SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
2014 EDITION

enjoy safer technology
Stay a Safe Distance from Internet Threats
Enjoy safer online browsing and offline activities with a detection technology trusted by millions of users around the world. It eliminates
all types of threats, including viruses, rootkits, worms, spyware and phishing attacks. Your passwords and banking details stay secure
with Anti-Phising. In addition, ESET NOD32 Antivirus keeps you a safe distance even from threats that evade detection - our Exploit
Blocker technology detects and stops such attacks.

Antivirus and Antispyware

Anti-Phishing

Protects your privacy and assets against attempts by fake websites to acquire sensitive information such
as usernames, passwords or banking details.

Exploit Blocker

Secure your digital life and enjoy safer
technology protected by ESET NOD32
Antivirus. Building on the legendary
ESET NOD32, you can take advantage
of our unique technology that fights off
malware that purposely evades detection.
Whether it’s social networking, browsing
the Internet or just playing, ESET NOD32
Antivirus has your security covered.

Provides proactive protection against all types of online and offline threats and prevents malware
spreading to other users

Blocks attacks specifically designed to evade antivirus detection
Eliminates lockscreens and ransomware
Protects from attacks on web browsers, PDF readers and other applications

Advanced Memory Scanner

Enables improved detection of persistent malware that employs multiple layers of encryption to
conceal its activity

Cloud-powered Scanning

Speeds up scans by whitelisting safe files based on file reputation database

Scan while
Downloading Files

Decreases scanning time by scanning specific file types − such as archives or iPhone updates − during
the download process

Idle-state Scanning

Aids system performance by performing in-depth scan when the computer is not in use
Helps detect potential inactive threats before they can cause damage

Device Control

Allows to prevent unauthorized copying of your private data to external device
Allows you to block storage media - CDs, DVDs, USB sticks, and disk storage devices
Lets you block devices connecting via Bluetooth, FireWire and serial/parallel ports

Host-based Intrusion
Prevention
System (HIPS)

Lets you customize the behavior of the system in greater detail
Gives you the option to specify rules for system registry, active processes and programs to fine-tune
your security posture
Enjoy the Full Power of Your Computer
Leaving more power to programs you use daily, the solution lets you play, work and browse the Internet without slowdowns. Stay
unplugged and online longer with battery-saving mode and enjoy gaming without distracting pop-ups.
Small System Footprint

Maintains high performance and extends the lifetime of hardware
Fits any type of system environment
Saves internet bandwidth with extremely small update packages

Gamer Mode

ESET NOD32 Antivirus automatically switches to silent mode if any program is run in full-screen mode
All pop-up windows, updates and other system-demanding activities are postponed to preserve system
resources for gaming or other full-screen activities (video, photo gallery, presentations)

Portable Computer Support

Postpones all non-actionable pop-up windows, updates and system-demanding activities to preserve
system resources so that you can focus on gaming or films

Install and Forget or Tweak Away
Delivering top protection right from the start with the default settings, ESET NOD32 Antivirus keeps you informed about potential
security issues and lets you address them directly from the main screen. Sleek user interface is designed to let you easily set up all routine
tasks. In addition, you can fine-tune your security profile with more than 150 detailed settings.
One-click Solution

Lets you view your protection status and access the most frequently used tools from all screens
Offers comprehensive, one-click solutions to potential issues

Settings for Advanced Users

Offers in-depth security settings to fit your needs
Allows you to define maximum scanning depth, scanning time, and size of the scanned files and archives
and much more

After-scan Actions

Lets you choose the action after an on-demand scan completes, saving you time
The available actions are: sleep, reboot or shutdown

ESET Social Media Scanner
Extend your security to Facebook and Twitter with this app. The app’s Security Center informs you which of your private information is
visible to public and provides direct links to tune-up your social media security profile.
On Facebook, it protects your timeline, messages and newsfeed and the timelines of your friends. On Twitter, it protects your profile
and posts from those you are following.

Copyright © 1992 – 2013 ESET, spol. s r. o. ESET, logo
ESET, NOD32, ThreatSense, LiveGrid, ThreatSense.Net
and/or other mentioned products of ESET, spol. s r. o.,
are registered trademarks of ESET, spol. s r. o. Other
here mentioned companies or products might be
registered trademarks of its proprietors. Produced
according to quality standards of ISO 9001:2000.
Your Reseller Contact
Information Here
Orioris experruntia con coraestrunto di
ut mosae. Bea corepel eaque id qui comni
iustio. Loreres equassu ntibus.
At fuga. Venis a dolorum volor resti nusda
non nobis nihil iducienit ut es re, elluptio
quunt.
Cae. Ut fuga. Itaera sum quo tecum
dus eosape officilles as et optatureptia
volorest id mos maximinum, qui sime nos

