Presentation on theme: "1 Kaspersky CCleaner VerbAce WinRar. 2 About VerbAce 2008 Freeware VerbAce 2008 freeware is a translation software with a Arabic-English-Arabic dictionary."— Presentation transcript:
2 About VerbAce 2008 Freeware VerbAce 2008 freeware is a translation software with a Arabic-English-Arabic dictionary with about 60,000 English and Arabic entries. The easy-to-use one-click user interface allows a quick translation of any text word. Requirements VerbAce runs on Windows Vista, Windows XP, 2000, and NT 5.0. Using VerbAce Once VerbAce is running, select a word by clicking on it (according to the selected mouse configuration). You can also type the word in the VerbAce window. Please Note that the text must be selectable (may be highlighted by Windows upon a regular double-click on it) in order for it to be recognized by a VerbAce mouse click. Most Windows applications are supported (e.g. Explorer, Word, Acrobat Reader by switching to Select Mode).
3 WinRAR is a powerful archive manager. It can backup your data and reduce size of email attachments, decompress RAR, ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file forma
4 One of the main goals of the Kaspersky Lab specialists in making Kaspersky Internet Security was to provide optimum configuration for all the program's options. This makes it possible for a user with any level of computer literacy to protect their computer right after installation without spending hours on the settings. However, configuration details for your computer or the jobs you do with it can have their own specifics. That is why we recommend performing a preliminary configuration to achieve the most flexible, personalized approach to protecting your computer.
5 As information technology has rapidly developed and as it has penetrated every aspect of human existence, the number of crimes aimed at breaching information security has grown. Cyber criminals have displayed great interest in the activity of state structures and commercial enterprises. They make attempts at theft and disclosure of confidential information, doing damage to business reputations, breaching business continuity, and consequently breach an organization's information resources. These acts can do extensive damage to assets, both tangible and intangible. It is not big companies alone who are at risk. Individual users can also be attacked. Using various tools, criminals gain access to personal data (bank account and credit card numbers and passwords), cause your system to malfunction, or gain complete access to your computer. Then that computer can be used as part of a zombie network, a network of infected computers used by hackers to attack servers, send out spam, harvest confidential information, and spread new viruses and Trojans. In today's world, everyone acknowledges that information is a valuable asset and should be protected. At the same time, information must be accessible for a certain user group (for instance, employees, clients and partners of a business). This is why there is a need to create a comprehensive information security system. This system must take account of all possible sources of threats, whether human, man-made, or natural disasters, and use a complete array of defensive measures, on the physical, administrative, and software level.
6 One of the main goals of the Kaspersky Lab specialists in making Kaspersky Internet Security was to provide optimum configuration for all the program's options. This makes it possible for a user with any level of computer literacy to protect their computer right after installation without spending hours on the settings. However, configuration details for your computer or the jobs you do with it can have their own specifics. That is why we recommend performing a preliminary configuration to achieve the most flexible, personalized approach to protecting your computer.
7 Right after installing Kaspersky Internet Security, its icon for it will appear in the system tray (beside the clock). The icon is a sort of indicator for Kaspersky Internet Security operations. It reflects the state of protection and shows a number of basic functions performed by the program. If the icon is active (color), it means that protection is enabled on your computer. If the icon is inactive (black and white), this means that your protection is either fully disabled or some protection components are temporarily disabled. The Kaspersky Internet Security icon changes in relation to the operation being performed: e-mail being scanned. script being scanned. a file that you or some program are opening, saving, or running is being scanned. Kaspersky Internet Security databases and application modules are being updated. an error has occurred in some Kaspersky Internet Security component. The icon also provides access the basics of the program interface: context menu and the main window. To open the context menu, right-click on the program icon. To open the Kaspersky Internet Security main window on the Protection section (this is the default first screen when you open the program), double-click the program icon. If you click once, the main window will open to the section that was active when you last closed it. If news from Kaspersky Lab is available, the following icon will appear in the taskbar Double click the icon to view the news in the resulting window.
