U SER ' S G UIDE KASPERSKY INTERNET SECURITY 2009
Dear User of Kaspersky Internet Security 2009! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product. Warning! This document is a property of Kaspersky Lab's and all rights to this document are reserved by the copyright laws of the Russian Federation and international treaties.
TABLE OF CONTENT INTRODUCTION .................................................................................................. 6 Obtaining information about the application .................................................... 6 Sources of information to research on your own ....................................... 6 Contacting the Sales Department.............................................................. 7 Contacting the Technical Support service .................................................
Kaspersky Internet Security 2009 Step 2. Verifying the system's conformity to the installation requirements .... 41 Step 3. Wizard's greeting window ................................................................. 41 Step 4. Viewing the License Agreement ....................................................... 41 Step 5. Selecting the installation type ........................................................... 42 Step 6. Selecting the installation folder ................................................
Table of content 5 Contact Us .................................................................................................... 86 CRYPTOEX LLC ................................................................................................ 88 MOZILLA FOUNDATION ................................................................................... 89 LICENSE AGREEMENT ....................................................................................
INTRODUCTION IN THIS SECTION: Obtaining information about the application ......................................................... 6 What's new in Kaspersky Internet Security 2009 .................................................. 9 Application protection concept ............................................................................ 11 Hardware and software system requirements ....................................................
Introduction 7 CONTACTING THE SALES DEPARTMENT If you have questions regarding selecting or purchasing the application or extending the period of its use, you can phone Sales Department specialists in our Central Office in Moscow at: +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00. The service is provided in Russian or English. You can send your questions to the Sales Department to e-mail address sales@kaspersky.com.
Kaspersky Internet Security 2009 Note If you are not yet a registered user of Kaspersky Lab's applications, you can fill out a registration form (https://support.kaspersky.com/en/PersonalCabinet/Registration/Form/). During the registration you will have to supply the activation code or key file name. You will receive a Technical Support service specialist's response to your request in your Personal Cabinet (https://support.kaspersky.
Introduction 9 DISCUSSING KASPERSKY LAB APPLICATIONS ON THE WEB FORUM If your question does not require an urgent answer, you can discuss it with Kaspersky Lab's specialists and other users of Kaspersky Lab's anti-virus applications in our forum located at Kaspersky Lab's web forum http://forum.kaspersky.com. In this forum you can view topics published earlier, leave your comments, create new topics and use the search engine.
Kaspersky Internet Security 2009 the applications installed on your computer, operating system's and browser settings. Kaspersky Lab now reacts to new threats faster due to the use of Participating in Kaspersky Security Network technology that gathers data about infection of users' computers and sends it to Kaspersky Lab's servers. New tools – Network Monitor and Network Package Analysis - facilitate collection and analysis of information about network activities on your computer.
Introduction 11 New program's interface features The new program's interface reflects the comprehensive approach to information protection. High information capacity of dialog boxes helps user quickly make decisions. The functionality of reports and statistics information about the application's operation has been extended. The possibility of using filters allowing flexible setup when working with reports makes this product irreplaceable for professionals.
Kaspersky Internet Security 2009 Support features which provide information support for working with the application and expanding its capabilities. WIZARDS AND TOOLS Ensuring computer security is a rather difficult task requiring knowledge about operating system's features and methods utilized to take advantage of its weaknesses. Besides, a large number and diversity of information about the system security makes it analysis and processing more difficult.
Introduction 13 SUPPORT FEATURES The application includes a number of support features. They are designed to provide maintain the application up-to-date, expand the capabilities of the program and to assist you as you use it. Kaspersky Security Network Kaspersky Security Network – a system providing an automatic transfer of reports about detected and potential threats into the centralized database.
Kaspersky Internet Security 2009 Of course, scanning using the signature method with a database created previously containing a description of known threats and methods for treating them will give you a definite answer regarding whether a scanned object is malicious and what dangerous program class it is classified as.
Introduction 15 HARDWARE AND SOFTWARE SYSTEM REQUIREMENTS To ensure normal functioning of the application the computer must conform to the following minimum requirements: General requirements: 75 MB free hard drive space. CD-ROM (for installation of the application from the installation CD). A mouse. Microsoft Internet Explorer 5.5 or higher (for updating application's bases and software modules via Internet). Microsoft Windows Installer 2.0.
