U SER G UIDE KASPERSKY ANTI-VIRUS 2009
Dear User of Kaspersky Anti-Virus 2009! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers regarding this software product. Warning! This document is the property of Kaspersky Lab: all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties.
TABLE OF CONTENTS INTRODUCTION .................................................................................................. 5 Obtaining information about the application .................................................... 5 Sources of information to research on your own ....................................... 5 Contacting the Sales Department.............................................................. 6 Contacting the Technical Support service .................................................
Kaspersky Anti-Virus 2009 Step 7. Selecting application components to be installed ............................. 40 Step 8. Searching for other anti-virus software ............................................. 41 Step 9. Final preparation for the installation .................................................. 42 Step 10. Completing the installation.............................................................. 43 APPLICATION INTERFACE.......................................................................
INTRODUCTION IN THIS SECTION: Obtaining information about the application ......................................................... 5 What's new in Kaspersky Anti-Virus 2009 ............................................................ 8 Overview of application protection ........................................................................ 9 Hardware and software system requirements ....................................................
Kaspersky Anti-Virus 2009 CONTACTING THE SALES DEPARTMENT If you have questions regarding selecting or purchasing the application or extending the period of its use, you can phone Sales Department specialists in our Central Office in Moscow at: +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00. The service is provided in Russian or English. You can send your questions to the Sales Department to the e-mail address sales@kaspersky.com.
Introduction 7 Note If you are not yet a registered user of Kaspersky Lab's applications, you can fill out a registration form at https://support.kaspersky.com/en/PersonalCabinet/Registration/Form/. During registration you will have to supply the activation code or key file name. The Technical Support service will respond to your request in your Personal Cabinet at https://support.kaspersky.com/en/PersonalCabinet, and to the email address you specified in your request.
Kaspersky Anti-Virus 2009 DISCUSSING KASPERSKY LAB APPLICATIONS ON THE WEB FORUM If your question does not require an urgent answer, you can discuss it with Kaspersky Lab's specialists and other Kaspersky software users in our web forum, located at http://forum.kaspersky.com/. In this forum you can view existing topics, leave your replies, create new topics and use the search engine.
Introduction 9 The new System Restore wizard helps repair damage to your system arising from malware attacks. New protection features for internet use: Protection against internet intruders has been improved by including the addresses of phishing sites in the application’s databases. Secure use of instant messaging is provided by a tool which scans ICQ and MSN traffic.
Kaspersky Anti-Virus 2009 Online Security provides protection against phishing attacks. Virus scan tasks are used to scan individual files, folders, drives, specified areas, or the entire computer for viruses. Scan tasks can also be configured to detect vulnerabilities in installed user applications. The updating component ensures the up to date status of both the application’s modules and the databases used to detect malicious programs, hacker attacks and spam messages.
Introduction 11 SUPPORT FEATURES The application includes a number of support features which are designed to keep the application up-to-date, to expand the application’s capabilities, and to assist you in using it. Kaspersky Security Network Kaspersky Security Network is a system which automatically transfers reports about detected and potential threats to Kaspersky Lab’s central database.
Kaspersky Anti-Virus 2009 HEURISTIC ANALYSIS Heuristics are used in some real-time protection components, such as File AntiVirus, Mail Anti-Virus, and Web Anti-Virus, and in virus scans. Scanning objects using the signature method, which uses a database containing descriptions of all known threats, gives a definite answer as to whether a scanned object is malicious, and what danger it presents.
Introduction 13 resources and the scan’s duration. The higher you set the heuristics level, the more system resources the scan will require, and the longer it will take. Warning! New threats detected using heuristic analysis are quickly analyzed by Kaspersky Lab, and methods for disinfecting them are added to the hourly database updates. If you regularly update your databases, you will be maintaining the optimal level of protection for your computer.
Kaspersky Anti-Virus 2009 Microsoft Windows Vista Starter x32, Microsoft Windows Vista Home Basic, Microsoft Windows Vista Home Premium, Microsoft Windows Vista Business, Microsoft Windows Vista Enterprise, Microsoft Windows Vista Ultimate: Intel Pentium 800 MHz 32-bit (x86) / 64-bit (x64) processor or higher (or a compatible equivalent). 512 MB RAM.
