Глоссарий 6 – Инструкция по эксплуатации ESET NOD32 Smart Security 5
Страница 4
........................................................................101
........................................................................102
........................................................................103
........................................................................103
........................................................................105
...........................................................................105
..........................................................................105
...........................................................................106
Интерфейс пользователя и работа в
приложении
..........................................................................106
Элементы управления программой
..........................................................................107
..........................................................................108
...........................................................................110
...........................................................................110
..........................................................................111
..........................................................................111
..........................................................................113
...........................................................................113
...........................................................................115
...........................................................................115
...........................................................................116
ESET SysInspector как часть ESET Smart Security
........................................................................117
...........................................................................117
...........................................................................117
Создание компакт-диска аварийного
восстановления
...........................................................................117
...........................................................................118
..........................................................................118
..........................................................................118
Противовирусная программа ESET
..........................................................................119
..........................................................................119
..........................................................................119
..........................................................................119
...........................................................................120
..........................................................................120
..................................................121
........................................................................121
...........................................................................121
...........................................................................121
...........................................................................122
...........................................................................122
...........................................................................122
...........................................................................123
...........................................................................123
Потенциально опасные приложения
...........................................................................123
Потенциально нежелательные приложения
........................................................................124
...........................................................................124
...........................................................................124
Атака путем подделки записей кэша DNS
...........................................................................124
...........................................................................124
...........................................................................125
...........................................................................125
...........................................................................125
........................................................................126
...........................................................................126
...........................................................................126
...........................................................................127
...........................................................................127
Распознавание мошеннических сообщений
..........................................................................127
..........................................................................128
..........................................................................128
..........................................................................128
..........................................................................128