APPENDIX D. LICENSE AGREEMENT............................................................ 166
CHAPTER 1. INTRODUCTION
1.1. Computer viruses and malicious
computer programs
As modern computer technology and communications tools develop, hackers
have more opportunities for spreading threats. Let’s take a closer look at them:
The Internet
The Internet is unique, since it is no one’s property and has no geographical borders. In many ways, this has promoted development of
countless web resources and the exchange of information. Today, anyone
can access data on the Internet or create their own webpage.
However, these very features of the worldwide web give hackers the ability to commit crimes on the Internet, making them difficult to detect and
punish as they go.
Hackers place viruses and other malicious programs on Internet sites and
disguise it as useful freeware. Furthermore, scripts that run automatically
when you open a webpage can execute dangerous actions on your computer, including modifying the system registry, stealing personal data, and
installing malicious software.
By using network technologies, hackers can attack remote PCs and company servers. These attacks can cause parts of your system to malfunction or could provide hackers with complete access to your system and
thereby to the information stored on it. They can also use it as part of a
zombie network.
Ever since it became possible to use credit cards and e-money through
the Internet in online stores, auctions, and bank homepages, online
scams have surfaced as one of the most common crimes.
Intranet
Your intranet is your internal network, specially designed for handling information within a company or a home network. An intranet is a unified
space for storing, exchanging, and accessing information for all the computers on the network. This means that if one computer on the network is
infected, the others are at great risk of infection. To avoid such situations,
both the network perimeter and each individual computer must be protected.
Introduction 7
E-mail
Since practically every computer has mail clients installed on it and since
malicious programs exploit the contents of electronic address books, conditions are usually right for spreading malicious programs. The user of an
infected computer, himself oblivious to the fact, might send infected emails to friends or coworkers who in turn send more infected e-mails. It is
common that infected file documents go undetected at are sent out with
business information from a large company. When this occurs, more than
a handful of people are infected. It could be hundreds or thousands, all of
whom then send the infected files to tens of thousands of subscribers.
Beyond the threat of malicious programs lies the program of electronic
junk mail, or spam. Although not a direct threat to your computer, spam
increases the load on mail servers, eats up bandwidth, fills up your mailbox, and wastes working hours, thereby incurring financial harm.
Also, note that hackers have begun using mass mailing programs and social engineering methods to convince users to open e-mails or click a link
to a certain website. It follows that spam filtration capabilities are both for
stopping junk mail and for counteracting new types of online scans, such
as phishing, and for stopping the spread of malicious programs.
Removable storage media
Removable media (floppies, CD-ROMs, and USB flash drives) are widely
used for storing and transmitting information.
When you open a file that contains malicious code from a removable
storage device, you can damage data stored on your computer and
spread the virus to your computer’s other drives or other computers on
the network.
There are a vast number of threats that could affect your computer today. This
section will go over the threats that Kaspersky Internet Security blocks.
Worms
This malicious program category largely exploits operating system vulnerabilities to spread itself. The class was named for the way the worms
crawl from computer to computer, using networks, e-mail, and other data
channels. This feature gives many worms a rather high speed in spreading themselves.
Worms penetrate a computer, calculate the network addresses of other
computers, and send a burst of self-made copies to these addresses. In
addition to network addresses, worms often utilize data from e-mail client
address books. Some of these malicious programs occasionally create
working files on system disks, but they can run without any system resources at all (with the exception of RAM).
8 Kaspersky Anti-Virus
®
Personal Pro
Viruses
Programs that infected other programs, adding their own code to them to
gain control of the infected files when they are opened. This simple definition explains the fundamental action performed by a virus – infection.
Trojans
Programs that carry out unauthorized actions on computers, such as deleting information on drives, making the system hang, stealing confidential
information, etc. This class of malicious program is not a virus in the traditional sense of the word (meaning it does not infect other computers or
data). Trojans cannot break into computers on their own and are spread
by hackers, who disguise them as regular software. The damage that they
incur can exceed that done by traditional virus attacks by several fold.
Recently, the most widespread type of malicious program damaging computer
data has been worms. Then follow viruses and Trojans. Some malicious
programs combine features of two or even three of these classes.
Adware
Program code included in software, unbeknownst to the user, designed to
display advertisements. Adware is usually built into software that is distributed free. The advertisement is situated in the program interface.
These programs often also collect personal data on the user and send it
back to their developer, change browser settings (start page and search
pages, security levels, etc.) and create traffic that the user cannot control.
All this can lead to breach of the security policy and to direct financial
losses.
