..................................................................................78Řeš ení problémů s filtrováním protokolů
4.3.8.5
....................................................................................................79Bezpečnostní nástroje4.4
..............................................................................79Rodičovská kontrola
4.4.1
..................................................................................81Kategorie
4.4.1.1
..................................................................................82Výjimky
4.4.1.2
....................................................................................................83Aktualizace programu4.5
..............................................................................86Nastavení aktua lizace
4.5.1
..................................................................................88Profily aktua lizace
4.5.1.1
..................................................................................88Pokročilá nastavení aktualiza ce
4.5.1.2
........................................................................88Režim aktualizace
4.5.1.2.1
........................................................................88HTTP Proxy
4.5.1.2.2
..............................................................................89Vrátit předchozí aktualizace
4.5.2
..............................................................................90Jak vytvořit aktualizační úlohu
4.5.3
....................................................................................................91Nástroje4.6
..............................................................................92Ochrana domácí sítě
4.6.1
..............................................................................92Ochrana webkamery
4.6.2
..............................................................................93Nástroje produktu ESET Smart Security
4.6.3
..................................................................................94Protokoly
4.6.3.1
........................................................................95Protokoly
4.6.3.1.1
..................................................................................96Spuště né procesy
4.6.3.2
..................................................................................97Statis tiky ochra ny
4.6.3.3
..................................................................................98Sledová ní aktivity
4.6.3.4
..................................................................................99Síťová spojení
4.6.3.5
..................................................................................100ESET SysInspector
4.6.3.6
..................................................................................100Plánovač
4.6.3.7
..................................................................................102ESET SysRescue
4.6.3.8
..................................................................................102ESET LiveGrid®
4.6.3.9
........................................................................103Podezřelé soubory
4.6.3.9.1
..................................................................................104Karanténa
4.6.3.10
..................................................................................105Proxy server
4.6.3.11
..................................................................................106Upozorně ní a udá losti
4.6.3.12
........................................................................107Formát zprávy
4.6.3.12.1
..................................................................................108Odesílá ní s ouborů analýze
4.6.3.13
..................................................................................108Aktua lizace operačního systému Windows
4.6.3.14
....................................................................................................109Uživatelské rozhraní4.7
..............................................................................109Prvky uživatelského rozhra ní
4.7.1
..............................................................................110Upozorně ní a udá losti
4.7.2
..................................................................................111Rozšířená nastavení
4.7.2.1
..............................................................................112Přístup k nastavení
4.7.3
..............................................................................113Ikona v oznamovací oblasti
4.7.4
..............................................................................114Kontextové menu
4.7.5
.......................................................115Pokročilý uživatel5.
....................................................................................................115Správa profilů5.1
....................................................................................................115Klávesové zkratky5.2
....................................................................................................116Diagnostika5.3
....................................................................................................116Import a export nastavení5.4
....................................................................................................117Detekce stavu nečinnosti5.5
....................................................................................................117ESET SysInspector5.6
..............................................................................117Úvod do programu ESET SysInspector
5.6.1
..................................................................................118Spuště ní programu ESET SysIns pector
5.6.1.1
..............................................................................118Uživa telské rozhra ní a používá ní a plikace
5.6.2
..................................................................................118Ovládací prvky programu
5.6.2.1
..................................................................................120Navigace v programu ESET SysIns pector
5.6.2.2
........................................................................121Klávesové zkra tky
5.6.2.2.1
..................................................................................122Porovnávání
5.6.2.3
..............................................................................123Ovlá daní prostřednictvím příkazového řá dku
5.6.3
..............................................................................123Servisní skript
5.6.4
..................................................................................124Generování servisního skriptu
5.6.4.1
..................................................................................124Struktura servisního skriptu
5.6.4.2
..................................................................................127Spouště ní servisních skriptů
5.6.4.3
..............................................................................127Ča sto kla dené otázky
5.6.5
..............................................................................128ESET Sys Inspector ja ko součást ESET Sma rt Security
5.6.6
....................................................................................................129Příkazový řádek5.7
.......................................................131Slovník pojmů6.
....................................................................................................131Typy infiltrací6.1
..............................................................................131Viry
6.1.1
..............................................................................131Červi
6.1.2
..............................................................................131Trojské koně
6.1.3
..............................................................................132Rootkity
6.1.4
..............................................................................132Adware
6.1.5
..............................................................................132Spyware
6.1.6
..............................................................................133Packery
6.1.7
..............................................................................133Potenciálně zneužitelné aplikace
6.1.8
..............................................................................133Potenciálně nechtě né aplikace
6.1.9
..............................................................................136Botnet
6.1.10
....................................................................................................136Typy útoků6.2
..............................................................................137DoS útoky
6.2.1
..............................................................................137DNS Poisoning
6.2.2
..............................................................................137Útoky počítačových červů
6.2.3
..............................................................................137Skenování portů
6.2.4
..............................................................................137TCP desynchronizace
6.2.5
..............................................................................138SMB Relay
6.2.6
..............................................................................138Útoky prostřednictvím protokolu ICMP
6.2.7
....................................................................................................138ESET Technologie6.3
..............................................................................138Exploit Blocker
6.3.1
..............................................................................138Advanced Memory Scanner
6.3.2
..............................................................................139Ochrana proti síťovým útokům
6.3.3
..............................................................................139ThreatSense
6.3.4
..............................................................................139Ochrana před zapojením do botnetu
6.3.5
..............................................................................139Java Exploit Blocker
6.3.6
..............................................................................140Ochrana ba nkovnictví a online plateb
6.3.7
..............................................................................141Ochrana proti útokům prostřednictvím skriptů
6.3.8
..............................................................................141Ochrana proti ransomware
6.3.9
....................................................................................................141Elektronická pošta6.4
..............................................................................142Reklamy
6.4.1
..............................................................................142Fámy
6.4.2
..............................................................................142Phishing
6.4.3
..............................................................................142Rozpoznání nevyžádané pošty
6.4.4
..................................................................................143Pravidla
6.4.4.1
..................................................................................143Seznam důvě ryhodných adres (Whitelist)
6.4.4.2
..................................................................................143Seznam spa mových a dres (Bla cklist)
6.4.4.3