10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A D V A N C E D A P P L I C A T I O N S E T T I N G SStep 1. Starting the WizardClick the Next button to start the wizard.Step 2. Searching for unused informationThe wizard searches for temporary and unused files on your computer. The scan may take some time. Once thesearch is complete, the Wizard will proceed automatically to the next step.Step 3. Selecting actions to delete unused filesWhen the search is complete, the Wizard displays the detected unused files and actions suggested to deletethem. The Wizard activity report is displayed as a list (see section "Additional Tools" on page 219).To view the actions within a group, click the + icon to the left of the group name.To make the Wizard perform a certain action, check the box to the left of the corresponding action description.By default, the Wizard performs all recommended and strongly recommended actions. If you do not wish toperform a certain action, uncheck the box next to it.It is strongly recommended not to uncheck the boxes selected by default because doing so will leave yourcomputer vulnerable to threats.Having defined the set of actions, which the Wizard will perform, click the Next button.Step 4. Delete Unused DataThe Wizard will perform the actions selected during the previous step. The deletion of unused information maytake some time. To delete certain files, computer restart may be required; the Wizard will notify you about that.Once the clearing of unused information is complete, the Wizard will automatically proceed to the next step.Step 5. Closing the WizardClick the Finish button to close the Wizard.BROWSER CONFIGURATIONThe Microsoft Internet Explorer browser requires in certain cases special analysis and configuring since some settingvalues selected by the user or set by default may cause security problems.Here are some examples of the objects and parameters used in the browser and how they are associated with potentialsecurity threats:Microsoft Internet Explorer cache. The cache stores data downloaded from the Internet, which allows not todownload them next time. This speeds up the download time of your web pages and reduces Internet traffic. Inaddition to that, the cache contains confidential data, from which a history of websites visited by the user canalso be obtained. Some malware objects also scan the cache while scanning the disk, and intruders can obtain,for example, the user's email addresses. You are advised to clear the cache every time you close your browserto improve the protection.Displaying extensions for files of known formats. To edit file names conveniently you can disable showingtheir extensions. Nevertheless, it is sometimes useful to see the file extension. File names of many maliciousobjects contain combinations of symbols imitating an additional file extension before the real one (e.g.,example.txt.com). If the real file extension is not displayed, users can see just the file name part with theimitated extension and so they can identify a malicious object as a harmless file. To improve protection, you areadvised to enable the display of files of known formats.223

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!