Instructions on how to change how your computer connects to the internet and how you want to handle updates while using mobile networks. Your Internet service provider may offer or require you to use a proxy. A proxy acts as an intermediary between your computer and the Internet. It intercepts all requests to the Internet […]
Articles Tagged: F-Secure for Home
View the latest updates (F-Secure)
View the date and time of the latest update. When automatic updates are turned on, the product receives the latest updates automatically when you are connected to the internet. To see details of the latest updates for the installed products: Open the product from the Windows Start menu. On the Antivirus page, select Settings. Select Updates. You see details of the […]
How to use automatic updates (F-Secure)
Automatic updates keep your computer protected from the latest threats. The product retrieves the latest updates to your computer automatically when you are connected to the Internet. It detects the network traffic and does not disturb your other Internet use even with a slow network connection. Source : Official F-Secure Brand Editor by : BEST […]
Using personal firewalls (F-Secure)
The product is designed to work with Windows Firewall. Other personal firewalls require additional setup to work with the product. The product uses Windows Firewall for basic firewall functions, such as controlling incoming network traffic and keeping your internal network separate from the public Internet. In addition, DeepGuard monitors installed applications and prevents suspicious applications […]
Changing Windows Firewall settings (F-Secure)
When the firewall is turned on, it restricts access to and from your computer. Some applications may require that you allow them through the firewall to work properly. The product uses Windows Firewall to protect your computer. To change Windows Firewall settings: Open the product from the Windows Start menu. On the main view of the product, […]
What is a firewall (F-Secure)
The firewall prevents intruders and harmful applications getting into your computer from the Internet. The firewall allows only safe Internet connections from your computer and blocks intrusions from the Internet. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team
Submitting a sample (F-Secure)
You can help us to improve the protection by contributing suspicious applications for analysis. When the product blocks an application, for example because it is a possible security risk for your computer or the application tried to do something possibly harmful, you can send a sample of the application for security research purposes. You can […]
Exploit kits (F-Secure)
Exploit kits are toolkits used by attackers to manage exploits and deliver harmful programs to a vulnerable computer or device. An exploit kit contains an inventory of exploits, each of which can take advantage of a flaw (vulnerability) in a program, computer or device. The kit itself is usually hosted on a harmful or a […]
Exploits (F-Secure)
Exploits are objects or methods that take advantage of a flaw in a program to make it behave unexpectedly. Doing so creates conditions that an attacker can use to perform other harmful actions. An exploit can be either an object or a method. For example, a specially crafted program, a piece of code or a […]
Backdoors (F-Secure)
Backdoors are features or programs that can be used to evade the security features of a program, device, portal, or service. A feature in a program, device, portal or service can be a backdoor if its design or implementation introduces a security risk. For example, hardcoded administrator access to an online portal can be used […]