........................................................................77Vytváření výjimek z oznámení firewallu
4.3.8.2.1
..................................................................................77Vytvoření pravidla z protokolu
4.3.8.3
..................................................................................77Rozšířený PCAP protokol
4.3.8.4
..................................................................................78Řešení problémů s filtrováním protokolů
4.3.8.5
....................................................................................................79Bezpečnostní nástroje4.4
..............................................................................79Rodičovská kontrola
4.4.1
..................................................................................81Kategorie
4.4.1.1
..................................................................................82Výjimky
4.4.1.2
....................................................................................................83Aktualizace programu4.5
..............................................................................86Nastavení aktualizace
4.5.1
..................................................................................88Profily aktualizace
4.5.1.1
..................................................................................88Pokročilá nastavení aktualizace
4.5.1.2
........................................................................88Režim aktualizace
4.5.1.2.1
........................................................................88Možnosti připojení
4.5.1.2.2
..............................................................................89Vrátit předchozí aktualizace
4.5.2
..............................................................................90Jak vytvořit aktualizační úlohu
4.5.3
....................................................................................................91Nástroje4.6
..............................................................................92Monitorování domácí sítě
4.6.1
..................................................................................93Síťové zařízení
4.6.1.1
..............................................................................93Ochrana webkamery
4.6.2
..............................................................................93Nástroje produktu ESET Internet Security
4.6.3
..................................................................................94Protokoly
4.6.3.1
........................................................................95Protokoly
4.6.3.1.1
..................................................................................96Spuštěné procesy
4.6.3.2
..................................................................................98Bezpečnostní přehled
4.6.3.3
..................................................................................99Sledování aktivity
4.6.3.4
..................................................................................100Síťová spojení
4.6.3.5
..................................................................................101ESET SysInspector
4.6.3.6
..................................................................................101Plánovač
4.6.3.7
..................................................................................103Kontrola systému
4.6.3.8
..................................................................................104ESET SysRescue
4.6.3.9
..................................................................................104Cloudová ochrana
4.6.3.10
........................................................................105Podezřelé soubory
4.6.3.10.1
..................................................................................106Karanténa
4.6.3.11
..................................................................................107Proxy server
4.6.3.12
..................................................................................108Upozornění a události
4.6.3.13
........................................................................109Formát zprávy
4.6.3.13.1
..................................................................................110Odesílání souborů analýze
4.6.3.14
..................................................................................110Aktualizace operačního systému Windows
4.6.3.15
..................................................................................111ESET CMD
4.6.3.16
....................................................................................................112Uživatelské rozhraní4.7
..............................................................................112Prvky uživatelského rozhraní
4.7.1
..............................................................................113Upozornění a události
4.7.2
..................................................................................115Rozšířená nastavení
4.7.2.1
..............................................................................115Přístup k nastavení
4.7.3
..............................................................................116Ikona v oznamovací oblasti
4.7.4
.......................................................118Pokročilý uživatel5.
....................................................................................................118Profily5.1
....................................................................................................118Klávesové zkratky5.2
....................................................................................................119Diagnostika5.3
....................................................................................................120Import a export nastavení5.4
....................................................................................................121ESET SysInspector5.5
..............................................................................121Úvod do programu ESET SysInspector
5.5.1
..................................................................................121Spuštění programu ESET SysInspector
5.5.1.1
..............................................................................122Uživatelské rozhraní a používání aplikace
5.5.2
..................................................................................122Ovládací prvky programu
5.5.2.1
..................................................................................123Navigace v programu ESET SysInspector
5.5.2.2
........................................................................125Klávesové zkratky
5.5.2.2.1
..................................................................................126Porovnávání
5.5.2.3
..............................................................................127Ovládaní přes příkazový řádek
5.5.3
..............................................................................127Servisní skript
5.5.4
..................................................................................128Generování servisního skriptu
5.5.4.1
..................................................................................128Struktura servisního skriptu
5.5.4.2
..................................................................................131Spouštění servisních skriptů
5.5.4.3
..............................................................................132Často kladené otázky
5.5.5
....................................................................................................133Příkazový řádek5.6
.......................................................135Slovník pojmů6.
....................................................................................................135Typy infiltrací6.1
..............................................................................135Viry
6.1.1
..............................................................................135Červi
6.1.2
..............................................................................136Trojské koně
6.1.3
..............................................................................136Rootkity
6.1.4
..............................................................................136Adware
6.1.5
..............................................................................137Spyware
6.1.6
..............................................................................137Packery
6.1.7
..............................................................................137Potenciálně zneužitelné aplikace
6.1.8
..............................................................................137Potenciálně nechtěné aplikace
6.1.9
..............................................................................140Botnet
6.1.10
....................................................................................................140Typy útoků6.2
..............................................................................141DoS útoky
6.2.1
..............................................................................141DNS Poisoning
6.2.2
..............................................................................141Útoky počítačových červů
6.2.3
..............................................................................141Skenování portů
6.2.4
..............................................................................141TCP desynchronizace
6.2.5
..............................................................................142SMB Relay
6.2.6
..............................................................................142Útoky prostřednictvím protokolu ICMP
6.2.7
....................................................................................................142ESET Technologie6.3
..............................................................................142Advanced Memory Scanner
6.3.1
..............................................................................142Exploit Blocker
6.3.2
..............................................................................143Java Exploit Blocker
6.3.3
..............................................................................143Ochrana bankovnictví a online plateb
6.3.4
..............................................................................144Ochrana proti ransomware
6.3.5
..............................................................................144Ochrana proti síťovým útokům
6.3.6
..............................................................................144Ochrana proti útokům prostřednictvím skriptů
6.3.7
..............................................................................145Ochrana před zapojením do botnetu
6.3.8
..............................................................................145ThreatSense
6.3.9
..............................................................................145UEFI skener
6.3.10
....................................................................................................145Elektronická pošta6.4
..............................................................................146Fámy
6.4.1
..............................................................................146Reklamy
6.4.2