{"id":1459,"date":"2012-06-05T07:06:09","date_gmt":"2012-06-05T07:06:09","guid":{"rendered":"http:\/\/www.onlinemagazine.gr\/?p=1459"},"modified":"2012-06-05T07:07:12","modified_gmt":"2012-06-05T07:07:12","slug":"eset-antivirus-%cf%80%cf%81%ce%bf%cf%83%cf%84%ce%b1%cf%84%ce%ad%cf%88%cf%84%ce%b5-%cf%84%ce%b7%ce%bd-%ce%b5%cf%84%ce%b1%ce%b9%cf%81%ce%af%ce%b1-%cf%83%ce%b1%cf%82","status":"publish","type":"post","link":"https:\/\/www.onlinemagazine.gr\/?p=1459","title":{"rendered":"ESET Antivirus: \u0398\u03c9\u03c1\u03b1\u03ba\u03af\u03c3\u03c4\u03b5 \u03c4\u03b7\u03bd \u03b5\u03c4\u03b1\u03b9\u03c1\u03af\u03b1 \u03c3\u03b1\u03c2"},"content":{"rendered":"<p><a href=\"http:\/\/www.onlinemagazine.gr\/wp-content\/uploads\/Eset-logo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-1460\" src=\"http:\/\/www.onlinemagazine.gr\/wp-content\/uploads\/Eset-logo-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>\u038c\u03c4\u03b1\u03bd\u00a0\u03c0\u03c1\u03cc\u03ba\u03b5\u03b9\u03c4\u03b1\u03b9\u00a0\u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03bc\u03b9\u03b1\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03af\u03b1\u03c2 \u03c3\u03c4\u03bf \u03c7\u03ce\u03c1\u03bf \u03c4\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03b4\u03b5\u03bd \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03c5\u03c0\u03ac\u03c1\u03c7\u03b5\u03b9 \u03ba\u03b1\u03bd\u03ad\u03bd\u03b1\u03c2 \u03c3\u03c5\u03bc\u03b2\u03b9\u03b2\u03b1\u03c3\u03bc\u03cc\u03c2. \u038c\u03bb\u03bf\u03b9 \u03b7 \u03b4\u03bf\u03c5\u03bb\u03b5\u03b9\u03ac \u03c3\u03b1\u03c2 \u03b2\u03c1\u03af\u03c3\u03ba\u03b5\u03c4\u03b1\u03b9 \u03bc\u03ad\u03c3\u03b1 \u03c3\u03c4\u03bf\u03c5\u03c2 \u03c3\u03ba\u03bb\u03b7\u03c1\u03bf\u03cd\u03c2\u00a0\u03b4\u03af\u03c3\u03ba\u03bf\u03c5\u03c2\u00a0\u03c4\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03ba\u03b1\u03b9 \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03c3\u03c6\u03b1\u03bb\u03b9\u03c3\u03c4\u03b5\u03af. \u00a0 \u0397 ESET \u03b1\u03bd\u03b1\u03ba\u03bf\u03b9\u03bd\u03ce\u03bd\u03b5\u03b9 \u03c4\u03b7 \u03b4\u03b9\u03ac\u03b8\u03b5\u03c3\u03b7 \u03c4\u03c9\u03bd \u03bd\u03ad\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd \u03b3\u03b9\u03b1 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b9\u03ba\u03bf\u03cd\u03c2 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2, \u03c4\u03b1 \u03c0\u03c1\u03bf\u03ca\u03cc\u03bd\u03c4\u03b1 ESET Endpoint Security \u03ba\u03b1\u03b9 ESET Endpoint Antivirus, \u03b5\u03bd\u03b9\u03c3\u03c7\u03cd\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b7 \u03b4\u03c5\u03bd\u03b1\u03bc\u03b9\u03ba\u03ae \u03c4\u03b7\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1\u03c2 \u03c3\u03c4\u03bf\u03bd<strong> <\/strong>\u03c4\u03bf\u03bc\u03ad\u03b1 \u03c4\u03c9\u03bd \u03b5\u03c0\u03b1\u03b3\u03b3\u03b5\u03bb\u03bc\u03b1\u03c4\u03b9\u03ba\u03ce\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd. \u03a4\u03b1 \u03c0\u03c1\u03bf\u03ca\u03cc\u03bd\u03c4\u03b1 ESET Endpoint Antivirus \u03ba\u03b1\u03b9 ESET Endpoint Security \u03b4\u03b9\u03b1\u03c4\u03af\u03b8\u03b5\u03bd\u03c4\u03b1\u03b9 \u03bc\u03b5 \u03c4\u03b7 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b1 ESET Remote Administrator, \u03b5\u03bd\u03ce \u03c4\u03bf ESET Endpoint Security \u03b5\u03af\u03bd\u03b1\u03b9 \u03b5\u03c0\u03b9\u03c0\u03bb\u03ad\u03bf\u03bd \u03b5\u03bc\u03c0\u03bb\u03bf\u03c5\u03c4\u03b9\u03c3\u03bc\u03ad\u03bd\u03bf \u03bc\u03b5 \u03c4\u03b1 \u03c7\u03b1\u03c1\u03b1\u03ba\u03c4\u03b7\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03ac Web Control, Two-way Firewall \u03ba\u03b1\u03b9 Client Antispam.<\/p>\n<p>\u0397 \u03bc\u03b9\u03ba\u03c1\u03ae \u03ba\u03b1\u03c4\u03b1\u03bd\u03ac\u03bb\u03c9\u03c3\u03b7 \u03c0\u03cc\u03c1\u03c9\u03bd \u03c4\u03bf\u03c5 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03bf\u03c2 \u03c3\u03b5 \u03c3\u03c5\u03bd\u03b4\u03c5\u03b1\u03c3\u03bc\u03cc \u03bc\u03b5 \u03c4\u03b7\u03bd \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b7 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b1 \u03c4\u03b7\u03c2 \u03b1\u03c0\u03bf\u03bc\u03b1\u03ba\u03c1\u03c5\u03c3\u03bc\u03ad\u03bd\u03b7\u03c2 \u03b4\u03b9\u03b1\u03c7\u03b5\u03af\u03c1\u03b9\u03c3\u03b7\u03c2, \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03bf\u03cd\u03bd \u03b9\u03b4\u03b1\u03bd\u03b9\u03ba\u03ac \u03c7\u03b1\u03c1\u03b1\u03ba\u03c4\u03b7\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03ac \u03b3\u03b9\u03b1 \u03ba\u03ac\u03b8\u03b5 \u03bc\u03ad\u03b3\u03b5\u03b8\u03bf\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03b7\u03c2. \u03a7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03ce\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b1 \u03c0\u03bf\u03bb\u03bb\u03b1\u03c0\u03bb\u03ac \u03b5\u03c0\u03af\u03c0\u03b5\u03b4\u03b1 \u03b1\u03bd\u03af\u03c7\u03bd\u03b5\u03c5\u03c3\u03b7\u03c2 \u03c4\u03b7\u03c2 \u03bc\u03b7\u03c7\u03b1\u03bd\u03ae\u03c2 ThreatSense \u03c4\u03b7\u03c2 ESET \u03ba\u03b1\u03b9 \u03c4\u03bf\u03c5 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03bf\u03c2 ESET Live Grid, \u03bf\u03b9 \u03bd\u03ad\u03b5\u03c2 \u03bb\u03cd\u03c3\u03b5\u03b9\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1\u03c2 ESET Endpoint Solutions \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03bf\u03c5\u03bd \u03ba\u03bf\u03c1\u03c5\u03c6\u03b1\u03af\u03b1 \u03c0\u03c1\u03bf\u03bb\u03b7\u03c0\u03c4\u03b9\u03ba\u03ae \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03b1\u03c0\u03cc \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b5\u03c1\u03c7\u03cc\u03bc\u03b5\u03bd\u03b5\u03c2 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2.<\/p>\n<p><strong> <\/strong><\/p>\n<p><em> <\/em><\/p>\n<p>\u0397 \u03bd\u03ad\u03b1 \u03b3\u03b5\u03bd\u03b9\u03ac \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd ESET Endpoint Solutions \u03c3\u03c5\u03bd\u03b5\u03c7\u03af\u03b6\u03bf\u03c5\u03bd \u03bc\u03b9\u03b1 \u03bc\u03b1\u03ba\u03c1\u03ac \u03c0\u03b1\u03c1\u03ac\u03b4\u03bf\u03c3\u03b7 \u03c4\u03c9\u03bd \u03c0\u03c1\u03bf\u03ca\u03cc\u03bd\u03c4\u03c9\u03bd \u03c5\u03c8\u03b7\u03bb\u03ae\u03c2 \u03c0\u03bf\u03b9\u03cc\u03c4\u03b7\u03c4\u03b1\u03c2 \u03b3\u03b9\u03b1 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b9\u03ba\u03bf\u03cd\u03c2 \u03c0\u03b5\u03bb\u03ac\u03c4\u03b5\u03c2, \u03b4\u03b9\u03b1\u03b8\u03ad\u03c4\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c0\u03ac\u03bd\u03c9 \u03b1\u03c0\u03cc \u03b4\u03ce\u03b4\u03b5\u03ba\u03b1 \u03bd\u03ad\u03b1 \u03c7\u03b1\u03c1\u03b1\u03ba\u03c4\u03b7\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03ac. \u03a7\u03b1\u03c1\u03b1\u03ba\u03c4\u03b7\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03cc \u03c0\u03b1\u03c1\u03ac\u03b4\u03b5\u03b9\u03b3\u03bc\u03b1, \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03bf\u03cd\u03bd \u03bf\u03b9 \u03bd\u03ad\u03b5\u03c2 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b5\u03c2, \u03cc\u03c0\u03c9\u03c2 \u03c4\u03bf Web Control<strong> <\/strong>(\u03c0\u03b5\u03c1\u03b9\u03bf\u03c1\u03af\u03b6\u03b5\u03b9 \u03c4\u03b7\u03bd \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03c3\u03b5 \u03b4\u03b9\u03ba\u03c4\u03c5\u03b1\u03ba\u03bf\u03cd\u03c2 \u03c4\u03cc\u03c0\u03bf\u03c5\u03c2 \u03b1\u03bd\u03ac \u03ba\u03b1\u03c4\u03b7\u03b3\u03bf\u03c1\u03af\u03b1), \u03c4\u03bf Device Control \u03ba\u03b1\u03b9 \u03bf\u03b9 \u03b2\u03b5\u03bb\u03c4\u03b9\u03ce\u03c3\u03b5\u03b9\u03c2 \u03c4\u03bf\u03c5 ESET Remote Administrator, \u03cc\u03c0\u03c9\u03c2 Role-Based Management, Rollback of Updates, Real-time Web Dashboard, Randomized Task Execution, Multiple Log Formats, RSA Envision Support \u03ba\u03b1\u03b9 Microsoft NAP Support.<\/p>\n<p>\u039c\u03b1\u03b6\u03af \u03bc\u03b5 \u03c4\u03b1 \u03c0\u03c1\u03bf\u03ca\u03cc\u03bd\u03c4\u03b1 Endpoint Solutions, \u03b7 ESET \u03b8\u03b1 \u03b4\u03b9\u03b1\u03b8\u03ad\u03c3\u03b5\u03b9 \u03c4\u03b9\u03c2 \u03c4\u03b5\u03bb\u03b5\u03c5\u03c4\u03b1\u03af\u03b5\u03c2 \u03b5\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2 \u03c4\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd \u03b3\u03b9\u03b1 \u03b5\u03c0\u03b1\u03b3\u03b3\u03b5\u03bb\u03bc\u03b1\u03c4\u03b9\u03ba\u03ae \u03c7\u03c1\u03ae\u03c3\u03b7: ESET File Security for Microsoft Windows Server, ESET File Security for Microsoft Windows Server Core \u03ba\u03b1\u03b9 ESET Mail Security for IBM Lotus Domino.<\/p>\n<p><strong>\u03a4\u03b1<\/strong><strong> <\/strong><strong>\u03ba\u03c5\u03c1\u03b9\u03cc\u03c4\u03b5\u03c1\u03b1<\/strong><strong> <\/strong><strong>\u03c7\u03b1\u03c1\u03b1\u03ba\u03c4\u03b7\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03ac<\/strong><strong> <\/strong><strong>\u03c4\u03c9\u03bd<\/strong><strong> ESET Endpoint Antivirus <\/strong><strong>\u03ba\u03b1\u03b9<\/strong><strong> ESET Endpoint Security <\/strong><strong>\u03b5\u03af\u03bd\u03b1\u03b9<\/strong><strong>:<\/strong><\/p>\n<p><strong> <\/strong><\/p>\n<p><strong>Web<\/strong><strong> <\/strong><strong>Control<\/strong><strong> <\/strong>(\u03bc\u03cc\u03bd\u03bf \u03c3\u03c4\u03bf ESET Endpoint Security) \u2013 \u03a0\u03b5\u03c1\u03b9\u03bf\u03c1\u03af\u03b6\u03b5\u03b9 \u03c4\u03b7\u03bd \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03c3\u03b5 \u03b9\u03c3\u03c4\u03bf\u03c3\u03b5\u03bb\u03af\u03b4\u03b5\u03c2 \u03b1\u03bd\u03ac \u03ba\u03b1\u03c4\u03b7\u03b3\u03bf\u03c1\u03af\u03b1, \u03b5\u03c0\u03b9\u03c4\u03c1\u03ad\u03c0\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c3\u03c4\u03bf \u03b4\u03b9\u03b1\u03c7\u03b5\u03b9\u03c1\u03b9\u03c3\u03c4\u03ae \u03bd\u03b1 \u03ba\u03b1\u03b8\u03bf\u03c1\u03af\u03c3\u03b5\u03b9 \u03c3\u03c5\u03b3\u03ba\u03b5\u03ba\u03c1\u03b9\u03bc\u03ad\u03bd\u03bf\u03c5\u03c2 \u03ba\u03b1\u03bd\u03cc\u03bd\u03b5\u03c2 \u03b3\u03b9\u03b1 \u03c4\u03b9\u03c2 \u03bf\u03bc\u03ac\u03b4\u03b5\u03c2 \u03c7\u03c1\u03b7\u03c3\u03c4\u03ce\u03bd \u03c0\u03bf\u03c5 \u03bd\u03b1 \u03c3\u03c5\u03bc\u03b2\u03b1\u03b4\u03af\u03b6\u03bf\u03c5\u03bd \u03bc\u03b5 \u03c4\u03b9\u03c2 \u03c0\u03bf\u03bb\u03b9\u03c4\u03b9\u03ba\u03ad\u03c2 \u03c4\u03b7\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1\u03c2, \u03c1\u03c5\u03b8\u03bc\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03c2 \u03ba\u03b1\u03b9 \u03b5\u03bb\u03ad\u03b3\u03c7\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c0\u03bf\u03b9\u03b5\u03c2 \u03b9\u03c3\u03c4\u03bf\u03c3\u03b5\u03bb\u03af\u03b4\u03b5\u03c2 \u03b5\u03c0\u03b9\u03c3\u03ba\u03ad\u03c0\u03c4\u03bf\u03bd\u03c4\u03b1\u03b9 \u03bf\u03b9 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2, \u03b2\u03ac\u03c3\u03b7 \u03c0\u03bf\u03bb\u03bb\u03b1\u03c0\u03bb\u03ce\u03bd \u03ba\u03b1\u03c4\u03b7\u03b3\u03bf\u03c1\u03af\u03c9\u03bd \u03b9\u03c3\u03c4\u03bf\u03c3\u03b5\u03bb\u03af\u03b4\u03c9\u03bd (gaming, \u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03b9\u03ba\u03ae \u03b4\u03b9\u03ba\u03c4\u03cd\u03c9\u03c3\u03b7, \u03b1\u03b3\u03bf\u03c1\u03ad\u03c2). \u039f\u03b9 \u03b9\u03c3\u03c4\u03bf\u03c3\u03b5\u03bb\u03af\u03b4\u03b5\u03c2 \u03c4\u03b1\u03be\u03b9\u03bd\u03bf\u03bc\u03bf\u03cd\u03bd\u03c4\u03b1\u03b9 \u03b1\u03c5\u03c4\u03cc\u03bc\u03b1\u03c4\u03b1 \u03c3\u03b5 \u03ba\u03b1\u03c4\u03b7\u03b3\u03bf\u03c1\u03af\u03b5\u03c2 \u03bc\u03ad\u03c3\u03c9 cloud-based \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03c9\u03bd. \u039f \u03b4\u03b9\u03b1\u03c7\u03b5\u03b9\u03c1\u03b9\u03c3\u03c4\u03ae\u03c2 \u03bc\u03c0\u03bf\u03c1\u03b5\u03af \u03bd\u03b1 \u03b5\u03c0\u03b9\u03bb\u03ad\u03be\u03b5\u03b9 \u03c4\u03b7\u03bd \u03b1\u03c0\u03b1\u03b3\u03cc\u03c1\u03b5\u03c5\u03c3\u03b7 \u03c4\u03b7\u03c2 \u03c0\u03bb\u03bf\u03ae\u03b3\u03b7\u03c3\u03b7\u03c2 \u03c3\u03b5 \u03b1\u03c5\u03c4\u03ad\u03c2 \u03c4\u03b9\u03c2 \u03c4\u03bf\u03c0\u03bf\u03b8\u03b5\u03c3\u03af\u03b5\u03c2 \u03c0\u03bf\u03c5 \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03bf\u03cd\u03bd \u03c5\u03c8\u03b7\u03bb\u03cc \u03cc\u03b3\u03ba\u03bf \u03bc\u03b5\u03c4\u03b1\u03c6\u03bf\u03c1\u03ac\u03c2 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd, \u03b4\u03b9\u03b1\u03c4\u03b7\u03c1\u03ce\u03bd\u03c4\u03b1\u03c2 \u03c4\u03bf bandwidth \u03c4\u03b7\u03c2 \u03c3\u03cd\u03bd\u03b4\u03b5\u03c3\u03b7\u03c2 \u03c3\u03cd\u03bc\u03c6\u03c9\u03bd\u03b1 \u03bc\u03b5 \u03c4\u03b7\u03bd \u03c0\u03bf\u03bb\u03b9\u03c4\u03b9\u03ba\u03ae \u03c7\u03c1\u03ae\u03c3\u03b7\u03c2 \u03c4\u03bf\u03c5 \u03b4\u03b9\u03b1\u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03c4\u03b7\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1\u03c2.<\/p>\n<p><strong>Client<\/strong><strong> <\/strong><strong>Antispam<\/strong> (\u03bc\u03cc\u03bd\u03bf \u03c3\u03c4\u03bf ESET Endpoint Security) \u2013 \u03a6\u03b9\u03bb\u03c4\u03c1\u03ac\u03c1\u03b5\u03b9 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03c3\u03bc\u03b1\u03c4\u03b9\u03ba\u03ac \u03c4\u03b1 \u03b1\u03bd\u03b5\u03c0\u03b9\u03b8\u03cd\u03bc\u03b7\u03c4\u03b1 \u03bc\u03b7\u03bd\u03cd\u03bc\u03b1\u03c4\u03b1 (spam).<\/p>\n<p><strong>Two<\/strong><strong>&#8211;<\/strong><strong>way<\/strong><strong> <\/strong><strong>Firewall<\/strong> (\u03bc\u03cc\u03bd\u03bf \u03c3\u03c4\u03bf ESET Endpoint Security) \u2013 \u0391\u03c0\u03bf\u03c4\u03c1\u03ad\u03c0\u03b5\u03b9 \u03c4\u03b7 \u03bc\u03b7 \u03b5\u03be\u03bf\u03c5\u03c3\u03b9\u03bf\u03b4\u03bf\u03c4\u03b7\u03bc\u03ad\u03bd\u03b7 \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03c3\u03c4\u03bf \u03b4\u03af\u03ba\u03c4\u03c5\u03bf \u03c4\u03b7\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1\u03c2 \u03ba\u03b1\u03b9 \u03c0\u03b1\u03c1\u03ad\u03c7\u03b5\u03b9 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 anti-hacker.<\/p>\n<p><strong> <\/strong><\/p>\n<p><strong>Device<\/strong><strong> <\/strong><strong>Control<\/strong> \u2013 \u0394\u03b5\u03bd \u03b5\u03c0\u03b9\u03c4\u03c1\u03ad\u03c0\u03b5\u03b9 \u03c4\u03b7 \u03c3\u03cd\u03bd\u03b4\u03b5\u03c3\u03b7 \u03ac\u03b3\u03bd\u03c9\u03c3\u03c4\u03c9\u03bd \u03bc\u03ad\u03c3\u03c9\u03bd, \u03b5\u03bd\u03ce \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03b5\u03b9 \u03c4\u03b7 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03b1 \u03b8\u03ad\u03c3\u03c0\u03b9\u03c3\u03b7\u03c2 \u03ba\u03b1\u03bd\u03cc\u03bd\u03c9\u03bd \u03ba\u03b1\u03b9 \u03c0\u03b1\u03c1\u03b1\u03bc\u03ad\u03c4\u03c1\u03c9\u03bd \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03c3\u03c5\u03b3\u03ba\u03b5\u03ba\u03c1\u03b9\u03bc\u03ad\u03bd\u03c9\u03bd \u03c3\u03c5\u03c3\u03ba\u03b5\u03c5\u03ce\u03bd \u03ae \u03c7\u03c1\u03b7\u03c3\u03c4\u03ce\u03bd.<\/p>\n<p><strong> <\/strong><\/p>\n<p><strong>Antivirus<\/strong><strong> \/ <\/strong><strong>Antispyware<\/strong><strong> <\/strong>\u2013 \u0395\u03be\u03b1\u03bb\u03b5\u03af\u03c6\u03b5\u03b9 \u03cc\u03bb\u03bf\u03c5\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03c4\u03cd\u03c0\u03bf\u03c5\u03c2 \u03c4\u03c9\u03bd \u03b1\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd, \u03c3\u03c5\u03bc\u03c0\u03b5\u03c1\u03b9\u03bb\u03b1\u03bc\u03b2\u03b1\u03bd\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd \u03c4\u03c9\u03bd \u03b9\u03ce\u03bd, rootkits, worms, spyware \u03ba\u03b1\u03b9 \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03b5\u03b9 \u03c0\u03c1\u03bf\u03b1\u03b9\u03c1\u03b5\u03c4\u03b9\u03ba\u03ac \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03b1 \u03b5\u03bb\u03ad\u03b3\u03c7\u03bf\u03c5 \u03c4\u03c9\u03bd \u03b1\u03c1\u03c7\u03b5\u03af\u03c9\u03bd \u03c3\u03c5\u03b3\u03ba\u03c1\u03af\u03bd\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b1 \u03bc\u03b5 \u03b1\u03c1\u03c7\u03b5\u03af\u03b1 \u03c0\u03bf\u03c5 \u03b2\u03c1\u03af\u03c3\u03ba\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03bf cloud \u03ba\u03b1\u03b9 \u03b5\u03b9\u03c3\u03b1\u03b3\u03c9\u03b3\u03ae \u03c4\u03bf\u03c5\u03c2 \u03c3\u03c4\u03b7 white-list. \u039f\u03b9 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03af\u03b5\u03c2 \u03c0\u03bf\u03c5 \u03c3\u03c4\u03ad\u03bb\u03bd\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03bf cloud \u03c0\u03c1\u03bf\u03ad\u03c1\u03c7\u03bf\u03bd\u03c4\u03b1\u03b9 \u03b1\u03c0\u03cc \u03b5\u03ba\u03c4\u03b5\u03bb\u03ad\u03c3\u03b9\u03bc\u03b1 \u03ba\u03b1\u03b9 \u03c3\u03c5\u03bc\u03c0\u03b9\u03b5\u03c3\u03bc\u03ad\u03bd\u03b1 \u03b1\u03c1\u03c7\u03b5\u03af\u03b1.<\/p>\n<p><strong> <\/strong><\/p>\n<p><strong>ESET<\/strong><strong> <\/strong><strong>Remote<\/strong><strong> <\/strong><strong>Administrator<\/strong><strong> <\/strong>\u2013 \u0395\u03c0\u03b9\u03c4\u03c1\u03ad\u03c0\u03b5\u03b9 \u03c4\u03b7 \u03b4\u03b9\u03b1\u03c7\u03b5\u03af\u03c1\u03b9\u03c3\u03b7 \u03cc\u03bb\u03c9\u03bd \u03c4\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 \u03c4\u03b7\u03c2 ESET \u03b1\u03c0\u03cc \u03bc\u03b9\u03b1 \u03ba\u03b5\u03bd\u03c4\u03c1\u03b9\u03ba\u03ae \u03ba\u03bf\u03bd\u03c3\u03cc\u03bb\u03b1 \u03c0\u03bf\u03c5 \u03b4\u03b9\u03b1\u03b8\u03ad\u03c4\u03b5\u03b9 \u03c4\u03b7 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b1 Role-based Management, \u03b4\u03af\u03bd\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b7 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03b1 \u03c3\u03c4\u03bf \u03b4\u03b9\u03b1\u03c7\u03b5\u03b9\u03c1\u03b9\u03c3\u03c4\u03ae \u03bd\u03b1 \u03b5\u03ba\u03c7\u03c9\u03c1\u03b5\u03af \u03b4\u03b9\u03b1\u03c6\u03bf\u03c1\u03b5\u03c4\u03b9\u03ba\u03ac \u03b4\u03b9\u03ba\u03b1\u03b9\u03ce\u03bc\u03b1\u03c4\u03b1 \u03c3\u03b5 \u03b4\u03b9\u03b1\u03c6\u03bf\u03c1\u03b5\u03c4\u03b9\u03ba\u03bf\u03cd\u03c2 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2. \u0395\u03c0\u03b9\u03c0\u03bb\u03ad\u03bf\u03bd, \u03b7 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b1 \u03b5\u03c0\u03b9\u03c4\u03c1\u03ad\u03c0\u03b5\u03b9 \u03c4\u03bf\u03bd \u03b5\u03bb\u03ad\u03b3\u03c7\u03bf \u03c4\u03c9\u03bd \u03c7\u03c1\u03b7\u03c3\u03c4\u03ce\u03bd \u03ba\u03b1\u03b9 \u03c4\u03b7 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03b1 \u03b5\u03c0\u03b9\u03b2\u03bf\u03bb\u03ae\u03c2 \u03ba\u03c9\u03b4\u03b9\u03ba\u03ce\u03bd.<\/p>\n<p><em>&#8220;\u03a4\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 \u03c4\u03b7\u03c2 ESET \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03b5\u03af\u03c4\u03b1\u03b9 \u03b1\u03c0\u03cc \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03bf\u03c5\u03c2 \u03b1\u03c0\u03cc 100 \u03b5\u03ba\u03b1\u03c4\u03bf\u03bc\u03bc\u03cd\u03c1\u03b9\u03b1 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2 \u03c3\u03b5 \u03cc\u03bb\u03bf \u03c4\u03bf\u03bd \u03ba\u03cc\u03c3\u03bc\u03bf \u03ba\u03b1\u03b9 \u03b5\u03af\u03bc\u03b1\u03b9 \u03c5\u03c0\u03b5\u03c1\u03ae\u03c6\u03b1\u03bd\u03bf\u03c2 \u03c0\u03bf\u03c5, \u03bc\u03b5\u03c4\u03ac \u03b1\u03c0\u03cc \u03b5\u03bc\u03c0\u03b5\u03c1\u03b9\u03c3\u03c4\u03b1\u03c4\u03c9\u03bc\u03ad\u03bd\u03b7 \u03ad\u03c1\u03b5\u03c5\u03bd\u03b1 \u03ba\u03b1\u03b9 \u03b1\u03bd\u03ac\u03c0\u03c4\u03c5\u03be\u03b7, \u03bc\u03c0\u03bf\u03c1\u03bf\u03cd\u03bc\u03b5 \u03bd\u03b1 \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03bf\u03c5\u03bc\u03b5 \u03b1\u03c5\u03c4\u03ae \u03c4\u03b7 \u03bd\u03ad\u03b1 \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b7 \u03c3\u03b5\u03b9\u03c1\u03ac \u03c0\u03c1\u03bf\u03ca\u03cc\u03bd\u03c4\u03c9\u03bd \u03c3\u03c4\u03b7\u03bd \u03b1\u03b3\u03bf\u03c1\u03ac \u03c4\u03c9\u03bd \u03b5\u03c0\u03b1\u03b3\u03b3\u03b5\u03bb\u03bc\u03b1\u03c4\u03b9\u03ba\u03ce\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd. \u0395\u03af\u03bc\u03b1\u03c3\u03c4\u03b5 \u03b5\u03bd\u03b8\u03bf\u03c5\u03c3\u03b9\u03b1\u03c3\u03bc\u03ad\u03bd\u03bf\u03b9 \u03c0\u03bf\u03c5 \u03b7 \u03ba\u03c5\u03ba\u03bb\u03bf\u03c6\u03bf\u03c1\u03af\u03b1 \u03c4\u03c9\u03bd \u03c0\u03c1\u03bf\u03ca\u03cc\u03bd\u03c4\u03c9\u03bd <\/em><em>ESET<\/em><em> <\/em><em>Endpoint<\/em><em> <\/em><em>Solutions<\/em><em> <\/em><em>\u03c3\u03c5\u03bc\u03c0\u03af\u03c0\u03c4\u03b5\u03b9 \u03bc\u03b5 \u03c4\u03bf\u03bd \u03b5\u03bf\u03c1\u03c4\u03b1\u03c3\u03bc\u03cc \u03c4\u03b7\u03c2 25<sup>\u03b7\u03c2<\/sup> \u03b5\u03c0\u03b5\u03c4\u03b5\u03af\u03bf\u03c5 \u03c4\u03b7\u03c2 \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1\u03c2 NOD32\u00bb, \u03b4\u03b7\u03bb\u03ce\u03bd\u03b5\u03b9 \u03bf Richard Marko, \u0394\u03b9\u03b5\u03c5\u03b8\u03cd\u03bd\u03c9\u03bd \u03a3\u03cd\u03bc\u03b2\u03bf\u03c5\u03bb\u03bf\u03c2 \u03c4\u03b7\u03c2 ESET.<\/em><\/p>\n<p>\u03a4\u03b1 \u03c0\u03c1\u03bf\u03ca\u03cc\u03bd\u03c4\u03b1 ESET Endpoint Solutions \u03b2\u03b1\u03c3\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03b7 \u03b2\u03c1\u03b1\u03b2\u03b5\u03c5\u03bc\u03ad\u03bd\u03b7 \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 ESET NOD32 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03c0\u03b1\u03c1\u03bf\u03c7\u03ae \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1\u03c2 \u03c3\u03b5 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2. \u00ab<em>\u039c\u03b5 \u03c4\u03b9\u03c2 \u03bd\u03ad\u03b5\u03c2 \u03bb\u03cd\u03c3\u03b5\u03b9\u03c2 ESET Endpoint<\/em><em> <\/em><em>Solutions<\/em><em>, \u03bc\u03c0\u03bf\u03c1\u03bf\u03cd\u03bc\u03b5 \u03bd\u03b1 \u03c0\u03b1\u03c1\u03ad\u03c7\u03bf\u03c5\u03bc\u03b5 \u03c3\u03c4\u03bf\u03c5\u03c2 <\/em><em>\u03b5\u03c4\u03b1\u03b9\u03c1\u03b9\u03ba\u03bf\u03cd\u03c2 <\/em><em>\u03bc\u03b1\u03c2 \u03c0\u03b5\u03bb\u03ac\u03c4\u03b5\u03c2 \u03b1\u03ba\u03cc\u03bc\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03ad\u03c3\u03c4\u03b5\u03c1\u03bf<\/em><em>\u03c5<\/em><em>\u03c2 \u03c4\u03c1\u03cc\u03c0\u03bf<\/em><em>\u03c5<\/em><em>\u03c2 \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7\u03c2 \u03c3\u03c4\u03bf \u03b4\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf. <\/em><em>\u039d<\/em><em>\u03ad\u03b5\u03c2 \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b5\u03c2 \u03ad\u03c7\u03bf\u03c5\u03bd \u03c0\u03c1\u03bf\u03c3\u03c4\u03b5\u03b8\u03b5\u03af \u03b3\u03b9\u03b1 <\/em><em>\u03bd\u03b1 \u03b1\u03c0\u03bf\u03c6\u03b5\u03c5\u03c7\u03b8\u03bf\u03cd\u03bd<\/em><em> <\/em><em>\u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03b1\u03c0\u03cc \u03b9\u03bf\u03cd\u03c2, \u03c3\u03c5\u03bd\u03b4\u03ad\u03c3\u03b5\u03b9\u03c2<\/em><em> <\/em><em>\u03c3<\/em><em>\u03b5 \u03b1\u03bd\u03b5\u03c0\u03b9\u03b8\u03cd\u03bc\u03b7\u03c4<\/em><em>\u03b1<\/em><em>\/\u03bc\u03b7 \u03b1\u03c3\u03c6\u03b1\u03bb<\/em><em>\u03ae<\/em><em> \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4<\/em><em>\u03b1<\/em><em> \u03ba\u03b1\u03b9 \u03ad\u03ba\u03b8\u03b5\u03c3\u03b7 \u03b5\u03c5\u03b1\u03af\u03c3\u03b8\u03b7\u03c4<\/em><em>\u03c9\u03bd<\/em><em> <\/em><em>\u03c0\u03c1\u03bf\u03c3\u03c9\u03c0\u03b9\u03ba\u03ce\u03bd <\/em><em>\u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd<\/em><em>\u03c9\u03bd<\/em><em>. \u03a3\u03b5 \u03c3\u03c5\u03bd\u03b4\u03c5\u03b1\u03c3\u03bc\u03cc \u03bc\u03b5 \u03c4<\/em><em>\u03bf<\/em><em> \u03b9\u03c3\u03c7\u03c5\u03c1<\/em><em>\u03cc<\/em><em> <\/em><em>\u03c3\u03cd\u03c3\u03c4\u03b7\u03bc\u03b1<\/em><em> Live Grid \u03c4\u03b7\u03c2 ESET, \u03c4\u03bf ESET Endpoint Security \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03c4\u03bf\u03b9\u03bc<\/em><em>\u03bf<\/em><em> \u03b3\u03b9\u03b1 \u03c4\u03b9\u03c2 <\/em><em>\u03bc\u03b5\u03bb\u03bb\u03bf\u03bd\u03c4\u03b9\u03ba\u03ad\u03c2<\/em><em> <\/em><em>\u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2<\/em><em> \u03c3\u03c4\u03bf\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf<\/em>\u00bb, \u03b4\u03b7\u03bb\u03ce\u03bd\u03b5\u03b9 \u03bf Righard Zwienenberg, Senior Research Fellow \u03c4\u03b7\u03c2 ESET.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u038c\u03c4\u03b1\u03bd\u00a0\u03c0\u03c1\u03cc\u03ba\u03b5\u03b9\u03c4\u03b1\u03b9\u00a0\u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03bc\u03b9\u03b1\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03af\u03b1\u03c2 \u03c3\u03c4\u03bf \u03c7\u03ce\u03c1\u03bf \u03c4\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03b4\u03b5\u03bd \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03c5\u03c0\u03ac\u03c1\u03c7\u03b5\u03b9 \u03ba\u03b1\u03bd\u03ad\u03bd\u03b1\u03c2 \u03c3\u03c5\u03bc\u03b2\u03b9\u03b2\u03b1\u03c3\u03bc\u03cc\u03c2. \u038c\u03bb\u03bf\u03b9 \u03b7 \u03b4\u03bf\u03c5\u03bb\u03b5\u03b9\u03ac \u03c3\u03b1\u03c2 \u03b2\u03c1\u03af\u03c3\u03ba\u03b5\u03c4\u03b1\u03b9 \u03bc\u03ad\u03c3\u03b1 \u03c3\u03c4\u03bf\u03c5\u03c2 \u03c3\u03ba\u03bb\u03b7\u03c1\u03bf\u03cd\u03c2\u00a0\u03b4\u03af\u03c3\u03ba\u03bf\u03c5\u03c2\u00a0\u03c4\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03ba\u03b1\u03b9 \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03c3\u03c6\u03b1\u03bb\u03b9\u03c3\u03c4\u03b5\u03af. \u00a0 \u0397 ESET \u03b1\u03bd\u03b1\u03ba\u03bf\u03b9\u03bd\u03ce\u03bd\u03b5\u03b9 \u03c4\u03b7 \u03b4\u03b9\u03ac\u03b8\u03b5\u03c3\u03b7 \u03c4\u03c9\u03bd \u03bd\u03ad\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd \u03b3\u03b9\u03b1 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b9\u03ba\u03bf\u03cd\u03c2 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2, \u03c4\u03b1 \u03c0\u03c1\u03bf\u03ca\u03cc\u03bd\u03c4\u03b1 ESET Endpoint Security \u03ba\u03b1\u03b9 ESET Endpoint Antivirus, \u03b5\u03bd\u03b9\u03c3\u03c7\u03cd\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b7 \u03b4\u03c5\u03bd\u03b1\u03bc\u03b9\u03ba\u03ae \u03c4\u03b7\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1\u03c2 \u03c3\u03c4\u03bf\u03bd [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1460,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"slim_seo":{"title":"ESET Antivirus: \u0398\u03c9\u03c1\u03b1\u03ba\u03af\u03c3\u03c4\u03b5 \u03c4\u03b7\u03bd \u03b5\u03c4\u03b1\u03b9\u03c1\u03af\u03b1 \u03c3\u03b1\u03c2 - OnLine Magazine","description":"\u038c\u03c4\u03b1\u03bd\u00a0\u03c0\u03c1\u03cc\u03ba\u03b5\u03b9\u03c4\u03b1\u03b9\u00a0\u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03bc\u03b9\u03b1\u03c2 \u03b5\u03c4\u03b1\u03b9\u03c1\u03af\u03b1\u03c2 \u03c3\u03c4\u03bf \u03c7\u03ce\u03c1\u03bf \u03c4\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03b4\u03b5\u03bd \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03c5\u03c0\u03ac\u03c1\u03c7\u03b5\u03b9 \u03ba\u03b1\u03bd\u03ad\u03bd\u03b1\u03c2 \u03c3\u03c5\u03bc\u03b2\u03b9\u03b2\u03b1\u03c3\u03bc\u03cc\u03c2. \u038c\u03bb\u03bf\u03b9 \u03b7 \u03b4\u03bf\u03c5\u03bb\u03b5\u03b9\u03ac \u03c3\u03b1\u03c2 \u03b2\u03c1\u03af\u03c3\u03ba\u03b5\u03c4\u03b1\u03b9 \u03bc\u03ad\u03c3\u03b1 \u03c3\u03c4\u03bf\u03c5\u03c2 \u03c3\u03ba\u03bb\u03b7\u03c1\u03bf"},"footnotes":""},"categories":[6,139],"tags":[510,511,512],"class_list":["post-1459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-6","category-daily-review","tag-eset-antivirus","tag-eset-endpoint-security","tag-eset-remote-administrator"],"_links":{"self":[{"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/posts\/1459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1459"}],"version-history":[{"count":3,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/posts\/1459\/revisions"}],"predecessor-version":[{"id":1463,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/posts\/1459\/revisions\/1463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/media\/1460"}],"wp:attachment":[{"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}