Kaspersky Internet Security User Guide APPLICATION VERSION: 14.
Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this software product. Attention! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation and by international treaties.
TABLE OF CONTENTS ABOUT THIS GUIDE .............................................................................................................................................. 6 In this Guide...................................................................................................................................................... 6 Document conventions ......................................................................................................................................
USER GUIDE SOLVING TYPICAL TASKS.................................................................................................................................. 27 Activating the application ................................................................................................................................. 28 Acquiring and renewing a license.....................................................................................................................
TABLE OF CONTENTS CONTACTING TECHNICAL SUPPORT ................................................................................................................ 71 How to get technical support ............................................................................................................................ 71 Technical support by phone .............................................................................................................................
ABOUT THIS GUIDE This document is the User Guide for Kaspersky Internet Security. For proper use of Kaspersky Internet Security, you should be acquainted with the interface of the operating system that you use, handle the main techniques specific for that system, know how to work with email and the Internet. This Guide is intended to do the following: Help you install, activate, and use Kaspersky Internet Security. Ensure a quick search of information on application-related issues.
ABOUT THIS GUIDE Contacting Technical Support This section provides information about how to contact Technical Support at Kaspersky Lab. Glossary This section contains a list of terms mentioned in the document and their respective definitions. Kaspersky Lab ZAO This section provides information about Kaspersky Lab. Information about third-party code This section provides information about the third-party code used in the application.
USER GUIDE SAMPLE TEXT DESCRIPTION OF DOCUMENT CONVENTION Update means... The following semantic elements are italicized in the text: The Databases are out of date event occurs. New terms Press ENTER. Names of keyboard keys appear in bold and are capitalized. Press ALT+F4. Names of keys that are connected by a + (plus) sign indicate the use of a key combination. Those keys must be pressed simultaneously. Click the Enable button.
SOURCES OF INFORMATION ABOUT THE APPLICATION This section describes sources of information about the application and lists websites that you can use to discuss the application's operation. You can select the most suitable information source, depending on the level of importance and urgency of the issue. IN THIS SECTION Sources of information for independent research .........................................................................................................
USER GUIDE On the page of the application in the Knowledge Base (http://support.kaspersky.com/kis2014), you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application. Articles may provide answers to questions that are out of scope of Kaspersky Internet Security, being related to other Kaspersky Lab applications. They also may contain news from Technical Support.
KASPERSKY INTERNET SECURITY This section describes the application's features and provides brief information about the application's functions and components. You will learn what items are included in the distribution kit, and what services are available for registered users of the application. This section provides information about software and hardware requirements that a computer should meet to allow a user to install the application on it. IN THIS SECTION What's new....................................
USER GUIDE Application reporting has been improved. Now reports are simpler and more obvious. The option of participating in the Protect a Friend program has been added. You can now share a link to Kaspersky Internet Security with friends and receive bonus activation codes. DISTRIBUTION KIT You can purchase the application in one of the following ways: Boxed. Distributed via stores of our partners. At the online store. Distributed at online stores of Kaspersky Lab (for example, http://www.
KASPERSKY INTER NET SECUR ITY File Anti-Virus File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating system, continuously remains in the computer's RAM, and scans all files being opened, saved, or launched on your computer and all connected drives. Kaspersky Internet Security intercepts each attempt to access a file and scans the file for known viruses.
USER GUIDE Parental Control Parental Control is designed to protect children and teenagers from threats related to computer and Internet usage. Parental Control allows you to set flexible restrictions on access to web resources and applications for different users depending on their age. Parental Control also allows viewing statistical reports on activities exerted by controlled users.
INSTALLING AND REMOVING THE APPLICATION This section contains step-by-step instructions for application installation and removal. IN THIS SECTION Standard installation procedure ................................................................................................................................. 15 Upgrading a previous version of the application ......................................................................................................... 18 Removing the application ..................
USER GUIDE STEP 1. FINDING A NEWER VERSION OF THE APPLICATION Before setup, the Setup Wizard checks the update servers of Kaspersky Lab for a newer version of Kaspersky Internet Security. If the Setup Wizard does not detect any newer version of the application on the update servers, it starts installing the current version. If the Wizard detects a newer version of Kaspersky Internet Security on the update servers, it offers you to download and install it to your computer.
INSTA LLING A ND REMOV ING THE APP LICATION STEP 5. INSTALLATION Some versions of Kaspersky Internet Security are distributed under subscription, and a password received from the service provider must be entered before installation. After you enter the password, the application installation starts. Installation of the application can take some time. Wait for it to finish. Once the installation is complete, the Wizard will automatically proceed to the next step.
