Home

Kaspersky Anti-Virus 8.0 for Lotus Domino

image

Contents

1. Delete gt gt Generating environment variables Deleting service data Deleting databases Figure 8 Application deletion window 2 Make sure that the Deleting from the last server in configuration check box is checked 3 Click the Delete button A query about rebooting the Domino server will be displayed onscreen Confirm the reboot DEPLOYING THE APPLICATION The first stage of deleting the application will begin At this stage the modifications made as a result of installing Kaspersky Anti Virus are deleted from the notes ini file see section Modifying the Domino configuration file on page 45 On completion of the first stage the server automatically reboots When the server has rebooted reclick the Delete button in the deletion window All remaining stages of the deletion are executed automatically On completion of each stage a symbol we is displayed in the list to indicate v if the stage was completed successfully or returned an error If the stage returned an error deletion of the application will halt In this instance you should close the window and repeat the deletion On completion of all stages of the deletion close the deletion window DELETING FROM A SERVER IN A DISTRIBUTED DEPLOYMENT SCHEME To delete Kaspersky Anti Virus from one of the servers in a distributed deployment scheme do the following 1 Open the installation database through the Lotus Notes client or web browser see se
2. d If the work has interactive user interfaces each must display Appropriate Legal Notices however if the Program has interactive interfaces that do not display Appropriate Legal Notices your work need not make them do so A compilation of a covered work with other separate and independent works which are not by their nature extensions of the covered work and which are not combined with it such as to form a larger program in or on a volume of a storage or distribution medium is called an aggregate if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation s users beyond what the individual works permit Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate 6 Conveying Non Source Forms You may convey a covered work in object code form under the terms of sections 4 and 5 provided that you also convey the machine readable Corresponding Source under the terms of this License in one of these ways a Convey the object code in or embodied in a physical product including a physical distribution medium accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange b Convey the object code in or embodied in a physical product including a physical distribution medium accompanied by a written offer valid for at least three years and valid for as long as you offe
3. 2 Tothis group add the user to be granted the permissions of a particular functional group for example the Control center administrators group 3 Log onto the system under a user account with the permissions of the Security administrators functional group 4 Add the ControlCenterAdmins group to the ACL of the Kaspersky Anti Virus databases Control center Worklog and statistics Quarantine and Information and define the permissions for the ControlCenterAdmins group to match those of the Control center administrators functional group See section Functional group permissions on page 23 APPLICATION ARCHITECTURE MANAGING PERMISSIONS AT THE LEVEL OF PROFILE AND SERVER SETTINGS To restrict access to the application at the level of individual documents profile and server settings the following functional roles are provided e Profile administrator Has the rights to perform the following actions e Editing the profile settings and the settings of all servers in the profile e Deleting records from the Quarantine and Worklog and statistics databases for servers in the profile e Server administrator Has the rights to perform the following actions e Editing the server settings including moving a server to another profile e Deleting records from the Quarantine and Worklog and statistics databases for the server Profile and server administrators are assigned after the application is installed The assignment is carri
4. INFORMATION ABOUT THIRD PARTY SOFTWARE This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU General Public License along with this program if not write to the Free Software Foundation Inc 51 Franklin Street Fifth Floor Boston MA 02110 1301 USA Also add information on how to contact you by electronic and paper mail If the program is interactive make it output a short notice like this when it starts in an interactive mode Gnomovision version 69 Copyright C year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY for details type show w This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course the commands you use may be called something other than show w and show c they could even be mouse clicks or menu items whatever suits your program You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the program if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the program Gn
5. Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License AWK 3 1 5 Copyright C 1986 1988 1989 1991 2005 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License INFORMATION ABOUT THIRD PARTY SOFTWARE BASH 3 2 33 Copyright C 1989 2005 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 3 of the License GCC 4 1 2 Copyright C 1987 1989 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License Distributed under the terms of the GNU Lesser General Public License as published by the Free Software Foundation version 2 1 of the License GCC 3 4 5 Copyright C 1987 1989 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License Distributed under the terms of the GNU Lesser General Public License as published by the Free Software Foundation version 2 1
6. Kaspersky Anti Virus 8 0 for Lotus Domino Implementation Guide APPLICATION VERSION 8 0 Dear User Thank you for choosing our product We hope that this documentation will help you in your work and provide answers to most of your questions regarding this software product Warning This document is the property of Kaspersky Lab ZAO herein also referred to as Kaspersky Lab all rights to this document are reserved by the copyright laws of the Russian Federation and by international treaties Illegal reproduction and distribution of this document or parts hereof will result in civil administrative or criminal liability pursuant to the laws of the Russian Federation Any type of reproduction or distribution of any materials including translations is allowed only with the written permission of Kaspersky Lab This document and graphic images related to it may be used exclusively for informational non commercial and personal purposes This document is subject to change without prior notification For the latest version of this document please refer to Kaspersky Lab s website at hitp www kaspersky com docs Kaspersky Lab assumes no liability for the content quality relevance or accuracy of any materials used in this document for which the rights are held by third parties or for any potential damages associated with the use of such documents This document involves the registered trademarks and service marks which are
