U SER G UIDE KASPERSKY INTERNET SECURITY 2009
Dear User of Kaspersky Internet Security 2009! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers regarding this software product. Warning! This document is the property of Kaspersky Lab: all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties.
TABLE OF CONTENTS INTRODUCTION .................................................................................................. 6 Obtaining information about the application .................................................... 6 Sources of information to research on your own ....................................... 6 Contacting the Sales Department.............................................................. 7 Contacting the Technical Support service .................................................
Kaspersky Internet Security 2009 Step 2. Verifying the system satisfies the installation requirements .............. 40 Step 3. Wizard's greeting window ................................................................. 40 Step 4. Viewing the License Agreement ....................................................... 40 Step 5. Selecting the installation type ........................................................... 41 Step 6. Selecting the installation folder ............................................
Table of contents 5 KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT ...... 71 KASPERSKY LAB .............................................................................................. 77 CRYPTOEX LLC ................................................................................................ 80 MOZILLA FOUNDATION ................................................................................... 81 LICENSE AGREEMENT ..............................................................................
INTRODUCTION IN THIS SECTION: Obtaining information about the application ......................................................... 6 What's new in Kaspersky Internet Security 2009 .................................................. 9 Overview of application protection ...................................................................... 11 Hardware and software system requirements ....................................................
Introduction 7 CONTACTING THE SALES DEPARTMENT If you have questions regarding selecting or purchasing the application or extending the period of its use, you can phone Sales Department specialists in our Central Office in Moscow at: +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00. The service is provided in Russian or English. You can send your questions to the Sales Department at e-mail address sales@kaspersky.com.
Kaspersky Internet Security 2009 Note If you are not yet a registered user of Kaspersky Lab's applications, you can fill out a registration form at (https://support.kaspersky.com/en/PersonalCabinet/Registration/Form/). During registration you will have to supply the activation code or key file name. The Technical Support service will respond to your request in your Personal Cabinet at https://support.kaspersky.com/en/PersonalCabinet, and to the email address you specified in your request.
Introduction 9 DISCUSSING KASPERSKY LAB APPLICATIONS ON THE WEB FORUM If your question does not require an urgent answer, you can discuss it with Kaspersky Lab's specialists and other Kaspersky software users in our web forum, located at http://forum.kaspersky.com/. In this forum you can view existing topics, leave your replies, create new topics and use the search engine.
Kaspersky Internet Security 2009 Kaspersky Lab now reacts more quickly to new threats through the use of the Kaspersky Security Network, which gathers data about the infection of users' computers and sends it to Kaspersky Lab's servers. New tools – Network Monitor and Network Package Analysis - facilitate collection and analysis of information about network activities on your computer. The new System Restore wizard helps repair damage to your system arising from malware attacks.
Introduction 11 New program's interface features: The application's new interface reflects the comprehensive approach to information protection. The high information capacity of dialog boxes helps the user make decisions quickly. The functionality for recording statistics and creating reports has been extended. Filters can be used to select data from reports, a powerful and flexible tool which is irreplaceable for professionals.
Kaspersky Internet Security 2009 The updating component ensures the up to date status of both the application’s modules and the databases used to detect malicious programs, hacker attacks and spam messages. Wizards and tools facilitating execution of tasks occurring during the operation of Kaspersky Internet Security. Support features, which provide information and assistance for working with the application and expanding its capabilities.
Introduction 13 SUPPORT FEATURES The application includes a number of support features which are designed to keep the application up-to-date, to expand the application’s capabilities, and to assist you in using it. Kaspersky Security Network Kaspersky Security Network is a system which automatically transfers reports about detected and potential threats to Kaspersky Lab’s central database.
Kaspersky Internet Security 2009 HEURISTIC ANALYSIS Heuristics are used in some real-time protection components, such as File AntiVirus, Mail Anti-Virus, and Web Anti-Virus, and in virus scans. Scanning objects using the signature method, which uses a database containing descriptions of all known threats, gives a definite answer as to whether a scanned object is malicious, and what danger it presents.
