Kaspersky Lab Internet Security 2009 Limited Edition Technické informace Strana 3

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 95
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 2
TABLE OF CONTENT
INTRODUCTION .................................................................................................. 6
Obtaining information about the application .................................................... 6
Sources of information to research on your own ....................................... 6
Contacting the Sales Department.............................................................. 7
Contacting the Technical Support service ................................................. 7
Discussing Kaspersky Lab applications on the web forum ........................ 9
What's new in Kaspersky Internet Security 2009 ............................................ 9
Application protection concept ...................................................................... 11
Wizards and Tools ................................................................................... 12
Support features ...................................................................................... 13
Heuristic analysis .................................................................................... 13
Hardware and software system requirements ............................................... 15
THREATS TO COMPUTER SECURITY ............................................................ 16
Threat applications ........................................................................................ 16
Malicious programs ................................................................................. 17
Viruses and worms ............................................................................ 17
Trojans ............................................................................................... 20
Malicious utilities ................................................................................ 26
Potentialy unwanted programs ................................................................ 29
Adware .............................................................................................. 30
Pornware ........................................................................................... 30
Other Riskware Programs ................................................................. 31
Methods of detecting infected, suspicious and potentially dangerous
objects by the application ........................................................................ 35
Internet threats .............................................................................................. 35
Spam or unsolicited incoming mail .......................................................... 36
Phishing .................................................................................................. 36
Hacker attacks......................................................................................... 37
Banners display ....................................................................................... 37
INSTALLING APPLICATION ON THE COMPUTER .......................................... 39
Step 1. Searching for a newer version of the application .............................. 40
Zobrazit stránku 2
1 2 3 4 5 6 7 8 ... 94 95

Komentáře k této Příručce

Žádné komentáře