USER GUIDE You will be offered the following options for Kaspersky Internet Security activation: Activate the application. Select this option and enter an activation code if you have purchased a license for the application. If you specify the activation code for Kaspersky Anti-Virus in the entry field, the procedure of switching to Kaspersky Anti-Virus will be started when the activation is completed. Activate trial version of the application.
INSTA LLING A ND REMOV ING THE APP LICATION Installing a new version of Kaspersky Internet Security over a previous version of Kaspersky AntiVirus If you install a new version of Kaspersky Internet Security to a computer on which one of the previous versions of Kaspersky Anti-Virus has been already installed with a license in effect, the Activation Wizard prompts you to select one of the following options for further actions: Continue using Kaspersky Anti-Virus under the current license.
USER GUIDE STEP 2. STARTING THE APPLICATION INSTALLATION At this step, the Setup Wizard offers you to install the application. To proceed with the installation, click the Install button. Depending on the installation type and the localization language, at this step the Wizard offers you to view the License Agreement concluded between you and Kaspersky Lab, also offering you to participate in Kaspersky Security Network. STEP 3.
INSTA LLING A ND REMOV ING T HE APPLICATION Presence of incompatible applications on the computer. If any incompatible applications are detected, they are displayed in a list on the screen, and you will be prompted to remove them. Applications that Kaspersky Internet Security cannot remove automatically should be removed manually. When removing incompatible applications, you will need to reboot your operating system, after which installation of Kaspersky Internet Security will continue automatically.
USER GUIDE STEP 2. SAVING DATA FOR FUTURE USE At this step you can specify which of the data used by the application you want to keep for further use at the next installation of the application (e.g., when installing a newer version of the application). By default, the application prompts you to save information about the license.
APPLICATION LICENSING This section provides information about general terms related to the application activation. Read this section to learn more about the purpose of the End User License Agreement, ways of activating the application, and the license renewal. IN THIS SECTION About the End User License Agreement .................................................................................................................... 23 About the license ...........................................................
USER GUIDE We recommend renewing the license before its expiration to ensure maximum protection of your computer against all security threats. Before purchasing a license, you can get acquainted the trial version of Kaspersky Internet Security without any fees. The trial version of Kaspersky Internet Security remains functional during a short evaluation period. After the evaluation period ends, Kaspersky Internet Security stops running all of its features.
APPLICA TION LICENSING If Kaspersky Internet Security is already in use under the current license when you register your subscription, Kaspersky Internet Security will be used under subscription after registration. The activation code that you have used to activate the application can be applied on another computer. To refuse the subscription, you need to contact the service provider from whom you purchased Kaspersky Internet Security.
USER GUIDE statistics of the actual time spent by application components on objects scanning. statistics of delays occurring when starting applications related with the operation of Kaspersky Internet Security files that can be used by criminals to damage your computer, or fragments of such files, including files detected by malicious links. Information to be sent to Kaspersky Lab can be stored on your computer no longer than 30 days since it was created.
SOLVING TYPICAL TASKS This section contains step-by-step instructions for performing typical user tasks that the application provides. IN THIS SECTION Activating the application .......................................................................................................................................... 28 Acquiring and renewing a license ..............................................................................................................................
USER GUIDE ACTIVATING THE APPLICATION You need to activate the application to be able to use its functionality and associated services (see the section "About the activation code" on page 24). If you did not activate the application during installation, you can do so later. You will be reminded about the need to activate the application by Kaspersky Internet Security messages appearing in the taskbar notification area. Kaspersky Internet Security is activated using the Activation Wizard.
SOLVING TYPICA L TASKS When your license expires, you can renew it. To do this, you can add a new activation code without waiting for the current license to expire. When the current license expires, Kaspersky Internet Security will be automatically activated with the new activation code. To acquire a license: 1. Open the main application window. 2. In the lower part of the main window, click the Enter activation code / Licensing link. The Licensing window opens. 3.
USER GUIDE ASSESSING COMPUTER PROTECTION STATUS AND RESOLVING SECURITY ISSUES Problems with computer protection are notified of by an indicator located in the left part of the main application window (see the following figure). The indicator is shaped as a monitor icon that changes color depending on the protection status of the computer: green means that the computer is protected, yellow indicates protection-related problems, and red alerts of serious threats to the computer's security.