Introduction 15 Warning! New threats detected using heuristic analysis are quickly analyzed by Kaspersky Lab, and methods for disinfecting them are added to the hourly database updates. If you regularly update your databases, you will be maintaining the optimal level of protection for your computer. HARDWARE AND SOFTWARE SYSTEM REQUIREMENTS To allow the computer to function normally, the computer must meet these minimum requirements: General requirements: 75 MB free hard drive space.
THREATS TO COMPUTER SECURITY A considerable threat to the computer security is imposed by threat applications. Additionally, such threat is imposed by spam, phishing, hacker attacks and adware ad banners. These threats are related to internet use. IN THIS SECTION: Threat applications ............................................................................................. 16 Internet threats ...................................................................................................
Threats to computer security 17 MALICIOUS PROGRAMS Malicious programs (“malware”) are created specifically to inflict harm on computers and their users: to steal, block, modify or erase information, or to disrupt the operation of computers or computer networks. Malware programs are divided into three subcategories: viruses and worms, Trojans programs and malware utilities. Viruses and worms (Viruses_and_Worms) (see page 17) can create copies of themselves, which in turn spread and reproduce again.
Kaspersky Internet Security 2009 other computers can occur only if the virus adds itself to a file stored in a shared folder or on a CD, or if the user forwards an e-mail message with an infected attachment. The code of a classic virus is usually specialized to penetrate a particular area of a computer, operating system or application. Based on the environment, there is a distinction between file, boot, script and macro viruses. Viruses can infect files using various methods.
Threats to computer security 19 TYPE NAME DESCRIPTION EmailWorm E-mail worms E-mail worms infect computers via e-mail. The infected message has an attached file containing either a copy of a worm, or a link to a worm file uploaded to a website. The website is usually either one that has been hacked, or is the hacker's own site. When the attachment is opened the worm is activated; alternatively, when you click the link, download and open the file, the worm will become active.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION P2PWorm File exchange worms File exchange worms propagate through fileexchange peer-to-peer networks, such as Kazaa, Grokster, EDonkey, FastTrack or Gnutella. To use a file exchange network, the worm copies itself into the file-exchange folder which is usually located on the user's computer.
Threats to computer security 21 Unlike worms and viruses, trojan programs do not create copies of themselves. They infect a computer, for example, via an infected e-mail attachment, or through a web browser when the user visits an “infected” website. Trojan programs must be launched by the user, and start performing their malicious actions as they run. Trojan programs can perform a range of malicious actions.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Trojans Trojans Trojans include the following malicious programs: Classic Trojan programs, which only perform the major functions of Trojan programs: blocking, modifying or erasing data, disrupting the operation of computers or computer networks.
Threats to computer security 23 TYPE NAME DESCRIPTION TrojanDownloaders Trojan programsdownloaders These programs access the intruder's web page, download other malware programs from it, and install them on the user's computer. They can either store the name of the downloadable malware program filename in their own code, or receive it from the web page they access.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION TrojanProxies Trojans-Proxies They allow the intruder to access web pages anonymously using the identity of the user's computer, and are often used to send spam. Trojan-PSWs Trojans stealing passwords Trojans stealing passwords (Password Stealing Ware); they steal users' accounts, for example, software registration information.
Threats to computer security 25 TYPE NAME DESCRIPTION Trojan-IMs Trojan programs stealing personal data of IM client users These programs steal numbers and passwords of IM client users (instant messaging programs), such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager or Skype. They transfer information to the intruder using methods which include e-mail, FTP, and by accessing the intruder's website.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION TrojanMailfinders Trojan programs that collect e-mail addresses These programs collect e-mail addresses on the computer and transfer them to the intruder using methods including e-mail, FTP, and by accessing the intruder's website. The intruder can use the collected addresses to send spam. MALICIOUS UTILITIES Subcategory: malicious utilities (Malicious_tools) Severity level: medium These utilities are designed specifically to inflict damage.