Mais conteúdo relacionado

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

ESET_NOD32_Antivirus_2014_product_overview_eng

  • 2. Stay a Safe Distance from Internet Threats Enjoy safer online browsing and offline activities with a detection technology trusted by millions of users around the world. It eliminates all types of threats, including viruses, rootkits, worms, spyware and phishing attacks. Your passwords and banking details stay secure with Anti-Phising. In addition, ESET NOD32 Antivirus keeps you a safe distance even from threats that evade detection - our Exploit Blocker technology detects and stops such attacks. Antivirus and Antispyware Anti-Phishing Protects your privacy and assets against attempts by fake websites to acquire sensitive information such as usernames, passwords or banking details. Exploit Blocker Secure your digital life and enjoy safer technology protected by ESET NOD32 Antivirus. Building on the legendary ESET NOD32, you can take advantage of our unique technology that fights off malware that purposely evades detection. Whether it’s social networking, browsing the Internet or just playing, ESET NOD32 Antivirus has your security covered. Provides proactive protection against all types of online and offline threats and prevents malware spreading to other users Blocks attacks specifically designed to evade antivirus detection Eliminates lockscreens and ransomware Protects from attacks on web browsers, PDF readers and other applications Advanced Memory Scanner Enables improved detection of persistent malware that employs multiple layers of encryption to conceal its activity Cloud-powered Scanning Speeds up scans by whitelisting safe files based on file reputation database Scan while Downloading Files Decreases scanning time by scanning specific file types − such as archives or iPhone updates − during the download process Idle-state Scanning Aids system performance by performing in-depth scan when the computer is not in use Helps detect potential inactive threats before they can cause damage Device Control Allows to prevent unauthorized copying of your private data to external device Allows you to block storage media - CDs, DVDs, USB sticks, and disk storage devices Lets you block devices connecting via Bluetooth, FireWire and serial/parallel ports Host-based Intrusion Prevention System (HIPS) Lets you customize the behavior of the system in greater detail Gives you the option to specify rules for system registry, active processes and programs to fine-tune your security posture
  • 3. Enjoy the Full Power of Your Computer Leaving more power to programs you use daily, the solution lets you play, work and browse the Internet without slowdowns. Stay unplugged and online longer with battery-saving mode and enjoy gaming without distracting pop-ups. Small System Footprint Maintains high performance and extends the lifetime of hardware Fits any type of system environment Saves internet bandwidth with extremely small update packages Gamer Mode ESET NOD32 Antivirus automatically switches to silent mode if any program is run in full-screen mode All pop-up windows, updates and other system-demanding activities are postponed to preserve system resources for gaming or other full-screen activities (video, photo gallery, presentations) Portable Computer Support Postpones all non-actionable pop-up windows, updates and system-demanding activities to preserve system resources so that you can focus on gaming or films Install and Forget or Tweak Away Delivering top protection right from the start with the default settings, ESET NOD32 Antivirus keeps you informed about potential security issues and lets you address them directly from the main screen. Sleek user interface is designed to let you easily set up all routine tasks. In addition, you can fine-tune your security profile with more than 150 detailed settings. One-click Solution Lets you view your protection status and access the most frequently used tools from all screens Offers comprehensive, one-click solutions to potential issues Settings for Advanced Users Offers in-depth security settings to fit your needs Allows you to define maximum scanning depth, scanning time, and size of the scanned files and archives and much more After-scan Actions Lets you choose the action after an on-demand scan completes, saving you time The available actions are: sleep, reboot or shutdown ESET Social Media Scanner Extend your security to Facebook and Twitter with this app. The app’s Security Center informs you which of your private information is visible to public and provides direct links to tune-up your social media security profile. On Facebook, it protects your timeline, messages and newsfeed and the timelines of your friends. On Twitter, it protects your profile and posts from those you are following. Copyright © 1992 – 2013 ESET, spol. s r. o. ESET, logo ESET, NOD32, ThreatSense, LiveGrid, ThreatSense.Net and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Other here mentioned companies or products might be registered trademarks of its proprietors. Produced according to quality standards of ISO 9001:2000.
  • 4. Your Reseller Contact Information Here Orioris experruntia con coraestrunto di ut mosae. Bea corepel eaque id qui comni iustio. Loreres equassu ntibus. At fuga. Venis a dolorum volor resti nusda non nobis nihil iducienit ut es re, elluptio quunt. Cae. Ut fuga. Itaera sum quo tecum dus eosape officilles as et optatureptia volorest id mos maximinum, qui sime nos