THREATS TO COMPUTER SECURITY Computer security can be compromised by threat applications, spam, phishing, hacker attacks, ad-ware and banners. The main source of these threats is the internet. IN THIS SECTION: Threat applications ............................................................................................. 15 THREAT APPLICATIONS Kaspersky Anti-Virus can detect thousands of malware programs that may reside on your computer.
Kaspersky Anti-Virus 2009 MALICIOUS PROGRAMS Malicious programs (“malware”) are created specifically to inflict harm on computers and their users: to steal, block, modify or erase information, or to disrupt the operation of computers or computer networks. Malware programs are divided into three subcategories: viruses and worms, Trojans programs and malware utilities. Viruses and worms (Viruses_and_Worms) (see page 16) can create copies of themselves, which in turn spread and reproduce again.
Threats to computer security 17 Classic viruses reproduce only within the local resources of the infected computer, but cannot independently penetrate other computers. Distribution to other computers can occur only if the virus adds itself to a file stored in a shared folder or on a CD, or if the user forwards an e-mail message with an infected attachment. The code of a classic virus is usually specialized to penetrate a particular area of a computer, operating system or application.
Kaspersky Anti-Virus 2009 Table 1. Worms categorized by the method of proliferation TYPE NAME DESCRIPTION EmailWorm E-mail worms E-mail worms infect computers via e-mail. The infected message has an attached file containing either a copy of a worm, or a link to a worm file uploaded to a website. The website is usually either one that has been hacked, or is the hacker's own site.
Threats to computer security 19 TYPE NAME DESCRIPTION NetWorms Network worms (worms residing in computer networks) These worms are distributed via computer networks. File exchange worms File exchange worms propagate through fileexchange peer-to-peer networks, such as Kazaa, Grokster, EDonkey, FastTrack or Gnutella. P2PWorm Unlike other types of worms, network worms propagate without the user's participation.
Kaspersky Anti-Virus 2009 TYPE NAME DESCRIPTION Worm Other worms Other network worms include: Worms that distribute their copies via network resources. Using the operating system's functionality, they go through available network folders, connect to computers in the global network and attempt to open their drives for full access. Unlike computer network worms, the user has to open a file containing a copy of the worm to activate it.
Threats to computer security 21 Table 2. Types of trojan programs categorized by behavior on the infected computer TYPE NAME DESCRIPTION TrojanArcBomb Trojan programs archive bombs Archives which when unpacked increase to a size that disrupts the computer's operation. When you attempt to unpack the archive, the computer may start working slowly or “freeze”, and the disk may be filled with “empty” data. “Archive bombs” are especially dangerous for file and mail servers.
Kaspersky Anti-Virus 2009 TYPE NAME DESCRIPTION TrojanRansoms Trojan programs requiring a ransom They “take hostage” information on the user's computer, modifying or blocking it or disrupting the computer’s operation so that the user cannot use the data. Then the intruder demands a ransom from the user, in exchange for a promise to send the program that will restore the computer's operability.
Threats to computer security 23 TYPE NAME DESCRIPTION TrojanDroppers Trojan programdroppers These programs save programs containing other Trojan programs on the computer's disk and then install them.
Kaspersky Anti-Virus 2009 TYPE NAME DESCRIPTION TrojanProxies Trojan-Proxies They allow the intruder to access web pages anonymously using the identity of the user's computer, and are often used to send spam. Trojan-PSWs Trojans stealing passwords Trojans stealing passwords (Password Stealing Ware); they steal users' accounts, for example, software registration information.
Threats to computer security 25 TYPE NAME DESCRIPTION Trojan-IMs Trojan programs stealing personal data of IM client users These programs steal numbers and passwords of IM client users (instant messaging programs), such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager or Skype. They transfer information to the intruder using methods which include e-mail, FTP, and by accessing the intruder's website.
