick way of eliminating vulnerabilities that could be used for attacks by hackers.
The wizard provides the option of blocking ports completely or for a particular application only (e.g.
your MP3 player software).
Allow or deny file and printer sharing (NetBIOS): NetBIOS is a special interface in networks
that can be used for e.g. sharing files or printers directly between one computer and another
without using the TCP/IP protocol. It is often advisable to deny sharing for untrustworthy networks,
as this is generally not necessary for home networks and the NetBIOS can also be used by
hackers to compromise a computer.
Allow or deny domain services: A domain is a type of classification directory for computers on
a network which allows the computers linked to the network to be managed centrally. Enabling for
domain services in untrustworthy networks should generally be denied.
Enable Internet connection sharing: If your system connects directly to the Internet you can
determine whether all computers connected via a TCP/IP network should have access to the
Internet or not. This Internet connection sharing (ICS) can generally be activated for home
networks.
Switch to the extended edit mode (advanced dialogue): This allows you to move from the
Rule wizard to the advanced dialogue. For further information on the advanced dialogue, see the
section Using the advanced dialogue.
© 2010 - Lavasoft
Firewall
?
31
If you remove the checkmark next to Always launch the Rule wizard
in the future checkbox, the firewall will automatically open the
advanced dialogue to define new rules.
Using the advanced dialogue
The advanced dialogue allows you to set highly specific rules for the relevant network, although you
will need a basic knowledge of network security for this. You can, of course, create all the rules here
that could be created using the rule wizard, but in addition advanced settings can also be made. The
following configuration options are available:
Name: This allows you to change the name of the current rule set if required. The rule set will then
be displayed under this name in the list within the Rule sets area and can be combined with
networks identified by the firewall there.
Stealth mode: Stealth mode (meaning: hidden, secret) is used for not answering requests to the
computer that verify the relevant port's accessibility. This makes it difficult for hackers to obtain
system information in this manner.
Action if no rule applies: Here, you can specify if access to the network should generally be
permitted, denied, or subject to an inquiry. Should any special rules for individual programs be
defined by the firewall's learning function, these will naturally be applied.
Adaptive mode: Adaptive mode supports applications that use feedback channel technology
(e.g. FTP and numerous online games). These applications connect to a remote computer and
negotiate a feedback channel with it, which the remote computer then uses to "reverse connect"
to your application. If the Adaptive mode is enabled, the firewall detects this feedback channel and
permits it without querying it separately.
Rules
The list of rules contains all the rules specified as existing exceptions for this rule set. This means,
for example, that selected programs can be authorised for numerous network accesses even if the
network is classified as untrustworthy. The rules applicable here may have been created in various
ways:
Via the Rule wizard
Directly via the Advanced dialogue using the New button
Via the dialogue in the info box displayed when the firewall alert is triggered.
Of course, each rule set has its own list of rules.
?
Since the firewall rules are partly nested hierarchically, it is sometimes
important to note the ranking of each rule. For example, a port that
you have granted access to may be blocked again because a certain
protocol is denied access. To modify the rank of a rule in the
sequence, highlight it with the mouse and use the arrow buttons under
Rank to move it up or down the list.
If you create a new rule using the Advanced dialogue or modify an existing rule using the Edit
dialogue, the Edit rule dialogue appears with the following setting options:
Name: For default and automatically generated rules, this displays the program name to which
the relevant rule applies. You can also use the Edit button at any time to change the name or add
further information.
Rule enabled: You can disable a rule without actually deleting it by deactivating the checkbox.
© 2010 - Lavasoft
32
Ad-Aware Total Security
Comment: This indicates how the rule was created. Default rule is listed next to rules preset for
the rule set; generated in response to alert is listed next to rules that arise from the dialogue
from the Firewall alarm; and for rules that you generate yourself via the advanced dialogue you
can insert your own comment.
Direction of connection: With Direction, you specify if the selected rule applies to incoming or
outgoing connections, or to both incoming and outgoing connections.
Access: This specifies if access is to be permitted or denied for the relevant program within this
rule set.
Protocol: This allows you to select the connection protocols you want to permit or deny
access. You can generally block or enable protocols or link usage of a protocol to the use of one
or more specific applications (Match to applications). Similarly, you can use the Match to
Internet service button to specify the ports that you do or do not wish to use.
Time window: You can also set up time-related access to network resources to ensure, for
example, that the network can only be accessed during your normal working day and is blocked
at all other times.
IP address space: It is advisable to regulate network use by restricting the IP address range,
especially for networks with fixed IP addresses. A clearly defined IP address range significantly
reduces the risk of attack from a hacker.
Firewall alarm
When in manual rule creation mode, the firewall will generally check unknown programs and
processes that try to connect to the network, to see if they should be allowed or blocked. An
information box will open to show you details about the relevant application. You can also allow oneoff or permanent access to the network, or deny any access. As soon as you have allowed or denied
permanent access for a program, a rule will be created in that network's rule set for this and you will
not be asked about this again.
The following buttons are available:
Always permit: This button lets you create a rule for the application mentioned above (e.g.
Opera.exe or Explorer.exe or iTunes.exe) allowing permanent access to the network and/or
Internet. You will also find this rule as Rule created by enquiry in the area called Rule sets.
Allow this time: You can use this button to permit the relevant application to access the network
only once. The firewall will issue another alert the next time this program attempts to access the
network.
Always block: This button lets you create a rule for the application mentioned above (e.g. dialer.
exe or spam.exe or trojan.exe) permanently denying it access to the network or Internet on the
network specified for the application. You will also find this rule as Rule created by enquiry in the
area called Rule sets.
Block this time: This button lets you deny the relevant application access to the network once
only. The firewall will issue another alert the next time this program attempts to access the
network.
© 2010 - Lavasoft
Firewall
33
There is further information available on the protocol, port and IP address with which the relevant
application is trying to interact.
Logs
The log area logs all the connections to the network and Internet permitted or blocked by the firewall.
You can sort this list as desired using different criteria by clicking on the relevant column header.
Click the Details button for further information on the individual connections.
Options (Firewall)
In the upper menu bar of the program interface, you will find comprehensive functions and settings
options by clicking the Options button.
Automatic
The advantage of using the default security levels is that you can adapt the firewall to your individual
requirements without too much administrative input or specialist knowledge of network security. You
can set the security level by simply adjusting the slide control. The following security levels are
available:
Maximum security: The firewall rules are generated using very strict guidelines. So you should
be familiar with specialised network concepts (TCP, UDP, ports etc.). The firewall detects the
slightest inconsistencies and will issue frequent queries during the learning phase.
High security: The firewall rules are generated using very strict guidelines. So you should be
familiar with specialised network concepts (TCP, UDP, ports, etc.). The firewall may issue
frequent queries during the learning phase.
Normal security: The firewall rules are generated at the application level only. Wizards keep
network-specific details away from you. You will be queried as little as possible during the learning
phase.
Low security: The firewall rules are generated at the application level only. Wizards keep
network-specific details away from you. You will only be rarely queried during the learning phase.
This level of security still offers highly effective protection against any connection requests that
may occur.
Firewall disabled: You can disable the firewall completely if required. This means that your
computer is still connected to the Internet and any other networks, but the firewall is no longer
protecting it against attacks or electronic espionage.
?
If you wish to make specific settings for your firewall, check Custom
security (for professionals). Please note: for these settings you will
need at least a basic understanding of network security.
Inquiry
Here you can specify if, when and how the firewall should query users when programs request a
connection to the Internet or network.
Define rule: If the firewall detects a connection being made to the network, an information box
appears in which you specify how to proceed for this particular application. Specify here precisely
how to proceed in terms of allowing or forbidding network access:
© 2010 - Lavasoft
34
Ad-Aware Total Security
Per protocol/port/application. Per application, if a minimum of
__ inquiries are pending: There are applications (e.g. Microsoft
Outlook) that send requests to multiple ports when requesting network
access or that use different protocols simultaneously. This might for
example cause several queries to occur via dialogue boxes in the
setting per protocol/port/application. Therefore you can specify here
that applications should receive global permission for or denial of
network use as soon as you have allowed or blocked the user's
connection.
Per application: This enables you to specify general authorization or
denial of network access by the currently selected application on any
port and using any transfer protocol (e.g. TCP or UDP).
Per protocol/port/application: The application requesting network
access is only permitted to go online with the requested transfer
protocol and on the specified port. If the same application requests an
additional network connection on another port or using a different
protocol, the information box will appear again, allowing you to create
another rule for it.
Cache: You can bundle recurring requests for connection of an application. This way, information
boxes do not keep appearing during connection attempts for which you have not yet specified a
rule, but rather only in e.g. 20-second intervals or another period of you define.
Unknown server applications: Applications that are not yet managed using a rule in the firewall
may be handled in a different manner. The time of the inquiry lies within a certain latitude. If the
server application goes to "on receipt", this means that it is waiting for a connection request as if
on standby. This connection request is made under the Connection request setting.
?
In general, the checkmark next to Scan for unknown server
applications on program start should be set. Otherwise Trojans, for
example, that were present on the computer before the firewall was
started, could continue to remain active without being discovered.
Unprotected networks: A firewall can only function properly if all the networks accessed by the
computer it is protecting can also be detected and monitored by it. You should therefore leave the
checkmarks next to Immediately report new networks if unprotected and Scan for
unprotected networks at program start set.
Attacks
You should generally leave these boxes checked to ensure that the widest range of hacker attacks
is detected. The potential damage a successful attack could inflict considerably outweighs the slight
improvement in system performance achieved if the firewall is not scanning for threats. The firewall
will detect the following types of attacks:
Port scans: Here, the open TCP and UDP ports on an attacked computer are identified. Such an
attack is used to search for weaknesses in the computer system and usually precedes more
dangerous attacks.
Ping of Death: In this attack, an ICMP packet is sent with a size exceeding the allowable value
of 64 KB. The attack can cause certain operating systems to crash.
Land: in this attack, a request is sent to an open port on the attacked computer to establish a
connection to itself. This causes an infinite loop on the affected computer, resulting in a greatly
increased processor load and possibly causing the operating system to crash.
