Table of Contents
CHAPTER 1. THREATS TO COMPUTER SECURITY............................................... 11
1.1. Sources of Threats .............................................................................................. 11
1.2. How threats spread ............................................................................................. 12
1.3. Types of Threats.................................................................................................. 14
1.4. Signs of Infection ................................................................................................. 17
1.5. What to do if you suspect infection ..................................................................... 18
1.6. Preventing Infection............................................................................................. 19
CHAPTER 2. KASPERSKY INTERNET SECURITY 6.0 ............................................ 21
2.1. What’s new in Kaspersky Internet Security 6.0.................................................. 21
2.2. The elements of Kaspersky Internet Security Defense..................................... 24
2.2.1. Protection components................................................................................. 24
2.2.2. Virus scan tasks............................................................................................ 26
2.2.3. Program tools................................................................................................ 27
2.3. Hardware and software system requirements ................................................... 28
2.4. Software packages.............................................................................................. 29
2.5. Support for registered users................................................................................ 30
CHAPTER 3. INSTALLING KASPERSKY INTERNET SECURITY 6.0 ..................... 31
3.1. Installation procedure using the Installation Wizard........................................... 31
3.2. Setup Wizard ....................................................................................................... 35
3.2.1. Using objects saved with Version 5.0 .......................................................... 35
3.2.2. Activating the program.................................................................................. 36
3.2.2.1. Selecting a program activation method................................................. 36
3.2.2.2. Entering the activation code .................................................................. 37
3.2.2.3. Obtaining a license key.......................................................................... 37
3.2.2.4. Selecting a license key file..................................................................... 37
3.2.2.5. Completing program activation.............................................................. 38
3.2.3. Selecting a security mode ............................................................................ 38
3.2.4. Configuring update settings.......................................................................... 39
3.2.5. Configuring a virus scan schedule ............................................................... 39
3.2.6. Restricting program access.......................................................................... 40