Spyware
Software that collects information about a particular user or organization
without their knowledge. You might never guess that you have spyware
installed on your computer. In general, the goal of spyware is to:
• trace user actions on a computer;
• gather information on the contents of your hard drive; in such
cases, this more often than not involves scanning several
directories and the system registry in order to compile a list of
the software installed on the computer;
• gather information on the quality of the connection, bandwidth,
modem speed, etc.
Riskware
Potentially dangerous software that does not have a malicious function
but can be used by hackers as an auxiliary component for a malicious
code, since it contains holes and errors. Under certain conditions, having
Introduction 9
such programs on your computer can put your data at risk. These programs include, for instance, some remote administration utilities, keyboard layout togglers, IRC clients, FTP servers, and all-purpose utilities
for stopping process or hiding their operation.
Yet another type of malicious program that goes along with programs like
adware, spyware, and riskware is programs that plug into your web browser and
redirect traffic. You have most certainly encountered such programs if you have
ever opened one web site when you thought you were pulling up another.
Jokes
Software that does not do any direct damage but displays messages stating that damage has already been done or will be under certain conditions. These programs often warn the user of dangers that do not exist,
such as messages that pop up about formatting the hard drive (although
no formatting actually takes place) or detecting viruses in uninfected files.
Rootkits
Utilities used to conceal malicious activity. They mask malicious programs
to keep anti-virus programs from detecting them. Rootkits modify the operating system on the computer and alter its basic functions to hide its
own existence and actions that the hacker undertakes on the infected
computer.
Other dangerous programs
Programs created to set up DoS attacks on remote servers, hacking into
other computers, and programs that are part of the development environment for malicious programs. These programs include hack tools, virus builders, vulnerability scanners, password-cracking programs, and
other types of programs for cracking network resources or penetrating a
system.
Hacker attacks
Hacker attacks can be initiated by hackers or by malicious programs.
They are aimed at stealing information from a remote computer, causing
the system to malfunction, or gaining full control of the system's resources.
Some types of online scams
10 Kaspersky Anti-Virus
Phishing is an online scam that uses mass mailings to steal confidential
information from the user, generally of a financial nature. Phishing e-mails
are designed to maximally resemble informative e-mails from banks and
well-known companies. These e-mails contain links to fake sites set up by
hackers to copy the site of the organization that they claim to represent.
On this site, the user is asked to enter, for example, his credit card number and other confidential information.
Dialers to pay-per-use websites – type of online scam using unauthorized use of pay-per-use Internet services (these are commonly web sites
of a pornographic nature). The dialers installed by hackers initiate modem
connections from your computer to the number for the pay service. These
numbers often have very high rates and the user is forced to pay enormous telephone bills.
Intrusive advertising
This includes popup windows and banner ads that open when using your
web browser. The information in these windows is generally not of benefit
to you. Popup windows and banner ads distract the user from the task
and take up bandwidth.
Spam
Spam is anonymous junk e-mail. Spam includes mailings that are marketing, political and provocative in nature and e-mails asking for assistance.
Another category of spam includes e-mails that ask one to invest large
amounts of money or to get involved in pyramid schemes, e-mails aimed
at stealing passwords and credit card numbers, and e-mails that ask to be
sent to friends (chain letters).
®
Personal Pro
Henceforth in the text of this User's Guide the term "virus" will be used
to refer to malicious software and the term “dangerous objects” will be
used to refer to objects infected with such software. A particular type of
malware will be mentioned only when it is required.
1.2. The purpose and major
functions of Kaspersky AntiVirus Personal Pro
Kaspersky Anti-Virus Personal Pro (hereinafter referred to as Kaspersky AntiVirus or the application) is designed to provide anti-virus protection for personal
computers running Microsoft Windows (see section 1.4 on page 14).
Introduction 11
When installed on your computer, the application performs the following
functions:
• Protection against viruses and malicious computer programs – the
application detects and eradicates malware present in your computer.
When using the application, the following two major modes can be used
(either jointly or separately):
• Real-time anti-virus protection – performs an anti-virus scan
of all objects being run, opened or saved.
• On-demand scan – performs an anti-virus scan of your entire
computer or of selected disks, files, or folders. You can launch
an on-demand scan manually or set up a regular scheduled
scan.
• Recovery from a virus attack – performing a full scan and disinfection
using settings recommended by Kaspersky Lab will allow you to detect
any viruses that have infected your files during a virus attack.
