USER'S GUIDE KASPERSKY INTERNET SECURITY 2009
10 Kaspersky Internet Security 2009 the applications installed on your computer, operating system's and browser settings. Kaspersky
Introduction 11 New program's interface features The new program's interface reflects the comprehensive approach to information
12 Kaspersky Internet Security 2009 Support features which provide information support for working with the application and expanding its capabi
Introduction 13 SUPPORT FEATURES The application includes a number of support features. They are designed to provide maintain the appl
14 Kaspersky Internet Security 2009 Of course, scanning using the signature method with a database created previously containing a desc
Introduction 15 HARDWARE AND SOFTWARE SYSTEM REQUIREMENTS To ensure normal functioning of the application the computer must conform to th
THREATS TO COMPUTER SECURITY A considerable threat to the computer security is imposed by threat applications. Additionally, such threat is impo
Threats to computer security 17 MALICIOUS PROGRAMS Malicious programs are created specifically to inflict harm to computers and their use
18 Kaspersky Internet Security 2009 Classic viruses reproduce only on the local resources of a certain computer, they cannot independently penetra
Threats to computer security 19 TYPE NAME DESCRIPTION Email-Worm E-mail worms E-mail worms infect computers via e-mail. An infected message contain
Dear User of Kaspersky Internet Security 2009! Thank you for choosing our product. We hope that this documentation will help you in your work and w
20 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION P2P-Worm File exchange worms File exchange worms propagate through file-exchange peer-to-p
Threats to computer security 21 Unlike worms and viruses, trojan programs do not create copies of themselves. They sneak into a computer, for
22 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Trojans Trojans Trojans include the following malicious programs: classic Trojan progra
Threats to computer security 23 TYPE NAME DESCRIPTION Trojan-Droppers Trojan program-droppers These programs save programs containing other Trojan p
24 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Trojans-PSWs Trojans stealing passwords Trojans stealing passwords (Password Stealing Ware
Threats to computer security 25 TYPE NAME DESCRIPTION Trojans-IMs Trojan programs stealing personal data of the IM client users These programs steal
26 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Trojans-Mailfinders Trojan programs that collect e-mail addresses These programs collect e
Threats to computer security 27 TYPE NAME DESCRIPTION Exploit Exploits Exploit is a set of data or a program code used application's vulnerabil
28 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Flooders Programs used for flooding networks They send a great number of messages via netw
Threats to computer security 29 TYPE NAME DESCRIPTION Email-Flooders Programs for flooding e-mail e-mail addresses These programs send numerous mess
TABLE OF CONTENT INTRODUCTION ... 6 Obtaining informa
30 Kaspersky Internet Security 2009 Potentially unwanted programs are installed using one of the following methods: They are installed by the
Threats to computer security 31 Table 4. Types of pornware programs depending on their functions TYPE NAME DESCRIPTION Porn-Dialers Automatic dia
32 Kaspersky Internet Security 2009 Table 5. Types of other riskware distinguished based on their functions TYPE NAME DESCRIPTION Client-IRC Inte
Threats to computer security 33 TYPE NAME DESCRIPTION RemoteAdmin Remote administration programs These programs are often used by system administra
34 Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION RiskTool Local computer tools These tools provide users with additional functionality and
Threats to computer security 35 METHODS OF DETECTING INFECTED, SUSPICIOUS AND POTENTIALLY DANGEROUS OBJECTS BY THE APPLICATION Kaspersky Lab's
36 Kaspersky Internet Security 2009 phishing (on page 36); hacker attacks (on page 37); banners display (on page 37). SPAM OR UNSOLICITED
Threats to computer security 37 Anti-phishing databases contain the list URLs of websites known as sites used for phishing attacks. Kaspersky
38 Kaspersky Internet Security 2009 Kaspersky Lab's application blocks banners based on the URL of the website to which the banner has a l
INSTALLING APPLICATION ON THE COMPUTER The application is installed on the computer in the interactive mode using the application setup
4 Kaspersky Internet Security 2009 Step 2. Verifying the system's conformity to the installation requirements ... 41 Step 3. Wizard's gre
40 Kaspersky Internet Security 2009 STEP 1. SEARCHING FOR A NEWER VERSION OF THE APPLICATION Before installing the application on your comput
Installing application on the computer 41 STEP 2. VERIFYING THE SYSTEM'S CONFORMITY TO THE INSTALLATION REQUIREMENTS Before installing the a
42 Kaspersky Internet Security 2009 To cancel the installation press the Cancel button. STEP 5. SELECTING THE INSTALLATION TYPE During this step y
Installing application on the computer 43 <Drive> \ Program Files (х86) \ Kaspersky Lab \ Kaspersky Internet Security 2009 – for 64-bit sys
44 Kaspersky Internet Security 2009 After you finished selecting components to be installed, press the Next button. To return to the li
Installing application on the computer 45 STEP 9. FINAL PREPARATION FOR THE INSTALLATION During this step you will be offered to perform th
APPLICATION INTERFACE The application has a fairly simple and easy-to-use interface. This chapter will discuss its basic features in deta
Application interface 47 The application icon changes depending on the operation being performed: – e-mail being scanned. – updating application d
48 Kaspersky Internet Security 2009 Virtual keyboard – switching to the virtual keyboard. Kaspersky Internet Security – opening the main
Application interface 49 MAIN APPLICATION WINDOW The main application window can be divided into three parts: The top part of the window indicate
Table of content 5 Contact Us ... 86 CRYPTOEX LLC .
50 Kaspersky Internet Security 2009 The left-hand part of the window - navigation bar - is used to quickly switch to using any a
Application interface 51 The right-hand part of the window contains information about the application function selected in the left
52 Kaspersky Internet Security 2009 Note You can change the appearance of the application by creating and using your own graphics and colo
Application interface 53 The settings configuration window consists of two parts: the left-hand part of the window provides access to th
GETTING STARTED One of the main goals of the Kaspersky Lab specialists in making Kaspersky Internet Security was to provide optimum
Getting started 55 SELECTING NETWORK TYPE After the application is installed, the Firewall component will analyze the active network connect
56 Kaspersky Internet Security 2009 For each network status Kaspersky Internet Security includes the set of rules for managing the network activi
Getting started 57 In order to detect and eliminate such security problem, Kaspersky Lab's experts recommend that you launch Security Analysis
58 Kaspersky Internet Security 2009 PARTICIPATING IN KASPERSKY SECURITY NETWORK A great number of new threats appear worldwide on an everyday basis.
Getting started 59 3. Check the I agree to participate in Kaspersky Security Network box to confirm your participation in Kaspersky Security Networ
INTRODUCTION OBTAINING INFORMATION ABOUT THE APPLICATION If you have any questions regarding purchasing, installing or using the applicati
60 Kaspersky Internet Security 2009 You can view the list of problems occurred, their description and the possible solutions on the Sta
Getting started 61 Note that this option is not available for serious problems. Such problems include, for example, malicious objects
62 Kaspersky Internet Security 2009 If network connections were established at the moment when the protection was paused, a notification about break
VALIDATING APPLICATION SETTINGS After the application has been installed and configured, you can verify whether the application is configured
64 Kaspersky Internet Security 2009 You can download this test "virus" from the official website of the EICAR organization at:
Validating application settings 65 Table 6. Modifications of the test "virus" Prefix Object status Object processing information No pre
66 Kaspersky Internet Security 2009 Prefix Object status Object processing information ERRO– Scanning error: An error occurred during a scan of an o
Validating application settings 67 TESTING THE HTTP TRAFFIC PROTECTION In order to verify detection of viruses in the data stream transferred via
