
Appendix A
21
•
Select standard/extended databases for scanning
•
Save a report on the scanning results in .txt or .html formats
Kaspersky Anti-Virus
®
7.0
Kaspersky Anti-Virus 7.0 is designed to safeguard personal computers against
malicious software as an optimal combination of conventional methods of anti-
virus protection and new proactive technologies.
The program provides for complex anti-virus checks, including:
•
Anti-virus scanning of e-mail traffic on the level of data transmission
protocol (POP3, IMAP and NNTP for incoming mail and SMTP for
outgoing messages), regardless of the mail client being used, as well as
disinfection of e-mail databases.
•
Real-time anti-virus scanning of Internet traffic transferred via HTTP.
•
Anti-virus scanning of individual files, folders, or drives. In addition, a
preset scan task can be used to initiate anti-virus analysis exclusively
for critical areas of the operating system and start-up objects of
Microsoft Windows.
Proactive protection offers the following features:
Controls modifications within the file system
. The program allows users
to create a list of applications, which it will control on a per component
basis. It helps protect application integrity against the influence of
malicious software.
Monitors processes in random-access memory
. Kaspersky Anti-Virus 7.0
in a timely manner notifies users whenever it detects dangerous,
suspicious or hidden processes or in case when unauthorized changes in
active processes occur.
Monitors changes in OS registry
due to internal system registry control.
Hidden Processes Monitor
helps protect from malicious code concealed in
the operating system using rootkit technologies.
Heuristic Analyzer.
When scanning a program, the analyzer emulates its
execution and logs all suspicious activity, such as, opening or writing to a
file, interrupt vector intercepts, etc. A decision is made based on this
procedure regarding possible infection of the program with a virus.
Emulation occurs in an isolated virtual environment which reliably protects
the computer of infection.
Performs system restore
after malware attacks by logging all changes to
the registry and computer file system and rolls them back at user's
discretion.