AVGメーカーInternet Security 2014の使用説明書/サービス説明書
ページ先へ移動 of 149
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r. o . A l l ri gh t s re s e rv e d. 1 Doc um e n t r e v is i o n 2 014 .05 (21 .8.2 01 3) C o p y r ight A V G Te c hno lo gie s C Z , s.r .o .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 Con t e n t s .. . . . .. . . . .. . . . .. . . . .. . . . .. . . .. . . . .. . . . .. . . . .. . . . .. . .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . ..
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 .. . .. . .. . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . . .. . .. . ..
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 . I n t rod u c ti on T his us er manu al pro v ides c ompre hen s iv e us er documentat ion f or AVG I n t e rne t S e curity 20 14 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 . AV G Inst al la t i on Requ i reme n t s 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 . AV G Inst al la t i on Pr oce ss T o ins t all AVG I n t e rne t S e curity 20 14 on y our c o mputer , y ou ne ed t o ge t t he lates t ins t allati on f i le.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 3 . 2. W el c ome: L i c en s e Agr eem en t T he W elco.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 3 . 3. Ac ti vat e you r l i c en se I n t he A ct i vat.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 C anc el - c lic k t o exi t t he s e t up pr oc es s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 T o re v er t t o t he def au l t de s t ination pr e- s e t by t he s of t wa re v en do r us e t he De fault butt on.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 C anc el - c lic k t o exi t t he s e t up pr oc es s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 . 7.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 . 8.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 5 4 . Afte r I n sta l l a t i on 4 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 6 I f AVG fa i l s to i de nt i f y the E I CA R te s t fi l e a s a virus , you s houl d che ck the progra m conf i gura t io n a ga i n! 4 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 7 5 . AV G Us e r I n t e r face A V G I nte r ne t Se c.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 8 A V G gadget i s ac c es s ible f ro m t he W in do w .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 9 5 . 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 0 5 . 1.4. Opti on s T he m ainten an c e of AVG I nte rne t S e c u rity 201 4 is ac c es s i ble v ia t he Opt i ons it em.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 1 c ompo ne nt. H elp conte nts - Open s t he A VG help f i les . Ge t s uppo rt - Ope ns t he A V G web s ite ( h t t p: / / w w w .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 2 - t he or ang e ic o n indic ates t ha t A V G I ntern.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 3 A ct i o ns a c ce s s i bl e M ove m ous e over any com ponent 's i con t o high l igh t it within t he c o mpon ents ov er v i ew .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 4 Scan n ow - T he butt on is gra ph i c ally div ide d int o t wo s ec t ion s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 5 T he A VG S ys tem Tray I con als o inf or ms abo ut c urr ent ac t iv it ies w it hin y our AVG I nte rne t S e c uri t y 201 4 , an d on po s s i ble s t at us c h ang es i n t he pr og r am ( e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 6 A V G ga dge t cont rol s I f ne ed ed , t he A V G ga dg et allow s y ou t o lau nch a s can or an up da t e im media t ely .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 7 5 . 8.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 8 5 . 9. AV G Ac c el erator A V G A cce l era tor allow s s moo t her on l ine v ide o playback and m ak es add it iona l do w nloa ds easi er .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 2 9 6 . AV G C omp on e n t s 6 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 0 En abled / D i s abled - T he bu t t on may re m ind y ou of a t raf f ic li gh t, both in app ea r an c e and in f unct i on ality .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 1 Firs t , y ou ha v e t o s pec if y y our s a f e&apos.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 2 A cce s s - t he c heck box es i n t his s ec t ion ena ble y ou t o c rea t e c onv en ien t s hor t c u t s t o y o ur data s a f e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 3 c ompu t er s imply by v is i t ing t he af f ec t ed s it e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 4 D et ai l s - Clic k t he butt on , an d a brie f desc r i ption of t he high lighted s er v i c e app ea rs in t he bo t t om pa r t of t h dialog .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 5 En abled / D i s abled - T he bu t t on may re m ind y ou of a t raf f ic li gh t, both in app ea r an c e and in f unct i on ality .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 6 mes s age s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 7 on ly ! Stat i s ti cs - C lic k t he bu t t on t o get re dir ect ed t o t he ded ic at ed pag e on t he A V G we bsi t e (h t t p:/ / w w w.