Warnings Tab; Rootkits Tab - AVG FILE SERVER 9.0 - REV 90.9 User Manual

Table of Contents

Advertisement

11.7.4. Warnings Tab

The Warnings tab displays information on "suspected" objects (typically files)
detected during scanning. When detected by the
blocked from being accessed. Typical examples of this kind of findings are: hidden files,
cookies, suspicious registry keys, password protected documents or archives, etc.
Such files do not present any direct threat to your computer or security. Information
about these files is generally useful in case there is an adware or spyware detected on
your computer. If there are only Warnings detected by an AVG test, no action is
necessary.
This is a brief description of the most common examples of such objects:
· Hidden files - The hidden files are by default not visible in Windows, and some
viruses or other threats may try to avoid their detection by storing their files
with this attribute. If your AVG reports a hidden file which you suspect to be
malicious, you can move it to your
· Cookies - Cookies are plain-text files which are used by websites to store
user-specific information, which is later used for loading custom website
layout, pre-filling user name, etc.
· Suspicious registry keys - Some malware stores its information into Windows
registry, to ensure it is loaded on startup or to extend its effect on the
operating system.

11.7.5. Rootkits Tab

The Rootkits tab displays information on rootkits detected during scanning if you have
launched the
Anti-Rootkit
A
rootkit
is a program designed to take fundamental control of a computer system,
without authorization by the system's owners and legitimate managers. Access to the
hardware is rarely required as a rootkit is intended to seize control of the operating
system running on the hardware. Typically, rootkits act to obscure their presence on
the system through subversion or evasion of standard operating system security
mechanisms. Often, they are also Trojans as well, thus fooling users into believing
they are safe to run on their systems. Techniques used to accomplish this can include
concealing running processes from monitoring programs, or hiding files or system data
from the operating system.
The structure of this tab is basically the same as the
tab.
A V G 9 .0 File Server © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
AVG Virus
scan.
Resident
Shield, these files are
Vault.
Infections tab
or the
Spyware
1 1 5

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FILE SERVER 9.0 - REV 90.9 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

9.0 file server

Table of Contents