Unisar 1.24.1867 User manual

Category
Antivirus security software
Type
User manual

This manual is also suitable for

User's Guide
Copyright © 2006 SOFTWIN
antivirus
antivirus
BitDefender Antivirus Scanner for Unices
User's Guide
SOFTWIN
Published 2006.04.27
Version 1.24.1867
Copyright © 2006 SOFTWIN
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage and retrieval system, without written
permission from an authorized representative of SOFTWIN. The inclusion of brief quotations in reviews may be
possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this
document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparation
of this document, the authors will not have any liability to any person or entity with respect to any loss or damage
caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of SOFTWIN, therefore SOFTWIN is
not responsible for the content of any linked site. If you access a third-party website listed in this document, you will
do so at your own risk. SOFTWIN provides these links only as a convenience, and the inclusion of the link does not
imply that SOFTWIN endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document
are the sole property of their respective owners, and are respectfully acknowledged.
BitDefender Antivirus Scanner for Unices
As every cat owner knows, nobody owns a cat.
BitDefender Antivirus Scanner for Unices
BitDefender Antivirus Scanner for Unices
Table of Contents
End User Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . ix
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
1. Conventions used in this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
1.1. Typographical conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
2. The book structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Description and features . . . .. . .. . . .. . . . . . .. . . .. . .. . . . .. . . . 17
1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.1. Why BitDefender? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.2. Data Security Division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.3. SOFTWIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2. Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.1. BitDefender Antivirus Scanner for Unices . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.2. Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3. The scanning mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Installation . . . .. . .. . . .. . . . . . .. . . .. . .. . . . .. . . .. . .. . . .. . . . . . .. 27
4. Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.1. System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.1.1. Hardware system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.1.2. Software system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2. Package naming convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2.1. Linux convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2.2. FreeBSD convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5. Package installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5.1. Getting BitDefender Antivirus Scanner for Unices . . . . . . . . . . . . . . . . . . . . 33
5.2. Test the package for integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5.2.1. Test the rpm and deb packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5.2.2. Test the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5.2.3. Test the FreeBSD tbz package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5.3. Install the package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.3.1. Install the rpm package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.3.2. Install the deb package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
v
BitDefender Antivirus Scanner for Unices
5.3.3. Install the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.3.4. Install the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5.4. The installer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
6. Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.1. Uninstall the rpm package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.2. Uninstall the deb package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.3. Uninstall using the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.4. Uninstall the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
6.4.1. Uninstall a package downloaded locally . . . . . . . . . . . . . . . . . . . . . . . 40
6.4.2. Uninstall from the ports collection . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Using BitDefender .. .. . . .. . .. . . . .. . . .. . .. . . . .. . . .. . .. . . . .. . 41
7. The configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8. Testing BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
8.1. Scan an executable file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
8.2. Scan an archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
8.3. Scan a mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9. Real life usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.1. Virus scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.1.1. Scan a regular file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.1.2. Scan a directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
9.1.3. Scan the entire system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
9.1.4. Scan the archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
9.1.5. Scan the mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
9.2. Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.2.1. Using the log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.2.2. Get more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.2.3. Display the virus list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.2.4. Display the product version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
9.3. Virus submission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
10. BitDefender integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
10.1. Desktop integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
10.1.1. Midnight Commander . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
10.1.2. KDE Konqueror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
10.1.3. Krusader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
10.1.4. ROX-Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
10.1.5. Pine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
10.1.6. Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
10.1.7. KMail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
10.2. Server integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
10.2.1. Qmail-Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
10.2.2. MailScanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
vi
BitDefender Antivirus Scanner for Unices
10.2.3. Amavisd-new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
11. Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
11.1. Triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
11.1.1. Run the triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
11.1.2. Regular updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
11.1.3. HTTP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
11.2. Manual update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
12. Product registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
12.1. Trial License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
12.2. License for home or personal use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
12.3. License for commercial use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
13. Best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Getting help . . . .. . .. . . .. . . . . . .. . . .. . .. . . . .. . . .. . .. . . .. . . . . . 81
14. Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
15. Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
15.1. Support department . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
15.2. BitDefender Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
15.3. Contact information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
15.3.1. Web addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
15.3.2. Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Manual Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
bdscan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
vii
BitDefender Antivirus Scanner for Unices
viii
BitDefender Antivirus Scanner for Unices
End User Software License Agreement
IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL
THE SOFTWARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY
INSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATING
YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF
THIS AGREEMENT.
These Terms cover the home-user or corporate BitDefender Solutions and Services
licensed to you, including the related documentation and any update and upgrade of
the applications delivered to you under the purchased license or under any related
service agreement, as defined in the documentation, as well as any copy thereof.
This License Agreement is a legal agreement between you (either an individual or a
legal person) and SOFTWIN for the use of the SOFTWIN software product identified
above, which includes computer software and services, and may include the associated
media, printed materials, and "online" or electronic documentation (hereinafter referred
to as "BitDefender"), all of which are protected by international copyright laws and
international treaties. By installing, copying or using BitDefender, you agree to be
bound by the terms of this agreement.
If you do not agree to the terms of this agreement, do not install or use BitDefender.
BitDefender License. BitDefender is protected by copyright laws and international
copyright treaties, as well as other intellectual property laws and treaties. BitDefender
is licensed, not sold.
GRANT OF LICENSE. SOFTWIN hereby grants you and only you the following
non-exclusive, limited, non-transferable and royalty-bearing license to use BitDefender.
The BitDefender Antivirus Scanner for Unices ("BitDefender") is subject to 3 types of
license:
1. Trial License. The product is distributed with a trial key which grants the user a
30 day trial period as of install time, under the terms of the license agreement. At the
end of the trial period, all scan- based product features (disinfect, delete) will be
disabled and the user will have to either go online to www.bitdefender.com and register
for a personal license or purchase a commercial license from any BitDefender reseller.
2. Home or Personal Use License. This license is free of charge and it can be
retrieved from the BitDefender website after filling in a short form. It only allows the
ix
End User Software License Agreement
product to be used for personal purposes, with no commercial implications whatsoever,
under the terms of the EULA. For example, under the Personal License, you are
allowed to scan your personal laptop or desktop computer but YOU ARE NOT
ALLOWED TO USE THE PRODUCT IN A BUSINESS ENVIRONMENT SUCH AS
AN OFFICE COMPUTER OR A COMPANY SERVER.
3. Commercial Use License. If you intend to use BitDefender with your own
integration system or pre-designed scripts, you must purchase the Commercial License.
The commercial license allows for the product to be used in any environment
whatsoever throughout the licensing period, under the terms of the EULA. Commercial
Licenses are granted on an individual user basis, which simply means that the cost
depends on how many users benefit from the features of the product.
LICENSE TERM. The license hereunder is granted as of the date BitDefender has
been purchased and until the end of the period for which such license has been
purchased.
UPGRADES. If BitDefender is upgrade labeled, in order to use it, you must hold a
SOFTWIN license allowing you to use products identified by such company as eligible
for upgrade. An upgrade labeled BitDefender product shall replace and/or supplement
the product based on which your were eligibile for such upgrade. You may use the
resulting upgraded product only in accordance with the terms of this License
Agreement. If BitDefender is an upgrade of a software package component which was
licensed to you as a single product, BitDefender may only be used and transferred as
part of that single product package and it may not be separated so as to be used by
more than the total number of licensed users. The terms and conditions of this license
shall replace and supersede any previous agreements that may have existed between
you and SOFTWIN regarding the original product or the resulting upgraded product.
COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyrights in
and to BitDefender (including but not limited to any images, photographs, logos,
animations, video, audio, music, text, and "applets" incorporated into BitDefender),
the accompanying printed materials, and any copies of BitDefender are property of
SOFTWIN. BitDefender is protected by copyright laws and international treaty
provisions. Therefore, BitDefender must be treated as any other copyrighted material.
The printed materials accompanying BitDefender shall not be copied. All copyright
notices shall be reproduced and included, in their original form, in all of the BitDefender
copies created, irrespective of the media or form in which BitDefender exists. The
BitDefender license shall not be sub-licensed, rented, sold, leased or shared. The
BitDefender source code shall not be reverse engineered, recompiled, disassembled,
no derivative works shall be created based on it, it shall not be modified, translated
and no attempts to discover it shall be made.
x
End User Software License Agreement
LIMITED WARRANTY. SOFTWIN warrants a 30 day fault free period for the media
on which BitDefender is distributed as of the date BitDefender has been delivered to
you. Any breach of this warranty shall only result in SOFTWIN replacing the faulty
media, at its sole discretion, upon receipt of the said media, or refunding the
BitDefender price. SOFTWIN does not warrant either the uninterrupted or error free
operation of BitDefender or the correction of possible errors. SOFTWIN does not
warrant that BitDefender will meet your requirements.
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, SOFTWIN DISCLAIMS
ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE
PRODUCTS, ENHANCEMENTS, MAINTENANCE THEREOF OR SUPPORT
RELATED THERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE)
OR SERVICES THAT IT HAS SUPPLIED. SOFTWIN HEREBY EXPRESSLY
DISCLAIMS ANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INTERFERENCE,
ACCURACY OF DATA, ACCURACY OF INFORMATIONAL CONTENT, SYSTEM
INTEGRATION, AND NON-INFRINGEMENT OF THIRD PARTY RIGHTS BY
FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY'S SOFTWARE,
SPYWARE, ADWARE, COOKIES, EMAILS, DOCUMENTS, ADVERTISEMENTS OR
THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING,
CUSTOM AND PRACTICE, OR TRADE USAGE.
DISCLAIMER OF DAMAGES. Anyone using, testing, or evaluating BitDefender shall
bears all risks as to the quality and performance of BitDefender. Under no
circumstances shall SOFTWIN be liable for any damages of any kind, including, without
limitation, direct or indirect damages arising out of the use, performance, or delivery
of BitDefender, even if SOFTWIN has been advised of the existence or possibility of
such damages.
SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY
FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION
OR EXCLUSION MAY NOT APPLY TO YOU.
UNDER NO CIRCUMSTANCES SHALL SOFTWIN'S LIABILITY EXCEED THE
PURCHASE PRICE PAID BY YOU FOR BITDEFENDER. The disclaimers and
limitations set forth above shall apply regardless of whether you accept to use, evaluate,
or test BitDefender.
IMPORTANT NOTICE TO USERS. THIS SOFTWARE IS NOT FAULT-TOLERANT
AND IT IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS
ENVIRONMENT REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. THIS
SOFTWARE IS NOT INTENDED FOR USE IN THE OPERATION OF AIRCRAFT
xi
End User Software License Agreement
NAVIGATION, NUCLEAR FACILITIES, OR COMMUNICATION SYSTEMS, WEAPONS
SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC
CONTROL, OR ANY APPLICATION OR INSTALLATION WHERE FAILURE COULD
RESULT IN DEATH, SEVERE PHYSICAL INJURY OR DAMAGE TO PROPERTY.
GENERAL. This Agreement shall be governed by the Romanian law and by the
international copyright regulations and treaties. The courts of Romania shall have
exclusive jurisdiction and venue to adjudicate any dispute arising from these License
Terms.
BitDefender prices, costs and use fees are subject to change without prior notice to
you.
In the event of invalidity of any provision of this Agreement, the invalidity shall not
affect the validity of the remaining portions of this Agreement.
BitDefender and the BitDefender logos are trademarks of SOFTWIN. All other
trademarks used in the product or in associated materials are property of their
respective owners.
Any breach of these terms and conditions shall result in the immediate termination of
this license, without any notice. You shall not be entitled to a refund from SOFTWIN
or any resellers of BitDefender as a result of such termination. Confidentiality terms
and conditions and restrictions on use shall remain in force even after termination.
SOFTWIN may revise these Terms at any time and the revised terms shall
automatically apply to the corresponding versions of the Software distributed under
such terms. None of these Terms being found to be void and unenforceable shall
affect the validity of rest of the Terms, which shall remain valid and enforceable.