SOLVING TYPICA L TASKS UPDATING DATABASES AND APPLICATION MODULES By default, Kaspersky Internet Security automatically checks for updates on the Kaspersky Lab update servers. If the server stores a set of recent updates, Kaspersky Internet Security downloads and installs them in background mode. You can run a Kaspersky Internet Security update manually at any time from the main application window or the context menu of the application icon in the taskbar notification area.
USER GUIDE SCANNING A FILE, FOLDER, DISK, OR ANOTHER OBJECT FOR VIRUSES You can use the following methods to scan an object for viruses: from the context menu of the object; From the main application window By using the Kaspersky Internet Security Gadget (only on Microsoft Windows Vista and Microsoft Windows 7) To start a virus scan from the object context menu: 1. Open Microsoft Windows Explorer and go to the folder which contains the object to be scanned. 2.
SOLVING TYPICA L TASKS SCANNING THE COMPUTER FOR VULNERABILITIES Vulnerabilities are unprotected portions of software code which intruders may deliberately use for their purposes, for example, to copy data used in unprotected applications. Scanning your computer for vulnerabilities helps you to reveal any such weak points in your computer. You are advised to remove the detected vulnerabilities. To start a vulnerability scan: 1. Open the main application window. 2.
USER GUIDE RESTORING AN OBJECT DELETED OR DISINFECTED BY THE APPLICATION Kaspersky Lab recommends that you avoid restoring deleted and disinfected objects since they may pose a threat to your computer. To restore a deleted or disinfected object, you can use its backup copy created by the application during a scan of the object. Kaspersky Internet Security does not disinfect applications from Windows Store. If after the scan the application is recognized as dangerous, it will be deleted from your computer.
SOLVING TYPICA L TASKS RECOVERING THE OPERATING SYSTEM AFTER INFECTION If you suspect the operating system of your computer to be corrupted or modified due to malware activity or a system failure, use the post-infection Microsoft Windows troubleshooting wizard that clears the system of any traces of malicious objects. Kaspersky Lab recommends that you run the Wizard after the computer has been disinfected to make sure that all threats and damage caused by infections have been fixed.
USER GUIDE To make the Wizard perform a certain action, select the check box to the left of the corresponding action. By default, the Wizard performs all recommended and strongly recommended actions. If you do not wish to perform a certain action, clear the check box next to it. It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your computer vulnerable to threats.
SOLVING TYPICA L TASKS BLOCKING UNWANTED EMAIL (SPAM) If you receive large amounts of unwanted messages (spam), enable the Anti-Spam component and set the recommended security level for it. To enable Anti-Spam and set the recommended security level: 1. Open the main application window. 2. Click the Settings link in the lower part of the window to go to the Settings section. 3. In the left part of the window, select the Protection Center section. 4.
USER GUIDE Application reputation check is available if you have agreed to participate in Kaspersky Security Network. To know the reputation of an application, open the context menu of the application's executable file and select Check reputation in KSN (see the following figure). Figure 5. Context menu of an executable file in Microsoft Windows A window with information about the reputation of the application in KSN opens. SEE ALSO: Participating in Kaspersky Security Network (KSN) ....................
SOLVING Service reading Service editing Service reconfiguration Service management Service start Service removal Access to internal browser data Access to critical system objects Access to password storage Debugger rights setup Use of system interfaces Use of system interfaces (DNS).
USER GUIDE 5. Specify application control rules: To configure rules of access to operating system resources for an application: a. On the Files and system registry tab select the required resource category. b. Right-click the column with an available action on the resource (Read, Write, Delete, or Create) to open the context menu and select the required value from it (Allow, Block, or Prompt for action).
SOLVING TYPICA L TASKS Analysis of the operating system and installed applications is performed when Trusted Applications mode is enabled for the first time. Analysis may take a long time (up to a few hours). Analysis can be run in the background. To use Trusted Applications mode, make sure that all of the following protection components are enabled: Application Control, File Anti-Virus, and System Watcher. If any of these components stops running, Trusted Applications mode is disabled.
USER GUIDE 3. In the lower part of the window, in the Trusted Applications mode is enabled section, click the Disable link. Trusted Applications mode is now disabled.
SOLVING TYPICA L TASKS Virtual Keyboard cannot protect your personal data if the website requiring the entry of such data is hacked, because in this case the information is obtained directly by the intruders from the website. Many programs classified as spyware can take screenshots, which then are automatically transmitted to an intruder for further analysis and for stealing the user's personal data.
