
220
Kaspersky Anti-Virus 7.0
Select standard/extended databases for scanning
Save a report on the scanning results in .txt or .html formats
Kaspersky
®
Internet Security 7.0
Kaspersky
®
Internet Security 7.0 is an integrated solution for protection of per-
sonal computers against the major information- threats (viruses, hackers, spam
and spyware). A single interface enables fusers to configure and manage all the
program‟s components.
The anti-virus protection features include:
Anti-virus scanning of e-mail traffic
on the level of data transmission
protocol (POP3, IMAP and NNTP for incoming mail and SMTP for out-
going messages), regardless of the mail client being used. The program
includes plug-ins for popular e-mail clients (such as Microsoft Office
Outlook, Microsoft Outlook Express/Windows Mail, and The Bat!) and
supports disinfection of their e-mail databases.
Real-time anti-virus scanning of Internet traffic
transferred via
HTTP.
File system protection
: anti-virus scanning of individual files, folders or
drives. In addition, the application can perform anti-virus analysis exclu-
sively for critical areas of the operating system and
Windows
start-up objects.
Proactive protection
: the program constantly monitors application ac-
tivity and processes running in random-access memory, preventing
dangerous changes to the file system and registry, and restores the
system after malicious influence.
Protection against Internet-fraud
is ensured by recognition of phishing attacks,
thereby preventing confidential data leaks (above all passwords, bank account
and credit card numbers) and blocking execution of dangerous scripts on web
pages, pop-up windows and advertisement banners. The
autodialer blocking
feature helps identify software that attempts to use your modem for hidden unau-
thorized connections to paid phone services and blocks such activity.
Kaspersky Internet Security 7.0
registers attempts to scan the ports of your
computer
, which frequently precede network attacks, and successfully defends
against typical network attacks. The program uses
defined rules as a basis
for
control over all network transactions tracking all
incoming and outgoing data
packets
.
Stealth Mode
(owing to the SmartStealth™ technology)
prevents
computer detection from outside
. When you switch to Stealth Mode, the sys-
tem blocks all network activity except for a few transactions allowed in user-
defined rules.