In case of controversy or inconsistency between the translations of these Terms into
other languages, the English version issued by SOFTWIN shall prevail.
Contact SOFTWIN, at 5, Fabrica de Glucoza street, 72322-Sector 2, Bucharest,
Romania, or at Tel No: 40-21-2330780 or Fax:40-21-2330763, e-mail address:
xii
End User Software License Agreement
Preface
This User's Guide is intended to all who have chosen BitDefender Antivirus Scanner
for Unices as security solution for their systems. The information presented in this
book is suitable not only for computer literates, it is accessible to everyone who is able
to do administrative tasks on a Linux box.
This book will describe for you BitDefender Antivirus Scanner for Unices, the Company
and the team who built it, will guide you through the installation process, will teach
you how to configure it at the very detail. You will find how to use BitDefender Antivirus
Scanner for Unices, how to update, interrogate, test and customize it. You will learn
how to integrate it with various software and how to get the best from BitDefender.
We wish you a pleasant and useful lecture.
1. Conventions used in this book
1.1. Typographical conventions
Several text styles are used in the book for an improved readability. Their aspect and
meaning are presented in the table below.
DescriptionAppearance
Variables and some numerical data are printed
with monospaced characters.
variable
The URL links is pointing to some external
location, on http or ftp servers.
http://www.bitdefender.com
Emails are inserted in the text for contact
information.
This is an internal link, towards some location
inside the document.
Chapter 5 Package installation (p.
33)
File and directories are printed using monospaced
font.
filename
xiii
Preface
DescriptionAppearance
The environment variables are MONOSPACED
CAPITALS.
ENV_VAR
The emphasized text is specially marked to
require your attention.
emphasized
The quoted text is provided as reference.“quoted text”
Inline commands are printed using strong
characters.
command
Command examples are printed with strong
monospaced characters in specially marked
# command -parameter
environment. The prompt can be one of the
following.
# The root prompt. You should be root in
order to run this command.
$ The normal user prompt. You do not need
special privileges to run the command.
The screen output and code listings are printed
with monospaced characters in specially marked
environment.
screen output
1.2. Admonitions
The admonitions are in-text notes, graphically marked, offering to your attention
additional information related to the current paragraph.
Note
The note is just a short observation. Although you can omit it, the notes can provide
valuable information, such as specific feature or a link to some related topic.
Important
This requires your attention and is not recommended to skip over it. Usually, it provides
non-critical but significant information.
xiv
Preface
Warning
This is critical information you should treat with increased caution. Nothing bad will
happen if you follow the indications. You should read and understand it, because it
describes something extremely risky.
2. The book structure
The book consists of four parts, containing the major topics: Description and features,
Installation, Usage and Getting help. Moreover, a glossary and UNIX manual pages
are provided to clarify some different aspects of BitDefender, which could issue
technical problems.
Description and features. A short introduction to BitDefender. It explains who is
BitDefender, who is SOFTWIN and Data Security Division. You are presented
BitDefender Antivirus Scanner for Unices, its features, the product components and
the basics of the integration and the filtering mechanism.
Installation. Step by step instructions for installing BitDefender on a system. Starting
with the prerequisites for a successfully installation, you are conducted through the
whole installation process. Finally, the uninstall procedure is described in case you
need to uninstall BitDefender.
Using BitDefender. Description of basic administration and maintenance of
BitDefender. You are presented the BitDefender configuration file, how to get run-time
information, how to test the antivirus efficiency, how to perform the updates and how
to register the product. You are also presented real life usage scenarios, covering
various aspects of using BitDefender to detect malware on your system, and several
desktop and server integration procedures, to have the antivirus scanning the files
directly from the file manager or the emails passing your local email server.
Getting help. Where to look and where to ask for help if something goes not so right.
You are guided to the Knowledge Base and offered the BitDefender and BitDefender
partners contact information to call, if needed.
Manual pages. The manual pages of BitDefender Antivirus Scanner for Unices are
included for a quick and convenient reference. Whenever you will find examples of
BitDefender commands, the manual pages will provide you a valuable help to
understand all the options and actions.