© 2010 - Lavasoft
Firewall
35
SYN Flood: With this attack, large quantities of false connection requests are sent to the
attacked computer. The system reserves certain resources for each of these connections, causing
all of its resources to be consumed and preventing it from responding to connection requests from
other sources.
UDP flood: With this attack, a UDP packet is sent, which, due to its structure, is endlessly sent
back and forth between the computer under attack and an address that the computer can access
freely. This causes a loss of resources on both computers and increases the load on the
connection channel.
ICMP Flood: With this attack, large quantities of ICMP packets are sent to the computer under
attack. This causes a greatly increased load on the processor since the computer reacts to each
packet.
Helkern: With this attack, special UDP packets with executable malware are sent to the attacked
computer. The attack leads to a slowing down of Internet functions.
SMB Die: This attack involves an attempt to establish a connection according to SMB protocol; if
the connection is successful, a special packet is sent to the computer which tries to overflow the
buffer. Consequently, the computer restarts.
Lovesan: With a Lovesan attack, the program tries to detect security holes in the DCOM RPC of
Windows NT 4.0/NT 4.0 Terminal Services Edition/2000/XP/Server (tm) 2003 operating systems. If
such vulnerabilities exist on the computer, a program with malicious functions is sent to perform
arbitrary changes on your computer.
?
If you click on the entries in the Mode column, you can specify
whether you want to be immediately alerted to hacker attacks via a
dialogue box or if these attacks should only be recorded in the log.
Miscellaneous
Further setting alternatives are available here.
Reference testing for applications: During reference testing the firewall calculates a checksum
based on the file size and other criteria for applications for which it has already enabled network
access. If the checksum for this program suddenly changes, it may be because the program has
been modified by a malware program. In such cases, the firewall generates an alarm. Generally,
reference testing for applications should remain switched on. In the same way, Reference
testing for loaded modules monitors modules that the applications use (e.g. DLLs). Since
these frequently change or new modules are downloaded, consistent checking for modified and
unknown references for modules may result in a considerable administration effort for the firewall.
Every modified module would cause a security request to be sent in its trail to the firewall.
Therefore module checking should only be used in this way for very high security requirements.
Modified references: Modified references can be automated as much as possible in the
reference testing (e.g. during a Windows update) if the modules are checked using Ad-Aware
Total Security and found to be harmless. If the Anti-Virus module is not installed, confirmation of
modified references can also be carried out manually by the user.
Rule sets: Specify here whether, in general, you wish to create new rules using the Rule wizard
or using the Advanced dialogue. For users who are not familiar with the subject of network
security, we recommend using the Rule wizard.
?
You can, of course, switch from the Rule wizard directly to the
Advanced dialogue and vice versa at any time. To do this, in the Rule
wizard under What do you want to do? simply select the entry
Switch to the extended edit mode or in the Advanced dialogue
click the Wizard button.
© 2010 - Lavasoft
36
Ad-Aware Total Security
Connection protocol: Here you can specify for how long the firewall connection data should be
saved. You can retain the data for anywhere between an hour and 56 hours and view it in the
Protocol program area.
Autopilot: During computer games (and other full screen applications), it can be disruptive if
the firewall interrupts the flow of the game with lots of inquiry windows or simply interferes with the
picture. To ensure that you can enjoy uninterrupted gaming without security compromises, the
autopilot is a useful setting because it suppresses the inquiries of the firewall. If you are not using
autopilot as a default setting, you can use the Offer autopilot automatically function to ensure
that it is activated automatically if you are using a program running in full screen mode.
© 2010 - Lavasoft
E-mail protection
37
E-mail protection
E-mail protection is used to protect you from infected e-mail, but also to ensure that you do not
accidentally send messages that contain malware. You can use the Advanced option to create
custom settings for checking incoming and outgoing e-mail. Please also refer to the section Options
(E-mail check).
© 2010 - Lavasoft
38
Ad-Aware Total Security
Spam protection
Here you can switch the protection against unwanted advertising and spam e-mail on or off. You can
use the Configure buttons to define in detail what you would like to define as spam.
Configure
The flood of unwanted e-mail increases every day. Is your inbox overflowing with vast amounts of
unwanted e-mail? Ad-Aware Total Security will use a combination of the most up-to-date spam
checking criteria to securely protect you from spam/junk mail, block spam senders effectively and
prevent false detections. The software is designed to be self-explanatory and clearly laid out. Using
tabs selected via the icons displayed on the left in the Ad-Aware Total Security interface, you can
switch to the appropriate program area where you can carry out different actions, select default
settings or review processes. Additionally, you can find overlapping functions and settings in the
menu bar at the top of the program interface (see section Spam protection).
Status
In the e-mail status area of the spam filter, you will find basic information about the current status of
your system and Ad-Aware Total Security. This is indicated by the text to the right of the relevant
item. By double-clicking the relevant entry (or selecting the entry and clicking the Edit button), you
can directly select actions or switch to the relevant program area. As soon as you have optimised
the settings for a component with a warning icon, the icon in the Status area will revert to the green
check icon.
Spam filter: Double-clicking on this entry enables you to access its settings window where you
can create a wide range of settings to protect your system from receiving spam e-mail.
Disable HTML scripts: You can disable HTML scripts by double-clicking on this entry. Unlike
regular file attachments, scripts in HTML formatted e-mail can start to deploy their damaging
functionality when the user views the message in the preview pane in his or her e-mail program.
Caution is especially applicable here.
?
To switch off protection against HTML scripts, uncheck the box next to
the Scripts entry in More filters.
Filter harmful attachments: Extensive functions are available for removing or deactivating
dangerous file attachments or for warning users of the danger. Double-clicking the entry enables
you to access the settings area where you can define appropriate filter rules for attachments).
More filters
In this area you can conveniently apply filters that block incoming e-mail or automatically remove
potentially malicious content from e-mail. You can use the New button to set up new filter rules or
edit existing filters with the Edit button. The filters created are shown in the list and can be enabled
or disabled as required by checking the checkbox to the left. If you see a check in the checkbox, it
means that that filter is active. If there is no checkmark in the box, the filter is inactive. To
permanently delete a filter, click the relevant filter once to highlight it and then click the Delete
button.
© 2010 - Lavasoft
Spam protection
?
39
The filter options available here are additional filters which support the
actual Ad-Aware Total Security spam filter and which allow you to
configure your own personal settings. The original spam filter
(described in the section Spam filter) gives you extensive setting
options which effectively block e-mail with unwanted content or block email from unwanted senders (for example, mass-mail senders). The
program checks for numerous e-mail characteristics that are typical of
spam. These characteristics are used to calculate a value reflecting the
likelihood of it being spam. To this end multiple tabs are available
providing you with all the relevant settings options sorted by subject.
Add new filter
When you create a new filter, a selection window appears in which you can specify the basic filter
type. All of the other details about the filter can be created using a wizard, which will guide you
through that filter type. This is a convenient way to create filters for every imaginable type of threat.
Disable HTML scripts: This filter disables scripts in the HTML part of an e-mail. Scripts that
might look OK on a web page tend to be rather irritating when they are integrated into an HTML email. In some cases, HTML scripts are also used to actively infect computers, whereby scripts
have the option of running not only when the infected attachment is opened but even when an email is previewed.
Filter attachments: A large number of filter options for filtering e-mail attachments are provided.
Most e-mail viruses are spread through attachments, which usually have more or less well-hidden
executable files. This can be in the form of a standard EXE file that contains malware, but can
also be VB scripts, which could be hidden behind an apparently safe graphic, film or music file. In
general, users should exercise extreme caution when opening e-mail attachments. If in doubt, the
sender of the e-mail should be asked before opening files that have not been expressly requested.
Under File extensions you can list the file extensions to which you would like to apply the
respective filter. This lets you put all executable files (e.g. EXE and COM files) into one filter, and
have another filter for other files (e.g. MPEG, AVI, MP3, JPEG, JPG, GIF etc.) if their file size
would overload the mail server. You can also filter archive files (e.g. ZIP, RAR or CAB) . Please
use a semicolon to separate all file extensions in a filter group. The Also filter attachments in
embedded e-mail function ensures that the filtering performed under File extensions for the
selected attachment types also applies to e-mail messages that are themselves being forwarded
as e-mail attachments. This option should generally be enabled. Choosing Only rename
attachments has the effect of renaming attachments that are to be filtered rather than deleting
them automatically. This is not only recommended for executable files (such as EXE and COM)
but also for Microsoft Office files that may contain executable scripts and macros. Renaming an
attachment makes it impossible to open it simply by clicking it. Instead, the user must first save
(and possibly rename) the attachment before it can be used. If the checkmark for the Only
rename attachments function has not been set, the respective attachments are deleted directly.
Under Suffix you can enter a character string that should be appended to the file extension (*.
exe.danger, for instance), which prevents the execution of this type of file by just clicking on it.
Under Insert message in e-mail text you can inform the recipient of the filtered e-mail that an
attachment was deleted or renamed based on a filter rule.
© 2010 - Lavasoft
40
Ad-Aware Total Security
Content filter: You can use the content filter to easily block e-mail messages which contain
certain subjects or text. Simply enter the keywords and expressions to which Ad-Aware Total
Security should react under Search criteria. It is possible to use the AND and OR logical
operators to link text components with one another. Under Search area you can now enter those
elements of an e-mail message where the defined terms should be looked for. The header is the
part of an e-mail message that, among other things, contains the e-mail address of the sender and
the recipient, the subject line, and information on the programs and protocols used, and the date
sent. If you have, for instance, activated Subject as the search area, only the content of the
subject line will be checked, and no other information contained in the header. If you select E-mail
text as the search area, you have the additional option of limiting the search area to pure text email, or extending the search to text in HTML e-mail (HTML text). By checking Embedded emails you can define whether the content filter search should also cover e-mail messages
included as attachments in received messages. Under Reaction you can determine what is to be
done with e-mail recognised as spam by Ad-Aware Total Security. Using Reject e-mail means
the e-mail in question will not even be accepted by your e-mail program. If you check the box for
Insert warning in e-mail subject and text you can prefix the actual text in the subject line with
a warning (prefix in subject line), e.g. Spam or Warning. You can also enter text to be placed
above the actual e-mail text in the event of suspected spam (Message in text). If you use
Microsoft Outlook (caution: not to be confused with Outlook Express or Outlook Mail), you
also have the option of moving e-mail containing suspected spam to a fully customizable folder in
your mailbox (Move e-mail to folder). You can create this folder directly via Ad-Aware Total
Security by defining the corresponding folder under Folder name.
?
The AND logical operator assumes that all components that have been
linked with AND must be present, while the OR operator assumes that
at least one of the elements needs to be present.
Sender filter: You can use the sender filter to easily block e-mail coming from certain senders.
To do this, simply enter the e-mail addresses or domain names to which Ad-Aware Total
Security should react under Senders/domains. Use a semicolon to separate multiple entries.
Under Reaction you can determine what is to be done with e-mail recognized as spam by AdAware Total Security. Using Reject e-mail means the e-mail in question will not even be
accepted by your e-mail program. If you check the box for Insert warning in e-mail subject and
text you can prefix the actual text in the subject line with a warning (prefix in subject line), e.g.
Spam or Warning. You can also enter text to be placed above the actual e-mail text in the event
of suspected spam (Message in text). If you use Microsoft Outlook (caution: not to be confused
with Outlook Express or Windows Mail), you also have the option of moving e-mail containing
suspected spam to a fully customizable folder in your mailbox (Move e-mail to folder). You can
create this folder directly via Ad-Aware Total Security by defining the corresponding folder under
Folder name.
Language filter: The language filter lets you automatically define e-mail in specific languages as
spam. For example, if you do not generally have e-mail contact with a German-speaking person,
then you can set German as a spam language which should be filtered out. Simply select the
languages in which you do not receive regular e-mail contact and Ad-Aware Total Security will
raise the spam probability for such e-mails. In the Reaction area you can determine what should
be done with e-mail filtered in this way. Under Reaction you can determine what is to be done
with e-mail recognized as spam by Ad-Aware Total Security. Using Reject e-mail means the email in question will not even be accepted by your e-mail program. If you check the box for Insert
warning in e-mail subject and text you can prefix the actual text in the subject line with a
warning (prefix in subject line), e.g. Spam or Warning. You can also enter text to be placed
above the actual e-mail text in the event of suspected spam (Message in text). If you use
Microsoft Outlook (caution: not to be confused with Outlook Express or Windows Mail), you
also have the option of moving e-mail containing suspected spam to a fully customizable folder in
your mailbox (Move e-mail to folder). You can create this folder directly in Ad-Aware Total
Security by defining the corresponding folder under Folder name.
© 2010 - Lavasoft
Spam protection
41
Statistics
In this area, you receive a statistical analysis of all spam-relevant operations of your e-mail traffic.
No spam
Here you can view all e-mail not recognized as spam by Ad-Aware Total Security. You can use the
Update button to retrieve the most up-to-date data status of the software and the Delete button to
delete previously marked entries. The e-mail messages themselves, which are held in your e-mail
program, are not deleted.
?
You can use the Add to whitelist button to add a highlighted e-mail to
the whitelist, thus generally excluding the relevant e-mail address from
further spam checks. Please also read the section Whitelist in the
Spam filter chapter. You can use the Add to blacklist button to add a
highlighted e-mail to the blacklist, thus generally subjecting the
relevant e-mail address to extensive checks for spam elements. Please
also read the section Blacklist in the Spam filter chapter.
Spam
Here you are provided with an overview of all e-mails defined as spam by Ad-Aware Total Security.
You can use the Update button to retrieve the most up-to-date data status of the software and the
Delete button to delete previously marked entries. The e-mail messages themselves, which are held
in your e-mail program, are not deleted.
?
You can use the Add to whitelist button to add a highlighted e-mail to
the whitelist, thus generally excluding the relevant e-mail address from
further spam checks. Please also read the section Whitelist in the
Spam filter chapter. You can use the Add to blacklist button to add a
highlighted e-mail to the blacklist, thus generally subjecting the
relevant e-mail address to extensive checks for spam elements. Please
also read the section Blacklist in the Spam filter chapter.
Options (Anti-Spam)
Here you can define basic settings for handling spam e-mail.
Spam filter
The spam filter provides you with an extensive range of settings options for effectively blocking e-mail
with undesirable content or from undesirable senders (e.g. mass e-mail senders). The program
checks for numerous e-mail characteristics that are typical of spam. These characteristics are used
to calculate a value reflecting the likelihood of it being spam. You can use the Use spam filter
button to enable or disable the spam filter. In order to switch the different filter types of the spam
filter on or off, simply set or remove the checkmark in front of the respective entry. To make changes
to the various filters, simply click on the respective entry. A dialogue window then opens in which
you can vary corresponding settings. The following settings options are available:
Spam OutbreakShield
The OutbreakShield detects and neutralizes threats from malware in mass mailings before the
most up-to-date relevant virus signatures become available. OutbreakShield uses the Internet to
monitor increased volumes of suspicious e-mails, enabling it to close the window between the mass
mail outbreak and its containment with specially adapted virus definitions, practically in real time.
© 2010 - Lavasoft
42
Ad-Aware Total Security
?
If you use a computer behind a firewall, or if you have other special
settings for your Internet access, please use a proxy server. To do
this, click the Internet Settings button and make the appropriate
changes. You should change these settings only if your
OutbreakShield doesn't function. If necessary, consult your system
administrator or Internet service provider about the proxy address.
Use w hitelist
Certain sender addresses or domains can be explicitly excluded from spam testing via the Whitelist
. Simply enter the e-mail address (e.g. [email protected]) or domain (e.g. www.lavasoft.
com) that you want to exclude from suspected spam in the Addresses/domains field, and Ad-Aware
Total Security will not process messages from that sender or sender domain as spam. You can use
the Import button to insert predefined lists of e-mail addresses or domains into the whitelist. Each
address or domain must be listed on a separate line. A plain txt file format is used for storing this
list; you can create this list using Windows Notepad, for example. You can also use the Export
button to export whitelists as text files.
Use blacklist
Certain sender addresses or domains can be explicitly flagged as suspected spam via the blacklist.
Simply enter the e-mail address (e.g. [email protected]) or domain (e.g.www.
megaspam.de.vu) that you want to check for spam in the Addresses/Domains field, and Ad-Aware
Total Security will generally process e-mail from that sender or sender domain as e-mail with a very
high spam probability. You can use the Import button to insert predefined lists of e-mail addresses
or domains into the blacklist. Each address or domain must be listed on a separate line. A plain txt
file format is used for storing this list; you can create this list using Windows Notepad, for example.
With the Export button, you can export blacklists as text files.
Use real-time blacklists
You can find blacklists on the Internet that contain the IP addresses of servers known to send
spam. Ad-Aware Total Security uses DNS queries to the RBLs (real-time blacklists) to determine
whether the sending server is listed. If it is, this increases the probability that it is spam. In general
we recommend that you use the default setting here, although you can add your own Internet
addresses to blacklists 1, 2, and 3.
Use keyw ords (email text)
You can also identify suspected spam messages through the words in the mail text by defining a
list of keywords. If at least one of these terms is included in the e-mail text, the spam probability
increases. You can change this list as you like by using the Add, Change, and Delete buttons.
You can add predefined lists of keywords to your list using the Import button. Entries in such a list
must be listed one below the other on separate lines. A plain txt file format is used for storing this
list; you can create this list using Windows Notepad, for example. You can also use the Export
button to export such a list of keywords as a text file. By checking Find whole words only, you
can specify that Ad-Aware Total Security will only search for complete words in the subject line of an
e-mail. Thus, for example, a term such as cash would fall under suspicion as spam whereas the
general cashew nuts would be allowed to pass.
© 2010 - Lavasoft
Spam protection
43
Use keyw ords (subject)
You can also identify suspected spam messages through the words in the subject line by defining a
list of keywords. An occurrence of at least one of the listed terms in the subject line increases the
probability of spam. You can change this list as you like by using the Add, Change, and Delete
buttons. You can add predefined lists of keywords to your list using the Import button. Entries in
such a list must be listed one below the other in separate lines. A plain txt file format is used for
storing this list; you can create this list using Windows Notepad, for example. You can also use the
Export button to export such a list of keywords as a text file. By checking Find whole words only,
you can specify that Ad-Aware Total Security will only search for complete words in the subject line
of an e-mail. Thus, for example, a term such as cash would fall under suspicion as spam whereas
the general cashew nuts would be allowed to pass.
Use content filter
The content filter has been designed as a self-learning filter based on the Bayes method,
calculating spam probability on the basis of the words that are used in the e-mail text. This filter not
only works on the basis of predefined word lists but also learns from each new e-mail received. You
can view the word lists that are used by the content filter for identifying e-mail as spam via the
Query table contents button. You can delete all words in this table by using the Reset tables
button, after which the content filter will restart its learning process again from the beginning.
Reaction
Here you can define how the spam filter should process e-mail messages that may contain spam.
You can use the spam probability value calculated for the affected e-mail by Ad-Aware Total Security
to define three different levels of filtering.
How those e-mail messages in which Ad-Aware Total Security finds individual spam elements are
handled is defined under Suspected spam. Such messages may not generally be spam, but can
also be newsletters or part of a mass mailing that is of interest to the recipient. In such cases, it
is recommended that you inform the recipient that the e-mail is suspected spam.
High spam probability covers e-mail that contains many spam characteristics and is rarely of
real interest to the recipient.
Very high spam probability covers e-mail that meets all the spam criteria. Such e-mails are
rarely wanted, and rejecting e-mail with these characteristics is recommended in most cases.
