About intelligent update, New product registration method, About viruses – Asus W1Gc User Manual
Page 60
59
Software
Utilities
About Intelligent Update
Intelligent Update automatically searches for and downloads the latest files for PC-cillin 2002. This includes
pattern and program files for both the main program and PC-cillin for Wireless. In addition, Intelligent
Update ensures you have the latest Personal Firewall rules. This powerful function keeps PC-cillin and all its
components updated; offering you maximum protection with minimal user intervention.
Once your computer is running, PC-cillin checks for an Internet connection. When this feature is enabled
and your computer is online, PC-cillin automatically connects to the Trend Micro server to check if the latest
update is available. If newer components are on the server, a pop-up window appears asking if you want to
start downloading. If you choose not to download immediately, the pop-up window reappears in 10 minutes.
New product registration method
PC-cillin 2002 offers a new way to register your software online. On our Registration Web page, simply type
your name and email address in the appropriate fields, receive your License Key via email, and insert it into
the correct field on the Register Now screen of the PC-cillin window.
Registration only takes a few minutes and Trend Micro provides technical support, virus pattern downloads,
and program updates for one year to all registered users, after which you must purchase renewal maintenance.
About viruses
A computer virus is a program that replicates. To do so, it needs to attach itself to other program files (for
example, .exe, .com, .dll) and execute whenever the host program executes. Beyond simple replication, a
virus almost always seeks to fulfill another purpose: to cause damage.
Called the damage routine, or payload, the destructive portion of a virus can range from overwriting critical
information kept on your hard disk's partition table to scrambling the numbers in your spreadsheets to just
taunting you with sounds, pictures, or obnoxious effects.
It is worth bearing in mind, however, that even without a "damage routine," viruses allowed to run unabated
will continue to propagate--consuming system memory, disk space, slowing network traffic and generally
degrading performance. Besides, virus code is often buggy and can also be the source of mysterious system
problems that take weeks to understand. So, whether a virus is harmful or not, its presence on your system
can lead to instability and should not be tolerated.
Some viruses, in conjunction with "logic bombs," do not make their presence known for months. Instead of
causing damage right away, these viruses do nothing but replicate--until the preordained trigger day or event
when they unleash their damage routines on the host system or across a network.
To learn more about any particular virus, or about viruses in general, you can access Trend Micro's online
Virus Encyclopedia at: www.antivirus.com/.