Brochure
83
INDEX
A
Activating the application ...................................................................................................................................... 28
Additional Tools
Microsoft Windows Troubleshooting ................................................................................................................. 35
Rescue Disk .................................................................................................................................................... 57
Anti-Spam ............................................................................................................................................................ 37
Application activation
activation code ................................................................................................................................................ 24
license ............................................................................................................................................................ 23
trial version ..................................................................................................................................................... 17
Application components ........................................................................................................................................ 12
Application Control
creating an application rule .............................................................................................................................. 38
device access rules ......................................................................................................................................... 38
exclusions ....................................................................................................................................................... 38
Application databases ........................................................................................................................................... 31
C
Code
activation code ................................................................................................................................................ 24
D
Diagnostics .......................................................................................................................................................... 30
Disinfected object ................................................................................................................................................. 34
E
End User License Agreement................................................................................................................................ 23
F
Full-screen application operation mode ................................................................................................................. 57
G
Gaming Profile...................................................................................................................................................... 57
H
Hardware requirements ........................................................................................................................................ 14
I
Installing the application ........................................................................................................................................ 15
K
Kaspersky Account ............................................................................................................................................... 67
Kaspersky Gadget ................................................................................................................................................ 64
Kaspersky Security Network ................................................................................................................................. 65
Kaspersky URL Advisor
Web Anti-Virus ................................................................................................................................................ 49
Keyboard interceptor
protection against data interception at the keyboard ......................................................................................... 45
Keyboard interceptors
Virtual Keyboard.............................................................................................................................................. 42