Kaspersky Anti-Virus 2009 TYPE NAME DESCRIPTION TrojanMailfinders Trojan programs that collect e-mail addresses These programs collect e-mail addresses on the computer and transfer them to the intruder using methods including e-mail, FTP, and by accessing the intruder's website. The intruder can use the collected addresses to send spam. MALICIOUS UTILITIES Subcategory: malicious utilities (Malicious_tools) Severity level: medium These utilities are designed specifically to inflict damage.
Threats to computer security TYPE NAME 27 DESCRIPTION computer to the remote server. The server will then exhaust its resources for processing requests, and will stop functioning. Exploit Exploits An exploit is a set of data, or a piece of program code, which uses an application's vulnerabilities to perform a malicious action on the computer. For example, exploits can write or read files, or access “infected” web pages.
Kaspersky Anti-Virus 2009 TYPE NAME DESCRIPTION Flooders Programs used for flooding networks These programs send a great number of messages via network channels, including, for example, internet relay chat channels. However, this category of malware does not include programs which flood e-mail traffic, or IM and SMS channels, which are separately classified in the table below (Email-Flooder, IM-Flooder and SMSFlooder).
Threats to computer security 29 TYPE NAME DESCRIPTION EmailFlooders Programs for flooding e-mail addresses These programs send numerous messages to e-mail addresses (flood them). Due to the large flow of messages, users are unable to view incoming messages which are not spam. IM-Flooders Programs used for flooding IM programs These programs send numerous messages to Instant Messaging (IM) client programs, such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager or Skype.
Kaspersky Anti-Virus 2009 Potentially unwanted programs are installed using one of the following methods: They are installed by the user, individually or together with another program. For example, software developers frequently include adware programs in freeware or shareware programs. They are also installed by intruders.
Threats to computer security 31 There are three types of pornware programs, as categorized in the table below. Table 4. Types of pornware programs categorized by their functions TYPE NAME DESCRIPTION Porn-Dialers Automatic dialers These programs contain the phone numbers of pornographic phone services and automatically dial them; unlike Trojan dialers, they notify users about their actions.
Kaspersky Anti-Virus 2009 Table 5. Types of other riskware grouped by function TYPE NAME DESCRIPTION Client-IRC Internet chat client programs Users install these programs to communicate through Internet Relay Channels. Intruders use them to spread malware programs. Dialers Automatic dialing programs These programs can establish “hidden” phone connections via the modem. Downloaders Downloaders These programs can secretly download files from websites.
Threats to computer security 33 TYPE NAME DESCRIPTION RemoteAdmin Remote administration programs These programs are often used by system administrators; they provide access to a remote computer, to monitor and manage it. Intruders use them in exactly the same way when they install them on users' computers. Remote administration riskware programs are different from Trojan (or Backdoor) remote administration programs.
Kaspersky Anti-Virus 2009 TYPE NAME DESCRIPTION RiskTool Local computer tools These tools provide users with additional functionality and are used within the user's computer only. They allow the hacker to hide files, hide the windows of active applications, or to close active processes. NetTool Network tools These tools allow a computer user to remotely manage other computers on the network: for example, to restart them, find open ports, or run programs installed on these computers.
Threats to computer security 35 METHODS OF DETECTING INFECTED, SUSPICIOUS AND POTENTIALLY DANGEROUS OBJECTS BY THE APPLICATION Kaspersky Anti-Virus detects malware programs in objects using two methods: reactive (using databases) and proactive (using heuristic analysis). The application’s databases contain records that are used to identify any of the hundreds of thousands known threats in scanned objects.
INSTALLING THE APPLICATION The application is interactively installed on the computer, using the Application Setup wizard. Warning! We recommend that you close all running applications before proceeding with the installation. To install the application on your computer run the distribution file, which has a .exe extension. Note Installing the application from the installation file downloaded via the Internet, is identical to installing the application from the CD.