USER GUIDE To open Virtual Keyboard from the context menu of the application icon in the taskbar notification area, in the context menu of the application icon (see the following figure), select Tools Virtual Keyboard (see the following figure) Figure 6. Kaspersky Internet Security context menu To open Virtual Keyboard from the main application window, in the lower part of the main application window select the Virtual Keyboard section.
SOLVING b. TYPICA L TASKS Select the check boxes for categories of websites on which the quick launch icon should be displayed in entry fields. The Virtual Keyboard quick launch icon will be displayed when a website that belongs to any of the selected categories is accessed. c. If you want to enable or disable display of the Virtual Keyboard quick launch icon on a specific website: a. Click the Configure exclusions link. The Exclusions for Virtual Keyboard window opens. b.
USER GUIDE 5. Specify the protection scope for data input from the hardware keyboard: a. Open the Hardware keyboard categories window by clicking the Edit categories link in the lower part of the Hardware keyboard section. b. Select the check boxes for categories of websites on which you want to protect data that is entered via the keyboard. c. If you want to enable protection of data input from the keyboard on a specified website: a.
SOLVING TYPICA L TASKS To configure Safe Money for a specified website: 1. Open the main application window. 2. In the lower part of the main window, select the Safe Money section. The window displays the Safe Money section. 3. Click the Add bank or payment system website button. The right part of the window displays fields for adding website details. 4. In the Bank or payment system website field, enter the URL of a website that you want to open in Safe Run for Websites.
USER GUIDE The Wizard consists of a series of screens (steps) that you can navigate through by using the Back and Next buttons. To close the Wizard after it completes its task, click the Finish button. To stop the Wizard at any stage, click the Cancel button. Let us review the steps of the Wizard in more detail. Step 1. Starting the Wizard Make sure that the Search for user activity traces check box is selected. Click the Next button to start the Wizard. Step 2.
SOLVING TYPICA L TASKS To make the Wizard perform a certain action, select the check box to the left of the corresponding action. By default, the Wizard performs all recommended and strongly recommended actions. If you do not wish to perform a certain action, clear the check box next to it. Clearing the check boxes that are selected by default is not recommended. This may jeopardize the safety of your computer. After you define the set of actions which the Wizard will perform, click the Next button.
USER GUIDE 6. If you want Web Anti-Virus to scan the content of all websites, select On all websites except those specified. If necessary, specify web pages that you trust, by clicking the Configure exclusions link. Web Anti-Virus does not scan the content of the specified web pages or encrypted connections with the specified websites. 7. If you want Web Anti-Virus to check the content of specific web pages only: a. Select On specified websites only. b. Click the Configure checked websites link. c.
SOLVING TYPICA L TASKS Parental Control allows you to reduce the risks posed by computer and Internet use.
USER GUIDE 5. To specify a time interval during which Parental Control will block access to the computer, select the Block access for bedtime check box in the Weekdays and Weekends sections and select a time frame for the interval from the dropdown lists next to the check boxes. You can also set up a schedule of computer usage using a table. To view the table, click the button. Parental Control will block the user's access to the computer during the specified time interval. 6.
SOLVING 5. TYPICA L TASKS To avoid sexual content in search results, in the Control Web Browsing section, select the Enable Safe Search check box. No sexual content will be displayed in search results when searching for information using search engines (such as Google, Bing®, Yahoo!™). 6. To block access to websites of certain categories: a. In the Control Web Browsing section, select the Block access to the following websites check box. b.
USER GUIDE CONTROL RUNNING OF GAMES AND APPLICATIONS By using Parental Control, you can allow or prohibit the user to start games depending on their age rating. Also, you can prohibit the user to start specified applications (such as games or IM clients) or limit the usage time for any of such applications. To block games with content, which is inappropriate for the user's age: 1. Open the main application window. 2.
SOLVING 8. If you want to limit the application usage time on weekdays and weekends, select the corresponding check boxes in the Weekdays and Weekends sections and select time limit values from the dropdown lists. You can also specify a time when the user is allowed / prohibited to use the application, by using a table. To view the table, click the 9. TYPICA L TASKS button.
USER GUIDE To configure control of private data transfer: 1. Open the main application window. 2. In the lower part of the window, click the button and select the Parental Control section. The window displays the Parental Control section. 3. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. 4. Click the Settings link in the Content Control section to go to the settings window of Data Sharing Control. 5.
SOLVING TYPICA L TASKS VIEWING THE REPORT ON A USER'S ACTIVITY You can access reports on the activity of each user account under Parental Control, reviewing individually each category of controlled events. To view a report on the activity of a controlled user account: 1. Open the main application window. 2. In the lower part of the window, click the button and select the Parental Control section. The window displays the Parental Control section. 3.