THREATS TO COMPUTER SECURITY A considerable threat to the computer security is imposed by threat applications. Additionally, such threat is imposed by spam, phishing, hacker attacks and adware ad banners. These threats are related to internet use. IN THIS SECTION: Threat applications ............................................................................................. 16 Internet threats ...................................................................................................
Threats to computer security 17 MALICIOUS PROGRAMS Malicious programs are created specifically to inflict harm to computers and their users: steal, block, modify or erase information, disrupt the operation of computers or computer networks. Malware programs are divided into three subcategories: viruses and worms, Trojans programs and malware utilities. Viruses and worms (see page 17) (Viruses_and_Worms) can create copies of themselves which are, in turn, capable of creating their own copies.
Kaspersky Internet Security 2009 Classic viruses reproduce only on the local resources of a certain computer, they cannot independently penetrate other computers. They can penetrate other computers only if it adds its copy into a file stored in a shared folder or on a CD or if the user forwards an e-mail messages with at infected attachment. Code of a classic virus can penetrate various areas of a computer, operating system or application.
Threats to computer security 19 TYPE NAME DESCRIPTION EmailWorm E-mail worms E-mail worms infect computers via e-mail. An infected message contains an attached file containing a copy of a worm or a link to such file uploaded to a website that, for example, can be hacked or be a hacker's site itself. When you open such attachment the worm gets activated; when you click the link, download and then open a file, the worm will also start performing its malicious action.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION P2PWorm File exchange worms File exchange worms propagate through fileexchange peer-to-peer networks, such as Kazaa, Grokster, EDonkey, FastTrack or Gnutella. In order to sneak into a file exchange network, the worm copies itself into the file-exchange folder usually located on the user's computer.
Threats to computer security 21 Unlike worms and viruses, trojan programs do not create copies of themselves. They sneak into a computer, for example, via e-mail or using a web browser when the user visits an "infected" website. Trojan programs are launched by the user and start performing their malicious actions as they run. The behavior of different trojan programs in the infected computer may differ.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Trojans Trojans Trojans include the following malicious programs: classic Trojan programs; they perform only major functions of Trojan programs: blocking, modification or erasing of data, disruption of the operation of the computers or computer networks; they do not have any additional functions characteristic of other types of Trojan programs described in this table; "multi-purpose" Trojan programs; they have additional functions characte
Threats to computer security 23 TYPE NAME DESCRIPTION TrojanDroppers Trojan programdroppers These programs save programs containing other Trojan programs on the computer's disk and then install them.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION TrojansPSWs Trojans stealing passwords Trojans stealing passwords (Password Stealing Ware); they steal users' accounts, for example, software registration information. They find confidential information in the system files and in the registry and send it to their developer by e-mail, via FTP, accessing the intruder's website or using other methods. Some of these Trojan programs fall into specific types described in this table.
Threats to computer security 25 TYPE NAME DESCRIPTION Trojans-IMs Trojan programs stealing personal data of the IM client users These programs steal numbers and passwords of the IM client users (instant messaging programs), such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager or Skype. Then they transfer information to the intruder by e-mail, via FTP, by accessing the intruder's website or using other methods.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION TrojansMailfinders Trojan programs that collect e-mail addresses These programs collect e-mail addresses on the computer and transfer them to the intruder by e-mail, via FTP, by accessing the intruder's website or using other methods. The intruder can use collected addresses to send spam. MALICIOUS UTILITIES Subcategory: malicious utilities (Malicious_tools) Severity level: medium These utilities are designed specifically to inflict damage.
Threats to computer security 27 TYPE NAME DESCRIPTION Exploit Exploits Exploit is a set of data or a program code used application's vulnerabilities procecced to perfom a malicious action on the computer. For example, exploits can write or read files or access "infected" web pages. Different exploits use vulnerabilities of different applications or network services.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION Flooders Programs used for flooding networks They send a great number of messages via network channels. These channels include, for example, programs used for flooding internet relay chats. However, this type of malware does not include programs flooding e-mail traffic and IM and SMS channels. Such programs are classified as individual types described in the table below (Email-Flooder, IM-Flooder and SMS-Flooder).
