Bitdefender Quick Scan uses in-the-cloud scanning technology to detect active malware on your system, in under a minute.Because it focuses on active e-threats, the product uses just a fraction of the system resources needed by a regular virus scan and requires no time-consuming virus signature updates, as the detection process is performed by remote Bitdefender servers.

.megamenu-hover { opacity:.70; filter: alpha(opacity=70); } .megamenu-hover:hover { opacity:1; filter: alpha(opacity=100); cursor:pointer; } .submenu img { margin-bottom:5px; } .submenu { color:white ! important; } .submenu .link:hover { text-decoration:underline !

important; } .submenu { max-width:250px; } .submenu .bodytext a { text-align:left; } .submenu .bodytext a:hover { text-decoration:underline !

important; } /* Remove "Display Statement" from megamenu */ /*.submenu .product-tile { margin-top: 10px; } .submenu .product-tile .description { display: none; } .submenu .product-tile .content { height:auto; }*/ .nav-main .product-tile .btn-buy{max-width:160px} .quick-help-links a { text-align:left !

important; margin:5px 15px 5px 0; padding-left:15px; background:url(//cdn3.esetstatic.com/eset/US/pages/product/icons/misc/icon-megamenu-link-arrow.png) no-repeat left; } .quick-help-links a:hover { text-decoration:underline !

Trend Micro reserves the right to change the terms of these free antivirus site offerings without advance notice.

Trend Micro also reserves the right to refuse service to any Web site at its sole discretion. Trend Microâ„¢ Internet Security includes all the functionality of House Call, plus automatic virus updates personal firewall, spyware detection and removal, spam blocking, protection against identity theft, and Wi-Fi network protection. "Active malware" refers to malicious programs that have been installed on computers and are capable of launching themselves after the computer restarts.

House Call cleans up threats but does not prevent them. These programs typically perform malicious activities, including contacting a "command & control" center, logging keystrokes, copying personal data, and sending spam.

important; } /*.submenu .product-tile .description { height:30px; } .submenu .product-tile { height:30px; }*/ .sneaky-right { margin-left:15px; } .

The terms 32-bit and 64-bit refer to the way a computer's processor (also called a CPU), handles information.