8 The primary purpose of the Protection section is to provide access to your computer’s basic real-time protection components. To view the status of a protection component or its modules, to configure its settings or open a relevant report, select this component from the list under Protection. This section also contains links that provide access to the most common tasks: virus scan of objects and application database updates. You can view information on the status of these tasks, configure them, or run them.
9 The Scan section provides access to virus scan tasks for objects. It shows tasks created by Kaspersky Lab experts, (virus scan of critical areas, startup objects, full host scan, rootkit scan), as well as user tasks. When a task is selected from the right pane, relevant task information is provided, task settings may be configured, a list of objects to be scanned is generated, or the task is run. To scan a single object (file, folder, or drive), select Scan, use the right pane to add an object to the list to be scanned, and run the task.
10 The Update section contains information on application updates: Database publication date and virus signature record count. Appropriate links may be used to start an update, view a detailed report, configure updates, roll an update back to a previous version.
11 Reports and Data Files may be used to view a detailed report on any application component, a virus scan or update task, and work with an object placed in quarantine or backup storage.
12 The Activation section is used to handle keys required for the applications to be fully functional. If a key is not installed, it is recommended that it be purchased without delay and that the application be activated. If a key is installed, this section shows information on the type of key used and its expiration date. Once a current key expires, it may be renewed at the Kaspersky Lab website.
13 The Support section provides information on Technical Support available to Kaspersky Internet Security registered users.
14 1. After Installation Once you have installed CCleaner you can open the application by: Double-clicking the desktop icon Clicking on Start -> Programs -> CCleaner Right-clicking on the Recycle Bin and selecting "Open CCleaner..." There is also a "Run CCleaner" option on the Recycle Bin menu, which will clean your system without any prompts. But we recommend you don't do this until you have familiarized yourself with the program and it's options.
15 2. Main Window CCleaner has four main sections which can be selected using the 4 icons in the left-hand navigation panel. (The Cleaner section is selected by default.) Cleaner This is the main feature of the program, which will allow you to optimize your system, by removing unused and temporary files. It also protects your personal privacy by removing traces of the websites you have visited and the files you have opened. (It's important to point out that it does this without removing any files you'll still need!) Registry This is a more advanced feature which analyses your computers registry (where windows system settings are stored) and fixes any problems and inconsistencies that exist. Tools This section allows you manage installed programs and applications that run when you turn on your computer. Options The Options section handles a wide array of preferences for how CCleaner runs.
16 3. Cleaner Settings The Cleaner Settings are the list of checkboxes next to the navigation buttons and are present when you are in the Cleaner mode. By checking and unchecking options you can choose to include or exclude items from the cleaning process. For example, if you uncheck the Cookies option then no Internet Explorer cookies will be removed. (You also have the choice to keep specific cookies in the Options section.) You will notice a second tab at the top labeled Applications. This displays a list of additional cleaning options for third- party applications you have installed. This list will change automatically to include new programs.
17 4. Running the Cleaner To actually run the cleaner and remove the files, it's a simple case of just clicking the Run Cleaner button. If you'd like to see what is going to be removed first (before deleting the files) then click on the Analyze button. The output window above the buttons will display a log of the analysis or cleaning process.
18 5. Issues The Issues section will help you find errors and old entries in the system registry. Whilst this will make sense to an advanced user, to the beginner a lot of the options will mean nothing. That is why CCleaner includes a complete backup option, so in the rare event you remove something that you later need - you will have a backup to restore from. To use, simply press the "Scan for Issues" button and once completed press the "Fix Selected Issues" button. You will be prompted to backup and helped throughout the process.
19 6. Tools The Tools section contains two features for advanced users: Uninstall Whilst windows includes a Control Panel program to remove installed programs. There's no feature to edit or remove these entries. Startup Most computers have many programs that run when Windows starts. It's often very difficult to remove these and prevent that from happening. This tool list the programs and allows you to remove them.
20 7. Options The Options section will allow you to customize the way CCleaner runs. For example there's an option to run the cleaner at computer startup, so you can automatically keep your computer clean without having to worry about it.
21 8. Tour Complete That's the end of the quick tour! You should now have enough information to confidently use CCleaner. Thanks for taking the time to read this and we hope you like the software!