68 Kaspersky Internet Security 2009 Note Message that contains a test virus will not be scanned if it is created in the RTF or HTML format! 2. Copy
Validating application settings 69 VALIDATING VIRUS SCAN TASK SETTINGS In order to verify the correctness of the anti-virus scan task configurati
Introduction 7 CONTACTING THE SALES DEPARTMENT If you have questions regarding selecting or purchasing the application or extending the pe
KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT INTRODUCTION PLEASE READ THIS DOCUMENT CAREFULLY. IT CONTAINS IMPORTANT INFORMATION THAT
Kaspersky Security Network Data Collection Statement 71 What is Kaspersky Security Network? Kaspersky Security Network service allows users of
72 Kaspersky Internet Security 2009 or opt-out (for all the other countries) on-line from the commercial use of this data and/or the transmission of
Kaspersky Security Network Data Collection Statement 73 Information about executable applications (size, attributes, date created, information ab
74 Kaspersky Internet Security 2009 Internet security threats to provide the best possible level of protection to Kaspersky Lab customers
Kaspersky Security Network Data Collection Statement 75 DATA COLLECTION – RELATED INQUIRIES AND COMPLAINTS Kaspersky Lab takes and addresses it
KASPERSKY LAB Founded in 1997, Kaspersky Lab has become a recognized leader in information security technologies. It produces a wide range of
Kaspersky Lab 77 OTHER KASPERSKY LAB PRODUCTS Kaspersky Lab's New Agent Program News Agent is used for quick delivering Kaspersky Lab
78 Kaspersky Internet Security 2009 response to their questions related to the infection with malware. In the course of a scan the user can: excl
Kaspersky Lab 79 Kaspersky Anti-Virus for Linux File Server. Kaspersky Anti-Virus for Novell Netware. Kaspersky Anti-Virus for Samba Server
8 Kaspersky Internet Security 2009 Note If you are not yet a registered user of Kaspersky Lab's applications, you can fill out a registration f
80 Kaspersky Internet Security 2009 This software product includes four programs: Kaspersky Open Space Security. Kaspersky Business Space Secu
Kaspersky Lab 81 automatic database updating; full-fledged support of 64-bit operating systems; optimization of the laptop software (Intel®
82 Kaspersky Internet Security 2009 isolation of suspicious objects in the special storage; automatic database updating. Kaspersky Enterprise
Kaspersky Lab 83 isolation of suspicious objects in the special storage; developed system of reports about the protection system status; au
84 Kaspersky Internet Security 2009 dynamic reallocation of resources during the full system scan; personal firewall with the system for detec
Kaspersky Lab 85 scan of messages, databases and other objects of Lotus Domino servers; filtering messages by attachments types; i
86 Kaspersky Internet Security 2009 support of hardware proxy servers; scalability of the software product to match the available sys
Kaspersky Lab 87 Tel., Fax: +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00 24/7 Emergency Support +7 (495) 797-87-07, +7 (495) 645-79-29
CRYPTOEX LLC For creation and verification of the digital signature Kaspersky Anti-Virus uses data security software library Crypto C deve
MOZILLA FOUNDATION Library Gecko SDK ver. 1.8 was used for the development of the application's component. This software is used according
Introduction 9 DISCUSSING KASPERSKY LAB APPLICATIONS ON THE WEB FORUM If your question does not require an urgent answer, you can discuss
LICENSE AGREEMENT Standard End User License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT&qu
License Agreement 91 All references to "Software" herein shall be deemed to include the software activation code with which yo
92 Kaspersky Internet Security 2009 1.1.6 You shall not rent, lease or lend the Software to any other person, nor transfer or sub-lice
License Agreement 93 you have satisfied this condition for the provision of Support Services. Support Services shall become available afte
94 Kaspersky Internet Security 2009 otherwise make available such confidential information in any form to any third party without the prio
License Agreement 95 breach of a common law duty of care or any negligent breach of a term of this Agreement, or (c) any other liability which cann
Comentarios a estos manuales