4 Kaspersky Security for PDA
4.2.7. The confidential file properties screen ................................................... 60
4.3. Running Kaspersky Security for Windows CE ............................................ 61
4.3.1. Creating a confidential file ...................................................................... 61
4.3.2. Mounting a file as a confidential folder................................................... 64
4.3.3. Opening a confidential file ...................................................................... 67
4.3.4. Unmounting a confidential folder............................................................ 69
4.3.5. Deleting a confidential file....................................................................... 70
4.3.6. Changing the settings of a confidential file............................................. 70
4.3.7. Changing the access-password to a confidential file ............................ 72
CHAPTER 5. KASPERSKY ANTI-VIRUS FOR PALM OS................................... 74
5.1. Purpose and main functions......................................................................... 74
5.2. Starting the program ..................................................................................... 75
5.3. Interface ....................................................................................................... 75
5.3.1. Main screen ............................................................................................ 75
5.3.2. Menu ....................................................................................................... 75
5.3.3. Dialogs and controls ............................................................................... 77
5.4. Managing the anti-virus ................................................................................ 78
5.4.1. Configuring the program......................................................................... 78
5.4.2. Searching for and deleting viruses......................................................... 79
5.4.2.1. Starting to search for and delete viruses ......................................... 79
5.4.2.2. Monitoring HotSynced or Beamed data .......................................... 80
5.4.2.3. Scanning for viruses on demand ..................................................... 81
5.4.2.4. Working with the disinfect dialog...................................................... 82
5.4.2.5. Performance statistics ...................................................................... 83
5.4.3. Working with your log file........................................................................ 84
5.4.3.1. Displaying the log file........................................................................ 84
5.4.3.2. Clearing the log file ........................................................................... 84
5.4.3.3. Beaming a log file ............................................................................. 85
5.4.4. Displaying the list of known viruses ....................................................... 85
5.4.5. Updating your anti-virus databases ....................................................... 86
5.4.5.1. … by beaming an update from another Palm device ..................... 86