Each of these three graduated reactions can be customized. Simply click on the Change button
and define the reaction which Ad-Aware Total Security should use. The Reject e-mail option allows
you to specify that the corresponding e-mail messages do not reach your mailbox. With Insert
spam warning in mail subject and mail text you can identify and highlight e-mail messages that
have been identified as spam to enable these to be filtered more easily. If you use Microsoft
Outlook (caution: not to be confused with Outlook Express or Windows Mail), you also have the
option of moving e-mail containing suspected spam to a fully customizable folder in your mailbox (
Move e-mail to folder). You can create this folder directly via Ad-Aware Total Security by defining
the corresponding folder under Folder name.
?
Even if you do not use Outlook, e-mail messages that have been
identified as spam can be moved to a different folder. Just add an alert
in the subject line of the message (for instance "[Spam]") and define a
rule in your e-mail program to move e-mail with this text in the subject
line to a different folder.
© 2010 - Lavasoft
44
Ad-Aware Total Security
Advanced settings
This window enables you to make detailed changes to the spam detection of Ad-Aware Total
Security , adapting the system to suit your e-mail traffic. However, it is generally recommended that
default settings are used here. Making changes in the advanced settings should only be done if you
have the corresponding expertise and know exactly what you are doing.
Settings
You can create more settings in this area.
Scan unread mails in the inbox at program start: Only for Microsoft Outlook: The Scan
unread mails in the inbox at program start option is used to check for suspected spam in email received while you are offline. Ad-Aware Total Security will check all unread e-mail in your
Inbox folder and subfolders as soon as you open Outlook.
Other mail programs (using POP3): For technical reasons, e-mail received via POP3 cannot be
deleted directly. If a filter is supposed to reject e-mail, this e-mail is then assigned a replacement
text. The replacement text for rejected e-mail is: The message has been rejected. However, you
can also customize the text for these notification functions. In the text you define for the subject
line and e-mail text, the following wildcards (defined using a percentage symbol followed by a
lower case letter) are available:
?
%s
Sender
%u
Subject
In your e-mail program, you can define a rule that automatically deletes
e-mails with the replacement text defined here.
More filters
The following filters are created by default; however, if necessary you can also switch them off by
unchecking the box. Please also refer to the section Add new filter.
Disable HTML scripts: This filter disables scripts in the HTML part of an e-mail. Scripts that
might look OK on a web page tend to be rather irritating when they are integrated into an HTML email. In some cases, HTML scripts are also used to actively infect computers, whereby scripts
have the option of running not only when the infected attachment is opened but even when an email is previewed.
Filter harmful attachments: A large number of filter options are provided for filtering dangerous email attachments. Most e-mail viruses are spread through attachments, which usually have more
or less well-hidden executable files. This can be in the form of a standard EXE file that contains
malware, but can also be VB scripts, which could be hidden behind an apparently safe graphic,
film or music file. In general, users should exercise extreme caution when opening e-mail
attachments. If in doubt, the sender of the e-mail should be asked before opening files that have
not been expressly requested.
© 2010 - Lavasoft
Parental controls
45
Parental controls
You can use parental controls to regulate surfing behavior and computer use for your children.
Configure
The parental controls are designed to be self-explanatory and clear. Using various tabs that you can
select by clicking the icons displayed on the left, you can switch to the relevant part of the program,
where you can perform actions, set defaults or review processes.
?
The parental controls are not included in a standard installation of AdAware Total Security. However you can install this retrospectively by
running a customized setup (see section Installation).
The following program areas are available
Status: Here you can review the current settings and can administer user accounts, so, for
example, allocate various Internet security levels for your children.
Personal filters: This is where you can individually configure the permitted content and prohibited
content settings for different users.
Logs: The log provides information on each user's surfing behavior, so, for example, you can see
when parental controls have intervened and based on which filter rules.
Additionally, you can find overlapping functions and settings in the menu bar at the top of the
program interface.
Test: As an administrator, this is where you can check whether the
restrictions you have defined for particular users are having the desired
effect. The Test mode lets you check that websites that are to be
blocked cannot be seen via your Internet browser, and thus making
sure that the settings are correct.
Options: This is where you can adjust the basic operational settings
for parental controls and adapt them to your individual requirements.
Status
As administrator you can select the user for whom you wish to make modifications or create
settings under User in the Status area; you can also create new users here.
?
Users with existing Windows user profiles set up on your computer
can be selected directly under Users. To modify settings here, just
select the relevant user and click the Edit button.
Create new user
Click the New user button. Enter the user name and password for the relevant user in the dialogue
box.
?
To make a password as secure as possible, it should be at least 8
characters long, include upper and lower case letters, and numbers.
© 2010 - Lavasoft
46
Ad-Aware Total Security
You will now see the new user name under Users; a Windows user account is created for this user
at the same time. This means that parental controls are automatically activated for the person
whose user name was used to log on when Windows was started, and that this person's settings
will apply. By double-clicking the Settings area, you can select the settings for a particular user, for
example: to block Prohibited content or to allow only Permitted content or to specify whether the I
nternet usage period or Computer usage period should be monitored for this user.
Prohibited content
Opens a dialogue window in this area where you can block specific web content for the user
currently displayed. Check the categories you wish to be blocked. Click on OK and the websites
that fit the blocking criteria will be blocked.
?
If you click on the New button, a dialogue window opens where you
can define your own blocking criteria (also called blacklists). To do
this, first give the name and, if you want, any additional information
about the filter you are creating.
Then click on OK to open a new window which lets you list the content you'd like blocked by this
filter. Add a term under Filter that is to be blocked, and under Search location indicate the parts of
a website that should be searched for the term. Here, you have the following options:
URL: If you set the checkmark here, it will search for the text that should be blocked in the web
address. For example, if you want to block websites like www.chatcity.no, www.crazychat.co.uk
etc., you can simply set chat as a filter, and check the URL option and then click on the Add
button. This way, you can block all websites in which the word chat appears in the domain name
, i.e., the Internet address.
Title: If you check "Title" it will search for the term that should be blocked in the website's title.
This is the short website description you see, for example, when you add a website to your
Favorites list as a bookmark. For example, if you want to block websites like Chat City Detroit,
Teenage Chat 2005 etc., you can simply set chat as a filter, and check the Title option, then
click on the Add button. This way, you can block all websites in which the letter combination chat
appears in the title.
Meta: So-called meta tags are text entries that are hidden in websites. They are there to help
search engines find relevant content or just to boost a website's visibility. Search terms like sex
or chat are often used here to increase the number of hits a website receives. If you want to block
websites in which chat appears among the meta tags, it will suffice to enter the filter chat, check
the Meta option and then click on the Add button. This way, you can block all websites in which
the letter combination chat appears in the meta tags.
In entire text: If you want to check all readable content of a website, just add a term that should
be blocked - for example, chat - then check the In the entire text option and click on the Add
button. This way, you can block all websites in which the word chat appears anywhere in the
website text.
Of course, using filter terms that are too general may also block websites that are perfectly
harmless. Thus a blocked term such as cash can also cause entries for cashew nuts to be blocked.
?
Websites that accidentally get filtered can be removed from the list
using the Exceptions function. To do so, just click on the Exception
button and add the term (e.g. cashew) to the filter as an exception.
?
You can create and delete your own filters as required in the Personal
filters area. For more information, see the section Personal filters.
© 2010 - Lavasoft
Parental controls
47
Permitted content
Opens a dialogue window where you can permit specific Internet content for the user currently
displayed. Select the categories you want to permit by checking the relevant boxes. Now click OK
to permit access to the websites relating to the criteria you want.
?
If you click on the New button, you will open a window where you can
define your own permitted content (also called whitelists). There you
can give a name (and a short description if you want) to your personally
created filter.
Now, click OK. A dialogue window will open in which, for example, you can create a whitelist of
websites suitable for children. Under Filter, enter the domain name components you want to
permit. If, for example, you want to permit access to a website with child-friendly content, you can
enter e.g. www.elefanti.de and thus permit access to this website. Now indicate in the Description
field what is contained on this website (e.g. Elefanti - child-friendly website) and enter the site's
exact web address under Link to website. The description and the link to the website are important
if, for example, your child tries to access a website that you have not permitted. Instead of an error
message, an HTML website will appear in the browser listing all the websites on the whitelist and a
description. This allows your child to directly access the websites he or she is permitted to visit.
Once you have added all the entries, click Add and the whitelist will be updated to include these
details.
?
The filter also searches for parts of domain names. The results can
vary depending on what you enter in the filter. Broader or stricter criteria
can be useful here, depending on the website.
Monitor Internet usage period
This allows you to define for how long and at what times the selected user can access the Internet.
To do this, check the box next to Monitor Internet usage period. You can now specify how long
the user can access the Internet in total per month, how long per week and how many hours on
particular days of the week. This means that e.g. weekends for school children can be handled
differently from weekdays. You can simply set the relevant periods under Days/hh:mm, where for
example the entry 04/20:05 would mean permission to use the Internet for 4 days, 20 hours and 5
minutes.
?
When there are conflicting details about Internet use, the smallest
value is always used. So, if you set a time limit of four days per month,
but a weekly limit of five days, then the software will automatically limit
Internet usage to four days.
If users try to access the Internet beyond their permitted amount of time, an information screen
appears telling them that they have exceeded their allotted time.
Block periods
With the Block periods button, you can open a dialogue box where you can completely block
certain time periods during the week - in addition to limiting the computer usage. The blocked time
periods are shown in red; the allowed time periods are shown in green. In order to allow or block a
time period, simply highlight it using the mouse. A context menu then appears next to the cursor in
which you have two options: Approve period and Block period. If users try to access the Internet
during the blocked periods, an information screen will appear in the browser informing them that they
do not have Internet access during that period.
© 2010 - Lavasoft
48
Ad-Aware Total Security
Monitor computer usage period
This allows you to define for how long and at what times the selected user can access the Internet.
To do this, set the checkmark for Monitor computer usage period. You can now specify how long
the user may use the computer for in total per month, how long per week and how many hours on
certain weekdays. This means that e.g. weekends for school children can be handled differently from
weekdays. You can simply set the relevant periods under Days/hh:mm, where for example the
entry 04/20:05 would mean permission to use the computer for 4 days, 20 hours and 5 minutes. You
can use the Display warning before time expires button to automatically inform the user shortly
before the computer is shut down so that he/she can save his/her data beforehand. Otherwise data
losses may occur if the computer is shut down without warning.
