Symantec Norton 360 Multi-Device, 5U Manuál Strana 235

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 618
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 234
checks for the infections that have processes running
in memory. It also checks for the infections that the
start-up files and folders refer.
If that does not work, read the information on the
Security History - Advanced Details window to
identify the types of files that cannot be repaired. You
can take one of the following actions, depending on the
file type:
You can view the file type of
the detected risk. This
information helps you to
decide the action that can be
taken depending on the file
type.
For example, you can view the
infected files with the
following file name
extensions (any file can be
infected):
1 .exe
1 .doc
1 .dot
1 .xls
Infected files
Replace using your operating
system disks.
Hard disk master boot record,
boot record, or system files
(such as IO.SYS or
MSDOS.SYS) and floppy disk
boot record and system files
235Responding to security issues
What to do if a security risk is found
Zobrazit stránku 234
1 2 ... 230 231 232 233 234 235 236 237 238 239 240 ... 617 618

Komentáře k této Příručce

Žádné komentáře