Tekil Mesaj gösterimi
Alt 11-01-2007   #1
Profil
Site Sahibi
Avatar Yok
 
Üyelik tarihi: Feb 2007
Bulunduğu yer: Ç@R$@MB@ 55
Yaş: 40
Mesajlar: 3.535
Üye No: 2

Seviye: 45 [♥ Bé-Yêu ♥♥ Bé-Yêu ♥♥ Bé-Yêu ♥♥ Bé-Yêu ♥♥ Bé-Yêu ♥]
Canlılık: 111 / 1116
Çekicilik: 1178 / 59287
Tecrübe: 67

Teşekkür

Teşekkürler: 0
0 Mesajina 0 Tesekkür Aldi
Rep
Rep Puanı : 9472
Rep Gücü : 10
İtibar :
| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute| CF | has a reputation beyond repute
| CF | - MSN üzeri Mesaj gönder
NOD32 ESET Smart Security 3.0.551 final ve full

Click the image to open in full size.


Click the image to open in full size.
Click the image to open in full size.Eset firması bu yazılımı NOD32 AntiVirus System yazılımını temel alarak oluşturmuş ve virüsten koruma yazılımının üzerine çok önemli modüller eklemiştir.Tam bir sistem koruma güvenlik yazılımıdır. Günümüzün en iyi virüsten koruma yazılımlarından birisi olan NOD32 AntiVirus System yazılımının üreticisi olan Eset firması tarafından kullanıcılara sunulmuştur.

Click the image to open in full size.ESET's NOD32 Key Features

* ThreatSense® technology — a single optimized Anti-Threat engine for analyzing code to identify malicious behavior, such as viruses, spyware, adware, phishing and more
* Unprecedented heuristic analysis capable of discovering new malware threats as they emerge
* Powerful virtual PC emulation technology enables unpacking and decryption of all types of archives and run-time packing
* Protects at multiple infiltration points, including HTTP, POP3, SMTP and all local and removable media
* Enhanced Rootkit Protection
* Prevents infected files from being opened and executed, and warns on creation of infected files
* Automatic execution on system startup
* Supports multiple Terminal Server environments
* Supports scanning of mapped network disks


Automatic Updates

* Supports hourly incremental updates to the ThreatSense Technology
* Includes upgrades of the executable program components, so your NOD is never out of date
* Most updates are performed behind the scenes and ‘on-the-fly’ without the need for a reboot.
* Small incremental update of the virus database minimizes network congestion and download times (usually under 50kB).
* Allows flexible scheduling of updates and selection of various update profiles.
* Checks for updates of the system at user-defined intervals or even upon the occurrence of a predefined event.
* Provides intelligent update options for computers on dial-up access.
* Supports proxy-servers (Basic and NTLM authentication).
* Provides authentication of the origin of downloaded update files using a digital signature technique.
* Supports updating from a local site without accessing the Internet, such as from a server within a LAN.
* The upgrade system can be configured to reflect a multi-level hierarchy and/or other needs of a large company or organization; including the ability to download updates from a local mirror server.
* Creates updates to a floppy or CD for PCs that are not connected to the network.
* Configuration settings can be distributed to local workstations from an administrator’s computer.
* Provides the option to use a configuration file to set system parameters across the network during initial installation and/or subsequent updates.
* Supports ‘silent mode’ on end-user workstations: notification messages may be forwarded to an administrator only.
* Allows the settings to be password protected.


Centralized Logging provides information on:

* On-demand scanner results
* Relevant events (e.g. performed updates, executed tasks, etc.)
* Infiltrations detected by resident modules and filters

NOD32 Control Center

This central management console provides full access to NOD32's features, tools and settings and fully integrates all installed system components. These are categorized into four different sections, each of which can be expanded into an easy-to-use directory tree style system. For increased security, the key settings can be password protected to prevent unauthorized access and modification.


System Requirements

* Operating System
o Microsoft Windows NT 4.0, 2000 and 2003 Server
o Microsoft Windows XP Home and Professional, including Windows XP Professional x64 Edition
o Windows Vista 32-bit and 64-bit
* CPU 386 or higher processor (Pentium recommended)
* 30 MB free hard disk space
* 32 MB RAM (64 MB RAM recommended)
* VGA or better graphic card



http://rapidshare.com/files/66663765/nod_32_final-mayonez.net.rar

Password:
www.mayonez.net
__________________

Click the image to open in full size.

Konu Bülent tarafından (11-01-2007 Saat 15:49 ) değiştirilmiştir..
| CF | is offline | CF | isimli üyenin yazdığı bu Mesajı değerlendirin.   Alıntı ile Cevapla