?
With regard to computer usage entries, it is always the smallest value
that is used. That means, if you specify a restriction of four days for the
month but allow e.g. five days during the week, the software
automatically caps the user's computer usage at four days.
Block periods
With the Block periods button, you can open a dialogue box, where you can, in addition to limiting
the computer usage, completely block certain time periods during the week. The blocked time
periods are shown in red; the allowed time periods are shown in green. In order to allow or block a
time period, simply highlight it using the mouse. A context menu then appears next to the cursor in
which you have two options: Approve period and Block period. If a user attempts to use the
computer during the blocked time periods or after his time limit has been reached, he will not be
allowed to log on.
Personal filters
In this area you can modify the whitelists (permitted content) and blacklists (prohibited content) you
have compiled and create entirely new lists manually. List types differ fundamentally from one
another, as described below:
Whitelist: If you set up a whitelist for one of the users selected above, the relevant user can only
view websites specified in this whitelist. The Master data area allows the administrator to set up
the whitelist according to his/her wishes or to select an appropriate list for a user from a number of
predefined whitelists. A whitelist is particularly suitable for allowing younger children restricted
Internet access, enabling them to use websites with beneficial educational content only.
Blacklist: A blacklist allows you to block access to selected websites for a specific user.
Otherwise, the user has free access to the Internet. Please note that this function allows you to
block specific pages but that identical content may still be accessible on other websites. In this
regard, a blacklist of Internet addresses can never provide complete protection against unwanted
content.
?
You cannot run a whitelist simultaneously with a blacklist since, by
definition, a whitelist already imposes the strictest possible access
restrictions.
The following buttons can be used to edit the exclusion lists:
Delete: The Delete function enables you to delete the selected lists quickly and easily with your
mouse.
New: Use this to set up a completely new blacklist or whitelist. The procedure for using this
function is the same as that described in the sections entitled Prohibited content and
Permitted content .
Edit: This allows you to modify the contents of an existing list.
© 2010 - Lavasoft
Parental controls
49
Logs
In the log area, you as the administrator have an overview of all attempts made by other users to call
up blocked content. For that purpose you have to select a user from the list at the top of the screen
to display his/her specific log.
?
You can also delete these logs using the Delete log button.
Options (Parental controls)
You can change basic software settings under Options. Simply click the tab with the setting options
you wish to change.
Log
Here you can change the basic settings for information shown in the Log area (see section Logs). In
this manner, you can specify whether violations of allowed and/or forbidden content should be logged
or not. If contents are logged, you can view the logs of different users in the log area.
?
Since log files grow considerably during regular use, you can have the
Parental Controls setting Alert when file reaches ___ KB remind you
that the log file has exceeded a certain size, and then delete it
manually in the Log area, under Delete logs.
© 2010 - Lavasoft
50
Ad-Aware Total Security
Tuner
Using the tuner makes optimization of your operating system effortless and uncomplicated. From
automatically memorizing Windows updates, through regular time-controlled defragmentation, to
regular removal of unnecessary registry entries and temporary files, the tuner is your handy tool for
making your Windows system much faster and more manageable. You will be shown when the last
tuning operation occurred. The Configure entry can be used for creating settings for tuning and
starting the tuning process.
Configure
On the left side of the program interface, you'll see a number of options to launch the different
program areas of the software. These different areas will be explained in detail in the following
sections. Furthermore, in the upper menu bar of the program interface under Options you will find
comprehensive functional and settings options.
Status
In the Status area, you can get an overview of all the key information for running the tuner software.
The following information is available in the Status area. Active elements are displayed in green while
inactive elements are displayed in gray:
Active profile: This option allows you to define various tuning profiles (such as security,
performance, or data protection tuning) so that they can be implemented independently of one
another. If you do not define different profiles, the standard profile is displayed. You can create
individual profiles in the Configuration program area.
Last run: This shows when the tuner software was last run. Both automatic and manual runs are
shown here. To directly start a tuning process, simply click the entry Last run or the Run button.
The software then immediately checks your system and optimises it according to the
configurations which you set in the Configuration program area. During the tuning process, an
information window appears which shows the tuning functions currently being run. As soon as
tuning has ended, this message will disappear. When the tuning process is being performed, a
status bar indicates the progress of the activity. This status bar can be seen in the status area
and the configuration area.
Changes made: The number of system changes made to date during tuning is listed here.
Double-click on this entry to reset the changes counter.
Scheduled tuning runs: If you define an automated scheduled system check in the Schedule
area, your computer will be regularly optimised at intervals you specify. If you don't want the tuning
process to run automatically, you can either click on Schedule and delete or disable the relevant
tuning job or temporarily disable all planned tuning tasks by clicking on the Run scheduled
tuning processes entry. The entry will then be shown as disabled. To restart the automatic run,
simply click on this entry again.
Active tuning function: The Active tuning function field indicates which components are
currently being optimised and/or checked during the tuning process. This window disappears
automatically once the tuning process is complete.
© 2010 - Lavasoft
Tuner
51
Configuration
In the Configuration area you can select all the modules that the tuner should use for a tuning
process. Selected modules are then either started automatically as a scheduled event (see
Schedule) or manually, by going to the Status area and clicking the Run button. To activate a
module simply double-click it. Using the All button you can activate every module in a specific
category (e.g. security, performance or data protection). You can use the None button to
deactivate all the modules, and with the Toggle button you can deactivate all active modules and
activate all inactive modules. The Test run button allows you to determine which changes the tuner
would make during a tuning process, without the changes actually being performed. Following a test
run, a screen appears in which the upcoming changes are documented. If you click OK, these
changes will actually be made. If you click Close however, none of the system changes suggested
by the test run are implemented. You can use the Details button to view a detailed log of the
suggested changes selected using the mouse. Furthermore, you can export this as a TXT file using
the Save button.
Define profile
This option allows you to define various tuning profiles (such as
security, performance, or data protection tuning) so that they can be
implemented independently of one another. If you do not define different
profiles, the standard profile is displayed. To configure a new profile,
simply click the Add profile button. A window then opens in which you
can enter a name (e.g. Security tuning or the like) for the new profile.
All the changes that you make when selecting the modules are saved
so that you can perform very specific tuning runs.
To delete a profile, select the profile and then click the Delete button.
The standard profile cannot be deleted.
Security
Various functions that download data automatically from the Internet are only of use to the provider
and have no benefit for you. These functions may often leave you vulnerable to malware. With these
modules you can protect your system and keep it up-to-date.
Performance
Once installation is complete, temporary files (such as backup copies, log files or installation data
that are no longer required) occupy hard disk space, only slow down your hard disk and use up
valuable memory capacity. Moreover processes and file links that are no longer required can
significantly slow down your system. You can use the modules listed here to remove this
superfluous load from your computer and speed the computer up.
Data Protection
This provides a summary of the modules that ensure your data is protected. Traces that are created
unintentionally while surfing or using the computer in general and that contain a lot of information
about your user behavior, or even important data and passwords, are deleted here.
© 2010 - Lavasoft
52
Ad-Aware Total Security
Undo
The software creates a Restore point each time a change is made. If one of the executed tuning
actions leads to unwanted results, you can undo this action and restore your system to the status
before the respective change. To do this, simply use your mouse to select the area up to the point
where you wish to perform the Restore operation and then click the Restore button.
?
Here you may deliberately select only those areas from the most
recent change, up to the last specified restore point as the maximum.
Since system optimization and system cleaning operations are
cumulative, you cannot, for example, select an intermediate restore
point from the sequence on its own. Performing a restore without
taking account of subsequent changes would lead to system-related
problems.
?
By using the Delete all button you can delete all Ad-Aware Total
Security restore points. Automatic system recovery is subsequently no
longer possible. Since only a small amount of memory is required for
restore data and you are provided with the opportunity in the Options
area to have restore points deleted automatically after a certain period,
you should avoid manual deletion of restore points as a rule.
Schedule
In this area, you can define automatic scheduled system checks. Use the Edit button to change an
existing scheduled system check. Use the Start now button to perform a tuning job immediately,
irrespective of time specifications. Simply click the New system check button and enter all
necessary details in the wizard that appears.
?
If you want to delete a scheduled automatic system check instruction,
right-click the entry and select Delete from the context menu which
appears.
Name
Enter a meaningful name for the new system check in the Name area (e.g. daily system check).
Profile
In this area you can select one of the profiles you have created in the Configuration area for the
respective tuning job.
Scheduling
The Scheduling tab allows you to specify when the automatic tuning job should run and how often.
You set up the default schedule under Run and then specify in more detail by entering the Time.
?
© 2010 - Lavasoft
Under Daily, you can use the Weekdays settings, for example, to
specify that the computer should only carry out the tuning on workdays
or just every other day, or on weekends only, when it is not being used
for work. To change the time and date under Time, simply highlight the
item you wish to change (e.g. day, hour, month, year) with the mouse
and use the arrow keys or the small arrow symbols to the right of the
input box to chronologically scroll within the relevant item.
Tuner
53
Logs
In the Logs area, you can find log files relating to all tuning processes. Here you can see in detail
which files have been deleted or modified, which user accounts and system areas have been
checked, and which entries in the registry have been changed. To view details relating to a specific
log, simply double-click the desired log, or highlight it and click the Open button. To manually delete
log files that are no longer required, use the Delete button.
?
In the Configuration area, you can also delete the log files
automatically.
Options (Tuner)
You can change basic software settings under Options. Simply click the tab with the setting options
you wish to change.
General
Here you can determine when obsolete data (e.g. old TEMP folders), restoration data (which the
tuner software creates when changes are made) and desktop shortcuts (if they have not been used
for a corresponding number of days) are supposed to be deleted. Here you can also specify whether
or not the tuner is supposed to search the Internet automatically for current Windows updates and
Office updates.
?
Of course, the search for Office updates only works if Microsoft Office
is installed on the relevant computer.