Threats to computer security 27 TYPE NAME DESCRIPTION Dos Network attacks Denial of Serive (DoS) programs send numerous requests from the user's computer to a remote server. The server will then exhaust its resources for processing requests, and will stop functioning. Exploit Exploits An exploit is a set of data, or a piece of program code, which uses an application's vulnerabilities to perform a malicious action on the computer.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Flooders Programs used for flooding networks They send a great number of messages via network channels, including, for example, internet relay chat channels. However, this category of malware does not include programs which flood e-mail traffic, or IM and SMS channels, which are separately classified in the table below (Email-Flooder, IM-Flooder and SMSFlooder).
Threats to computer security 29 TYPE NAME DESCRIPTION EmailFlooders Programs for flooding e-mail email addresses These programs send numerous messages to e-mail addresses (flood them). Due to the large flow of messages, users are unable to view incoming messages which are not spam. IM-Flooders Programs used for flooding IM programs These programs send numerous messages to Instant Messaging (IM) client users, such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager or Skype.
Kaspersky Internet Security 2009 They are also installed by intruders. For example they include such programs in packages with other malware programs, using "vulnerabilities" of the web browser, or Trojan downloaders and droppers, when the user visits an "infected" website. ADWARE Subcategory: Adware Severity level: medium Adware programs involve display of advertising information to the user.
Threats to computer security 31 Table 4. Types of pornware programs categorized by their functions TYPE NAME DESCRIPTION Porn-Dialers Automatic dialers These programs contain the phone numbers of pornographic phone services and automatically dial them; unlike Trojan dialers, they notify users about their actions.
Kaspersky Internet Security 2009 The table lists riskware programs, grouped by function: Table 5. Types of other riskware grouped by function TYPE NAME DESCRIPTION Client-IRC Internet chat client programs Users install these programs to communicate through Internet Relay Channels. Intruders use them to spread malware programs. Dialers Automatic dialing programs These programs can establish "hidden" phone connections via the modem.
Threats to computer security 33 TYPE NAME DESCRIPTION Server-FTP FTP servers These programs perform the functions of FTP servers. Intruders install them on the users' computers to obtain remote access via the FTP protocol. Server-Proxy Proxy servers These programs perform the functions of proxy servers. Intruders install them on the users' computers to send spam using the identity of the user. Server-Telnet Telnet servers These programs perform the functions of Telnet servers.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Client-SMTP SMTP clients These programs send e-mail messages and hide this activity. Intruders install them on the users' computers to send spam using users' identities. WebToolbar Web toolbars These programs add their own search toolbars to other applications' toolbars. FraudTool Fraud programs These programs camouflage as other real programs.
Threats to computer security 35 The application detects objects containing new malware programs based on their behavior. The code of a new malware program may not fully or even partially coincide with that of a known malware program, but it will contain characteristic command sequences, such as opening a file, writing to a file, or intercepting interrupt vectors. The application can determine, for example, whether a file is infected with an unknown boot virus.
Kaspersky Internet Security 2009 Anti-Spam databases contain "black" and "white" lists of senders' addresses, and lists of words and phrases related to various categories of spam such as advertising, medicine and health, gambling. PHISHING Phishing is a type of fraudulent internet activity which aims to "fish" personal information from computer users, such as credit card numbers and PINs, in order to steal their money. Phishing is often related to internet banking.
Threats to computer security 37 Kaspersky Internet Security stops network attacks without disrupting network connections, by using special firewall databases. These databases contain records identifying characteristic IP data packets sent by various hacking programs. The application analyzes network connections and blocks in them any dangerous IP packets. BANNERS Banners or ads are links to an advertiser's website, commonly displayed as images.
INSTALLING THE APPLICATION The application is installed interactively on the computer using the Application Setup wizard. Warning! We recommend that you close all running applications before proceeding with the installation. To install the application on your computer, run the distribution file (file with *.exe extension). Note Installing the application from the installation file downloaded via Internet, is identical to installing the application from CD.
Installing the application 39 IN THIS SECTION: Step 1. Searching for a newer version of the application .................................... 39 Step 2. Verifying the system satisfies the installation requirements ................... 40 Step 3. Wizard's greeting window ....................................................................... 40 Step 4. Viewing the License Agreement ............................................................. 40 Step 5. Selecting the installation type .......................
Kaspersky Internet Security 2009 STEP 2. VERIFYING THE SYSTEM SATISFIES THE INSTALLATION REQUIREMENTS Before installing the application on your computer, the wizard will verify that the computer satisfies the minimum requirements (see section "Hardware and software system requirements" on page 15). It will also verify that you have the rights required to install software on it. If any of the requirements is not met, a corresponding notification will be displayed on the screen.
Installing the application 41 To cancel the installation, press the Cancel button. STEP 5. SELECTING THE INSTALLATION TYPE During this step you will be asked to select the installation type that suits you best: Express installation. If you select this option, the entire application will be installed on your computer with the default protection settings recommended by Kaspersky Lab. Once the installation is complete, the Application Configuration wizard will be started. Custom installation.
Kaspersky Internet Security 2009 During this step you will be asked to identify the folder on your computer into which the application will be installed. The default path is: \ Program Files \ Kaspersky Lab \ Kaspersky Internet Security 2009 – for 32-bit systems. \ Program Files (х86) \ Kaspersky Lab \ Kaspersky Internet Security 2009 – for 64-bit systems.
Installing the application 43 To select a component to be installed, open the shortcut menu by clicking the icon next to the component's name and select Component will be installed on local hard drive. When you have finished selecting components to be installed, press the Next button. To return to the default list of components to be installed, press the Clear button. STEP 8.
Kaspersky Internet Security 2009 STEP 9. FINAL PREPARATION FOR THE INSTALLATION This step completes the preparation for installing the application on your computer. During the initial and custom application installation (see section "Step 5. Selecting the installation type" on page 41) we recommend that you do not uncheck the Enable Self-Defense before installation box during the initial installation.
APPLICATION INTERFACE The application has a simple, easy-to-use interface. This chapter discusses its basic features in detail. In addition to the main application interface, there are plug-ins for Microsoft Outlook, The Bat! and Microsoft Windows Explorer. These plug-ins extend the functionality of these programs, as they allow Kaspersky Internet Security components to be managed and configured from the client program’s interface. IN THIS SECTION: Notification area icon ...................................
Kaspersky Internet Security 2009 The application icon changes depending on the operation being performed: – e-mail being scanned. – updating application databases and program modules. – computer needs to be rebooted to apply updates. – an error has occurred in some Kaspersky Internet Security component.
Application interface 47 Virtual keyboard – switch to the virtual keyboard. Kaspersky Internet Security – open the main application window (see section "Main application window" on page 48). Settings – view and modify the application settings. Activate – activate the program. To become a registered user, you must activate your application. This menu item is only available if the application has not been activated. About – display information about the application.
Kaspersky Internet Security 2009 MAIN APPLICATION WINDOW The main application window can be divided into three parts: The top part of the window indicates your computer’s current protection status. Figure 2: Current status of the computer protection There are three possible values of protection status: each status is indicated by a certain color, similar to traffic lights.
Application interface 49 The left-hand part of the window, the navigation bar, provides quick access to the application’s functions, including anti-virus scans and updating tasks.
Kaspersky Internet Security 2009 The right-hand part of the window contains information about the application function selected in the left-hand part, and is used to configure those functions and display provide tools for performing antivirus scan tasks, downloading updates, etc. Figure 4: Informational part of the main window You can also use these buttons: Settings – to open the application's settings window. Help – to open the application Help system.