• Scanning and disinfecting of incoming/outgoing email traffic – real-
time protection performs a real-time anti-virus scan and disinfection of
incoming and outgoing email messages1. In addition, the application
provides on-demand scanning and disinfection of the email databases of
email clients2 (see section 6.3.3 on page 52).
• Protection of the user’s computer against network attacks – analysis
of all data entering the user's computer from the network (either LAN or
internet) to determine whether these data is a part of an internet attack. If
an internet attack is detected, the attack will be repelled the attacking
computer can be blocked. Additionally, the program provides for the
operation in the stealth (invisible) mode when the user’s computer
receives data from other computers only when the data exchange with the
particular machine has been initiated by the user.
• Updating of the anti-virus database, network attacks database and
application modules – updating the anti-virus database and network
attacks database with information about new viruses and attacks and with
methods used for disinfecting objects infected with viruses and updating
the application modules (if this option is not disabled). Updates are
1
The application scans all mail sent or received by Microsoft Office Outlook irrespective of the mail protocols used as well as mail sent or received by any mail client application via SMTP and POP3 protocols.
2
Kaspersky Anti-Virus® can scan email databases for any email client program, but can
disinfect only Microsoft Office Outlook and Microsoft Outlook Express email databases.
12 Kaspersky Anti-Virus
®
Personal Pro
downloaded from Kaspersky Lab’s update servers, server specified by the
user or copied from a network/local folder.
• Recommendations on application setup and operation – the
application will display tips from Kaspersky Lab’s experts and
recommendations on the settings that correspond to the optimal anti-virus
protection level.
When a dangerous object is found, if the anti-virus database have been
not updated for a critically long time, or your computer has not been
scanned for a long time, the main window of Kaspersky Anti-Virus will
recommend a course of action and give a supporting explanation.
Kaspersky Lab’s experts have configured the application for optimal performance based on the extensive expertise in the anti-virus protection
business, and on analysis of our users’ feedback. The recommended antivirus protection settings are installed as the default application settings.
• Using various application configuration profiles – creating and using
special configuration files (profiles) that store the application’s operation
settings. You can easily alter the Kaspersky Anti-Virus configuration by
specifying the application’s settings and saving such changes in the
profiles. For example, you can configure the application to work in the
real-time protection mode only or to perform on-demand scan and then
use such configurations when you feel it is necessary. You can also
return to the recommended settings any time while using Kaspersky AntiVirus.
• Moving to quarantine – moving objects that are possibly infected with
viruses or their modifications to a special secure storage area. You can
then disinfect or delete the quarantined objects, restore them to their
initial folders or send them to Kaspersky Lab for analysis. Quarantined
files are stored using a special format and do not constitute any danger to
your computer.
• Creating backup copies of objects – creating backup copies of objects
in a special backup storage prior to disinfection or deletion of such
objects. Such copies are created for the cases when it is necessary to
restore an original object if it contains valuable information or in order to
restore the infection situation for analysis purposes. Backup copies are
stored in a special format and do not impose any threat.
• Reporting – results of all actions performed by Kaspersky Anti-Virus are
documented in reports. A detailed scan report contains statistics of all
scanned objects, stores information about settings used for each task and
the history of actions performed on each individual file. Reports are also
generated during real-time protection, and after updating the anti-virus
database and application modules.
Introduction 13
Some functions of Kaspersky Anti-Virus are available only from the
command line (details see Chapter 10 on page 132).
1.3. What's new in Version 5.0?
Kaspersky Anti-Virus Personal Pro 5.0 has the following features not found in
Version 4.5:
• The use of anti-virus scan acceleration technologies iChecker™ and
iStreams™. Version 5.0 does not scan previously analyzed objects that
have not changed since their last scan. This applies both to real-time
protection and to the on-demand scan. This feature greatly improves the
application’s speed and performance.
• Scanning and disinfecting mail sent and received by any email client that
via SMTP and POP3 protocol. The previous version protected only mail
sent and received by Microsoft Office Outlook.
• Disinfecting infected archives. Version 5.0 disinfects infected files in zip,
arj, cab, rar, lha and ice archives. The previous version provided detection
and disinfection of infected files in zip archives only.
Kaspersky Anti-Virus only scans multiple volume archives of
the specified types as well as self-extracting archives but does
not disinfect them.
• Anti-virus updating function has become faster due to finding the
geographically closest Kaspersky updates server. The ability to receive
the remaining part of the update after restoring failed connection has
been implemented.
• Protection against network attacks. This version of Kaspersky Anti-Virus
protects your computer against most network or hacking attacks that are
currently widespread.
• User-friendly interface. This version is a single application, whereas the
previous release consisted of several components each performing their
own anti-virus protection function. This new approach simplifies control
over the most important Kaspersky Anti-Virus functions.
• Improved compatibility of Kaspersky Anti-Virus with other anti-virus
products. During the installation of the application you can choose not to
enable file system mail and network protection and script monitoring if
these protection functions are performed by other applications installed on
your computer.
14 Kaspersky Anti-Virus
• Recommended settings and experts' tips. To simplify application
operation, the default settings of this version of the application match the
settings recommended by Kaspersky Lab and in most cases there is no
need to configure the application before use. When the anti-virus
protection level is set to High Speed, the user is prompted to switch to a
higher level of anti-virus protection.
• Application operation profiles management. A possibility to store the
application’s settings in a special file so that you can use them any time
later. If you are not satisfied with the recommended Kaspersky Anti-Virus
settings, configure the application based on your requirements and save
this configuration in a profile file.
• Product license renewal. Users of Version 5.0 can now install a new
license key, extending the license period.
• Sending your files for analysis to Kaspersky Lab. Now you can send us
possibly infected files detected by Version 5.0 or files that you suspect
may be infected.
• The ability to delete infected composite objects has been removed. You
cannot inadvertently delete infected composite objects (archives, email
clients' databases or email format files) using Version 5.0. However, you
can still delete such objects using standard Windows tools such as
Windows Explorer. The exception is self-extracting archives.
• The ability to create lists of trusted processes. The file activities of the
trusted processes are not monitored by Kaspersky Anti-Virus when it
functions in the real-time protection mode.
• Access to the Kaspersky Anti-Virus settings is now password-protected.
You can setup a password that will be asked for by the application every
time when switching between the user’s and the administrator’s mode.
The user’s mode does not allow modification of the application’s settings,
disabling the real-time protection and closing Kaspersky Anti-Virus
Personal Pro on your computer..
®
Personal Pro
1.4. Hardware and software system
requirements
For normal performance of Kaspersky Anti-Virus Personal Pro 5.0, your
computer must meet the following minimum requirements:
General Requirements:
• 50 MB available space on your hard drive
Introduction 15
• CD-ROM drive (for installation of Kaspersky Anti-Virus from CD) or
floppy drive (for installation from floppy disks, and to read license key)
• Microsoft Internet Explorer 5.5 or higher (for updating anti-virus database
and application modules via the Internet)
Microsoft Windows 98, Microsoft Windows ME, Microsoft Windows NT
Workstation 4.0 (Service Pack 6a):
• Intel Pentium 300 MHz processor
• 64 MB RAM
Microsoft Windows ME:
• Intel Pentium 150 MHz processor
• 32 MB RAM
Microsoft Windows NT Workstation 4.0 (Service Pack 6a):
• Intel Pentium 133 MHz processor
• 32 MB RAM
Microsoft Windows 2000 Professional (Service Pack 2 or later), Microsoft
Windows XP Home Edition, Microsoft Windows XP Professional (Service Pack 1
or later):
• Intel Pentium 300 MHz processor
• 128 MB RAM
Microsoft Windows XP Home Edition or XP Professional (Service Pack 1 or
later):
• Intel Pentium 300 MHz processor
• 128 MB RAM
1.5. Distribution Kit
You can purchase Kaspersky Anti-Virus either from our dealers (retail box) or
online (for example, you may visit http://www.kaspersky.com, and go to E-Store
section).
The contents of the retail box package include:
• Sealed envelope with an installation CD, or set of floppy disks,
containing the application files.
• User's Guide.
16 Kaspersky Anti-Virus
• License key written on a special floppy disk.
• License Agreement.
Before you open the envelope with the CD (or a set of floppy disks)
make sure that you have carefully read the license agreement.
If you buy Kaspersky Anti-Virus online, you will download the application from the
Kaspersky Lab website. In this case, the distribution kit will include this User's
Guide along with the application. The license key will be emailed to you upon
receipt of your payment.
The License Agreement is a legal contract between you and Kaspersky Lab that
describes the terms and conditions under which you may use the anti-virus
product that you have purchased.
Please read the License Agreement carefully!
If you do not agree with the terms and conditions of the License Agreement,
return the retail box to the Kaspersky Anti-Virus dealer you purchased it from and
the money you paid for the product will be refunded to you on the condition that
the envelope with the installation CD (or set of floppy disks) is still sealed.
By opening the sealed envelope with the installation CD (or set of floppy disks),
you confirm that you agree with all the terms and conditions of the License
Agreement.