The tuner is structured in such a way that it consistently logs information about any changes that
are made. If you think that a log file containing relevant information about what the tuner has deleted
is a security risk, you can suppress creation of such a deletion log by setting the checkmark for
Do not create log files with detailed information about the deleted items. In the Logs area,
this information is then displayed in non-detailed format.
You can use the Permanently delete temporary web browser files function to exclude web files
(such as cookies, temporary Internet files) from the restore option in the tuner i.e. you cannot
restore these files using the Undo program area.
?
By activating this function, you reduce the number of files that the tuner
has to manage in the Undo area considerably. This improves
performance.
Use the Automatic computer restart not permitted by the service option to prevent a possible
computer restart, which the tuner might otherwise need to perform for a scheduled tuning job. Since
the tuner would only perform a computer restart without asking when no user is logged on, it is
definitely recommended that this option is not activated in the majority of cases. If you are using a
Firefox browser, you can use the Restore standard rights for Firefox function to further improve
the security of the Firefox browser.
?
When you switch to standard rights, the Firefox browser always starts
with a security prompt from then on. Furthermore, the browser can only
save to folders with the same security level, i.e. you can only save data
from the Internet to a preconfigured download folder or the desktop.
© 2010 - Lavasoft
54
Ad-Aware Total Security
Folder protection
This tab lets you select specific folders (including your Windows partition) to protect old files from
automatic deletion. Just click the Add icon and select the corresponding folder or the desired drive.
To clear all the items from an Exceptions directory, select it in the
Temporary files area and then click the Delete button.
?
The tuner software finds temporary files based on the file extensions.
The following file types are defined as temporary files: file*.chk, *.tmp,
*.temp, *.gid, *.bak, *.sik and *.old.
?
Here you can define specific directories as exceptions. So, for
example, if you define C: as an exception, then all files in the top
directory level of C:\ (the root directory) will be protected. Temporary
files in the subfolders of this directory (e.g., C: > Windows or C: >
Data > Storage) will be searched for temp files and, if necessary,
completely cleaned, as normal.
File protection
You can use file protection to protect certain files from being deleted by the tuner, for example,
game scores for computer games or similar files with unusual file extensions, which could also be
interpreted as backup or temp files.
To protect specific files, click the Add button and enter the
corresponding file name. You can also use wildcards here.
?
Wildcards work as follows:
The question mark symbol (?) represents individual characters.
The asterisk symbol (*) represents entire character strings.
For instance, in order to protect all files with the file extension .sav,
enter *.sav. Or to protect files of various types that have identical initial
file names, enter e.g. text*.*.
Now choose the folder in which the files are to be protected by clicking
the Advanced button. Here you can now select the storage location
where the files to be protected are located. The Tuner now protects the
files thus defined in this folder only (e.g. only game scores in the
relevant games folder).
© 2010 - Lavasoft
Backup
55
Backup
As everyday life becomes increasingly digitalized, including the use of online music services, digital
cameras and e-mail, backing up your personal data becomes ever more important. Whether in case
of a hardware error, an accident or damage from viruses or hacker attacks, you should take care to
regularly backup your personal documents. Backup takes care of this job for you and protects your
most important documents and files so that you don't have to worry about them.
Configure
The software is designed to be self-explanatory and clearly laid out. Using various tabs which you
can select by clicking the icons displayed on the left, you can switch to the relevant program area
where you can perform actions, set defaults or review processes.
The following program areas are available
Status: In the status area you can see the current status of your data security measures.
Backup: In this area you can launch backups directly or create schedules for automatic backups.
Restore: Here you can restore files that you have backed up.
Actions: In the actions area you can use additional FTP and burn functions.
Logs: All the backup, administration and restore processes are logged by Backup. You can
access the logs here.
Additionally, you can find overlapping functions and settings in the menu bar at the top of the
program interface.
Options: Here you can change the backup program's basic settings to
suit your requirements.
?
Including online storage (1 GB)
When you register this software, Lavasoft will give you 1 GB of online
storage on an FTP server for your backups, for free. The FTP details
will automatically be entered in Backup's FTP window and you will be
able to store your most important data safely online, with password
protection if required. You'll find the necessary information about FTP
access data on the back of the user guide. If you bought your software
online, you'll receive the access data in a separate e-mail.
?
If you have multiple licenses you get 1 GB of free online storage
space for every license; for example, a triple license means you have 3
GB of space.
?
As long as you are getting Lavasoft virus updates, this FTP storage
space will remain available to you. If you terminate the contract, you
still have 30 days to remove the files from the Lavasoft Backup server.
After that, the data will be deleted.
Status
In the Status area you can see an overview of the current backup status. Here you can check when
the last backup was made and see when the next automatic backup is due to be run by the
program.
© 2010 - Lavasoft
56
Ad-Aware Total Security
Backup
In this program area, you can start a backup of your important data immediately or define an
automatic backup that makes backups of your data at regular intervals automatically. Simply
choose the files for backup, define a target (e.g. external hard disk or DVD-ROM drive) and click the
Start backup button.
You can choose between the options Standard backup and
Advanced backup, and you can toggle between them using the
respective icon at the top right.
Standard backup
In Standard backup you will find all the settings options in a single dialogue window. This is
recommended for making a quick backup of the most critical data.
Source files
Select the files here that should be included in the backup. Backup provides default parameters for
folders in which personal data in Windows is generally saved. In other words, you can perform a
backup of your images, your music, or even all of your most important files.
Images: If you set the checkmark here, Backup saves all types of files that contain images and
are found in certain folders.
Music: If you select this function, the software saves all types of files that contain music and are
located in certain folders.
Documents: You can also back up text documents having the most varied of formats.
Films: Film files of every format can also be backed up with Backup.
E-mail: The software also makes it possible to back up your e-mail. For this, the e-mail archives
of the e-mail programs that are found on your computer are saved.
Other file types: You can define other file types here if you use documents that you would like to
back up even though they do not have a standard file format.
Additional search folders: In general, Backup compiles a backup from the files and folders that
is generally intended for the storage of personal data by your operating system. If you still have
folders in another location that should be included in the backup, select them here. These folders
will then be automatically searched if you want to back up images, music, documents, etc.
Additional folders/files: If you would like to define entire folders or certain files for the backup
regardless of the selectable file types, you may do so here. Simply select the folders and files that
should be included by Backup.
?
© 2010 - Lavasoft
In the File selection area, you can click the plus (+) symbols to open
and select directories whose content is then displayed in the file view
(right). Each directory or each file which you check off is taken into
account during Backup. If not all files in a directory are checked, this
directory is marked with a gray checkmark.
Backup
?
57
In the Files types area you can also define individual file types in
addition to the specified file types. So, for example, if you also want to
back up other text documents in addition to Office documents, such as
documents in OpenOffice format, you can define individual file types on
the Files types tab using the Add button. So, for example, enter *.odt
here for OpenOffice documents. To exclude unnecessary document
formats from the backup, you can also select the desired file type
using the mouse and then click the Remove button.
Target
Here you can define the target or location to which Backup should save the backup copy of the files
and folders. The currently selected target is displayed. If you double-click on this option, a dialog
window opens in which you can define a new target. This can be a CD- or DVD-ROM drive, another
hard disk, a USB stick, other removable media or a directory on the network.
?
To store backups on the Lavasoft FTP server, please check the box
next to Copy archive to FTP servers.
If you cannot establish a connection to the FTP server, please use the
extended dialog box to enter the connection details you received
during online registration of Ad-Aware Total Security.
?
If you would like to write the data to a CD-ROM or DVD-ROM, Backup
will prompt you to insert a blank CD or DVD in the drive.
?
Please ensure that the backup is not made to the same disk that the
original data is located on. If this disk becomes defective, you will lose
both your original and your backup data. The best thing to do is to keep
the backup at a place that is spatially separate from the original files,
that is, on a USB hard disk or burnt to CD/DVD ROM in another room.
Schedule
You can automate backups here. If you click on this option, a dialogue window will open in which
you can define under Schedule how often a backup of your data should be carried out.
?
Warning: To be able to carry out scheduled backups at all, you must
check the box next to the Run job as option under User details in the
Options area and enter the access data for your Windows user
account there. This input is required so the backup can be scheduled
to run even when you are not logged on as a user.
Under Run, just enter how often, on which days, and at what time the backup should take place. A
backup of all data that you selected under Source files will be now made automatically according to
the frequency you entered.
?
Warning: Automatic backups do not work with CD-ROMs or DVDROMs since user intervention may be required for changing a blank
disk.
© 2010 - Lavasoft
58
Ad-Aware Total Security
In the Delete older archives section you can define how to use Backup with backups that already
exist. Backup archives your data to a separate individual file with the file extension ARC. Having
existing backups that have not been overwritten naturally increases the security of your data since,
in the event that the current archive should be corrupted, an older archive is available so you do not
lose all the data. In general, however, archives require a lot of space on data carriers, so you should
beware that you do not accumulate too many archive files. It is a good idea to set a maximum
number of backups to store on your backup medium under retain full backups. The oldest archive
will then be replaced by the current archive.
Partial backups
Partial backups serve to speed up data security. Instead of using all data for a backup, a partial
backup adds to an existing full backup and only backs up data that has changed since the last full
backup. This way you still get a complete backup of your data set, but the backup process itself is
significantly faster. If you want to use partial backups, check the box next to Create partial
backup(s) and enter the frequency with which the backup should be run.
?
A disadvantage of partial backups is the comparatively greater storage
space requirement, as data in the full backup that is no longer required
will not be directly deleted. However, after the next full backup, the full
and partial backup datasets will be synchronised and the data volume
will again be the same as for a full backup.
Advanced backup
An advanced backup is supported by a wizard and is more comprehensive. Here you can define
various independent backup jobs and so, for example, carry out a backup of your music collection
every month while backing up important text documents on a daily basis. To start the backup job
set-up wizard, please click on the New button.
File selection
A window now opens in which you can highlight the files and folders you want to save. Just put a
check mark in front of the relevant folder or file.
?
In the File selection area, you can click the plus (+) symbols to open
and select directories whose content is then displayed in the file view
(right). Each directory or each file which you check off is taken into
account during Backup. If not all files in a directory are checked, this
directory is marked with a gray checkmark.
