home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Personal Computer World 2009 February
/
PCWFEB09.iso
/
Software
/
Full
/
Panda Internet Security 2009
/
IS09PROMO3M.exe
/
[0]
/
Adicional
/
English
/
r09_en.chm
/
r09_en.brs
< prev
next >
Wrap
INI File
|
2008-07-16
|
6KB
|
161 lines
[Anti-spam protection]
Anti-spam protection | 86.htm
How to enable/configure the anti-spam protection | 87.htm
How does the anti-spam protection work? | 89.htm
How to deal with Spam in other e-mail clients | 91.htm
[Automatic protection]
Automatic protection | 141.htm
[Automatic protection against known threats]
Protection against known threats | 98.htm
How to enable or disable the automatic protection against known threats | 99.htm
[Automatic protection against unknown threats]
How to enable or disable the protection against unknown threats | 142.htm
How to configure the protection against unknown threats | 143.htm
[Backup copies]
Backup copies | 957.htm
Installing and enabling backup copies | 964.htm
Create or schedule a new backup copy | 958.htm
Configuring a backup copy | 959.htm
Update backup copies on-demand | 960.htm
Deleting a scheduled backup copy | 961.htm
Making backup copies on CD or DVD | 962.htm
How to recover files from the backup copies | 963.htm
[Configuring scans and the automatic protection]
Configuring the scans | 700.htm
[Description of the main window]
Main window | 110.htm
General status | 135.htm
[FAQs (Frequently asked questions and answers)]
FAQs (Frequently asked questions and answers) | 320.htm
How to activate the product | 85.htm
How can I activate licenses on several computers? | 813.htm
How can I reinstall the program if I've formatted my hard disk or changed my PC? | 814.htm
Do I have to uninstall the program before installing a new version? | 815.htm
How can I renew my product services? | 816.htm
When do my product services expire? | 817.htm
I have an antivirus installed, can I install the program? | 355.htm
How can I start a self-diagnosis? | 360.htm
How can I configure the Firewall protection? | 370.htm
Am I protected against vulnerabilities? | 380.htm
What does the anti-spam protection consist of? | 395.htm
Is it necessary to create the Rescue Disk? | 405.htm
What does the Web access filter consist of? | 420.htm
How can I scan a single folder or file? | 445.htm
How can I perform a full system scan? | 450.htm
What can I do if a file is considered suspicious? | 465.htm
How can I send a file to the virus laboratory? | 470.htm
I have disinfected a virus, why does its name still appear in the report? | 475.htm
What happens if I disable the automatic protection? | 480.htm
How do I configure the program to update automatically? | 495.htm
How do I know if the program is up-to-date? | 485.htm
Automatic updates | 265.htm
How often should I carry out updates? | 500.htm
Uninstallation | 100.htm
How do I know which version of the program I have? | 521.htm
More information about access to shared folders | 625.htm
Does the program incorporate any sort of self-protection system? | 471.htm
Why do I have to enter a password to use the Internet? | 944.htm
How can I configure the firewall to access shared folders on other computers? | 807.htm
The firewall shows a pop-up warning. What option should I select? | 808.htm
Who is the PC supervisor? How can I change the supervisor password? | 812.htm
How to install the firewall protection | 31.htm
[Firewall protection]
What is the firewall protection? | 525.htm
Characteristics of the firewall protection | 530.htm
View network activity report | 540.htm
Basic firewall configuration | 809.htm
Advanced firewall configuration | 810.htm
[General description]
How to open the main program window | 105.htm
Operations from the Windows system tray icon Using the right-click menu in the taskbar (next to the system clock) | 115.htm
[General preferences]
Preferences | 200.htm
[Identity protection]
Enabling the protection against fraud | 154.htm
Configuring detection of fraudulent web pages | 915.htm
Configuring the detection of calls to unauthorized phone numbers | 157.htm
Configuring the confidential information protection | 52.htm
[In-depth scanning]
How to perform a scan of the computer | 161.htm
[Information on the website]
Information, inquiries and services on the website | 01b.htm
Tech Support | 949b.htm
How to activate the product | 85.htm
Consult the up-to-the-minute online help | 02.htm
[Introduction]
Introduction | 10.htm
Key features | 15.htm
[Optimization of computer performance (TuneUp)]
[Protection against vulnerabilities]
Vulnerability detection | 48.htm
[Quarantine]
What does quarantine consist of? | 275.htm
Actions on the files in Quarantine | 270.htm
[Reinstallation / Uninstallation]
Repairing the installation | 73b.htm
Uninstallation | 100.htm
[Reports and statistics]
Reports | 310.htm
Statistics | 714.htm
Scan progress and possible incidents Information about scans in progress | 175.htm
View network activity report | 540.htm
[Rescue disks]
Rescue disks | 80.htm
How to create a rescue CD | 241.htm
How to use the rescue disk | 243.htm
How to use the installation CD as a rescue disk | 242.htm
[Scans and automatic protection]
Scan types (Full Scan) | 145.htm
[Scheduled scans]
Scheduled scan | 155.htm
How to schedule a scan | 170.htm
Configuring the scheduled scans | 152.htm
How to edit a scheduled scan | 171.htm
How to delete a scheduled scan | 172.htm
[Services]
What services does the program include? | 305b.htm
Internet Tech support | 331.htm
Sending suspicious files | 315.htm
Email technical support | 325.htm
Suggestion box | 330.htm
Rescue disks | 80.htm
[Updates]
What is an update? | 255.htm
How to carry out an update | 260.htm
Automatic updates | 265.htm
[Warnings system]
Warnings system | 545.htm
[Web content filtering]
What is the Web content control? | 84.htm
How to enable/disable the Web content control. | 97.htm
How to use the Web access filter | 715.htm
How to use Web content control settings? | 76.htm