USER GUIDE IN THIS SECTION Creating a Rescue Disk ............................................................................................................................................ 58 Starting the computer from the Rescue Disk ..............................................................................................................
SOLVING TYPICA L TASKS Step 4. Updating the ISO image file The updating procedure for the ISO image file comprises the following operations: updating application databases updating configuration files. Configuration files determine whether the computer can be booted from a removable medium (such as a CD / DVD or a USB flash drive with Kaspersky Rescue Disk) created by the Wizard. When updating application databases, those distributed at the last update of Kaspersky Internet Security are used.
USER GUIDE STARTING THE COMPUTER FROM THE RESCUE DISK If the operating system cannot be booted as a result of a virus attack, use the Rescue Disk. To boot the operating system, you should use a CD / DVD or a USB flash drive with Kaspersky Rescue Disk copied on it (see the section "Creating a Rescue Disk" on page 58). Booting a computer from a removable media is not always possible. In particular, this mode is not supported by some obsolete computer models.
SOLVING TYPICA L TASKS PAUSING AND RESUMING COMPUTER PROTECTION Pausing protection means temporarily disabling all protection components for some time. To pause the protection of your computer: 1. In the context menu of the application icon in the taskbar notification area, select the Pause protection item. The Pause protection window opens (see the following figure). Figure 8. Pause protection window 2.
USER GUIDE 3. Select the General section. The window displays the settings of Kaspersky Internet Security. 4. In the lower part of the window, click the Restore settings link (see the following figure). Figure 9. Settings window, General subsection Let us review the steps of the Wizard in more detail. Step 1. Starting the Wizard Click the Next button to proceed with the Wizard.
SOLVING TYPICA L TASKS Step 2. Restore settings This Wizard window shows which Kaspersky Internet Security protection components have settings that differ from the default value because they were either changed by the user or accumulated by Kaspersky Internet Security through training (Firewall or Anti-Spam). If special settings have been created for any of the components, they will also be shown in the window (see the following figure). Figure 10.
USER GUIDE Step 4. Finishing restoration To close the Wizard after it completes its task, click the Finish button. VIEWING THE APPLICATION REPORT Kaspersky Internet Security maintains operation reports for each of the protection components.
SOLVING view application reports; view Parental Control reports; view information about network activity (Network Monitor) and applications' activity; pause the protection; open the Virtual Keyboard; open the Task Manager window. TYPICA L TASKS To start the application using the gadget, click the Enable icon located in the center of the gadget. To open the main application window using the gadget, click the monitor icon in the center area of the gadget.
USER GUIDE IN THIS SECTION Enabling and disabling participation in Kaspersky Security Network ........................................................................... 66 Checking the connection to Kaspersky Security Network ........................................................................................... 66 ENABLING AND DISABLING PARTICIPATION IN KASPERSKY SECURITY NETWORK Participation in Kaspersky Security Network is voluntary.
SOLVING TYPICA L TASKS PARTICIPATING IN PROTECT A FRIEND PROGRAM Protect a Friend program allows you to publish on Twitter and on your page in Facebook or vk.com a link for downloading the distribution package of Kaspersky Internet Security with an extended evaluation period. If one of your friends on Twitter, Facebook, or vk.com downloads the distribution package of Kaspersky Internet Security by clicking the link that you published and then activates the application, you will be awarded bonus points.
USER GUIDE 2. Create and activate your Kaspersky Account: a. In the left part of the web page, enter an email address in the Email field. b. Enter a password and then re-enter it for confirmation in the Password and Confirm password fields. The password should contain at least eight characters. c. Click the Register button. The web page displays a message informing you of a successful registration of your Kaspersky Account.
SOLVING TYPICA L TASKS If you have not yet logged in to your page in a social network or Twitter, the authorization page opens. To publish a web widget with a link for downloading the distribution package of Kaspersky Internet Security: 1. Open the main window of Kaspersky Internet Security and click the My profile link in the lower part of the window. The web page of authentication in Protect a Friend program opens. 2. Go through authentication on the web page with your Kaspersky Account.
USER GUIDE To receive a bonus activation code and activate the application with it: 1. Open the main window of Kaspersky Internet Security and click the My profile link in the lower part of the window. The web page with your profile in Protect a Friend program opens. 2. Go through authentication on the web page with your Kaspersky Account. The web page displays details of your profile in Protect a Friend program. You can view information about bonus points awarded to you in the My bonus points section.