Threats to computer security 29 TYPE NAME DESCRIPTION EmailFlooders Programs for flooding e-mail email addresses These programs send numerous messages to e-mail addresses (flood them). Due to the large flow of messages, the users are unable to view non-spam incoming messages. IM-Flooders Programs used for flooding IM programs These programs send numerous messages to IM client users (instant messaging programs), such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager or Skype.
Kaspersky Internet Security 2009 Potentially unwanted programs are installed using one of the following methods: They are installed by the user, individually or along with another program (for example, software developers include adware programs into freeware or shareware programs).
Threats to computer security 31 Table 4. Types of pornware programs depending on their functions TYPE NAME DESCRIPTION Porn-Dialers Automatic dialers These programs automatically dial pornographic phone services (they store phone numbers of such services); unlike Trojan dialers, they notify users about their actions.
Kaspersky Internet Security 2009 Table 5. Types of other riskware distinguished based on their functions TYPE NAME DESCRIPTION Client-IRC Internet chat client programs Users install these programs to communicate through Internet Relay Charts. Intruders use them to spread malware programs. Dialers Automatic dialing programs These programs can establish "hidden" phone connections via the modem. Downloaders Downloaders These programs can secretly download files from websites.
Threats to computer security 33 TYPE NAME DESCRIPTION RemoteAdmin Remote administration programs These programs are often used by system administrators; they provide access to the remote computer's interface to monitor and manage it. Intruders pursue exactly the same purpose when they install them on users' computers to monitor and manage them. Remote administration riskware programs are different from Trojan remote administration programs called Backdoor.
Kaspersky Internet Security 2009 TYPE NAME DESCRIPTION RiskTool Local computer tools These tools provide users with additional functionality and are used within the user's computer only (they allow hiding files or windows of active applications, closing active processes).
Threats to computer security 35 METHODS OF DETECTING INFECTED, SUSPICIOUS AND POTENTIALLY DANGEROUS OBJECTS BY THE APPLICATION Kaspersky Lab's application detects malware programs in the objects using two methods: reactive (using databases) and proactive (using heuristic analysis). Bases are files with records that are used to identify the presence of hundreds of thousands known threats in the detectable objects.
Kaspersky Internet Security 2009 phishing (on page 36); hacker attacks (on page 37); banners display (on page 37). SPAM OR UNSOLICITED INCOMING MAIL Kaspersky Lab's application protects users from spam. Spam is unsolicited incoming mail often of advertising nature. Spam is an additional load on the channels and provider's mail servers. The recipient pays for the traffic created by Spam and non-spam mail travels slower. Therefore spam is illegal in many countries.
Threats to computer security 37 Anti-phishing databases contain the list URLs of websites known as sites used for phishing attacks. Kaspersky Lab's application analyzes incoming Microsoft Office Outlook and Microsoft Outlook Express messages and if it finds a link to a URL included into the databases, it marks this message as Spam. If the user opens the message and tries to follow the link, the application blocks this website.
Kaspersky Internet Security 2009 Kaspersky Lab's application blocks banners based on the URL of the website to which the banner has a link. It uses updatable Anti-Banner databases which contain the list of URLs of Russian and foreign banner networks. The application goes through the links of the website being loaded, compares them to the addresses in the databases and if it finds a certain link in one of them, it deletes the link to this address from the site and continues loading the page.
INSTALLING APPLICATION ON THE COMPUTER The application is installed on the computer in the interactive mode using the application setup wizard. Warning! We recommend that you close all running applications before proceeding with the installation. To install the application on your computer run the distribution file (file with *.exe extension). Note Installation of the application from the installation file downloaded via Internet is fully identical to the installation from CD.
Kaspersky Internet Security 2009 IN THIS SECTION: Step 1. Searching for a newer version of the application .................................... 40 Step 2. Verifying the system's conformity to the installation requirements ......... 41 Step 3. Wizard's greeting window ....................................................................... 41 Step 4. Viewing the License Agreement ............................................................. 41 Step 5. Selecting the installation type .....................
Installing application on the computer 41 STEP 2. VERIFYING THE SYSTEM'S CONFORMITY TO THE INSTALLATION REQUIREMENTS Before installing the application on your computer the wizard will verify the conformity of the operating system and service packs installed to the software installation requirements (see section "Hardware and software system requirements" on page 14).
Kaspersky Internet Security 2009 To cancel the installation press the Cancel button. STEP 5. SELECTING THE INSTALLATION TYPE During this step you will be offered to select the installation type that suits you best: Express installation. If you select this option, the entire application will be installed on your computer with the protection settings recommended by Kaspersky Lab's experts. Once the installation is complete the Application Setup wizard will be started. Custom installation.
Installing application on the computer 43 \ Program Files (х86) \ Kaspersky Lab \ Kaspersky Internet Security 2009 – for 64-bit systems. You can specify a different folder by pressing the Browse button and selecting a folder in the standard folder select dialog box or entering the path to it in the entry field provided.
Kaspersky Internet Security 2009 After you finished selecting components to be installed, press the Next button. To return to the list of components to be installed by default press the Clear button. STEP 8. SEARCHING FOR OTHER ANTIVIRUS SOFTWARE During this step the wizard performs a search for other anti-virus programs including Kaspersky Lab's programs which may conflict with the application being installed.
Installing application on the computer 45 STEP 9. FINAL PREPARATION FOR THE INSTALLATION During this step you will be offered to perform the final preparation for the installation to your computer. During the initial and custom application installation (see section "Step 5. Selecting the installation type" on page 42) we recommend that you do not uncheck the Enable Self-Defense before installation box during the initial installation.
APPLICATION INTERFACE The application has a fairly simple and easy-to-use interface. This chapter will discuss its basic features in detail. In addition to the main program interface, there are plugins for Microsoft Office Outlook (scan for viruses and spam processing), Microsoft Outlook Express (Windows Mail), The Bat! (scan for viruses and spam processing), Microsoft Internet Explorer and Microsoft Windows Explorer.
Application interface 47 The application icon changes depending on the operation being performed: – e-mail being scanned. – updating application databases and program modules. – computer needs reboot to apply updates. – an error has occurred in some Kaspersky Internet Security component. The icon also provides access the basics of the program interface: shortcut menu (see section "Shortcut menu" on page 47) and main application window (see section "Main application window" on page 49).
Kaspersky Internet Security 2009 Virtual keyboard – switching to the virtual keyboard. Kaspersky Internet Security – opening the main application window (see section "Main application window" on page 49). Settings - view and configure the application settings. Activate - activate the program. In order to obtain the status of a registered user, you must activate your application. This menu item is only available if the program is not activated.
Application interface 49 MAIN APPLICATION WINDOW The main application window can be divided into three parts: The top part of the window indicates your computer’s current protection status. Figure 2: Current status of the computer protection There are three possible protection statuses, each of these statuses is visually displayed by a certain color similarly to the traffic lights.
Kaspersky Internet Security 2009 The left-hand part of the window - navigation bar - is used to quickly switch to using any application function, execution of anti-virus scan task, updating task, etc.
Application interface 51 The right-hand part of the window contains information about the application function selected in the left-hand part and is used to configure settings of such functions and to provide tools for performing anti-virus scan tasks, downloading updates, etc. Figure 4: Informational part of the main window You can also use buttons: Settings - to switch to the application's settings. Help - to switch to the application Help system.
Kaspersky Internet Security 2009 Note You can change the appearance of the application by creating and using your own graphics and color schemes. NOTIFICATIONS If events occur in the course of the application's operation special notifications will be displayed on the screen in the form of pop-up messages above the application icon in the Microsoft Windows task bar.
Application interface 53 The settings configuration window consists of two parts: the left-hand part of the window provides access to the application components, virus scan tasks, updating tasks, etc.; the right part of the window contains a list of settings for the component, task, etc. selected in the left part of the window.
GETTING STARTED One of the main goals of the Kaspersky Lab specialists in making Kaspersky Internet Security was to provide optimum configuration for all the program's options. This makes it possible for the user with any level of computer literacy to ensure protection of his or her computer immediately after installation without spending hours on the settings.
Getting started 55 IN THIS SECTION: Selecting network type ....................................................................................... 55 Updating the application ..................................................................................... 56 Security analysis................................................................................................. 56 Scanning computer for viruses ...........................................................................
