User manual SECUREMAC MACSCAN

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual SECUREMAC MACSCAN. We hope that this SECUREMAC MACSCAN user guide will be useful to you.


SECUREMAC MACSCAN : Download the complete user guide (1147 Ko)

Manual abstract: user guide SECUREMAC MACSCAN

Detailed instructions for use are in the User's Guide.

[. . . ] MacScan will move all selected spyware programs, extensions, preferences, and log files to a single and secured location. Page 3 of 16 Part 2 2. 1 Preferences This section highlights the options that are found on the Preferences screen in MacScan. To change the preferences, select Preferences under the MacScan menu, or click the "Prefs" icon in the MacScan toolbar. 2. 1. 1 Detect Remote Administration Programs This option enables additional auditing of files for remote administration programs during a spyware scan. Remote administration programs can be found in shareware, freeware, and commercial applications and allow complete remote control of a computer. [. . . ] MacScan offers three different types of spyware scans: quick scan, full scan, and custom scan. 4. 1. 1 Quick Scan The Quick Scan checks the files in your home folder for known spyware applications. MacScan will also scan your running processes for the presence of spyware. If spyware is detected in the current processes but does not appear for isolation after Quick Scan is finished, it may be running from a folder not accessible with your current permissions. If a full scan fails to isolate the spyware file, restart MacScan in Authenticated Mode. Page 8 of 16 4. 1. 1. 1 Running a Quick Scan To perform a Quick Scan, click the "Quick Scan" tab on the Scan Screen, and then click on the "Scan" button in the lower right corner. The scans are short but ensure protection of your computer and your privacy. However, running a Full Scan upon installation of MacScan is strongly recommended. Page 9 of 16 4. 1. 2 Full Scan MacScan's Full Scan function will scan your startup disk for spyware and check for actively running spyware applications. It will search thoroughly for spyware by scanning all accessible files on your start up disk. If you would like to scan a specific folder on your computer such as an external hard drive or removable media such as CDs or DVDs, use Custom Scan instead. 4. 1. 2. 1 Running a Full Scan Click on the Scan button to run a Full Scan on your hard drive. Note: Running MacScan in authenticated mode allows Full Scan to run at full capability. Page 10 of 16 4. 1. 3 Custom Scan Custom Scan allows you to scan a specific folder or drive for spyware. You can specify a folder, data CD, DVD, or other hard drives by selecting those locations for a Custom Scan. Custom Scan will scan for spyware in all accessible files in the specified location. Note: Spyware detected on a locked volume such as a data CD or DVD cannot be isolated. 4. 1. 3. 1 Running a Custom Scan To configure and perform a Custom Scan, click on the Scan button and choose "Custom Scan" from the tabbed items. Select the folder or drive to be scanned from the window that appears, and click "Select". MacScan will start scanning the specified folder or drive for spyware. Page 11 of 16 If no spyware is found, the following window will be displayed: Done Click the "Done" button when the scan is over. Cancel Click the "Cancel" button at any time during a scan to end the current scan. [. . . ] Temporary Cache Files Select this box to clear Temporary Cache files. Page 15 of 16 Part 6 6. 1 Spyware Information Database MacScan comes bundled with spyware information. This section provides you with information about spyware, Keyloggers, Trojan Horses and Remote Administration Programs. 6. 1. 1 Display Spyware Information Select a Spyware Information entry in the popup menu to display detailed information about that particular topic. 6. 1. 1. 1 Keyloggers Select "Keyloggers" to get information about Keyloggers. 6. 1. 1. 2 Trojan Horses Select "Trojan Horses" to get information about Trojan Horses. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SECUREMAC MACSCAN




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual SECUREMAC MACSCAN will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.