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 8 A va i l a bl e Fi re w a l l m ode s Fire w all allow.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 3 9 D i a log controls T he dialog pr ov i de s an ov er v.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 0 T he f ollow i ng c a t eg or ies c an be ana l y z ed.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 1 T he result s ov erv iew pro v ides t he numb er of detec t ed s y s tem pr ob l ems c l ass if ied ac c or ding t o t he respect i v e c atego rie s t es t ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 2 7 . AV G S e cu rit y Tool bar A V G S ec uri t y Too .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 3 D o Not Track - t he DN T s er v ic e help s y ou iden t if y we bs it es t hat ar e c ollec t ing data abo ut y our online act i v i t ies , an d giv es y ou t he c hoic e t o allow or dis allow i t .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 4 A V G S ec uri t y Too l bar . Shor t c ut butt ons f or quic k ac c es s t o t hes e app l ic at ion s : Ca l culat or , Not epad , W i ndows E xplorer .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 5 8 . AV G D o Not Tr a ck A V G Do Not T ra ck helps y ou iden t if y we bs it es t hat ar e c ollec t ing data abo ut y our online act i v i t ies .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 6 Al l detec t ed data c ollec t ion s er v i c es ar e lis ted in t he Trac k ers o n this page ov erv iew .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 7 B l ock A ll - Clic k t he bu t t on loc ated in t he .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 8 s er v i c e s h ould be allow ed or block ed i nd iv idu ally . Y ou may allow run nin g of s ome of t he detec t ed s y s tems (e .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 4 9 9 . AV G A dv a n ce d S et t i n gs T he adv an c ed c onf igu ra t i on dia log of A V G I n t e rne t S e curity 201 4 ope ns i n a new wind ow name d A dv anc ed A V G S et tin gs .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 0 Press t he Re s tart A VG now bu tt on t o ag r ee w i.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 1 on . o Em a il S canner notificat i o ns (o n, b y defau lt ) - deci de w he t he r inf or mati on on s c ann i ng of all inc oming an d outgo ing email mes s age s s hou ld be dis play ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 2 9 . 2.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 3 9 . 3.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 4 9 . 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 5 A s k m e before rem ovin g thre ats ( on b y de fault.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 6 I n t he F i l es S canned by t he Re s i dent S hi el.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 7 Scan appl i cat i on s an d S ca n dri ve rs en ab l e y ou t o s pecify in de t ail w ha t s hou l d be inc lude d in an t i-r ootk i t s c ann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 8 9 . 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 5 9 9 . 5.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 0 R eport P ote ntiall y U nwant ed P rog rams and S pywa re thre ats ( on b y de fault ) - c heck t o ac t iv ate s c ann ing f or s py wa re as w ell as fo r v iru s es .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 1 t o email mes s age s with att ac hmen t s : By def au l t , t he c er t if i c ati on t ext c o ns is ts of j ust a ba s ic inf or mat ion t ha t s t ates No v i ru s f oun d in t his mes s age .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 2 T he A t tac hm ent f i l te r dialog allow s y o u t o s e t up par ame t er s f or email mes s age at t ac hmen t s cann ing .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 3 I n t his dia log y ou c an s et up a new E mail S c a.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 4 au t omatic ally c rea t ed " A utoP OP3" s er v ers t his f ield is dea c tiv ated.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 5 SM TP S erve r Na m e - in t his f ield y ou c a n s p.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 6 I n t his dia log y ou c an s et up a new E mail S c a.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 7 au t omatic ally c rea t ed " A utoI M A P " s er v ers t his f ield is de ac t iv a t ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 8 I n t he A nt i -Spam S ett i ngs dialog y ou c an c heck /uncheck t he Turn on A nt i -Spam p rot ec tion c heck b ox t o allow / pr oh ibit t he an ti -spam s cann ing of email c ommunic ation.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 6 9 A dd rec i pi ents of s ent em ail s to whi t eli s t .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 0 c ommunic ation with t he Mails hell s er v e rs, i. e. t he s c ann ed da t a will be c ompa re d with M ails hell da t ab as es on line.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 1 impor t i t by s e lec t ing t his bu t t on . T he c ontent of t he f i le m us t c on t ain on ly one it em ( a dd ress , do main na me ) pe r line.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 2 The E xpert S et tings branch conta i ns ex te ns i ve s et tin g options for t he A nt i -Spam fea ture.