Installing the application 37 IN THIS SECTION: Step 1. Searching for a newer version of the application .................................... 37 Step 2. Verifying the system satisfies the installation requirements ................... 37 Step 3. Wizard's greeting window ....................................................................... 38 Step 4. Viewing the License Agreement ............................................................. 39 Step 5. Selecting the installation type .......................
Kaspersky Anti-Virus 2009 on installing a newer version of the application, please refer to that version’s documentation. STEP 2. VERIFYING THE SYSTEM SATISFIES THE INSTALLATION REQUIREMENTS Before installing the application on your computer, the wizard will verify that the computer satisfies the minimum requirements (see section “Hardware and Software System Requirements” on page 13). It will also verify that you have the rights required to install software on it.
Installing the application 39 STEP 4. VIEWING THE LICENSE AGREEMENT The wizard's next dialog box contains the license agreement between you and Kaspersky Lab. Read it carefully, and if you agree with all terms and conditions of the agreement, select I accept the terms of the license agreement and press the Next button. The installation will be continued. To cancel the installation, press the Cancel button. STEP 5.
Kaspersky Anti-Virus 2009 STEP 6. SELECTING THE INSTALLATION FOLDER Note This step of the installation wizard will be performed only if you selected the custom installation option (see section “Step 5. Selecting the installation type” on page 39). During this step you will be asked to identify the folder on your computer into which the application will be installed. The default path is: \ Program Files \ Kaspersky Lab \ Kaspersky Anti-Virus 2009 – for 32-bit systems.
Installing the application 41 During a custom installation you must select which of the application's components you wish to be installed on your computer. By default, all the application's components are selected: protection, scanning and updating components. To help you decide which components you wish to install, some information is available about each component: select the component from the list and read the information in the field below.
Kaspersky Anti-Virus 2009 be automatically moved to the quarantine of the current version, and you will be able to re-scan them after the installation. If you select automatic removal of the 7.0 version, information about its activation will be saved, and re-used during the installation of version 2009. Warning! The application accepts key files for versions 6.0 and 7.0. Keys used by version 5.0 and earlier are not supported. To proceed with the installation press the Next button. STEP 9.
Installing the application 43 Warning! During the installation process, the current network connection will be severed if the application package includes components for intercepting network traffic. The majority of terminated connections will be restored in due course. STEP 10. COMPLETING THE INSTALLATION The Installation complete window contains information on completing the installation of the application on your computer.
APPLICATION INTERFACE The application has a fairly simple and easy-to-use interface. This chapter discusses its basic features in detail. In addition to the main application interface, there are plug-ins for Microsoft Outlook, The Bat! and Microsoft Windows Explorer. These plug-ins extend the functionality of these programs, as they allow Kaspersky Anti-Virus components to be managed and configured from the client program’s interface. IN THIS SECTION: Notification area icon ................................
Application interface 45 The application icon changes depending on the operation being performed: – e-mail being scanned. – updating application databases and program modules. – computer needs to be rebooted to apply updates. – an error has occurred in some Kaspersky Anti-Virus component.
Kaspersky Anti-Virus 2009 Kaspersky Anti-Virus – open the main application window (see section “Main application window” on page 47). Settings – view and modify the application settings. Activate – activate the program. To become a registered user, you must activate your application. This menu item is only available if the application has not been activated. About – display information about the application.
Application interface 47 MAIN APPLICATION WINDOW The main application window can be divided into three parts: The top part of the window indicates your computer's current protection status. Figure 2: Current status of the computer protection There are three possible values of protection status: each status is indicated by a certain color, similar to traffic lights.
Kaspersky Anti-Virus 2009 The left-hand part of the window, the navigation bar, provides quick access to the application’s functions, including anti-virus scans and updating tasks.
Application interface 49 The right-hand part of the window contains information about the application function selected in the left-hand part, and is used to configure those functions and display tools for performing anti-virus scan tasks, downloading updates, etc. Figure 4: Informational part of the main window You can also use these buttons: Settings – to open the application configuration window. Help – to open the application’s Help system.
Kaspersky Anti-Virus 2009 Note You can change the appearance of the application by creating and using your own graphics and color schemes. NOTIFICATIONS If events occur during the application's operation, special notifications will be displayed on the screen as pop-up messages above the application’s icon, in the Microsoft Windows task bar. Depending on how critical the event is for computer security, you might receive the following types of notifications: Alert.
Application interface 51 The settings configuration window consists of two parts: the left-hand part of the window provides access to the application’s components, such as virus scan tasks, and updating tasks; the right part of the window contains a list of settings for the component or task selected in the left part of the window.
GETTING STARTED One of the main goals of Kaspersky Lab in making Kaspersky Anti-Virus was to provide the optimum configuration for all the application's options. This allows even an unsophisticated computer user to protect his or her computer immediately after installation, without spending hours changing the settings. For the user's convenience, we have combined the preliminary configuration stages into a unified Initial Setup Wizard that starts as soon as the application is installed.
Getting started 53 IN THIS SECTION: Updating the application ..................................................................................... 53 Security analysis................................................................................................. 54 Scanning computer for viruses ........................................................................... 54 Managing license................................................................................................
Kaspersky Anti-Virus 2009 To manually update Kaspersky Anti-Virus, 1. Open the main application window. 2. Select the Update section in the left window side. 3. Press the Start update button. As a result, Kaspersky Anti-Virus will begin to be updated. The details of the process will be displayed in a special window. SECURITY ANALYSIS Your computer’s operating system can be damaged by system failures and by the activities of malware programs.
Getting started 55 Once Kaspersky Anti-Virus is installed on your computer, it automatically performs a Quick scan task on your computer. This task searches for and neutralizes harmful programs in the objects which are loaded when the operating system starts. Kaspersky Lab's specialists also recommend that you perform the Full scan task. To start / stop virus scan task: 1. Open the main application window. 2. In the left-hand part of the window select the Scan (Full scan, Quick scan) section. 3.
Kaspersky Anti-Virus 2009 Information on the current key is shown under License in the main window of Kaspersky Anti-Virus: key ID, type (commercial, commercial with subscription, commercial with protection subscription, trial, for beta testing), number of hosts on which this key may be installed, key expiration date and number of days remaining to expiration.
Getting started 57 mode. This way the license will be renewed without your involvement. If the period during which the application renews the license itself has also expired, the license can be renewed manually. During the period allowing manual license renewal, the functionality of the application will be retained.
Kaspersky Anti-Virus 2009 6. Subscription cancellation. You cancel the subscription for the automatic license renewal. 7. Update is required. The key for subscription renewal has not been received on time for any reason. Use the Renew subscription status to renew the subscription. For the commercial license with protection subscription, the subscription is characterized by two additional statuses: Suspended.
Getting started 59 PARTICIPATING IN THE KASPERSKY SECURITY NETWORK A great number of new threats appear worldwide on an everyday basis. To facilitate the gathering of statistics about new threat types, where they come from and how to eliminate them, Kaspersky Lab invites you to use the Kaspersky Security Network service. The use of Kaspersky Security Network involves sending the following information to Kaspersky Lab: A unique identifier assigned to your computer by the application.
Kaspersky Anti-Virus 2009 2. Select the Feedback section in the left part of the window. 3. Check the box I agree to participate in Kaspersky Security Network, to confirm your participation in the Kaspersky Security Network. Check the box I agree to send extended statistics within the framework of Kaspersky Security Network, to confirm your consent to send extended statistics.
Getting started 61 You can view the list of current problems, their description and possible solutions on the Status tab (see figure below) that opens when you click on the Fix it now link (see figure above). Figure 6: Solving security problems The tab shows the list of current problems.
Kaspersky Anti-Virus 2009 Postpone elimination. If, for any reason, you cannot immediately eliminate the problem, you can delay this action and return to it later. To postpone elimination, use the Hide message button. Note that this option is not available for serious problems. Such problems include, for example, malicious objects which were detected but not disinfected, crashes of one or several components, or corruption of the application files.
Getting started 63 As a result of temporarily disabling protection, all protection components will be paused. This is indicated by: Inactive (grey) names of disabled components in the Protection section of the main window. Inactive (grey) application icon (see section “Notification area icon” on page 44) in the system panel. Red color for the status icon and for the main application window's panel.
VALIDATING APPLICATION SETTINGS After the application has been installed and configured, you should verify whether the application is correctly configured using a test “virus” and its modifications. A separate test is required for each protection component / protocol. IN THIS SECTION: Test the EICAR “virus” and its modifications ...................................................... 64 Testing the HTTP traffic protection .....................................................................
Validating application settings 65 You can download the test “virus” from the EICAR organization’s official website at: http://www.eicar.org/anti_virus_test_file.htm. Note Before you download the file, you must disable the computer’s anti-virus protection, because otherwise the application would identify and process the file anti_virus_test_file.htm as an infected object transferred via HTTP protocol. Do not forget to enable the anti-virus protection immediately after you download the test “virus”.
Kaspersky Anti-Virus 2009 Table 6. Modifications of the test “virus” Prefix Object status Object processing information No prefix, standard test virus Infected. Infected object contains code of a known virus. Disinfection is not possible. The application identifies the object as a non-disinfectible virus. CORR– Corrupted. The application could access the object, but was unable to scan it because the object is corrupted (for example, the file structure is corrupted or file format is invalid).
Validating application settings 67 Prefix Object status Object processing information ERRO– Scanning error An error occurred while scanning the object. The application was unable to access the object: either the object's integrity was breached (for example, no end to a multivolume archive) or there is no connection to it (if the object being scanned is located on a network drive). You can find information about the object’s processing in the application operation’s report. CURE– Infected.
Kaspersky Anti-Virus 2009 TESTING THE HTTP TRAFFIC PROTECTION In order to verify that viruses are successfully detected in data streams transferred via the HTTP protocol, do the following: try to download a test “virus” from the official website of the EICAR organization at: http://www.eicar.org/anti_virus_test_file.htm.
Validating application settings 69 Note A message that contains a test virus will not be scanned if it is created in RTF or HTML format! 2. Copy the text of the standard or modified “virus” at the beginning of the message, or attach a file containing the test “virus” to the message. 3. Send the message to the administrator. The application will detect the object, identify it as infected, and block the message.
Kaspersky Anti-Virus 2009 VALIDATING VIRUS SCAN TASK SETTINGS To verify that the anti-virus scan task is correctly configured: 1. Create a folder on a disk, and copy into the folder the EICAR test “virus” which you downloaded, and the modified test “viruses” which you created. 2. Create a new virus scan task and select the folder which contains the set of test “viruses”, as the object to scan. 3.
KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT INTRODUCTION PLEASE READ THIS DOCUMENT CAREFULLY. IT CONTAINS IMPORTANT INFORMATION THAT YOU SHOULD KNOW BEFORE CONTINUING TO USE OUR SERVICES OR SOFTWARE. BY CONTINUING TO USE KASPERSKY LAB SOFTWARE AND SERVICES YOU WILL BE DEEMED TO HAVE ACCEPTED THIS KASPERSKY LAB’ Data Collection STATEMENT. We reserve the right to modify this Data Collection Statement at any time by posting the changes on this page.
Kaspersky Anti-Virus 2009 The data and information is collected by Kaspersky Lab and if after reviewing this Data Collection Statement you have any questions or Data Collection concerns please send an e-mail to support@kaspersky.com.
Kaspersky Security Network Data Collection Statement 73 data transferred to third countries) and the subsequent legislation adopted in the EC Member States.
Kaspersky Anti-Virus 2009 information about the status of your computer's antivirus protection, and data on any files or activities suspected of being malware (e.g., virus name, date/time of detection, names/paths and size of infected files, IP and port of network attack, name of the application suspected of being malware). Please note that the above referenced collected data does not contain personally identifiable information.
Kaspersky Security Network Data Collection Statement 75 processed and stored in the United States and possibly other jurisdictions and also in other countries where Kaspersky Lab conduct business. All Kaspersky Lab employees are aware of our security policies. Your data is only accessible to those employees who need it in order to perform their jobs. Any stored data will not be associated with any personally identifiable information.
Kaspersky Anti-Virus 2009 note, however, if you should choose to withhold requested information or data, we may not be able to provide you with some of the services dependent upon the collection of this data. Once the service period of your Kaspersky Lab product ends, some of the functions of the Kaspersky Lab software may continue to operate, but information will no longer be sent automatically to Kaspersky Lab.
KASPERSKY LAB Founded in 1997, Kaspersky Lab has become a recognized leader in information security technologies. It produces a wide range of high-performance data security software including anti-virus, anti-spam and anti-hacking systems. Kaspersky Lab is an international company. Headquartered in the Russian Federation, the company has offices in the United Kingdom, France, Germany, Japan, the Benelux countries, China, Poland, Romania and the USA (California).
Kaspersky Anti-Virus 2009 customer’s specific business requirements. We design, implement and support corporate anti-virus complexes. Kaspersky Lab's anti-virus database is updated every hour. The company provides its customers with 24-hour technical support service available in several languages. If you have any questions, you can contact our dealers or contact Kaspersky Lab directly. Detailed consultations are provided by phone or e-mail.
Kaspersky Lab Sales Department: 79 +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00 sales@kaspersky.com General Information: +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00 info@kaspersky.com WWW: http://www.kaspersky.com/ http://www.viruslist.
CRYPTOEX LLC To create and verify digital signatures, Kaspersky Anti-Virus uses Crypto Ex LLC’s data security software library, Crypto C. Crypto Ex holds a license from the Federal Agency for Government Communications and Information (a branch of the Federal Security Service) to develop, manufacture and distribute encryption software to protect data which does not constitute a state secret.
MOZILLA FOUNDATION The Gecko SDK ver. 1.8 library was used for the development of this application's components. This software is used according to the terms and conditions of license MPL 1.1 Public Mozilla Foundation license http://www.mozilla.org/MPL. For more details about the Gecko SDK library, refer to: http://developer.mozilla.org/en/docs/Gecko_SDK. © Mozilla Foundation Mozilla Foundation website: http://www.mozilla.org.
LICENSE AGREEMENT Standard End User License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT (“AGREEMENT”), FOR THE LICENSE OF KASPERSKY ANTIVIRUS (“SOFTWARE”) PRODUCED BY KASPERSKY LAB (“KASPERSKY LAB”). IF YOU HAVE PURCHASED THIS SOFTWARE VIA THE INTERNET BY CLICKING THE ACCEPT BUTTON, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT.
License Agreement 83 All references to “Software” herein shall be deemed to include the software activation code with which you will be provided by Kaspersky Lab as a part of the Kaspersky Anti-Virus. 1. License Grant.
Kaspersky Anti-Virus 2009 1.1.5 You shall not make error corrections to, or otherwise modify, adapt, or translate the Software, nor create derivative works of the Software, nor permit any third party to copy (other than as expressly permitted herein). 1.1.6 You shall not rent, lease or lend the Software to any other person, nor transfer or sub-license your license rights to any other person. 1.1.
License Agreement 85 you have satisfied this condition for the provision of Support Services. Support Services shall become available after Software activation. Kaspersky Lab's technical support service is also entitled to demand from you additional registration for identifier awarding for Support Services rendering. Until Software activation and/or obtaining of the End User identifier (Customer ID) technical support service renders only assistance in Software activation and registration of the End User.
Kaspersky Anti-Virus 2009 reasonable security measures to protect such confidential information, but without limitation to the foregoing shall use best endeavours to maintain the security of the activation code. 5. Limited Warranty.
License Agreement 87 6. Limitation of Liability. (i) Nothing in this Agreement shall exclude or limit Kaspersky Lab’s liability for (a) the tort of deceit, (b) death or personal injury caused by its breach of a common law duty of care or any negligent breach of a term of this Agreement, or (c) any other liability which cannot be excluded by law.
Kaspersky Anti-Virus 2009 7.