![]() Here you can remove all, some or none of the items found during the scan. The report after the scan divides items into threat categories, with critical threats displayed at the very top of the scan results. ![]() Threats are displayed immediately while the scan progresses. You find them listed in categories such as for example, and can click on the plus icon in front to look up all file names and paths of threats that have been found. ![]() A quick scan on the other hand completed on the same PC in less than 2 minutes. You can select to scan the memory, Registry, Startup locations and cookies, and add folders (drives too) to the scan.īenchmarks: A complete scan with low boost priority took 36 minutes to complete on a system with a single 128 Gigabyte packed Solid State Drive. The Custom Scan on the other hand offers a different set of scanning options. Here you can also add items to the trusted items list, and exclude folders from the scan. In addition to that, you can open the scanning preferences which display a large list of scanning related options.The program will for instance only scan files that are smaller than 4 Megabytes, and will also ignore non-executable files.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |