Contens
5
4.4.1.3. Menubar ................................................................................................. 63
4.4.1.4. Taskbar .................................................................................................. 65
4.4.1.5. Contextual menu.................................................................................... 65
4.4.2. The confidential file creation screen............................................................. 67
4.4.3. The confidential file-mount screen ............................................................... 70
4.4.4. The confidential file-open screen ................................................................. 71
4.4.5. The file-access password redefine screen .................................................. 73
4.4.6. The confidential file properties screen ......................................................... 75
4.5. Running Kaspersky DataSafe for Pocket PC..................................................... 76
4.5.1. Creating a confidential file ............................................................................ 76
4.5.2. Mounting a file as a confidential folder......................................................... 79
4.5.3. Opening a confidential file ............................................................................ 82
4.5.4. Unmounting a confidential folder.................................................................. 84
4.5.5. Deleting a confidential file............................................................................. 84
4.5.6. Changing the settings of a confidential file .................................................. 85
4.5.7. Changing the access-password to a confidential file .................................. 86
CHAPTER 5. KASPERSKY ANTI-VIRUS FOR PALM OS ......................................... 88
5.1. Purpose and main functions ............................................................................... 88
5.2. Starting the program............................................................................................ 89
5.3. Interface ............................................................................................................... 89
5.3.1. Main screen .................................................................................................. 89
5.3.2. Menu ............................................................................................................. 90
5.3.3. Dialogs and controls ..................................................................................... 91
5.4. Managing the anti-virus....................................................................................... 92
5.4.1. Configuring the program............................................................................... 92
5.4.2. Searching for and deleting viruses............................................................... 94
5.4.2.1. Starting to search for and delete viruses............................................... 94
5.4.2.2. Monitoring HotSynced or Beamed data................................................ 95
5.4.2.3. Scanning for viruses on demand........................................................... 96
5.4.2.4. Interception of malware during application launch ............................... 97
5.4.2.5. Working with the disinfect dialog ........................................................... 99