05.05.2014 Views

Kaspersky Internet Security 2012

Kaspersky Internet Security 2012

Kaspersky Internet Security 2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A PPEND I X<br />

UNRELIABLE CERTIFICATE DETECTED<br />

<strong>Kaspersky</strong> <strong>Internet</strong> <strong>Security</strong> verifies security of the connection established via the SSL protocol using an installed<br />

certificate. If an invalid certificate is detected when the connection to the server is attempted (for example, if the<br />

certificate is replaced by an intruder), a notification is displayed on screen.<br />

The notification provides the following information:<br />

description of the threat;<br />

a link for viewing the certificate;<br />

probable causes of the error;<br />

the URL of the web resource.<br />

You can select one of the following actions:<br />

Yes, accept the untrusted certificate – proceed with connecting to the web resource.<br />

Deny certificate – interrupt the connection with the website.<br />

REQUEST FOR PERMISSION TO ACCESS A WEBSITE FROM A REGIONAL<br />

DOMAIN<br />

If you attempt to access a website from a regional domain that is not recognized as neither blocked nor allowed, a<br />

notification is displayed on the screen.<br />

The notification provides the following information:<br />

a description of the reason for blocking access to the website;<br />

the name of the region to which the website belongs;<br />

the domain and level of infectiousness of websites in this domain;<br />

the URL of the website;<br />

the name of the application that has attempted to access the website.<br />

You can select one of the following actions:<br />

Yes, allow request – load the website.<br />

No, block request – cancel website loading.<br />

To apply the selected action to all websites from this regional domain, check the Remember for this region box.<br />

AN APPLICATION THAT MAY BE EXPLOITED BY AN INTRUDER IN ORDER TO<br />

DO HARM TO THE USER'S COMPUTER OR DATA, HAS BEEN DETECTED<br />

When Activity Monitor detects an application that may be exploited by an intruder in order to do harm to the user's<br />

computer or data, a notification is displayed on the screen.<br />

197

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!