Contents
CHAPTER 1. THREATS TO COMPUTER SECURITY................................................. 9
1.1. Sources of Threats ................................................................................................ 9
1.2. How threats spread ............................................................................................. 10
1.3. Types of Threats .................................................................................................. 12
1.4. Signs of Infection ................................................................................................. 14
1.5. What to do if you suspect infection ..................................................................... 15
1.6. Preventing Infection ............................................................................................. 16
CHAPTER 2. KASPERSKY ANTI-VIRUS 7.0 .............................................................. 18
2.1. What‟s new in Kaspersky Anti-Virus 7.0 ............................................................. 18
2.2. The elements of Kaspersky Anti-Virus Defense ............................................... 20
2.2.1. Real-Time Protection Components.............................................................. 21
2.2.2. Virus scan tasks ............................................................................................ 22
2.2.3. Update ........................................................................................................... 23
2.2.4. Program tools................................................................................................ 23
2.3. Hardware and software system requirements ................................................... 24
2.4. Software packages .............................................................................................. 25
2.5. Support for registered users ................................................................................ 26
CHAPTER 3. INSTALLING KASPERSKY ANTI-VIRUS 7.0 ....................................... 27
3.1. Installation procedure using the Installation Wizard ........................................... 27
3.2. Setup Wizard ....................................................................................................... 31
3.2.1. Using objects saved with Version 5.0 .......................................................... 32
3.2.2. Activating the program .................................................................................. 32
3.2.2.1. Selecting a program activation method ................................................. 32
3.2.2.2. Entering the activation code .................................................................. 33
3.2.2.3. User Registration ................................................................................... 34
3.2.2.4. Obtaining a Key File............................................................................... 34
3.2.2.5. Selecting a Key File ............................................................................... 34
3.2.2.6. Completing program activation.............................................................. 35
3.2.3. Selecting a security mode ............................................................................ 35
3.2.4. Configuring update settings .......................................................................... 36