22 K
aspersky Internet Security 6.0
•
The program protects the computer against rootkits and dialers, blocks
banner ads, popup windows, and malicious scripts downloaded from web
pages, and detects phishing sites.
•
File Anti-Virus technology has been improved to lower the load on the
central processor and disk subsystems and increase the speed of file
scans using iChecker and iSwift. By operating this way, the program rules
out scanning files twice.
•
The scan process now runs as a background task, enabling the user to
continue using the computer. If there is a competition for system
resources, the virus scan will pause until the user’s operation is
completed and then resumes at the point where it left off.
•
Critical areas of the computer where infection could lead to serious
consequences are given their own separate task. You can configure this
task to run automatically every time the system is started.
•
E-mail protection from malicious programs and spam has been
significantly improved. The program scans these protocols for emails
containing viruses and spam:
•
IMAP, SMTP, POP3, regardless of which email client you use
•
NNTP (virus scan only), regardless of the email client
•
Regardless of the protocol (MAPI, HTTP) when using plug-ins
for Microsoft Office Outlook and The Bat!
•
Special plug-ins are available for the most common mail clients, such as
Microsoft Office Outlook, Microsoft Outlook Express, and The Bat!. These
place email protection against both viruses and spam directly in the mail
client.
•
Anti-Spam now has a training mode, based around the iBayes algorithm,
which learns by monitoring how you deal with email. It also provides
maximum flexibility in configuring spam detection – for instance, you can
create black and white lists of addressees and key phrases that mark
email as spam.
Anti-Spam uses a phishing database, which can filter out emails designed
to obtain confidential financial information.
•
The program filters inbound and outbound traffic, traces and blocks
threats from common network attacks, and lets you use the Internet in
Stealth Mode.
•
When using a combination of networks, you can also define which
networks to trust completely and which to monitor with extreme caution.