?
Unlike the Standard backup, which automatically selects the most
important user data, with Advanced backup you have to know where
you have saved your data and files. You can usually find the My
Pictures folder under e.g. Local Disk (C:) > User > [user name] >
Images.
© 2010 - Lavasoft
Backup
59
Select target
Here you can define the target or location to which Backup should save the backup copy of the files
and folders. This can be a CD- or DVD-ROM drive, another hard disk, a USB stick, other removable
media or a directory on the network.
?
To store backups on the Lavasoft FTP server, please set the
checkmark for Copy archive to FTP server.
If you cannot establish a connection to the FTP server, please use the
extended dialogue box to enter the connection data you received
during the online registration of Ad-Aware Total Security.
?
If you would like to write the data to a CD-ROM or DVD-ROM, Backup
will, of course, prompt you to insert a blank CD or DVD in the drive.
?
Please ensure that the backup is not made to the same disk that the
original data is located on. If this disk becomes defective, you will lose
both your original and your backup data. The best thing to do is to keep
the backup at a place that is spatially separate from the original files,
that is, on a USB hard disk or burnt to CD/DVD ROM in another room.
Schedule
You can automate backups here.
?
Warning: To be able to carry out scheduled backups at all, you must
check the box next to the Run job as option under User details in the
Options area and enter the access data for your Windows user
account there. This input is required so the backup can be scheduled
to run even when you are not logged on as a user.
Under Run, just enter how often, on which days, and at what time the backup should take place. A
backup of all data that you selected under Source files will now be made automatically according to
the frequency you entered.
?
Warning: Automatic backups do not work with CD-ROMs or DVDROMs since user intervention may be required for changing a blank
disk.
In the Delete older archives section you can define how to use Backup with backups that already
exist. Backup archives your data to a separate individual file with the file extension ARC. Having
existing backups that have not been overwritten naturally increases the security of your data since,
in the event that the current archive should be corrupted, an older archive is available so you do not
lose all the data.
In general, however, archives require a lot of space on data carriers, so you should beware that you
do not accumulate too many archive files. It is a good idea to set a maximum number of backups to
store on your backup medium under retain full backups. The oldest archive will then be replaced
by the current archive.
© 2010 - Lavasoft
60
Ad-Aware Total Security
Partial backups
Partial backups serve to speed up data security. Instead of using all data for a backup, a partial
backup adds to an existing full backup and only backs up data that has changed since the last full
backup. This way you still get a complete backup of your data set, but the backup process itself is
significantly faster. If you want to use partial backups, check the box next to Create partial
backup(s) and enter the frequency with which the backup should be run.
?
A disadvantage of partial backups is the comparatively greater storage
space requirement, as data in the full backup that is no longer required
will not be directly deleted. However, after the next full backup, the full
and partial backup datasets will be synchronised and the data volume
will again be the same as for a full backup.
Options
You can change general archive options in the Options area. In general, you do not have to make
any changes here since the Ad-Aware Total Security default options cover most application
scenarios.
General archive options
In the General archive options, you have the following settings options:
Directory for temporary files: Temporary files are data that a backup only writes to your hard
disk temporarily. If there is insufficient space on your standard partition, this is where you can
change the partition and the temporary storage location for these files.
Limit file size of archive: If you store archives on CD, DVD ROM or other writeable media, it is
important that Backup limits the size of the archive files. Here, you can choose from default sizes
enabling you to retrospectively store the archive data on CD, DVD or Blu-ray discs. When the
archive reaches the maximum size specified here, it is split and the backup information is spread
across two or more archive files.
Delete temporary archives: This option should generally be enabled. After a certain number of
backup operations, temporary archives require a lot of space on your hard disk and are no longer
needed after their temporary use.
Copy restore program: If you activate this function, a program is also installed in the storage
area of your data backup that you can use to restore your data without using installed backup
software. To use this function, start the AVKBackup program or AVKBackup.exe from the CD/
DVD ROM.
Check files for viruses before archiving: If the Anti-Virus module is installed, you can check
your data for viruses before it is stored in the backup archive.
Check archive after creation: The purpose of this function is to check the archive for
completeness and correctness once it has been created.
Encrypt archive: If you want to protect archived files from external access, you can assign a
password to them. In this case, the data can only be restored with this password. You should
memorize this password or write it down and put it somewhere safe. Then your archive data
cannot be restored without the password.
Integrity test with differential backup: The purpose of this function is to check a partial
backup for completeness and correctness once it has been created.
Check source/destination drive on same hard disk: If you set this checkmark, Backup
checks whether you are accidentally trying to create a backup on the same data medium on
which the original data is located. Such a backup is possible in principle, but since both the
source and the backup data would be lost if this data medium was lost or destroyed, this would be
pointless and dangerous.
© 2010 - Lavasoft
Backup
?
The restore program is only copied with it onto CD/DVD ROM. This is
not the case for backup copies to removable media (USB stick,
external hard disk).
?
If you have installed the Backup software on the computer on which the
restore is supposed to take place, please do not execute the restore
by using the restore program on CD/DVD ROM but by using the
function Import archive.
61
User details
To run scheduled backups, set the checkmark in the Options area under User details for the Run
job as entry and enter the access data for your Windows user account there. This input is required
so the backup can be scheduled to run even when you are not logged on as a user.
Compression
In the Compression area, you can determine if your archives should be strongly or weakly
compressed.
Good compression: The data is strongly compressed for the backup. This saves you backup
storage space, but the backup itself will take longer.
Balanced compression: The backup is not as strongly compressed, but it will be executed more
quickly.
Fast execution: Data is not compressed, so the backup is executed quickly.
Exclude files
Backup usually saves files on the basis of their file format. On your computer system, however,
corresponding file formats also exist in areas that are managed automatically and are not relevant for
backup because the respective files are only stored temporarily (e.g. to speed up the display of
pages from the Internet). To ensure that Backup does not unnecessarily archive these files as well,
you can exclude them by setting the corresponding checkmark.
Temporary directory with files: If this option is selected, the temporary folders (... Documents
and Settings > "User" > Local Settings > temp) plus any subfolders and files they contain are
excluded from the backup.
Temporary Internet directories with files: If this option is selected, the folders for saving web
pages (... Documents and Settings > "User" > Temporary Internet Folders) and the subfolders
and files they contain are excluded from the backup.
Thumbs.db: If this option is selected, the Thumbs.db files created automatically by Windows
Explorer will be excluded from the backup. These files are used to manage thumbnails for
slideshows, for example, and are generated automatically from original images.
Temporary files (file attribute): If this option is selected, files with the system-assigned file
attribute temporary are not included in the backup.
System files (file attribute): If this option is selected, files with the system-assigned file
attribute system file are not included in the backup.
You can use the Exclude file types function to define file extensions that should be excluded from
your backup. To do so, proceed as follows: Under File type (e.g. *.txt), enter the file extension or
file name that you want to exclude. Now click OK. Repeat this process for all other file types and file
names that you want to exclude, e.g. picasa.ini, *.ini, *bak etc. The asterisk and the question
mark can be used as wildcards here.
© 2010 - Lavasoft
62
Ad-Aware Total Security
?
Wildcards work as follows:
The question mark symbol (?) represents individual characters.
The asterisk symbol (*) represents entire character strings.
For instance, in order to check all files with the file extension .exe,
enter *.exe. To check e.g. files with different spreadsheet formats (e.g.
*.xlr, *.xls), simply enter *.xl?. To check e.g. files of various types that
have identical initial file names, enter text*.* for example.
Reset to current default options
By clicking the Reset to Current Default Options button, you accept the
options that you have defined as the standard options in the Options
item in Ad-Aware Total Security's menu bar. If you want special
options for a certain backup job, set these up accordingly. If so, you
should of course not press the Reset to current default options
button.
?
This function is only available if you are setting up special options for
individual backup jobs in the wizard for an Advanced backup .
Reset to Ad-Aw are default options
By clicking the Reset to Ad-Aware Default Options button, you accept
the options that have been defined as the standard options for Backup.
That is, if you accidentally entered incorrect options for creating
backups and you do not know how to correct them, click the Reset to
Ad-Aware default options button.
?
This function is only available if you set the options globally, e.g. for a
Standard backup using the Options button in the menu bar.
Restore
In the Restore area you can restore original files from your backup data in the case of data loss. As
in the Backup area, there is also a Standard backup and Advanced backup area here.
Standard backup: If you used the Standard backup option when backing up your data, you will
find it very simple to restore your data from the Restore area under Standard backup.
Advanced backup: If you backed up your data using the Advanced backup function, you will
also have advanced options in the Restore area. Here you can go back to imported archives and
select which version of the backup you want to use when performing a backup.
Restore job
If you have selected a data backup and clicked the Restore button, you will be asked whether you
want to restore all files (Restore all files from the archive) or only selected files (Only restore
selected files from the archive). Make your selection here.
Select target
In the following dialogue box you can specify whether the data is to be restored to the exact same
point from which the backup was made or if you want to store the files in a special folder. We
usually recommend the Restore files to original directories setting. Under Password enter the
© 2010 - Lavasoft
Backup
63
access password, if you have compressed your data backups as password protected when you
saved. Under Overwrite existing files you can specify how Backup proceeds with files that still
exist at the original location when restoring a data backup. The following configuration options are
available:
Always overwrite: In this setting, the files from the data backup are always seen as more
important than the data that is still in the original directory. If you set a checkmark here, any data
that may remain is completely overwritten by the data in the archive.
If the size has changed: With this setting, existing data in the original directory is only
overwritten if the original file has been changed. Files where the size remains unchanged are
skipped. This means the data might be restored more quickly.
If the 'modified on' time in the archive is more recent: Here, files in the original directory are
always replaced with copies from the archive if they are newer than the data in the archive. This
may also speed up the data restore because it is possible that only changed data, rather than all
files, have to be restored.
If the 'modified on' time has changed: Here, the data in the original directory is always
replaced if the modification date has changed compared to the archived files.
Then click Finish. Your data will now be restored to the specified location.