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 3 A dd 'Secure d by Li nk S ca nner'.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 4 de t ect ed t hr ea t : v i a s t and ar d po p- up dialog , v ia t r ay balloo n notif ic at ion, or v ia t r ay i c on inf o.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 5 c ompu t er b eing i nfec t ed ) y ou may c heck t his.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 6 W h en t he I de nt it y P rotec t ion is ac t iv ated.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 7 9 . 8.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 8 Scan i n s i de archives ( off b y defau lt ) - t his par amet er s tipulates t ha t s cann ing s hou l d c hec k all f i les s t or ed i nsi de ar c h iv es , e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 7 9 9 . 8.2. S p ec i fi c Fi l es o r Fol d ers Sc an T he editi ng interf ac e f or S ca n S pec i f i c Fi l es or Fol ders is iden t ic al t o t he W ho l e Co mputer Sc a n ed it ing dia log.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 0 T he l is t of par ameters i s iden ti c al t o t hose av ailab le fo r t he S c a n of t he W h ole C ompu t er .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 1 9 . 8.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 2 9 . 9.1. S c h edu l ed Sc an T he par amet er s of t he s c hed uled s can c an be edited ( o r a new s c h ed ule s et up ) on t hr ee t ab s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 3 A dva nce d s che dul e optio ns T his s e c t ion all.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 4 R eport enhance d s et o f pote ntiall y unwant ed pro.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 5 s w it c hed on b ut nob od y is c urr ently w or k ing on it ). On t he other han d, y o u c an de c re ase t he s y s tem re s o ur c es us ed by ex t end ing t he s c ann i ng du r ation.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 6 On t he Locat i on t ab y o u c an de f i ne w he t he r y ou wa nt t o s c h ed ule s c ann ing of t he w ho le c o m pu t er or s c ann ing of s pecific files or f older s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 7 Finally , c heck t he Run t he u pdat e again as s oon.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 8 Ot he r upda te s e t t i ngs C he c k t he Run the up.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 8 9 A dva nce d s che dul e optio ns T his s e c t ion all.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 0 R equire conf i rm at i on f rom the us er (b y defau .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 1 9 . 10 .1. Pr ox y T he pro x y s e rv er is a s t and - alon e s er v er or a s erv ic e r un ning on a PC t hat gua r an t ee s s af er c onn ec t ion t o t he I nt er net.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 2 c on ne c t ing t o t he In t ern et v ia t he pr oxy s e r v e r.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 3 M ove down - m ov es t he s e lec t ed U R L one pos it ion dow n i n t he lis t 9 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 4 T he c h art in t he dia log dis plays a l is t of ex c eptions, i f any hav e bee n alre ady de fin ed .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 5 9 . 12 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 6 9 . 13 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 7 W ithin t he dialog , t he f ollow i ng s e t t ing op.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 8 max im um s a f ety . Mos t com m on t hre a ts N ow ada y s , t her e ar e f ar more t hre at s out t her e t ha n plain v i ru s e s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 9 9 9 . 15 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 0 re m embe r t he un iqu e at t r ibutes of t he netwo rk (s pe c if ic a lly t he M A C ad dr es s ) , and w ill no t dis pla y t he no t if i c ati on ne x t t ime.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 1 1 0 . Firew a l l S e t t i ngs T he Fi re wall c o nf igu ra t i on op ens in a ne w w indo w whe re in s ev er al dialog s y ou c an s et up ad v anc ed pa r ameter s f or t he c ompon ent.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 2 Fire w all allow s y ou t o def ine s peci f i c s ec ur i t y ru les ba s ed on w he t he r y our c omputer is l ocat ed in a do main, i s a s t and alo ne c ompu t er , or ev en a notebo ok.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 3 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 4 do not m odify the s et tin gs ! C ontrol butt ons T he l is t c an be edited us ing t he f ollow ing c ontro l bu t t on s : A dd - op en s an empty dialog f or de f ining new app l ic at ion ru l es.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 5 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 6 1 0.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 7 Ed i t net work - ope ns t he Ne tw ork propert i es.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 8 A ction - T his c olumn dis play s an ic on f or t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 0 9 re s p ect iv e l og ac t ion, us er na me, P I D , .