"I Want To"..............................................................................................................................92
Appendix D: Advanced Web User Interface...................................93
Summary................................................................................................................................94
Alerts.......................................................................................................................................94
Virus Protection......................................................................................................................95
Realtime Scanning.......................................................................................................95
Scheduled Scanning ...................................................................................................99
Manual Scanning ......................................................................................................100
Firewall.................................................................................................................................105
General Settings .......................................................................................................105
Rules .........................................................................................................................106
Network Services ......................................................................................................106
Integrity Checking.................................................................................................................107
Known Files ..............................................................................................................107
Rootkit Prevention......................................................................................................107
General Settings...................................................................................................................108
Communications .......................................................................................................108
Automatic Updates.....................................................................................................110
Appendix E: List of Traps...............................................................113
Appendix F: Get More Help ...........................................................119
6 | F-Secure Linux Security | TOC