Application interface 51 NOTIFICATIONS If events occur in the course of the application's operation, special notifications will be displayed on the screen as pop-up messages above the application’s icon in the Microsoft Windows task bar. Depending on how critical the event is for computer security, you might receive the following types of notifications: Alert. A critical event has occurred; for instance, a virus or dangerous activity has been detected on your system.
GETTING STARTED One of the main goals of Kaspersky Lab in making Kaspersky Internet Security was to provide the optimum configuration for all the application's options. This allows even an unsophisticated computer user to protect his or her computer immediately after installation, without spending hours changing the settings. For the user's convenience, we have combined the preliminary configuration stages into a unified Initial Setup Wizard that starts as soon as the application is installed.
Getting started 53 IN THIS SECTION: Selecting network type ....................................................................................... 53 Updating the application ..................................................................................... 54 Security analysis................................................................................................. 54 Scanning computer for viruses ........................................................................... 55 Managing license...
Kaspersky Internet Security 2009 For each network status Kaspersky Internet Security includes a set of rules for managing network activities. Subsequently, you can change the specified network status for each connection once it is detected for the first time. UPDATING THE APPLICATION Warning! You will need an internet connection to update Kaspersky Internet Security.
Getting started 55 The security analysis wizard searches for vulnerabilities in installed applications, and for damage and anomalies in the operating system's and the browser's settings. To start the wizard: 1. Open the main application window. 2. In the left part of the window select System Security. 3. Start the Security Analyzer task.
Kaspersky Internet Security 2009 MANAGING LICENSE The application needs a license key to operate. You will be provided with a key when you buy the program. It gives you the right to use the program from the day you purchase it and install the key. Without a license key, unless a trial version of the application has been activated, the application will run in the mode allowing only one update. The application will not download any new updates.
Getting started 57 online, a key file or an activation code will be mailed to you at the address specified in the order form once payment has been made. 2. Install the key. To do it use the Install key button in the License section of the main application window or use command Activation from the main application menu. This will start the Activation Wizard. Note. Kaspersky Lab regularly has special pricing offers on license extensions for our products.
Kaspersky Internet Security 2009 1. Corrupted. Your request to activate the subscription has not yet been processed (some time is required for processing the request at the server). Kaspersky Internet Security works in a full-functional mode. If after a certain period of time the subscription request has not been processed, you will receive notification that the subscription has not been processed.
Getting started 59 feature. For the commercial license with protection subscription the application bases will not be updated and the computer protection will not be performed. If, for any reason, the license was not renewed (subscription status – Update required) in time (for example the computer was off during the entire time while the license renewal was available), you can renew its status manually. For this purpose you can use the Renew subscription status button.
Kaspersky Internet Security 2009 program versions, browser extensions, version number of Kaspersky Internet Security installed. Kaspersky Security Network also gathers extended statistics including information about: executable files and signed applications downloaded on your computer; applications running on your computer. This statistical information is sent, once application updating is complete.
Getting started 61 You can view the list of current problems, their description and the possible solutions on the Status tab (see figure below) that opens when you click on the Fix it now link (see figure above). Figure 6: Solving security problems The tab shows the list of current problems.
Kaspersky Internet Security 2009 Note that this option is not available for serious problems. Such problems include, for example, malicious objects which were detected but not disinfected, crashes of one or several components, or corruption of the application files. To make hidden messages re-appear in the general list, check the Show hidden messages box. PAUSING PROTECTION Pausing of protection means temporarily disabling all protection components for a certain period of time.
Getting started 63 If new network connections were being established at the same time as protection was paused, a notification will be displayed about disruptions to those connections
VALIDATING APPLICATION SETTINGS After the application has been installed and configured, you should verify whether the application is correctly configured using a test “virus” and its modifications. A separate test is required for each protection component / protocol. IN THIS SECTION: Test the EICAR "virus" and its modifications ...................................................... 64 Testing the HTTP traffic protection .....................................................................
