Kaspersky Internet Security includes the following protective features:
Monitors system activities by user applications, preventing any dangerous actions by applications.
Protection components provide real-time protection of all data transfer and input paths through your computer.
Protection components ensure protection of your computer against all currently known network and intruder attacks during internet connections.
Filtering components remove unwanted data saving time, web traffic and money.
Virus scan tasks are used to scan individual files, folders, drives, specified areas, or the entire computer for viruses. Scan tasks can also be configured to detect vulnerabilities in installed user applications.
12 Kaspersky Internet Security 2009
The updating component ensures the up to date status of both the applicationís modules and the databases used to detect malicious programs, hacker attacks and spam messages.
Wizards and tools facilitating execution of tasks occurring during the operation of Kaspersky Internet Security.
Support features, which provide information and assistance for working with the application and expanding its capabilities.
WIZARDS AND TOOLS
Ensuring computer security is a complex task which requires knowledge of the operating system's features and the methods used to exploit its weaknesses. Additionally, the volume and diversity of information about system security make its analysis and processing difficult. To help solve specific tasks in providing computer security,
the Kaspersky Internet Security package includes a set of wizards and tools:
Security Analyzer Wizard performs computer diagnostics
searching for vulnerabilities in the operating system and in user programs installed on the computer.
Browser Configuration Wizard analyses the Microsoft Internet Explorer browser settings, evaluating them primarily from a security point of view.
System Restore wizard eliminates any traces of malware attacks on the system.
Privacy Cleaner Wizard searches for and eliminates traces of the user's activities in the system and in the operating system's settings, preventing the gathering of information about the user's activities.
Rescue Disk wizard restores system functionality after a virus attack has damaged the operating systemís files and made it impossible to restart the computer.
Network Package Analysis ntercepts network packets and displays their details.
Network Monitor displays details about network activity on your computer.
Virtual keyboard prevents the interception of data entered at the keyboard.
The application includes a number of support features which are designed to keep the application up-to-date, to expand the applicationís capabilities, and to assist you in using it.
Kaspersky Security Network
Kaspersky Security Network is a system which automatically transfers reports about detected and potential threats to Kaspersky Labís central database. This database allows Kaspersky Lab to respond more quickly to the most widespread threats, and to notify users about virus
When you purchase Kaspersky Internet Security, you enter into a licensing agreement with Kaspersky Lab which governs the use of the application, your access to application database updates, and Technical Support for a specified period of time. The term of use and other information necessary for the applicationís full functionality are included in the license key file. Using the License function you can obtain detailed information about your current license, purchase a new license or renew your current one.
All registered Kaspersky Internet Security users can take advantage of our technical support service. To see information about how to receive technical support, use the Support function. By following the links you can access the Kaspersky Lab product users' forum, send an error report to Technical Support, or give application feedback by completing a special online form. You also have access to the online Technical Support and Personal User Cabinet Services. Our personnel are always happy to provide you with telephone support about the application.
Heuristics are used in some real-time protection components, such as File Anti-Virus, Mail Anti-Virus, and Web Anti-Virus, and in virus scans. Scanning objects using the signature method, which uses a database containing descriptions of all known threats, gives a definite answer as to whether a scanned object is malicious, and what danger it presents. The heuristic method, unlike the signature method, aims to detect the typical behavior of objects rather than their static content, but cannot provide the same degree of certainty in its conclusions. The advantage of heuristic analysis is that it detects malware that is not registered in the database, so that you do not have to update the database before scanning. Because of this, new threats are detected before virus analysts have encountered them. However, there are methods for circumventing heuristics. One such defensive measure is to freeze the activity of malicious code as soon as the object detects the heuristic scan.
Note Using a combination of scanning methods ensures greater security.
When scanning an object, the heuristic analyzer emulates the objectís execution in a secureenvironment
provided by the application. If suspicious activity is discovered as the object executes, it will be deemed malicious and will not be allowed to run on the host, and a message will be displayed requesting further instructions from the user:
Quarantine the object, allowing the new threat to be scanned and processed later using updated databases.
Delete the object.
Skip (if you are positive that the object cannot be malicious).
To use heuristic methods, check the box Use heuristic analyzer and move the scan detail slider to one of these positions: Shallow, Medium, or Detailed. The level of detail of the scan provides a balance between the thoroughness, and hence the quality, of the scan for new threats, and the load on operating system resources and the scanís duration. The higher you set the heuristics level, the more system resources the scan will require, and the longer it will take.
New threats detected using heuristic analysis are quickly analyzed by Kaspersky Lab, and methods for disinfecting them are added to the hourly database updates. If you regularly update your databases, you will be maintaining the optimal level of protection for your computer.
HARDWARE AND SOFTWARE SYSTEM REQUIREMENTS
To allow the computer to function normally, the computer must meet these minimum requirements:
75 MB free hard drive space
(for installation of the application from the installation CD).
Microsoft Internet Explorer 5.5 or higher (for updating application's bases and software modules via Internet).
Microsoft Windows Installer 2.0.
Microsoft Windows XP Home Edition (SP2 or above), Microsoft Windows XP Professional (SP2 or above), Microsoft Windows XP Professional x64 Edition:
Intel Pentium 300 MHz processor or higher (or a compatible equivalent).
256 MB free RAM.
Microsoft Windows Vista Starter x32, Microsoft Windows Vista Home Basic, Microsoft Windows Vista Home Premium, Microsoft Windows Vista Business, Microsoft Windows Vista Enterprise, Microsoft Windows Vista Ultimate:
Intel Pentium 800 MHz 32-bit (x86) / 64-bit (x64) processor or higher (or a compatible equivalent).
512 MB free RAM.