CONTACTING TECHNICAL SUPPORT This section provides information about how to obtain technical support and the requirements for receiving help from Technical Support. IN THIS SECTION How to get technical support ..................................................................................................................................... 71 Technical support by phone ......................................................................................................................................
USER GUIDE To obtain access to My Kaspersky Account, you should go through the registration procedure on the registration page (https://my.kaspersky.com/registration). Enter your email address and a password to log in to My Kaspersky Account. In My Kaspersky Account, you can perform the following actions: Contact Technical Support and the Virus Lab. Contact Technical Support without using email. Track the status of your requests in real time.
CONTACTING TEC HNICA L SUPPORT IN THIS SECTION Creating a system state report .................................................................................................................................. 73 Sending data files ..................................................................................................................................................... 73 AVZ script execution ..........................................................................................................
USER GUIDE 4. In the window that opens, click the Send report to Technical Support link. The Send report window opens. 5. Select the check boxes next to the data that you want to send to Technical Support. 6. Click the Send report button. The selected data files are packed and sent to the Technical Support server. If for any reason it is not possible to contact Technical Support, the data files can be stored on your computer and later sent from My Kaspersky Account. To save data files to disk: 1.
GLOSSARY A ACTIVATING THE APPLICATION Switching the application into full-function mode. Application activation is performed by the user during or after the application installation. The user should have an activation code to activate the application. ACTIVATION C OD E A code that you receive when purchasing a license for Kaspersky Internet Security. This code is required for activation of the application.
USER GUIDE DATABASES These databases contain information on the computer security threats known to Kaspersky Lab by the time of database release. Records that are contained in databases allow detecting malicious code in scanned objects. The databases are created by Kaspersky Lab specialists and updated hourly. DIGI TAL SI GNA T URE An encrypted block of data embedded in a document or application. A digital signature is used to identify the document or application author.
GLOSSARY INC OMPAT IBLE APPLICATION An antivirus application from a third-party developer or a Kaspersky Lab application that does not support management through Kaspersky Internet Security. INFE CTED OBJECT It is the object, which contains a part of code that matches completely a part of code of a well-known harmful application. Kaspersky Lab does not recommend using such objects.
USER GUIDE Q QUAR A NTI NE A dedicated storage to which the application places backup copies of files that have been modified or deleted during disinfection. Copies of files are stored in a special format, imposing no threat for the computer. R ROOT KI T A program or a set of programs for hiding traces of an intruder or malware in the operating system.
GLOSSARY THREAT LEVEL An index showing the probability of an application imposing a threat to the operating system. The threat level is calculated using heuristic analysis based on two types of criteria: static (such as information about the executable file of an application: size, creation date, etc.); dynamic, which are used while simulating the application's operation in a virtual environment (analysis of the application's requests to system functions).
USER GUIDE V VIRUS A program that infects other ones by adding its code to them in order to gain control when infected files are run. This simple definition allows exposing the main action performed by any virus – infection. VULNERABI LIT Y A flaw in an operating system or an application that may be exploited by malware makers to penetrate into the system or the application and corrupt its integrity.
KASPERSKY LAB ZAO Kaspersky Lab software is internationally renowned for its protection against viruses, malware, spam, network and hacker attacks, and other threats. In 2008, Kaspersky Lab was rated among the world’s top four leading vendors of information security software solutions for end users (IDC Worldwide Endpoint Security Revenue by Vendor). Kaspersky Lab is the preferred developer of computer protection systems among home users in Russia, according to the COMCON survey "TGI-Russia 2009".
INFORMATION ABOUT THIRD-PARTY CODE Information about third-party code is contained in the file legal_notices.txt, in the application installation folder. TRADEMARK NOTICES Registered trademarks and service marks are the property of their respective owners. Google Chrome is a trademark owned by Google, Inc. ICQ is a trademark and/or service mark of ICQ LLC. Intel and Pentium are trademarks of Intel Corporation registered in the United States of America and elsewhere.
INDEX A Activating the application ...................................................................................................................................... 28 Additional Tools Microsoft Windows Troubleshooting ................................................................................................................. 35 Rescue Disk....................................................................................................................................................
USER GUIDE L License activation code ................................................................................................................................................ 24 End User License Agreement .......................................................................................................................... 23 M Mail Anti-Virus ......................................................................................................................................................
INDEX Trusted Applications mode .................................................................................................................................... 40 U Unknown applications ........................................................................................................................................... 37 Unwanted email.................................................................................................................................................... 37 Update ...