Validating application settings 65 You can download the test "virus" from the EICAR organization’s official website at: http://www.eicar.org/anti_virus_test_file.htm. Note Before you download the file, you must disable the computer’s anti-virus protection, because otherwise the application would identify and process the file anti_virus_test_file.htm as an infected object transferred via the HTTP protocol. Do not forget to enable the anti-virus protection immediately after you download the test "virus".
Kaspersky Internet Security 2009 Table 6. Modifications of the test "virus" Prefix Object status Object processing information No prefix, standard test virus Infected. Infected.object contains code of a known virus. Disinfection is not possible. The application identifies the object as a non-disinfectible virus. CORR– Corrupted.
Validating application settings 67 Prefix Object status Object processing information ERRO– Scanning error. An error occurred while scanning the object. The application was unable to access the object: either the object's integrity was breached (for example, no end to a multivolume archive) or there is no connection to it (if the object being scanned is located on a network drive). You can find information about the object’s processing in the application operation’s report. CURE– Infected.
Kaspersky Internet Security 2009 When attempting to download the test “virus”, Kaspersky Internet Security will detect this object, identify it as an infected object that cannot be disinfected, and will perform the action specified in the HTTP traffic settings for objects with this status.
Validating application settings 69 VALIDATING FILE ANTI-VIRUS SETTINGS To verify that the File Anti-Virus component is correctly configured: 1. Create a folder on a disk, and copy into the folder the EICAR test “virus” which you downloaded, and the modified test “viruses” which you created. 2. Check that all events will be logged, so that the report file will retain data on both corrupted objects, and on objects not scanned because of errors. 3. Run the test "virus" or one of its modified versions.
Kaspersky Internet Security 2009 4. Run the virus scan task. When the scan task is running, the actions specified in the task configuration will be performed as suspicious or infected objects are detected. By selecting various actions to be performed on detected objects, you will be able to fully check the component's operation. You can view detailed information about the task’s actions in the report on the component's operation.
KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT INTRODUCTION PLEASE READ THIS DOCUMENT CAREFULLY. IT CONTAINS IMPORTANT INFORMATION THAT YOU SHOULD KNOW BEFORE CONTINUING TO USE OUR SERVICES OR SOFTWARE. BY CONTINUING TO USE KASPERSKY LAB SOFTWARE AND SERVICES YOU WILL BE DEEMED TO HAVE ACCEPTED THIS KASPERSKY LAB’ Data Collection STATEMENT. We reserve the right to modify this Data Collection Statement at any time by posting the changes on this page.
Kaspersky Internet Security 2009 What is Kaspersky Security Network? Kaspersky Security Network service allows users of Kaspersky Lab security products from around the world to help facilitate identification and reduce the time it takes to provide protection against new ("in the wild") security risks targeting your computer.
Kaspersky Security Network Data Collection Statement 73 or opt-out (for all the other countries) on-line from the commercial use of this data and/or the transmission of this data to third parties. Kaspersky Lab may be required by law enforcement or judicial authorities to provide some personally identifiable information to appropriate governmental authorities. If requested by law enforcement or judicial authorities, we shall provide this information upon receipt of the appropriate documentation.
Kaspersky Internet Security 2009 Information about executable applications (size, attributes, date created, information about PE headers, region, name, location, and compression utility used). Securing the Transmission and Storage of Data Kaspersky Lab is committed to protecting the security of the information it collects. The information collected is stored on computer servers with limited and controlled access.
Kaspersky Security Network Data Collection Statement 75 Internet security threats to provide the best possible level of protection to Kaspersky Lab customers in the future.
Kaspersky Internet Security 2009 DATA COLLECTION – RELATED INQUIRIES AND COMPLAINTS Kaspersky Lab takes and addresses its users’ Data Collection concerns with utmost respect and attention. If you believe that there was an instance of noncompliance with this Statement with regard to your information or data you have other related inquiries or concerns, you may write or contact Kaspersky Lab at email: support@kaspersky.com.
