20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

38 <strong>Kaspersky</strong> Internet Security 7.0<br />

If the activation code does not pass inspection, an information message will be<br />

displayed on the screen. If this occurs, contact the software vendors from whom<br />

you purchased the program for more information.<br />

3.2.2.5. Selecting a Key File<br />

If you have a key file for <strong>Kaspersky</strong> Internet Security 7.0, the Wizard will ask if<br />

you want to install it. If you do, use the Browse button and select the file path for<br />

the file with the .key extension in the file selection window.<br />

Following successful key installation, current key information will be displayed at<br />

the bottom of the window: owner name, key code, key type (commercial, for beta<br />

testing, trial, etc.), and expiration date.<br />

3.2.2.6. Completing program activation<br />

The Setup Wizard will inform you that the program has been successfully<br />

activated. It will also display information on the license key installed: owner<br />

name, key code, key type (commercial, for beta testing, trial, etc.), and expiration<br />

date.<br />

3.2.3. Selecting a security mode<br />

In this window, the Settings Wizard asks you to select the security mode that the<br />

program will operated with:<br />

Basic. This is the default setting and is designed for users, who do not have<br />

extensive experience with computers or anti-virus software. It implies that<br />

application components are set to their recommended security level and that<br />

the user is informed only of dangerous events (such as, detection of a<br />

malicious object, dangerous activity).<br />

Interactive. This mode provides more customized defense of your computer’s<br />

data than Basic mode. It can trace attempts to alter system settings,<br />

suspicious activity in the system, and unauthorized activity on the network.<br />

All of the activities listed above could be signs of malicious programs or<br />

standard activity for some of the programs you use on your computer. You<br />

will have to decide for each separate case whether those activities should be<br />

allowed or blocked.<br />

If you choose this mode, specify when it should be used:<br />

Enable Firewall Training Mode – ask for user decisions when programs<br />

installed on your computer attempt to connect to a certain network resource.<br />

You can either allow or block that connection and configure an Firewall rule<br />

for that program. If you disable Training Mode, Firewall runs with minimal

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!