Unlike last year, where F-Secure 2012
had a wonky double-installation process, this year's installation was
fast and pain-free. It even installed alongside a competitor, which we
experimented with just to see if it worked -- it's not good computer
security to have two suites running at once.
At around four minutes to complete the install, F-Secure isn't as fast Norton or Trend Micro Titanium, but it's definitely improved this year.
The main interface still presents itself as two clean, well-designed windows with three main sections. The Computer Security window offers Lies, Damned Lies, and Statistics. Just kidding, it's really Status, Tasks, and Statistics. Below that are three buttons for quick actions: Scan, with a drop-down to choose which kind of scan to run; Check for updates; and Settings. Note that the blue-and-yellow shield on Settings means that the changing settings requires approving the User Account Control (UAC).
The Online Safety window has an identical design, but with big-buttoned icons for Users, Tasks, and Statistics, and quick links below for Restrict Web content, Restrict browsing, and Create new account. Note that all three of those, plus the Users and Statistics sections, require UAC control.
At around four minutes to complete the install, F-Secure isn't as fast Norton or Trend Micro Titanium, but it's definitely improved this year.
The main interface still presents itself as two clean, well-designed windows with three main sections. The Computer Security window offers Lies, Damned Lies, and Statistics. Just kidding, it's really Status, Tasks, and Statistics. Below that are three buttons for quick actions: Scan, with a drop-down to choose which kind of scan to run; Check for updates; and Settings. Note that the blue-and-yellow shield on Settings means that the changing settings requires approving the User Account Control (UAC).
The Online Safety window has an identical design, but with big-buttoned icons for Users, Tasks, and Statistics, and quick links below for Restrict Web content, Restrict browsing, and Create new account. Note that all three of those, plus the Users and Statistics sections, require UAC control.
0 comments:
Post a Comment