®
Personal Pro
1.6. Services provided for registered
users
Kaspersky Lab offers all registered users an extensive service package enabling
them to use Kaspersky Anti-Virus more efficiently.
After purchasing a license you become a registered user and during the license
period you can enjoy the following services:
• application module and anti-virus database updates;
• support on issues related to the installation, configuration and use of the
application. Services will be provided by phone or via email;
• information about new Kaspersky Lab products. You can also subscribe
to the Kaspersky Lab newsletter which provides information about new
computer viruses as they appear.
Introduction 17
Kaspersky Lab does not provide support on issues related to the performance and the use of operating systems or other technologies.
1.7. Conventions
In this book we use various conventions to emphasize different meaningful parts
of the documentation. The table below lists the conventions used in this
document.
Convention Meaning
Bold font
Step 1.
…
Note
Attention
To run a program:
Task:
Solution
Menu titles, commands, window titles,
dialog elements, etc.
Additional information, notes.
Critical information.
Actions that must be taken to run a
program.
Task statement as an example of
parameter definitions, functions, etc.
Solution to the task formulated.
CHAPTER 2. INSTALLING THE
APPLICATION
To install Kaspersky Anti-Virus on your computer, run the executable file from the
installation CD.
Installation of the application using the distribution kit downloaded from
the internet is identical to the installation from the distribution kit on CD.
The installation wizard operates in an interactive mode. Each dialog box has the
following buttons that you can use to navigate through the installation process:
• Next> – accept and proceed with the installation.
• <Back – return to the previous stage of the installation process.
• Cancel – cancel the application installation.
• Finish – finish the application installation.
A detailed discussion of each step of the installation process is provided below.
Step 1. Checking the version of the operating system in-
stalled on your computer
Before the installation of the application, the operating system and Service Packs
installed on your computer are checked for the conformity with the minimum
system requirements for the installation of Kaspersky Anti-Virus Personal Pro.
Should the application determine that any of the requirements is not met, the
corresponding message will be displayed. We advise to install the required
programs and update packages of Microsoft Windows using Windows Update
(or other utilities) or before proceeding with the installation of Kaspersky AntiVirus.
Step 2. Search for other anti-virus software
The next step involves a search for other installed anti-virus software (including
Kaspersky Lab applications). This is performed because the simultaneous use of
these applications with Kaspersky Anti-Virus may cause conflicts.
Installing the application 19
If an earlier version of Kaspersky Anti-Virus is found (as for example version 4.5),
you will be asked if you would like to keep the license key for this product if such
license key is still valid.
We recommend that you keep the valid license key that was used earlier as this key can be used with Kaspersky Anti-Virus Personal Pro 5.0.
After you save the key, you will be prompted to uninstall the earlier version of the
product as it is in conflict with Kaspersky Anti-Virus Personal Pro 5.0.
Click OK button in order to abort the installation. After this uninstall the earlier
version of Kaspersky Anti-Virus and run the product installation wizard again.
If during the previous step you saved a valid license key used for
Kaspersky Anti-Virus 4.x to be used in version 5.0, then the license key
installation window will not be displayed during the installation procedure (see Step 8. on page 21). The key will be used for the program
operation.
If any anti-virus software from a different vendor is found installed on your
computer, you will be prompted to uninstall this program before proceeding with
the installation of Kaspersky Anti-Virus.
We recommend that you uninstall such program(s). To do this, click the No
button, in order to abort the installation. Then uninstall the program and run the
product installation wizard again.
Kaspersky Lab's specialists do not recommend installing several antivirus products on one computer as their joint use may cause conflicts.
If it is determined that Kaspersky Anti-Virus Personal Pro 5.0 has already been
installed on your computer, a message will be displayed with a warning that if
you proceed with the installation, the application that was installed earlier will be
updated by the new installation.
If you are upgrading version 5.0, the license key installation window
(see Step 8. on page 21) will not contain information about they key,
but the key installed earlier will be used for the program operation.
Step 3. Start the Installation Wizard
If no other anti-virus software is found installed on your computer, immediately
after the executable file is run, an installation startup window will appear to inform
you that the installation of Kaspersky Anti-Virus Personal Pro on your computer
began.
20 Kaspersky Anti-Virus
To proceed with the installation, click Next>. To cancel the installation, click
Cancel.
®
Personal Pro
Step 4. Read the license agreement
The next dialog box contains a License Agreement between you and Kaspersky
Lab. Read it carefully and click I Agree if you agree with all terms and conditions
of the Agreement. The installation process will continue.