Glossary. The Glossary tries to explain some technical and uncommon terms you
will find in the pages of this book.
xv
Preface
3. Request for Comments
We invite you to help us improve the book. We have tested and verified all of the
information to the best of our ability, but you may find that features have changed (or
even that we have made mistakes). Please write to tell us about any flaws you find in
this book or how you think it could be improved, to help us provide you the best
documentation possible.
Let us know by sending an email to <[email protected]>.
xvi
Preface
Description and features
Description and features
Description and features
Chapter 1. Overview
BitDefender provides security solutions to satisfy the protection requirements of today's
computing environment, delivering effective threat management for over 41 million
home and corporate users in more than 100 countries.
Designed to provide full protection for corporate network and systems, the BitDefender
solution range comprises, beside antivirus protection, antispam, personal firewall and
security management solutions. BitDefender also specializes in providing assistance
with designing and establishing content security policies for corporate networks.
BitDefender Professional was the third product of its kind in the world to receive ICSA
certification for Windows XP and the first to be awarded for groundbreaking innovation
by the European Commission and Academies. BitDefender Antivirus is certified by all
the major reviewers in the antivirus field - ICSA Labs, CheckMark, CheckVir, TÜV and
Virus Bulletin.
BitDefender is headquartered in Bucharest, Romania and has offices in Tettnang,
Germany, Barcelona, Spain and Florida, US. Website: http://www.bitdefender.com
1.1. Why BitDefender?
Proven. Most reactive antivirus producer. BitDefender fast reactivity in case of
computer virus epidemic was confirmed beginning with the last outbreaks of CodeRed,
Nimda and Sircam, as well as Badtrans.B or other dangerous, fast-spreading malicious
codes. BitDefender was the first to provide antidotes against these codes and to make
them freely available on the Internet for all affected people. Now, with the continuous
expansion of the Klez virus - in various versions immediate antivirus protection has
become once more a critical need for any computer system.
Innovative. Awarded for innovation by the European Commission and EuroCase.
BitDefender has been proclaimed a winner of the European IST-Prize, awarded by
the European Commission and by representatives of 18 academies in Europe. Now
in its eighth year, the European IST Prize is a reward for groundbreaking products
that represent the best of European innovation in information technology.
Comprehensive. Covers every single point of your network, providing complete
security. BitDefender security solutions for the corporate environment satisfy the
protection requirements of today's business environment, enabling management of
19
01
Description and
features
Overview
all complex threats that endanger a network, from a small local area to large
multi-server, multi-platform WAN's.
Your Ultimate Protection. The final frontier for any possible threat to your
computer system. As virus detection based on code analysis has not always offered
good results, BitDefender has implemented behavior-based protection, providing
security against born-new malware. MIDAS (Malware Intrusion Detection Advanced
System), featuring three levels of security, guarantees your serenity even after the
fastest epidemics.
These are the costs that organizations want to avoid and what the security products
are designed to prevent:
Worm attacks
Communication loss because of infected e-mails
E-mail breakdown
Cleaning and recovering systems
Lost productivity experienced by end users because systems are not available
Hacking, and unauthorized access that causes damage
Some simultaneously developments and benefits can be accomplished by using
the BitDefender security suite:
Increase network availability by stopping the spread of malicious code attacks (i.e.,
Nimda, Trojan horses, DDoS).
Protect remote users from attacks.
Reduce administrative costs and deploys rapidly with BitDefender Enterprise
management capabilities.
Stop the spreading of malware through e-mail, using a BitDefender e-mail protection
at the company's gateway. Temporarily or permanently block unauthorized,
vulnerable, and expensive application connections.
1.2. Data Security Division
Ever since the beginning, SOFTWIN's Data Security Division approached data
protection in a specific manner, with the first intelligent update, requiring no user
intervention, the first remote antivirus management through WAP technology or the
first Personal Firewall to be integrated within an antivirus engines to provide complete
response to today's complex security threats.
Born to provide full data security at all critical levels in today's business environment,
Data Security Division aims to ensure the protection of systems against computer
20
Overview
Description and
features
01
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102

Unisar 1.24.1867 User manual

Category
Antivirus security software
Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI