Kaspersky Lab Internet Security 2009 Limited Edition Technické informace

Procházejte online nebo si stáhněte Technické informace pro Antivirový bezpečnostní software Kaspersky Lab Internet Security 2009 Limited Edition. Kaspersky Lab Internet Security 2009, 5 User Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 95
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - SECURITY 2009

USER'S GUIDE KASPERSKY INTERNET SECURITY 2009

Strany 2

10 Kaspersky Internet Security 2009 the applications installed on your computer, operating system's and browser settings.  Kaspersky

Strany 3 - TABLE OF CONTENT

Introduction 11 New program's interface features  The new program's interface reflects the comprehensive approach to information

Strany 4

12 Kaspersky Internet Security 2009  Support features which provide information support for working with the application and expanding its capabi

Strany 5 - Table of content 5

Introduction 13 SUPPORT FEATURES The application includes a number of support features. They are designed to provide maintain the appl

Strany 6 - INTRODUCTION

14 Kaspersky Internet Security 2009 Of course, scanning using the signature method with a database created previously containing a desc

Strany 7 - SERVICE

Introduction 15 HARDWARE AND SOFTWARE SYSTEM REQUIREMENTS To ensure normal functioning of the application the computer must conform to th

Strany 8

THREATS TO COMPUTER SECURITY A considerable threat to the computer security is imposed by threat applications. Additionally, such threat is impo

Strany 9 - INTERNET SECURITY 2009

Threats to computer security 17 MALICIOUS PROGRAMS Malicious programs are created specifically to inflict harm to computers and their use

Strany 10

18 Kaspersky Internet Security 2009 Classic viruses reproduce only on the local resources of a certain computer, they cannot independently penetra

Strany 11 - Introduction 11

Threats to computer security 19 TYPE NAME DESCRIPTION Email-Worm E-mail worms E-mail worms infect computers via e-mail. An infected message contain

Strany 12 - WIZARDS AND TOOLS

Dear User of Kaspersky Internet Security 2009! Thank you for choosing our product. We hope that this documentation will help you in your work and w

Strany 13 - HEURISTIC ANALYSIS

20 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION P2P-Worm File exchange worms File exchange worms propagate through file-exchange peer-to-p

Strany 14

Threats to computer security 21 Unlike worms and viruses, trojan programs do not create copies of themselves. They sneak into a computer, for

Strany 15 - HARDWARE AND SOFTWARE SYSTEM

22 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Trojans Trojans Trojans include the following malicious programs:  classic Trojan progra

Strany 16 - THREATS TO COMPUTER

Threats to computer security 23 TYPE NAME DESCRIPTION Trojan-Droppers Trojan program-droppers These programs save programs containing other Trojan p

Strany 17 - MALICIOUS PROGRAMS

24 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Trojans-PSWs Trojans stealing passwords Trojans stealing passwords (Password Stealing Ware

Strany 18 - ESCRIPTION

Threats to computer security 25 TYPE NAME DESCRIPTION Trojans-IMs Trojan programs stealing personal data of the IM client users These programs steal

Strany 19

26 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Trojans-Mailfinders Trojan programs that collect e-mail addresses These programs collect e

Strany 20 - TROJANS

Threats to computer security 27 TYPE NAME DESCRIPTION Exploit Exploits Exploit is a set of data or a program code used application's vulnerabil

Strany 21

28 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Flooders Programs used for flooding networks They send a great number of messages via netw

Strany 22

Threats to computer security 29 TYPE NAME DESCRIPTION Email-Flooders Programs for flooding e-mail e-mail addresses These programs send numerous mess

Strany 23

TABLE OF CONTENT INTRODUCTION ... 6 Obtaining informa

Strany 24

30 Kaspersky Internet Security 2009 Potentially unwanted programs are installed using one of the following methods:  They are installed by the

Strany 25

Threats to computer security 31 Table 4. Types of pornware programs depending on their functions TYPE NAME DESCRIPTION Porn-Dialers Automatic dia

Strany 26 - MALICIOUS UTILITIES

32 Kaspersky Internet Security 2009 Table 5. Types of other riskware distinguished based on their functions TYPE NAME DESCRIPTION Client-IRC Inte

Strany 27

Threats to computer security 33 TYPE NAME DESCRIPTION RemoteAdmin Remote administration programs These programs are often used by system administra

Strany 28

34 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION RiskTool Local computer tools These tools provide users with additional functionality and

Strany 29 - POTENTIALY UNWANTED PROGRAMS

Threats to computer security 35 METHODS OF DETECTING INFECTED, SUSPICIOUS AND POTENTIALLY DANGEROUS OBJECTS BY THE APPLICATION Kaspersky Lab's

Strany 30 - PORNWARE

36 Kaspersky Internet Security 2009  phishing (on page 36);  hacker attacks (on page 37);  banners display (on page 37). SPAM OR UNSOLICITED

Strany 31 - OTHER RISKWARE PROGRAMS

Threats to computer security 37 Anti-phishing databases contain the list URLs of websites known as sites used for phishing attacks. Kaspersky

Strany 32

38 Kaspersky Internet Security 2009 Kaspersky Lab's application blocks banners based on the URL of the website to which the banner has a l

Strany 33

INSTALLING APPLICATION ON THE COMPUTER The application is installed on the computer in the interactive mode using the application setup

Strany 34

4 Kaspersky Internet Security 2009 Step 2. Verifying the system's conformity to the installation requirements ... 41 Step 3. Wizard's gre

Strany 35 - INTERNET THREATS

40 Kaspersky Internet Security 2009 STEP 1. SEARCHING FOR A NEWER VERSION OF THE APPLICATION Before installing the application on your comput

Strany 36 - PHISHING

Installing application on the computer 41 STEP 2. VERIFYING THE SYSTEM'S CONFORMITY TO THE INSTALLATION REQUIREMENTS Before installing the a

Strany 37 - BANNERS DISPLAY

42 Kaspersky Internet Security 2009 To cancel the installation press the Cancel button. STEP 5. SELECTING THE INSTALLATION TYPE During this step y

Strany 38

Installing application on the computer 43  <Drive> \ Program Files (х86) \ Kaspersky Lab \ Kaspersky Internet Security 2009 – for 64-bit sys

Strany 39 - ON THE COMPUTER

44 Kaspersky Internet Security 2009 After you finished selecting components to be installed, press the Next button. To return to the li

Strany 40 - VERSION OF THE APPLICATION

Installing application on the computer 45 STEP 9. FINAL PREPARATION FOR THE INSTALLATION During this step you will be offered to perform th

Strany 41 - AGREEMENT

APPLICATION INTERFACE The application has a fairly simple and easy-to-use interface. This chapter will discuss its basic features in deta

Strany 42 - STEP 6. SELECTING THE

Application interface 47 The application icon changes depending on the operation being performed: – e-mail being scanned. – updating application d

Strany 43 - COMPONENTS TO BE INSTALLED

48 Kaspersky Internet Security 2009  Virtual keyboard – switching to the virtual keyboard.  Kaspersky Internet Security – opening the main

Strany 44 - VIRUS SOFTWARE

Application interface 49 MAIN APPLICATION WINDOW The main application window can be divided into three parts:  The top part of the window indicate

Strany 45 - STEP 10. COMPLETING THE

Table of content 5 Contact Us ... 86 CRYPTOEX LLC .

Strany 46 - APPLICATION INTERFACE

50 Kaspersky Internet Security 2009  The left-hand part of the window - navigation bar - is used to quickly switch to using any a

Strany 47 - SHORTCUT MENU

Application interface 51  The right-hand part of the window contains information about the application function selected in the left

Strany 48 - Figure 1: Shortcut menu

52 Kaspersky Internet Security 2009 Note You can change the appearance of the application by creating and using your own graphics and colo

Strany 49 - MAIN APPLICATION WINDOW

Application interface 53 The settings configuration window consists of two parts:  the left-hand part of the window provides access to th

Strany 50

GETTING STARTED One of the main goals of the Kaspersky Lab specialists in making Kaspersky Internet Security was to provide optimum

Strany 51 - Application interface 51

Getting started 55 SELECTING NETWORK TYPE After the application is installed, the Firewall component will analyze the active network connect

Strany 52 - APPLICATION SETTINGS

56 Kaspersky Internet Security 2009 For each network status Kaspersky Internet Security includes the set of rules for managing the network activi

Strany 53 - Application interface 53

Getting started 57 In order to detect and eliminate such security problem, Kaspersky Lab's experts recommend that you launch Security Analysis

Strany 54 - GETTING STARTED

58 Kaspersky Internet Security 2009 PARTICIPATING IN KASPERSKY SECURITY NETWORK A great number of new threats appear worldwide on an everyday basis.

Strany 55 - SELECTING NETWORK TYPE

Getting started 59 3. Check the I agree to participate in Kaspersky Security Network box to confirm your participation in Kaspersky Security Networ

Strany 56 - SECURITY ANALYSIS

INTRODUCTION OBTAINING INFORMATION ABOUT THE APPLICATION If you have any questions regarding purchasing, installing or using the applicati

Strany 57 - CANNING COMPUTER FOR VIRUSES

60 Kaspersky Internet Security 2009 You can view the list of problems occurred, their description and the possible solutions on the Sta

Strany 58 - SECURITY NETWORK

Getting started 61 Note that this option is not available for serious problems. Such problems include, for example, malicious objects

Strany 59 - SECURITY MANAGEMENT

62 Kaspersky Internet Security 2009 If network connections were established at the moment when the protection was paused, a notification about break

Strany 60

VALIDATING APPLICATION SETTINGS After the application has been installed and configured, you can verify whether the application is configured

Strany 61 - PAUSING PROTECTION

64 Kaspersky Internet Security 2009 You can download this test "virus" from the official website of the EICAR organization at:

Strany 62

Validating application settings 65 Table 6. Modifications of the test "virus" Prefix Object status Object processing information No pre

Strany 63 - SETTINGS

66 Kaspersky Internet Security 2009 Prefix Object status Object processing information ERRO– Scanning error: An error occurred during a scan of an o

Strany 64

Validating application settings 67 TESTING THE HTTP TRAFFIC PROTECTION  In order to verify detection of viruses in the data stream transferred via

Strany 65

68 Kaspersky Internet Security 2009 Note Message that contains a test virus will not be scanned if it is created in the RTF or HTML format! 2. Copy

Strany 66

Validating application settings 69 VALIDATING VIRUS SCAN TASK SETTINGS  In order to verify the correctness of the anti-virus scan task configurati

Strany 67 - TESTING THE SMTP TRAFFIC

Introduction 7 CONTACTING THE SALES DEPARTMENT If you have questions regarding selecting or purchasing the application or extending the pe

Strany 68 - VALIDATING FILE ANTI-VIRUS

KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT INTRODUCTION PLEASE READ THIS DOCUMENT CAREFULLY. IT CONTAINS IMPORTANT INFORMATION THAT

Strany 69 - VALIDATING VIRUS SCAN TASK

Kaspersky Security Network Data Collection Statement 71 What is Kaspersky Security Network? Kaspersky Security Network service allows users of

Strany 70 - COLLECTION STATEMENT

72 Kaspersky Internet Security 2009 or opt-out (for all the other countries) on-line from the commercial use of this data and/or the transmission of

Strany 71

Kaspersky Security Network Data Collection Statement 73  Information about executable applications (size, attributes, date created, information ab

Strany 72

74 Kaspersky Internet Security 2009 Internet security threats to provide the best possible level of protection to Kaspersky Lab customers

Strany 73

Kaspersky Security Network Data Collection Statement 75 DATA COLLECTION – RELATED INQUIRIES AND COMPLAINTS Kaspersky Lab takes and addresses it

Strany 74

KASPERSKY LAB Founded in 1997, Kaspersky Lab has become a recognized leader in information security technologies. It produces a wide range of

Strany 75

Kaspersky Lab 77 OTHER KASPERSKY LAB PRODUCTS Kaspersky Lab's New Agent Program News Agent is used for quick delivering Kaspersky Lab

Strany 76 - KASPERSKY LAB

78 Kaspersky Internet Security 2009 response to their questions related to the infection with malware. In the course of a scan the user can:  excl

Strany 77 - OTHER KASPERSKY LAB PRODUCTS

Kaspersky Lab 79  Kaspersky Anti-Virus for Linux File Server.  Kaspersky Anti-Virus for Novell Netware.  Kaspersky Anti-Virus for Samba Server

Strany 78

8 Kaspersky Internet Security 2009 Note If you are not yet a registered user of Kaspersky Lab's applications, you can fill out a registration f

Strany 79 - Kaspersky Lab 79

80 Kaspersky Internet Security 2009 This software product includes four programs:  Kaspersky Open Space Security.  Kaspersky Business Space Secu

Strany 80

Kaspersky Lab 81  automatic database updating;  full-fledged support of 64-bit operating systems;  optimization of the laptop software (Intel®

Strany 81 - Kaspersky Lab 81

82 Kaspersky Internet Security 2009  isolation of suspicious objects in the special storage;  automatic database updating. Kaspersky Enterprise

Strany 82

Kaspersky Lab 83  isolation of suspicious objects in the special storage;  developed system of reports about the protection system status;  au

Strany 83 - Kaspersky Lab 83

84 Kaspersky Internet Security 2009  dynamic reallocation of resources during the full system scan;  personal firewall with the system for detec

Strany 84

Kaspersky Lab 85  scan of messages, databases and other objects of Lotus Domino servers;  filtering messages by attachments types;  i

Strany 85 - Kaspersky Lab 85

86 Kaspersky Internet Security 2009  support of hardware proxy servers;  scalability of the software product to match the available sys

Strany 86 - CONTACT US

Kaspersky Lab 87 Tel., Fax: +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00 24/7 Emergency Support +7 (495) 797-87-07, +7 (495) 645-79-29

Strany 87 - Kaspersky Lab 87

CRYPTOEX LLC For creation and verification of the digital signature Kaspersky Anti-Virus uses data security software library Crypto C deve

Strany 88 - CRYPTOEX LLC

MOZILLA FOUNDATION Library Gecko SDK ver. 1.8 was used for the development of the application's component. This software is used according

Strany 89 - MOZILLA FOUNDATION

Introduction 9 DISCUSSING KASPERSKY LAB APPLICATIONS ON THE WEB FORUM If your question does not require an urgent answer, you can discuss

Strany 90 - LICENSE AGREEMENT

LICENSE AGREEMENT Standard End User License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT&qu

Strany 91 - License Agreement 91

License Agreement 91 All references to "Software" herein shall be deemed to include the software activation code with which yo

Strany 92

92 Kaspersky Internet Security 2009 1.1.6 You shall not rent, lease or lend the Software to any other person, nor transfer or sub-lice

Strany 93 - License Agreement 93

License Agreement 93 you have satisfied this condition for the provision of Support Services. Support Services shall become available afte

Strany 94

94 Kaspersky Internet Security 2009 otherwise make available such confidential information in any form to any third party without the prio

Strany 95 - License Agreement 95

License Agreement 95 breach of a common law duty of care or any negligent breach of a term of this Agreement, or (c) any other liability which cann

Komentáře k této Příručce

Žádné komentáře