Appendix B
95
Kaspersky
®
Internet Security 7.0
Kaspersky Internet Security 7.0 is an integrated solution for protection of
personal computers against the major information- threats (viruses, hackers,
spam and spyware). A single interface enables fusers to configure and manage
all the program’s components.
The anti-virus protection features include:
Anti-virus scanning of e-mail traffic
on the level of data transmission pro-
tocol (POP3, IMAP and NNTP for incoming mail and SMTP for outgoing
messages), regardless of the mail client being used. The program in-
cludes plug-ins for popular e-mail clients (such as Microsoft Office Out-
look, Microsoft Outlook Express/Windows Mail, and The Bat!) and sup-
ports disinfection of their e-mail databases.
Real-time anti-virus scanning of Internet traffic
transferred via HTTP.
File system protection
: anti-virus scanning of individual files, folders or
drives. In addition, the application can perform anti-virus analysis exclu-
sively for critical areas of the operating system and Microsoft Windows
start-up objects.
Proactive protection
: the program constantly monitors application activity
and processes running in random-access memory, preventing dangerous
changes to the file system and registry, and restores the system after ma-
licious influence.
Protection against Internet-fraud
is ensured by recognition of phishing attacks,
thereby preventing confidential data leaks (above all passwords, bank account
and credit card numbers) and blocking execution of dangerous scripts on web
pages, pop-up windows and advertisement banners. The
autodialer blocking
feature helps identify software that attempts to use your modem for hidden
unauthorized connections to paid phone services and blocks such activity.
Privacy Control
module keeps your confidential information secure from
unauthorized access and transmission.
Parental Control
is a Kaspersky Internet
Security component that monitors user access to the Internet.
Kaspersky Internet Security 7.0
registers attempts to scan the ports of your
computer
, which frequently precede network attacks, and successfully defends
against typical network attacks. The program uses
defined rules as a basis
for
control over all network transactions tracking all
incoming and outgoing data
packets
.
Stealth Mode
(owing to the SmartStealth™ technology)
prevents
computer detection from outside
. When you switch to Stealth Mode, the
system blocks all network activity except for a few transactions allowed in user-
defined rules.
The program employs an all-inclusive approach to anti-spam filtering of incoming
e-mail messages: