..................................................................................77Solving problems with protocol filtering
4.3.8.5
....................................................................................................78Security tools4.4
..............................................................................78Pa renta l control
4.4.1
..................................................................................80Categories
4.4.1.1
..................................................................................81Website exceptions
4.4.1.2
....................................................................................................82Updating the program4.5
..............................................................................85Update settings
4.5.1
..................................................................................86Update profiles
4.5.1.1
..................................................................................87Advanced update setup
4.5.1.2
........................................................................87Update mode
4.5.1.2.1
........................................................................87HTTP Proxy
4.5.1.2.2
..............................................................................88Update rollba ck
4.5.2
..............................................................................89How to create update tasks
4.5.3
....................................................................................................89Tools4.6
..............................................................................90Home Network Protection
4.6.1
..............................................................................91Webcam Protection
4.6.2
..............................................................................91Tools in ESET Smart Security
4.6.3
..................................................................................92Log files
4.6.3.1
........................................................................93Log files
4.6.3.1.1
..................................................................................94Running processes
4.6.3.2
..................................................................................96Protection statistics
4.6.3.3
..................................................................................96Watch activity
4.6.3.4
..................................................................................97Network connections
4.6.3.5
..................................................................................98ESET SysInspector
4.6.3.6
..................................................................................99Scheduler
4.6.3.7
..................................................................................100ESET SysRes cue
4.6.3.8
..................................................................................100ESET LiveGrid®
4.6.3.9
........................................................................101Suspicious files
4.6.3.9.1
..................................................................................102Quarantine
4.6.3.10
..................................................................................103Proxy server
4.6.3.11
..................................................................................104Email notifications
4.6.3.12
........................................................................105Message format
4.6.3.12.1
..................................................................................105Select sample for analysis
4.6.3.13
..................................................................................106Micros oft Windows® update
4.6.3.14
....................................................................................................106User interface4.7
..............................................................................106User interface elements
4.7.1
..............................................................................107Alerts and notifications
4.7.2
..................................................................................108Advanced setup
4.7.2.1
..............................................................................109Access setup
4.7.3
..............................................................................110Program menu
4.7.4
.......................................................112Advanced user5.
....................................................................................................112Profile manager5.1
....................................................................................................112Keyboard shortcuts5.2
....................................................................................................113Diagnostics5.3
....................................................................................................114Import and export settings5.4
....................................................................................................114ESET SysInspector5.5
..............................................................................114Introduction to ESET Sys Inspector
5.5.1
..................................................................................115Sta rting ESET SysIns pector
5.5.1.1
..............................................................................115User Interface and application usage
5.5.2
..................................................................................115Progra m Controls
5.5.2.1
..................................................................................117Navigating in ESET SysInspector
5.5.2.2
........................................................................118Keyboard shortcuts
5.5.2.2.1
..................................................................................119Compare
5.5.2.3
..............................................................................120Command line para meters
5.5.3
..............................................................................121Service Script
5.5.4
..................................................................................121Generating Service script
5.5.4.1
..................................................................................121Structure of the Service script
5.5.4.2
..................................................................................124Executing Service scripts
5.5.4.3
..............................................................................125FAQ
5.5.5
..............................................................................126ESET SysInspector as pa rt of ESET Smart Security
5.5.6
....................................................................................................126Command Line5.6
.......................................................129Glossary6.
....................................................................................................129Types of infiltration6.1
..............................................................................129Viruses
6.1.1
..............................................................................129Worms
6.1.2
..............................................................................129Trojans
6.1.3
..............................................................................130Rootkits
6.1.4
..............................................................................130Adware
6.1.5
..............................................................................130Spyware
6.1.6
..............................................................................131Packers
6.1.7
..............................................................................131Potentially uns afe applications
6.1.8
..............................................................................131Potentially unwanted applica tions
6.1.9
..............................................................................133Botnet
6.1.10
....................................................................................................133Types of remote attacks6.2
..............................................................................134DoS attacks
6.2.1
..............................................................................134DNS Poisoning
6.2.2
..............................................................................134Worm attacks
6.2.3
..............................................................................134Port scanning
6.2.4
..............................................................................134TCP desynchronization
6.2.5
..............................................................................135SMB Relay
6.2.6
..............................................................................135ICMP atta cks
6.2.7
....................................................................................................135ESET Technology6.3
..............................................................................135Exploit Blocker
6.3.1
..............................................................................135Advanced Memory Scanner
6.3.2
..............................................................................136Network Attack Protection
6.3.3
..............................................................................136ESET LiveGrid®
6.3.4
..............................................................................136Botnet protection
6.3.5
..............................................................................136Ja va Exploit Blocker
6.3.6
..............................................................................136Banking & Payment protection
6.3.7
..............................................................................137Script-Based Attacks Protection
6.3.8
..............................................................................138Ransomware Protection
6.3.9
....................................................................................................138Email6.4
..............................................................................138Advertisements
6.4.1
..............................................................................138Hoaxes
6.4.2
..............................................................................139Phishing
6.4.3
..............................................................................139Recognizing spam sca ms
6.4.4
..................................................................................139Rules
6.4.4.1
..................................................................................140Whitelist
6.4.4.2
..................................................................................140Blacklist
6.4.4.3
..................................................................................140Exception lis t
6.4.4.4
..................................................................................140Server-side control
6.4.4.5