Kaspersky Internet Security 2009 For each network status Kaspersky Internet Security includes the set of rules for managing the network activities. Later you can change the network status specified once it is detected for the first time. UPDATING THE APPLICATION Warning! You will need a connection to the Internet to update Kaspersky Internet Security.
Getting started 57 In order to detect and eliminate such security problem, Kaspersky Lab's experts recommend that you launch Security Analysis Wizard after you have installed the application. The security analysis wizard searches for vulnerabilities in the installed applications and for the damages and anomalies in the operating system's and the browser's settings. To start the wizard: 1. Open main application window. 2. In the left part of the window select System Security. 3.
Kaspersky Internet Security 2009 PARTICIPATING IN KASPERSKY SECURITY NETWORK A great number of new threats appear worldwide on an everyday basis. In order to facilitate gathering the statistics about new threat types, their source and developing the method to be used for their elimination, Kaspersky Lab allows you to use the Kaspersky Security Network service.
Getting started 3. 59 Check the I agree to participate in Kaspersky Security Network box to confirm your participation in Kaspersky Security Network. Check the I agree to send extended statistics within the framework of Kaspersky Security Network box in order to confirm your consent to send extended statistics.
Kaspersky Internet Security 2009 You can view the list of problems occurred, their description and the possible solutions on the Status tab (see figure below) that opens by clicking the Fix it now link (see figure above). Figure 6: Solving security problems You can view the list of existing problems.
Getting started 61 Note that this option is not available for serious problems. Such problems include, for example, malicious objects that were not disinfected, crashes of one or several components, or corruption of the program files. In order for the hidden messages to re-appear in the general list, check the Show hidden messages box. PAUSING PROTECTION Pausing of protection means temporary disabling of all protection components for a certain period of time.
Kaspersky Internet Security 2009 If network connections were established at the moment when the protection was paused, a notification about breaking these connections will be displayed.
VALIDATING APPLICATION SETTINGS After the application has been installed and configured, you can verify whether the application is configured correctly using a test "virus" and its modifications. A separate test will be performed for each protection component / protocol. IN THIS SECTION: Test "virus" EICAR and its modifications ............................................................ 63 Testing the HTTP traffic protection .....................................................................
Kaspersky Internet Security 2009 You can download this test "virus" from the official website of the EICAR organization at: http://www.eicar.org/anti_virus_test_file.htm. Note Before you download the file, you have to disable the anti-virus protection because otherwise the application would identify and process file anti_virus_test_file.htm as an infected object transferred via HTTP protocol. Do not forget to enable the anti-virus protection immediately after you download the test "virus".
Validating application settings 65 Table 6. Modifications of the test "virus" Prefix Object status Object processing information No prefix, standard test virus Infected. Infected.Object contains code of a known virus. Disinfection is not possible. The application identifies the object as a non-disinfectible virus. CORR– Corrupted.
Kaspersky Internet Security 2009 Prefix Object status Object processing information ERRO– Scanning error: An error occurred during a scan of an object. Application was unable to obtain access to the object: the object's integrity was breached (for example, no end to a multi-volume archive) or there is no connection to it (if the object being scanned is located on a network drive). Information about the object processing can be found in the report about the application operation. CURE– Infected.
Validating application settings 67 TESTING THE HTTP TRAFFIC PROTECTION In order to verify detection of viruses in the data stream transferred via HTTP protocol, do the following: try to download a test "virus" from the official website of the EICAR organization at: http://www.eicar.org/anti_virus_test_file.htm.
Kaspersky Internet Security 2009 Note Message that contains a test virus will not be scanned if it is created in the RTF or HTML format! 2. Copy the text of the standard or modified "virus" in the beginning of the message or attach a file containing the test "virus" to the message. 3. Send the message to the administrator. The application will detect the object and identify it as infected. Sending of a message containing an infected object will be blocked.
Validating application settings 69 VALIDATING VIRUS SCAN TASK SETTINGS In order to verify the correctness of the anti-virus scan task configuration, do the following: 1. Create a folder on a disk, copy the test virus downloaded from the organization's official website (http://www.eicar.org/anti_virus_test_file.htm), and the modifications of the test virus that you created. 2. Create a new virus scan task and select the folder, containing the set of test "viruses" as the objects to scan. 3.
KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT INTRODUCTION PLEASE READ THIS DOCUMENT CAREFULLY. IT CONTAINS IMPORTANT INFORMATION THAT YOU SHOULD KNOW BEFORE CONTINUING TO USE OUR SERVICES OR SOFTWARE. BY CONTINUING TO USE KASPERSKY LAB SOFTWARE AND SERVICES YOU WILL BE DEEMED TO HAVE ACCEPTED THIS KASPERSKY LAB’ Data Collection STATEMENT. We reserve the right to modify this Data Collection Statement at any time by posting the changes on this page.
Kaspersky Security Network Data Collection Statement 71 What is Kaspersky Security Network? Kaspersky Security Network service allows users of Kaspersky Lab security products from around the world to help facilitate identification and reduce the time it takes to provide protection against new ("in the wild") security risks targeting your computer.
Kaspersky Internet Security 2009 or opt-out (for all the other countries) on-line from the commercial use of this data and/or the transmission of this data to third parties. Kaspersky Lab may be required by law enforcement or judicial authorities to provide some personally identifiable information to appropriate governmental authorities. If requested by law enforcement or judicial authorities, we shall provide this information upon receipt of the appropriate documentation.
Kaspersky Security Network Data Collection Statement 73 Information about executable applications (size, attributes, date created, information about PE headers, region, name, location, and compression utility used). Securing the Transmission and Storage of Data Kaspersky Lab is committed to protecting the security of the information it collects. The information collected is stored on computer servers with limited and controlled access.
Kaspersky Internet Security 2009 Internet security threats to provide the best possible level of protection to Kaspersky Lab customers in the future.
Kaspersky Security Network Data Collection Statement 75 DATA COLLECTION – RELATED INQUIRIES AND COMPLAINTS Kaspersky Lab takes and addresses its users’ Data Collection concerns with utmost respect and attention. If you believe that there was an instance of noncompliance with this Statement with regard to your information or data you have other related inquiries or concerns, you may write or contact Kaspersky Lab at email: support@kaspersky.com.
KASPERSKY LAB Founded in 1997, Kaspersky Lab has become a recognized leader in information security technologies. It produces a wide range of data security software and delivers high-performance, anti-virus, anti-spam and anti-hacking systems. Kaspersky Lab is an international company. Headquartered in the Russian Federation, the company has offices in the United Kingdom, France, Germany, Japan, the Benelux countries, China, Poland, Romania and the USA (California).
Kaspersky Lab 77 IN THIS SECTION: Other Kaspersky Lab Products ........................................................................... 77 Contact Us .......................................................................................................... 86 OTHER KASPERSKY LAB PRODUCTS Kaspersky Lab's New Agent Program News Agent is used for quick delivering Kaspersky Lab's news, notification about the "virus weather" and latest events.
Kaspersky Internet Security 2009 response to their questions related to the infection with malware. In the course of a scan the user can: exclude archives and e-mail databases from the scan; select standard or extended databases to be used for the scan; save results of the scan in txt or html formats.
Kaspersky Lab Kaspersky Anti-Virus for Linux File Server. Kaspersky Anti-Virus for Novell Netware. Kaspersky Anti-Virus for Samba Server. 79 Advantages and functional capabilities: real-time protection of the servers' file systems: all servers' files will be scanned at the attempt to open or save them to the server.
Kaspersky Internet Security 2009 This software product includes four programs: Kaspersky Open Space Security. Kaspersky Business Space Security. Kaspersky Enterprise Space Security. Kaspersky Total Space Security. Provided below is the detailed description of each product.
Kaspersky Lab 81 automatic database updating; full-fledged support of 64-bit operating systems; optimization of the laptop software (Intel® Centrino® Duo technology for mobile PC); ability to perform remote disinfection (Intel® Active Management technology, component Intel® vPro™). Kaspersky Business Space Security ensures optimal protection of information resources against modern internet threats.