Step 5. Provide user information
At this point the user name and the user's company name will be determined.
Default information will be copied from the operating system registry. You can
alter it if you wish.
To proceed with the installation, click Next>.
Step 6. Read important information about the application
During this stage of the installation process you will be asked to read important
information about the application before you start using Kaspersky Anti-Virus.
This dialog box contains information about the major features and functionality of
Kaspersky Anti-Virus.
In order to proceed to the next step of the setup process, click Next >.
Step 7. Using the proprietary Kaspersky Lab's technology
During this step of the Kaspersky Anti-Virus setup process you will have to make
a decision whether you want the program to use the following technologies:
Real-time file system protection – scanning all objects that are run, opened and
saved on your computer for viruses. By default the file protection is enabled.
If you do not want Kaspersky Anti-Virus to scan files when you access them,
uncheck the
Real-time mail protection – scanning all messages received by your computer,
messages you send and your mail databases for viruses. By default mail
protection is enabled. If you do not want Kaspersky Anti-Virus to scan mail
messages for viruses, uncheck the Use real-time mail protection box.
Monitoring of executed scripts – anti-virus analysis of all VBScripts and
JavaScripts before their execution. By default script monitoring function is
enabled. If you do not wish to use Kaspersky Anti-Virus for script monitoring,
uncheck the
Use real-time file system protection box.
Use script monitoring box.
Installing the application 21
Macros monitoring – scanning all VBA macros run on your computer for the
presence of malicious code. By default this protection is enabled. In order to
disable macros monitoring, uncheck the Use macros monitoring box.
Real-time protection against network attacks – technology used to protect your
computer against hackers attacks. This technology protects your computer
against network attacks and prevents corruption, theft of or unauthorized
access to your data. By default the real-time protection against network
attacks is enabled. In order to disable real-time protection, uncheck the
Use real-time protection against network attacks box.
iStreams™ Technology – an anti-virus scan acceleration technology (details see
Appendix B on page 151). In order to disable this technology uncheck the
Use the iStreams™ technology checkbox.
This technology can only be used on partitions with the NTFS
file system.
If you disable the use of the above technologies during the installation,
you will have to run the installer again and select technologies that you
would like to use.
If, while working with Kaspersky Anti-Virus, you decide to disable one of
the real-protection types or to disable Streams™ technology you will
have to run the installer again and uncheck the corresponding box.
In order to proceed with the setup process, press Next>.
Step 8. Install the license key
Perform this step only if the Kaspersky Anti-Virus Installation Wizard
fails to find the key file automatically
During this step, the license key for Kaspersky Anti-Virus will be installed. The
license key is your personal "key" that stores all service information required for
proper full-featured operation of the application, including the following reference
information:
• Technical support information (support service provider and contact
information).
• License name, number, and expiry date.
The application will not work without the license key.
22 Kaspersky Anti-Virus
®
In order to install a license key,
1. Press the Browse button and browse to the folder containing the li-
cense key file:
• If you purchased a retail box version of Kaspersky Anti-Virus,
you will find the license key written or a special floppy disk. You
will have to insert the disk into the drive and select this drive
(see Figure 1).
Personal Pro
Figure 1. Selecting path to the license key file
• If the license was purchased online, then the license key file
that you received by via e-mail shall be saved in any folder on
your computer’s hard drive. You will have to open this folder.
The selected folder will display the list of available license keys.
Installing the application 23
2. Select the required license key (a file with .key extension) and press the
Open button (see Figure 2).
Figure 2. Selecting the license key file
As the result, the installation wizard will display general information about the
license and the path to the license key file.
In order to proceed with the installation press Next >.
If you do not have the license key at the time of installation (for example, if you
ordered via the Internet but have not received it yet), you may install it later,
when you run the application for the first time or using a special license key
installation utility (see Chapter 9 on page 128). Remember that you cannot start
using Kaspersky Anti-Virus without the license key.
Step 9. Select the installation folder
During this step, the destination folder will be selected for the installation of the
application files. The default path is: <Disk>\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal Pro.
You can type in the path to this folder or press the Browse button and use the
standard Select Folder dialog box to locate and select the folder.
Press the Install button in order to proceed with the installation. After this,
Kaspersky Anti-Virus application files will be copied to your computer.
24 Kaspersky Anti-Virus
®
Personal Pro
Step 10. Finish setup
A Completing the Setup dialog box informs you that installation of Kaspersky
Anti-Virus on your computer has been completed.
If registration of system services is required, you will be asked to restart your
computer. This is a MANDATORY step for the correct completion of the
application installation.
