05.05.2014 Views

Kaspersky Internet Security 2012

Kaspersky Internet Security 2012

Kaspersky Internet Security 2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

U S E R G U I D E<br />

Step 3. Removing the application. Completing removal .................................................................................... 28<br />

LICENSING THE APPLICATION ................................................................................................................................. 29<br />

About the End User License Agreement ................................................................................................................ 29<br />

About data provision ............................................................................................................................................... 29<br />

About the license .................................................................................................................................................... 29<br />

About the activation code ....................................................................................................................................... 30<br />

APPLICATION INTERFACE ........................................................................................................................................ 31<br />

The notification area icon........................................................................................................................................ 31<br />

The context menu ................................................................................................................................................... 32<br />

The <strong>Kaspersky</strong> <strong>Internet</strong> <strong>Security</strong> main window ....................................................................................................... 33<br />

Notification windows and pop-up messages ........................................................................................................... 34<br />

The application settings window ............................................................................................................................. 36<br />

The <strong>Kaspersky</strong> Gadget ........................................................................................................................................... 37<br />

News Agent ............................................................................................................................................................ 37<br />

STARTING AND STOPPING THE APPLICATION ...................................................................................................... 38<br />

Enabling and disabling automatic launch ............................................................................................................... 38<br />

Launching and closing the application manually ..................................................................................................... 38<br />

MANAGING THE COMPUTER PROTECTION ............................................................................................................ 39<br />

Diagnostics and elimination of problems in your computer protection .................................................................... 39<br />

Enabling and disabling the protection ..................................................................................................................... 40<br />

Pausing and resuming protection ........................................................................................................................... 41<br />

SOLVING TYPICAL TASKS ......................................................................................................................................... 43<br />

How to activate the application ............................................................................................................................... 43<br />

How to purchase or renew a license ....................................................................................................................... 44<br />

What to do when application notifications appear ................................................................................................... 45<br />

How to update application databases and modules .............................................................................................. 45<br />

How to scan critical areas of your computer for viruses ........................................................................................ 46<br />

How to scan a file, folder, disk, or another object for viruses .................................................................................. 46<br />

How to perform a full scan of your computer for viruses ........................................................................................ 48<br />

How to scan your computer for vulnerabilities ........................................................................................................ 48<br />

How to protect your personal data against theft ..................................................................................................... 48<br />

Protection against phishing ............................................................................................................................... 49<br />

Protection against data interception at the keyboard ........................................................................................ 50<br />

Protection of confidential data entered on websites .......................................................................................... 51<br />

What to do if you suspect an object is infected with a virus .................................................................................... 51<br />

How to run an unknown application without doing any harm to the system ........................................................... 52<br />

What to do with a large number of spam messages ............................................................................................... 52<br />

What to do if you suspect your computer is infected .............................................................................................. 53<br />

How to restore a file that has been deleted or disinfected by the application ........................................................ 54<br />

How to create and use a Rescue Disk .................................................................................................................... 54<br />

Creating a Rescue Disk .................................................................................................................................... 55<br />

Starting the computer from the Rescue Disk..................................................................................................... 57<br />

How to view the report on the application's operation ............................................................................................. 57<br />

How to restore default application settings ............................................................................................................. 58<br />

How to transfer settings to <strong>Kaspersky</strong> <strong>Internet</strong> <strong>Security</strong> installed on another computer ......................................... 59<br />

How to use the <strong>Kaspersky</strong> Gadget ......................................................................................................................... 59<br />

How to know the reputation of an application ......................................................................................................... 61<br />

4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!