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 0 C ontrol butt ons R ef res h l i s t - all l og ged .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 1 1 1 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 2 I n t he S can Option s dia log, y ou c an s ee t hr.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 3 Sca n configu ra ti on e ditin g You c a n ed it t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 4 R eport P ote ntiall y U nwant ed P rog rams and S pywa re thre ats (on b y de fault ) - Ch ec k t o ac t iv a t e t he s c ann i ng f or s py wa re as w ell as fo r v i r uses .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 5 o C om puter s hutdown o ptions - deci de w he t he r t he c ompu t er s h ou l d be s hut dow n au t omatic ally once t he run nin g s c a nn ing pr oc es s is ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 6 W a rni n g: These s c an s et t ing s ar e iden t i.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 7 Sca n configu ra ti on e ditin g You c a n ed it t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 8 s c ann ing f or s py wa re as w ell as fo r v iru s es .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 1 9 o C om puter s hutdown o ptions - deci de w he t he r t he c ompu t er s h ou l d be s hut dow n au t omatic ally once t he run nin g s c a nn ing pr oc es s is ov er .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 0 W a rni n g: These s c an s et t ing s ar e iden t i.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 1 Sca n configu ra ti on e ditin g You c a n ed it t h.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 2 W ithin W ind ow s E x plor er high light t he f i l.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 3 if a pa ra m eter re qu i re s s peci f i c v a lue t o be pr ov ided (e.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 4 / LO G Ge ne ra t e a s c a n re s ult f il e / MA C.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 5 1 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 6 1 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 7 1 1.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 8 U s e heuri s tics ( on b y de fault ) : he ur i s t.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 2 9 o Sel ec te d fil e ty pes - y ou c an s peci f y t .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 0 1 1.4.3. L oc ati on On t he Locat i on t ab y o u c an de f i ne w he t he r y ou wa nt t o s c h ed ule s c ann ing of t he w ho le c o m pu t er or s c ann ing of s pecific files or f older s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 1 W indows fold er - C: W ind ows Ot her o Syst em dri.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 2 o N o inf ec t ions fo und , s c an c ompleted o N o.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 3 D et ect i o ns - T his t ab is only dis pla y ed if.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 4 1 2 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 5 1 3 . V i rus V a u l t Vi rus V aul t is a s a f e env iron m en t f or t he mana gemen t of s us pe c t / inf ec t ed ob jec t s de t ect ed dur i ng AV G t es t s .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 6 C ontrol butt ons T he f ollow i ng c o ntro l bu t .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 7 1 4 . Hi st or y T he His tory s ec t ion inc lude s inf or mat ion on all pa s t ev ents (s uch as upd ates , s c ans, detec t ions, et c .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 8 - re d ic on wa rn s t her e w as an i nf ect ion de.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 3 9 W ithin t his wa rn i ng dia log y ou will f i nd in.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 0 For eac h detec t ed object t he f ollow ing i nf or.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 1 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 2 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 3 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 4 For eac h detec t ed object t he f ollow ing i nf or.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 5 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 6 1 4.
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 7 1 5 .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 8 Prog r am up da t e s c hed ule N ote : I f a s c h .
A V G I nt e rn e t S e c ur i t y 2 0 1 4 © 2 0 1 3 C o py ri g h t A V G T e c h no lo gi e s C Z , s .r.o. A l l ri gh t s re s e rv e d. 1 4 9 1 6 .
デバイスAVG Internet Security 2014の購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
AVG Internet Security 2014をまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはAVG Internet Security 2014の技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。AVG Internet Security 2014の取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。AVG Internet Security 2014で得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
AVG Internet Security 2014を既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はAVG Internet Security 2014の不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、AVG Internet Security 2014に関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちAVG Internet Security 2014デバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。