KASPERSKY LAB Founded in 1997, Kaspersky Lab has become a recognized leader in information security technologies. It produces a wide range of high-performance data security software including anti-virus, anti-spam and anti-hacking systems. Kaspersky Lab is an international company. Headquartered in the Russian Federation, the company has offices in the United Kingdom, France, Germany, Japan, the Benelux countries, China, Poland, Romania and the USA (California).
Kaspersky Internet Security 2009 every hour. The company provides its customers with 24-hour technical support service available in several languages. If you have any quetions, you can contact our dealers or contact Kaspersky Lab directly. Detailed consultations are provided by phone or e-mail. You will receive full and comprehensive answers to any question. Address: Russia, 123060, Moscow, 1-st Volokolamsky Proezd, 10, Building 1 Tel.
Kaspersky Lab General Information: 79 +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00 info@kaspersky.com WWW: http://www.kaspersky.com http://www.viruslist.
CRYPTOEX LLC To create and verify digital signatures, Kaspersky Anti-Virus uses Crypto Ex LLC’s data security software library, Crypto C. Crypto Ex holds a license from the Federal Agency for Government Communications and Information (a branch of the Federal Security Service) to develop, manufacture and distribute encryption software to protect data which does not constitute a state secret.
MOZILLA FOUNDATION The Gecko SDK ver. 1.8 library was used for the development of this application's components. This software is used according to the terms and conditions of license MPL 1.1 Public Mozilla Foundation license http://www.mozilla.org/MPL. For more details about the Gecko SDK library, refer to: http://developer.mozilla.org/en/docs/Gecko_SDK. © Mozilla Foundation Mozilla Foundation website: http://www.mozilla.org.
LICENSE AGREEMENT Standard End User License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT (“AGREEMENT”), FOR THE LICENSE OF KASPERSKY INTERNET SECURITY (“SOFTWARE”) PRODUCED BY KASPERSKY LAB (“KASPERSKY LAB”). IF YOU HAVE PURCHASED THIS SOFTWARE VIA THE INTERNET BY CLICKING THE ACCEPT BUTTON, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT.
License Agreement 83 All references to “Software” herein shall be deemed to include the software activation code with which you will be provided by Kaspersky Lab as a part of the Kaspersky Internet Security. 1. License Grant.
Kaspersky Internet Security 2009 1.1.5 You shall not make error corrections to, or otherwise modify, adapt, or translate the Software, nor create derivative works of the Software, nor permit any third party to copy (other than as expressly permitted herein). 1.1.6 You shall not rent, lease or lend the Software to any other person, nor transfer or sub-license your license rights to any other person. 1.1.
License Agreement 85 code also provided to you by Kaspersky Lab with this Agreement. It shall be at the absolute discretion of Kaspersky Lab whether or not you have satisfied this condition for the provision of Support Services. Support Services shall become available after Software activation. Kaspersky Lab's technical support service is also entitled to demand from you additional registration for identifier awarding for Support Services rendering.
Kaspersky Internet Security 2009 4. Confidentiality. You agree that the Software and the Documentation, including the specific design and structure of individual programs constitute confidential proprietary information of Kaspersky Lab. You shall not disclose, provide, or otherwise make available such confidential information in any form to any third party without the prior written consent of Kaspersky Lab.
License Agreement 87 terms as to satisfactory quality, fitness for purpose or as to the use of reasonable skill and care). 6. Limitation of Liability. (i) Nothing in this Agreement shall exclude or limit Kaspersky Lab’s liability for (a) the tort of deceit, (b) death or personal injury caused by its breach of a common law duty of care or any negligent breach of a term of this Agreement, or (c) any other liability which cannot be excluded by law.
Kaspersky Internet Security 2009 7.