20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22 <strong>Kaspersky</strong> Internet Security 7.0<br />

• The program protects users from rootkits and autodialers, blocks banner<br />

ads, pop-up windows, and malicious scripts loaded from websites, detects<br />

phishing sites, and protecting users from unauthorized transmission of<br />

confidential data (passwords for Internet connections, e-mail, or ftp<br />

servers).<br />

• File Anti-Virus technology has been improved to lower the load on the<br />

central processor and disk subsystems and increase the speed of file<br />

scans using iChecker and iSwift. By operating this way, the program rules<br />

out scanning files twice.<br />

• The scan process now runs as a background task, enabling the user to<br />

continue using the computer. If there is a competition for system<br />

resources, the virus scan will pause until the user’s operation is<br />

completed and then resumes at the point where it left off.<br />

• Individual tasks are provided for scanning Critical Areas of the computer<br />

and startup objects that could cause serious problems if infected and for<br />

detecting rootkits used to hide malware on your system. You can<br />

configure these tasks to run automatically every time the system is<br />

started.<br />

• E-mail protection from malicious programs and spam has been<br />

significantly improved. The program scans these protocols for emails<br />

containing viruses and spam:<br />

• IMAP, SMTP, POP3, regardless of which email client you use<br />

• NNTP (virus scan only), regardless of the email client<br />

• Regardless of the protocol (including MAPI and HTTP), using plugins<br />

for Microsoft Office Outlook and The Bat!<br />

• Special plug-ins are available for the most common mail clients, such as<br />

Microsoft Office Outlook, Microsoft Outlook Express (Windows Mail), and<br />

The Bat!. These place email protection against both viruses and spam<br />

directly in the mail client.<br />

• Anti-Spam is trained as you work with the mail in your inbox, taking into<br />

account all the details of how you deal with mail and providing maximum<br />

flexibility in configuring spam detection. Training is built around the iBayes<br />

algorithm. In addition, you can create black and white lists of addressees<br />

and key phrases that would mark an e-mail as spam.<br />

Anti-Spam uses a phishing database, which can filter out emails designed<br />

to obtain confidential financial information.<br />

• The program filters inbound and outbound traffic, traces and blocks<br />

threats from common network attacks, and lets you use the Internet in<br />

Stealth Mode.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!