Friday, 24 June 2016

Trustport Antivirus -1 User, 1 Year, 2015 (CD)

Trustport Antivirus -1 User, 1 Year, 2015 (CD)



  • Resistance against attacks
  • On-access protection
  • System rescue disk
  • High level of virus and spyware detection
  • This item is non returnable


Product Description

ON-ACCESS PROTECTION Every program started and every file opened undergoes an antivirus check. The resident protection reliably blocks attempts to run malware. Depending on the repair settings the defective file is renamed, moved to quarantine or permanently deleted. SYSTEM RESCUE DISK In case of a severe virus infection program allows you to create a system rescue disk with the antivirus module. After loading the operating system from the rescue disk, you will be able to clean malicious software from your computer. HIGH LEVEL OF VIRUS AND SPYWARE DETECTION Thanks to the use of two top-of-the-range scanning engines, the antivirus is able to achieve one of the highest detection rates in the world. It is able to detect and stop practically all existing viruses, worms and trojans. SILENT MODE The user can enjoy movies, music or computer games, without the nuisance of pop-up windows. This mode is suitable for example for those who do not want to be disturbed during a presentation by the program showing potential threats. In the silent mode the computer is fully protected even if the user is not alerted about program updates or malware alerts etc. RESISTANCE AGAINST ATTACKS The system files of the antivirus are themselves protected against any attempts to change them by unauthorized applications. In this way, the malware has no chance of putting the antivirus out of action and of evading detection. APPLICATION INSPECTOR This layer of protection runs continuously in the background and monitors all suspicious activity in the file system and system registry. Unknown toolbars or screensavers frequently access these items without your knowledge and can damage the operating system. Application Inspector also provides the user with full control of the Windows operating system modifications, that may be tried by third party software

No comments:

Post a Comment