Actions
You can manage and maintain your data backups and more in this area. The following tools are
available for this purpose:
Administer online archives
If you backup your most important data online on the Lavasoft FTP server, Backup will of course
need the appropriate access data. Here, you can enter the server name, port, user name,
password and directory that you were given when you registered with the Lavasoft Update Server.
?
Registering your Lavasoft product is described in detail in the
Internet update section.
FTP brow ser
Simply enter your FTP access data to gain access to your Lavasoft FTP server. This data was sent
to you by e-mail, when you registered your product online. For more information, see the section
entitled Internet update. Using the FTP browser you can now perform the following actions:
Connect: If the connection to the FTP browser was lost, you can
reactivate it here.
Disconnect: You can use this function to terminate the connection to
the FTP browser.
New folder: If you want to store your backups in different folders (e.g.
only special folders just for music backups), you can use this function
to create folders in your FTP storage area.
Delete: This function enables you to delete folders or archives you no
longer need.
Update: If you have performed another update while using the FTP
browser, you can display the new data by pressing the Update button.
Download: You can use this function to copy archives selected using
your mouse from the FTP server to any location on your computer.
© 2010 - Lavasoft
64
Ad-Aware Total Security
Upload: You can use this function to retrospectively save archives
generated using Backup on your FTP server.
Burn archive to CD/DVD retrospectively
You can burn backup files to CD or DVD at a later date. To do this, simply choose the project you
want to burn in the dialogue box displayed and then click the Continue button. Choose which drive
you want to burn the data backup on.
Check data after burning: If you set a checkmark here, the burned data is checked again after
the process of burning. This takes a bit longer than a burning process without a check but is
generally recommended.
Copy restore program files: If you activate this function, a program is also installed in the
storage area of your data backup that you can use to restore your data without using installed
backup software. To use this function, start the AVKBackup program or AVKBackup.exe from
the CD/DVD ROM.
Click the Burn button to start the burning process. Once the burning process is complete, the
backup CD/DVD is ejected automatically.
?
Of course, the backup data is not deleted from the original data
medium after the burning process. Retrospective burning to CD/DVD is
an additional backup.
?
You can use the Import archive function to integrate archives on
external data carriers such as CD or DVD back into the Backup file
management system.
Import archive
To restore archives and data backups located on a drive that is not managed by Backup, please use
the Import archive function. Here, a dialogue box opens in which you can search for the required
archive files with the extension ARC, e.g. on a CD, DVD or on the network. Once you have found the
archive you want, please set a checkmark and then click the OK button. A message window tells
you that the archive has been imported successfully. If you then want to use this archive to restore
data, simply go to the Restore area of Backup, select the backup you want and start the restore.
?
Archive files created by Backup have the file extension ARC.
Logs
The Logs area provides a comprehensive log file for every action and every backup job. Here you
can open individual actions by double-clicking on them and print them out as required or save them
as text files.
Options
You can change basic software settings under Options. You may define these options either
individually for the respective backup job or globally as a default setting for all the backup jobs.
Options are explained in detail in the section Options .
© 2010 - Lavasoft
What happens when my license expires?
65
What happens when my license expires?
A few days before your license expires, an information window appears in the task bar. If you click
this, a dialogue window opens in which you can extend your license without a problem and in a few
steps. Simply click on the Buy now button to renew.
You can also renew your license by clicking the This Link.
© 2010 - Lavasoft
66
Ad-Aware Total Security
Tips for installation
Here you can find further information about the installation and registration of Ad-Aware Total
Security.
Boot scan prior to installation
The boot scan will help you fight viruses that have embedded themselves prior to installation of the
anti-virus software on your computer and that may prevent Ad-Aware Total Security from being
installed. If you bought Ad-Aware Total Security with a Boot CD, it can be run before the start of
Windows.
?
What is meant by booting up?
When you switch on your computer, the Windows operating system
will normally start up automatically. This process is called booting.
However, it is also possible to run other programs automatically instead
of your Windows operating system. To scan your computer for viruses
before Windows starts up, a Boot CD is needed.
?
How do I cancel a boot scan?
If you restart your computer and a special Ad-Aware interface appears
instead of the usual Windows environment, there is no cause for alarm.
If you have not planned a boot scan, just use the arrows to select the
Microsoft Windows entry and click on return. Windows will now start
normally, without first carrying out a boot scan.
If you want to run a boot scan, proceed as follows:
1a
Boot scan using the program CD: Use the Ad-Aware Total Security
CD to boot up your computer. - Insert the Ad-Aware Total Security
CD into the drive. In the start window that opens, click Cancel and turn
off the computer.
1b
Boot scan with Ad-Aware Total Security that you have
downloaded from the Internet: You can burn a new boot CD via the
Create Ad-Aware Total Security boot CD entry in the Ad-Aware
Total Security program group. - Insert the boot CD you have burnt
into the drive. In the start window that opens, click Cancel and turn off
the computer.
After this first step the boot scan in all three scenarios will proceed identically:
2
© 2010 - Lavasoft
Restart the computer. The Ad-Aware Total Security boot scan start
menu will appear.
Tips for installation
3
Use the arrow keys to choose the Ad-Aware Total Security boot CD
option and confirm your choice with Enter. A Linux operating system is
now started from the CD and a Ad-Aware Total Security special
version for boot scans appears.
?
If you are having problems with the program interface display, restart
your computer and choose the Ad-Aware Total Security boot CD –
alternative option.
4
The program will now suggest updating the virus definitions (or virus
signatures).
5
Click Yes and perform the update. As soon as the data has been
updated via the Internet, you see the message Update complete. Now
exit the update screen by clicking the Close button.
?
The automatic Internet update is available if you are using a router
that assigns IP addresses automatically (DHCP). If the Internet update
is not available, you can still perform the boot scan using old virus
signatures. However, in that case, you should perform a new boot scan
with updated data as soon after installing Ad-Aware Total Security as
possible.
6
You will now see the program interface. Click the Check computer
entry to check your computer for viruses and malware. Depending on
the type of computer and size of the hard drive, the boot scan can take
an hour or more.
7
If Ad-Aware Total Security finds any viruses, please use the option
provided in the program to remove them. Once the virus has been
removed successfully, the original file is available again.
8
Once the virus check is complete, leave the system by clicking the
Exit button and then choosing Restart.
67
© 2010 - Lavasoft
68
Ad-Aware Total Security
The Exit button is located on the bottom right of the program interface.
9
Take the Ad-Aware Total Security CD out of the drive as soon as the
drive tray opens.
10
Switch off your computer again and restart it. Your computer will now
start with your standard Windows operating system again, and you can
be certain of being able to install the regular Ad-Aware Total Security
on a virus-free system.
?
What do I do if my computer will not boot from the CD-ROM?
If your computer will not boot from the CD/DVD-ROM, you may need to
set this option up first. This is done in the so-called BIOS, a system
that is automatically started before your Windows operating system. To
make changes in BIOS, proceed as follows:
1. Switch your computer off.
2. Restart your computer. Usually you reach the BIOS setup by
pressing the DEL button as the computer is booting up (and
sometimes the F2 or F10 button as well).
3. How to change individual settings in your BIOS setup varies from
computer to computer. Please consult your computer's
documentation. The result should be the boot sequence CD/DVDROM:, C: , meaning that the CD/DVD-ROM drive becomes the 1st
boot device and the hard disk partition with your Windows operating
system on it becomes the 2nd boot device.
4. Save the changes and restart your computer. Your computer is now
ready for a boot scan.
Customized setup or full installation?
A full setup applies the settings that make sense for the majority of users. Just click on the module
you want and select whether it should be installed or not.
A drive icon will show you that the module is being installed.
A delete icon will show you that the module cannot be installed.
?
You can also install or uninstall software components later. To do so,
simply run the installation again and activate or deactivate the modules
you want (or do not want) using the custom setup.
Invalid registration number?
If you have problems entering your registration number, please check for correct entry. Depending
on the font used, a capital "I" (for India) is often misread as the number "1" or the letter "l" (for Lima).
The same applies to: "B" and "8", "G" and "6", "Z" and "2".
© 2010 - Lavasoft
Tips for installation
69
Access data invalid or missing?
A
Please check that the access data has been entered correctly.
Please note the case-sensitivity; the access data does not contain
spaces.
B
If you have lost or forgotten your access data, go to the login page and
click on the Access data misplaced? entry. A website opens where
you can enter your registration number again. When you have done so,
your access data will be re-sent to the e-mail address you entered
during registration.
C
If your e-mail address has changed in the meantime, please contact
Lavasoft Support.
Can I use my old access data to obtain updates on a new
computer?
Yes. In this event, the update server establishes its connection with the new computer - from then on
the old computer can no longer obtain updates.
Notes on uninstalling
If you intend to uninstall Ad-Aware Total Security sometime in the future, the easiest way to do
this is by clicking on the Uninstall button in the Ad-Aware Total Security program group. The
uninstall then takes place automatically. Alternatively, you can also uninstall the program using the
Windows Control Panel.
Windows XP: Click Start on the Windows taskbar and selectSettings > Control Panel >
Software. You can then use your mouse to highlight Ad-Aware Total Security on the Install/
Uninstall tab. Then, click the Add/Remove button to run the uninstall process.
Windows Vista, Windows 7: On the Windows taskbar click on the start icon (normally at the
bottom left of your screen) and select the Control Panel folder. Here you will find the option
Programs > Uninstall a program. Select Ad-Aware Total Security from the list and then click
Uninstall to initiate the uninstall process.
If you still have files in the Quarantine area of Ad-Aware Total Security during the uninstall, you
will be asked whether or not these files should be deleted. If you do not delete the files, they remain
encrypted on your computer in a special Ad-Aware Total Security folder and are therefore
incapable of causing any harm. You can only use these files again by reinstalling Ad-Aware Total
Security on your computer. During the uninstall process, you will be prompted whether you want to
delete settings and logs. If you do not delete these files, the logs and settings will be available on
reinstallation of the software. Complete the uninstall process by clicking on the Exit button. The
software is now completely uninstalled from your system.
© 2010 - Lavasoft