To complete the setup:
1. Choose one of the following options:
Yes, I want to restart my computer now
No, I will restart my computer later
2. Click Finish.
If your computer does not need to be restarted to complete the setup, you
can begin using the program immediately. Perform the following steps to
finish the installation:
1. If you do not want to enable anti-virus protection of your computer
immediately after the installation is completed, uncheck the box
Start Kaspersky Anti-Virus Personal Pro 5.0.
If you uncheck this box, the anti-virus protection of your computer will be automatically enabled after reboot. Before that time
you can manually enable anti-virus protection from the Microsoft
Windows main menu (Start ! Programs ! Kaspersky Anti-Virus Personal Pro).
2. Click the Finish button.
As a result of installation and launch of Kaspersky Anti-Virus:
• The application icon will be added to the system tray
• Application shortcuts will be added to the main Microsoft Windows menu
(Start! Programs! Kaspersky Anti-Virus Personal Pro).
CHAPTER 3. PREVENTING
COMPUTER INFECTION
Sometimes it is not apparent, even to a knowledgeable user, that a computer is
infected with a virus because viruses efficiently camouflage themselves among
regular files. This chapter contains a detailed discussion of virus infection
symptoms, methods of data recovery after a virus attack and measures aimed at
prevention of data corruption by viruses.
3.1. Symptoms of infection
There are a number of symptoms indicating that your computer has probably
been infected. If you are noticing "strange things" happening to your computer,
for example:
• unexpected messages or images are suddenly displayed;
• unusual sounds or music played at random;
• your CD-ROM tray mysteriously opens and closes;
• programs suddenly start on your computer;
• if Kaspersky Anti-Hacker is installed on your computer, it notifies you of
attempts by some programs to connect to the Internet although you did
not initiate this.
If any of the above symptoms appear, it is very likely your computer has been
infected with a virus.
In addition, there are some typical symptoms indicating that your computer has
been infected via email:
• your friends mention that they receive messages although you never
sent such messages;
• your mailbox contains many messages without the sender’s email
address or header.
Note that these problems may be caused by reasons other than viruses. For
example, infected messages which have your address as the sender can actually
be sent from a different computer.
26 Kaspersky Anti-Virus
There are also indirect symptoms that indicate your computer has possibly been
infected:
• your computer freezes frequently or encounters errors;
• your computer slows down when programs are started;
• you are unable to load the operating system;
• files and folders are suddenly missing or their content changes;
• your hard drive is accessed too often (the light on your main unit flashes
rapidly);
• Microsoft Internet Explorer "freezes" or displays unpredictable behavior,
(for example you cannot close the application window).
In most cases such indirect symptoms indicate that there is a hardware or
software problem, but although such symptoms are unlikely to be caused by an
infection, we recommend that you perform a full scan of your computer using the
default settings recommended by Kaspersky Lab experts if your encounter any of
these problems.
®
Personal Pro
3.2. What should you do if you notice
symptoms of infection
If you notice that your computer displays "suspicious" behavior:
1. Don’t panic! This golden rule may prevent the loss of important data
stored on your computer and help you avoid unnecessary stress.
2. Disconnect your computer from the Internet.
3. Disconnect your computer from the Local Area Network if it is con
4. If the symptom of an infection is that you cannot boot from your hard
drive (your computer encounters an error at startup), try to start the
system in Safe Mode or from the Microsoft Windows boot disk that you
created during the installation of the operating system on your
computer.
5. Before taking any action, back up all critical data to an external drive (a
floppy disk, CD, flash card, etc.)
Preventing computer infection 27
Later, before you move saved date to the computer after it has
been disinfected, make sure that you have scanned this data with
Kaspersky Anti-Virus (see section 6.3.5 on page 57).
6. Install Kaspersky Anti-Virus Personal Pro.
7. Download the latest anti-virus database updates. If possible, do not use
the infected computer to download the updates, but instead use a
friend’s computer, or a computer at your office or an Internet café. It is
preferred that you use a different computer because when you connect
to the internet using an infected computer some important information
stored on your computer may be sent to the malefactors or the virus
may be sent to the contacts stored in your address book. Therefore, if
you suspect an infection it is the best to immediately disconnect from
the Internet and from any local area network you are connected to. You
can also obtain the anti-virus database on a CD-ROM or a floppy disk
from Kaspersky Lab or its authorized dealers and update your
databases from this disk (for more details see section 7.1.1 on page
63).
8. Apply the recommended application settings (see Chapter 4 on page
30).
