AVG Internet Security is capable of detecting Anti-of-trojan horses, worms and viruses on your computer, the AVG Enterprise has an internal database with all the settings to capture the threats immediately. Basically is the most important component of this package of security.
Anti-Spyware protects the PC of programs able to gather information about their habits in the PC and send them secretly to a destination on the Internet. It is also responsible for prevent adware, or unwanted propaganda and bars.
Checker\'s e-mail Notes email with plug-ins for customers best-known e-mail. He is responsible for detecting and eliminating viruses contained in attachments to messages, both received as those sent.
Anti-Rootkit Rootkits are collections of programs able to infect the whole network and get the level of administrator of computers. They are difficult to findings by common anti-virus and can cause an unprecedented damage. The tool Anti-Rootkit is the best way to find them.
System Tools Investigate processes, network connections, programs that start with Windows and even stretches of browsers. Great to see which processes accessing the Internet and check possible threats.
Link Scanner and Web Shield Two new ingredients that can make a difference for those who like to surf the web. The first can block dangerous sites and links suspects, while the second finds the network traffic preventing dangerous connections.
Resident Protection Works in the background checking of the data files you are using. It is he who instantly captures the entry of potential threats, compromising safety.
Firewall protects your computer from unwanted connections, creating a real barrier of protection between your machine and network. It is responsible for preventing the item that your computer is invaded and controlled by hackers, blocking the attempted invasion so detected. It offers a setup wizard, which can be executed at any time.
Anti-Spam Let the inbox of your customer e-mails free of spam, unwanted messages sent in mass to a number of users. He acts marking the suspicious messages, after being analyzed by various methods, such as SPAM. Then the sending directly to the trash - optional configuration - and records the sender on the famous blacklist.