Kaspersky Internet Security 2009 isolation of suspicious objects in the special storage; automatic database updating. Kaspersky Enterprise Space Security This software product includes components for protection of workstations and teamwork servers against all types of modern internet threats, removes viruses from the e-mail streams, ensures security of information and instant users' access to the network resources.
Kaspersky Lab 83 isolation of suspicious objects in the special storage; developed system of reports about the protection system status; automatic database updating. Kaspersky Total Space Security This solution controls all incoming and outgoing data streams - e-mail, web traffic and all network interactions.
Kaspersky Internet Security 2009 dynamic reallocation of resources during the full system scan; personal firewall with the system for detection of intrusions an prevention of network attacks; secure work in networks of any type including Wi-Fi; protection against phishing attacks and spam; ability to perform remote disinfection (Intel® Active Management technology, component Intel® vPro™); rollback of malicious changes made to the system; self-protection technology of the ant
Kaspersky Lab 85 scan of messages, databases and other objects of Lotus Domino servers; filtering messages by attachments types; isolation of suspicious objects in the special storage; convenient system for managing the software product; preventing virus outbreaks; monitoring of the protection system status using notifications; system of reports about operation of the application; scalability of the software product to match the available system resources; automatic data
Kaspersky Internet Security 2009 support of hardware proxy servers; scalability of the software product to match the available system resources; automatic database updating. Kaspersky® Anti-Spam Kaspersky Anti-Spam is the first Russian software package used to ensure protection against spam for small and medium-size companies.
Kaspersky Lab 87 Tel., Fax: +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00 24/7 Emergency Support +7 (495) 797-87-07, +7 (495) 645-79-29, +7 (495) 956-87-08 Support of business product users: +7 (495) 797-87-07, +7 (495) 645-79-29, +7 (495) 956-87-08 (from 10 am until 7 pm) http://support.kaspersky.com/helpdesk.html Support for corporate users: contact information will be provided after you purchase a corporate software product depending on your support package.
CRYPTOEX LLC For creation and verification of the digital signature Kaspersky Anti-Virus uses data security software library Crypto C developed by Crypto Ex LLC. Crypto Ex is a holder of Federal Agency for Government Communications and Information (FSB - Federal Security Service) license for development, manufacture and distribution of encrypting complex systems for ensuring security of data not constituting a state secret.
MOZILLA FOUNDATION Library Gecko SDK ver. 1.8 was used for the development of the application's component. This software is used according to the terms and conditions of license MPL 1.1 Public Mozilla Foundation license http://www.mozilla.org/MPL. For more details about this library http://developer.mozilla.org/en/docs/Gecko_SDK. © Mozilla Foundation Mozilla Foundation website: http://www.mozilla.org.
LICENSE AGREEMENT Standard End User License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF KASPERSKY INTERNET SECURITY ("SOFTWARE") PRODUCED BY KASPERSKY LAB ("KASPERSKY LAB"). IF YOU HAVE PURCHASED THIS SOFTWARE VIA THE INTERNET BY CLICKING THE ACCEPT BUTTON, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT.
License Agreement 91 All references to "Software" herein shall be deemed to include the software activation code with which you will be provided by Kaspersky Lab as a part of the Kaspersky Internet Security 2009. 1. License Grant.
Kaspersky Internet Security 2009 1.1.6 You shall not rent, lease or lend the Software to any other person, nor transfer or sub-license your license rights to any other person. 1.1.7 You shall not provide the activation code or license key file to third parties or allow third parties access to the activation code or license key. The activation code and license key are confidential data. 1.1.
License Agreement 93 you have satisfied this condition for the provision of Support Services. Support Services shall become available after Software activation. Kaspersky Lab's technical support service is also entitled to demand from you additional registration for identifier awarding for Support Services rendering. Until Software activation and/or obtaining of the End User identifier (Customer ID) technical support service renders only assistance in Software activation and registration of the End User.
Kaspersky Internet Security 2009 otherwise make available such confidential information in any form to any third party without the prior written consent of Kaspersky Lab. You shall implement reasonable security measures to protect such confidential information, but without limitation to the foregoing shall use best endeavours to maintain the security of the activation code. 5. Limited Warranty.
License Agreement 95 breach of a common law duty of care or any negligent breach of a term of this Agreement, or (c) any other liability which cannot be excluded by law.