9. Perform a full system scan (see section 6.3.2 on page 51).
3.3. Safety rules
Even proven and trusted preventative actions cannot ensure 100% protection
against computer viruses and Trojans, but you can considerably minimize the
risk of being affected by a virus attack and thus reduce the losses from a
possible infection if you develop and follow certain rules.
Similar to health care, one of the main methods of fighting viruses is the
prevention of infection. For computers, prevention of a virus infection includes a
few rules that must be followed to reduce the risk of infection and data loss.
Listed below are the main security rules that you should follow to prevent virus
attacks.
Rule 1: keep your computer protected with an anti-virus program and Internet
security software. To do this:
• Install Kaspersky Anti-Virus Personal Pro.
• Update your anti-virus database on a regular basis. During periods of
virus outbreaks you should retrieve updates several times each day
because during such periods the anti-virus database on Kaspersky Lab’s
update servers is updated constantly.
28 Kaspersky Anti-Virus
®
Personal Pro
• Apply the real-time protection settings recommended by Kaspersky Lab.
Real-time protection is enabled immediately after system startup and
prevents the penetration of viruses into your computer.
• Apply the on-demand scan settings recommended by Kaspersky Lab
and schedule the scan to be run at least once a week.
• We also recommend that you install Kaspersky Anti-Hacker for
comprehensive computer protection while you are surfing the Internet.
Rule 2: be careful when copying any new data to your computer:
• Always scan all removable drives (floppy disks, CD-ROM drives, flash
cards, etc.) for viruses before using them.
• Be careful with email messages. Never open an email attachment, even
if it was sent to you by a person you know, unless you are expecting it. In
particular, do not trust emails that claim to be sent by anti-virus
companies.
• Be careful with any data downloaded from the Internet. If you are
prompted to download a program, always check that it comes with a
security certificate.
• If you download an executable file from the Internet or from a LAN, scan
it with Kaspersky Anti-Virus.
• Be selective about the websites you visit. Some websites contain
dangerous scripts or Internet worms.
Rule 3: Read carefully all information supplied by Kaspersky Lab.
In most cases, Kaspersky Lab warns users about new virus outbreaks
long before they reach their peak. The risk of getting infected is still low at
this time and if you download the up-to-date anti-virus database, you will
be able to protect your computer.
Rule 4: Be suspicious about hoax virus warnings - email messages that claim to
be warnings of virus threats.
Rule 5: Regularly update your operating system using the Microsoft Windows
Update utility.
Rule 6: Always buy licensed copies of your software from authorized dealers.
Rule 7: Limit the number of people who have access to your computer.
Rule 8: Minimize potential losses from a possible infection:
• Backup your data on a regular basis, so that in the event of data loss,
your system may be fairly quickly restored using backup copies. Your
distribution disks, floppy disks and other media with software installation
and other important data should be kept in a safe place.
Preventing computer infection 29
• Always create a bootable rescue disk from which you can boot using a
"clean" operating system.
Rule 9: Inspect the list of applications installed on your computer on a regular
basis.
You can access this list using the Add/Remove programs utility in the
Control Panel or simply view the contents of the Program Files folder,
startup folder. This way you can detect software that was installed onto
your computer without your knowledge while you were using Internet or
installing some software you needed. There is a very high chance that
some of these programs are riskware.
CHAPTER 4. ANTI-VIRUS
PROTECTION USING
KASPERSKY ANTI-VIRUS
DEFAULT SETTINGS
Real-time protection of your computer is provided only if you did not
disable it during the installation of the application.
You can use Kaspersky Anti-Virus immediately upon installation. There is no
need to customize the application before using it for the first time because the
default settings provide the optimal balance between protection and
performance.
Below, we describe the default settings in detail.
According to the default settings, the anti-virus protection becomes active
immediately after the application is installed on your computer. The default
settings are recommended by Kaspersky Lab's experts to ensure the optimal
protection of your computer.
Additionally, the application includes a tool for quick altering the settings by
selecting one of the three protection levels, pre-defined by the Kaspersky Lab’s
experts.
• Maximum protection – computer protection level that ensures
maximum possible protection with some decrease in the system
performance.
• Recommended – second anti-virus protection level based on the
settings recommended by Kaspersky Lab’s experts that ensure optimal
protection of your computer.
• High speed – anti–virus protection level that ensures maximum speed of
operation with somewhat lower extent of the anti-virus protection due to
some reduction in the number of scanned objects.
Following below is a detailed discussion of how Kaspersky Anti-Virus performs in
accordance with the experts' recommendations.
Loading...
+ 141 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.