20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

162 <strong>Kaspersky</strong> Internet Security 7.0<br />

To stop using a mask that you created, you can either delete it from the list, or<br />

uncheck the box next to it. Then banners that fall under this mask will revert to<br />

being blocked.<br />

Using the Import and Export buttons, you can copy the list of allowed banners<br />

from one computer to another.<br />

12.1.4.3. Banner ad black list<br />

In addition to the standard list of banners blocked (see 12.1.4.1 on pg. 160) by<br />

Anti-Banner, you can create your own list. To do so:<br />

1. Open the application settings window and select Firewall under<br />

Protection.<br />

2. Check Enable Anti-Banner under Publicity Banners Blocking and<br />

3.<br />

click Settings (cf. Figure 46).<br />

Open the Black List tab in the Settings: Banners Blocking dialog.<br />

Using a window accessible by clicking the Add button, enter a mask for the<br />

banner that you want Anti-Banner to block. You can specify the whole URL for<br />

the banner or a mask for it. In the latter case, when a banner attempts to load,<br />

the program will scan its address for the mask.<br />

When creating a mask, you can use the wildcards * or ? (where * represents a<br />

sequence of characters and ? – any one character).<br />

To stop using a mask that you created, you can either delete it from the list, or<br />

uncheck the box next to it.<br />

Using the Import and Export buttons, you can copy the list of blocked banners<br />

from one computer to another.<br />

12.2. List of network attacks<br />

detected<br />

There are currently a multitude of network attacks that utilize operating system<br />

vulnerabilities and other software, system or otherwise, installed on your<br />

computer. Malefactors are constantly perfecting attack methods, learning how to<br />

steal confidential information, making your system malfunction, or take over your<br />

computer to use it as part of a zombie network for carrying out new attacks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!