7. lt program gt Copyright C lt year gt lt name of author gt This program comes with ABSOLUTELY NO WARRANTY for details type show wi INFORMATION ABOUT THIRD PARTY SOFTWARE This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course your program s commands might be different for a GUI interface you would use an about box You should also get your employer if you work as a programmer or school if any to sign a copyright disclaimer for the program if necessary For more information on this and how to apply and follow the GNU GPL see lt http www gnu org licenses gt The GNU General Public License does not permit incorporating your program into proprietary programs If your program is a Subroutine library you may consider it more useful to permit linking proprietary applications with the library If this is what you want to do use the GNU Lesser General Public License instead of this License But first please read lt http www gnu org philosophy why not lgpl html gt GNU LESSER GENERAL PUBLIC LICENSE Version 2 1 February 1999 Copyright C 1991 1999 Free Software Foundation Inc 51 Franklin Street Fifth Floor Boston MA 02110 1301 USA Everyone is permitted to copy and distribute verbatim copies of this license docu
8. OpenSSL appear in their names without prior written permission of the OpenSSL Project 6 Redistributions of any form whatsoever must retain the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org IMPLEMENTATION GUIDE THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED INNO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tihOcryptsoft com Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Nets
9. compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 5 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it 6 Each time you redistribute the Program or any work based on the Program t
10. from the Standard Version d make other distribution arrangements with the Copyright Holder 4 You may distribute the programs of this Package in object code or executable form provided that you do at least ONE of the following a distribute a Standard Version of the executables and library files together with instructions in the manual page or equivalent on where to get the Standard Version b accompany the distribution with the machine readable source of the Package with your modifications c give non standard executables non standard names and clearly document the differences in manual pages or equivalent together with instructions on where to get the Standard Version d make other distribution arrangements with the Copyright Holder 5 You may charge a reasonable copying fee for any distribution of this Package You may charge any fee you choose for support of this Package You may not charge a fee for this Package itself However you may distribute this Package in aggregate with other possibly commercial programs as part of a larger possibly commercial software distribution provided that you do not advertise this Package as a product of your own You may embed this Package s interpreter within an executable of yours by linking this shall be construed as a mere form of aggregation provided that the complete Standard Version of the interpreter is so embedded 6 The scripts and library files supplied as input to or p
11. sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Library or works based on it 10 Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original licensor to copy distribute link with or modify the Library subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with this License 11 If as a consequence of a court judgment or allegation of patent infringement or for any other reason no
12. 1 1 Additional Terms applicable to the Netscape Public License Effect These additional terms described in this Netscape Public License Amendments shall apply to the Mozilla Communicator client code and to all Covered Code under this License Il Netscape s Branded Code means Covered Code that Netscape distributes and or permits others to distribute under one or more trademark s which are controlled by Netscape but which are not licensed for use under this License III Netscape and logo This License does not grant any rights to use the trademarks Netscape the Netscape N and horizon logo or the Netscape lighthouse logo Netcenter Gecko Java or JavaScript Smart Browsing even if such marks are included in the Original Code or Modifications IV Inability to Comply Due to Contractual Obligation Prior to licensing the Original Code under this License Netscape has licensed third party code for use in Netscape s Branded Code To the extent that Netscape is limited contractually from making such third party code available under this License Netscape may choose to reintegrate such code into Covered Code without being required to distribute such code in Source Code form even if such code would otherwise be considered Modifications under this License V Use of Modifications and Covered Code by Initial Developer INFORMATION ABOUT THIRD PARTY SOFTWARE V 1 In General The obligations of Se
13. 956 70 00 Our specialists speak English and Russian You can also send your questions to our Sales Department by email to sales kaspersky com CONTACT THE TECHNICAL DOCUMENTATION DEVELOPMENT TEAM If you have any questions related to the documentation or find an error or want to leave a comment feel free to contact our Technical Documentation Development Team Send a mail message with your comments and questions to the Technical Documentation Development Team at docfeedback kaspersky com Please write Kaspersky Help Feedback Kaspersky Anti Virus 8 0 for Lotus Domino in the subject field DISCUSSING KASPERSKY LAB APPLICATIONS ON THE WEB FORUM If your question does not require an urgent answer you can discuss it with Kaspersky Lab s specialists and other users in our forum at http forum kaspersky com index php showforum 5 In this forum you can view existing topics leave your comments create new topics and use the search engine KASPERSKY ANTI VIRUS 8 0 FOR LOTUS DOMINO Kaspersky Anti Virus 8 0 for Lotus Domino hereinafter referred to as Kaspersky Anti Virus provides comprehensive anti virus protection for Domino servers Kaspersky Anti Virus protects email traffic and replications and scans databases stored on the protected server Kaspersky Anti Virus is installed on servers that run the Microsoft Windows or Linux operating systems It performs the following functions e Scanning of all incoming outgoing a
14. Code or ii the combination of the Original Code with other software or devices 2 2 Contributor Grant Subject to third party intellectual property claims each Contributor hereby grants You a world wide royalty free non exclusive license under intellectual property rights other than patent or trademark Licensable by Contributor to use reproduce modify display perform sublicense and distribute the Modifications created by such Contributor or portions thereof either on an unmodified basis with other Modifications as Covered Code and or as part of a Larger Work and under Patent Claims infringed by the making using or selling of Modifications made by that Contributor either alone and or in combination with its Contributor Version or portions of such combination to make use sell offer for sale have made and or otherwise dispose of 1 Modifications made by that Contributor or portions thereof and 2 the combination of Modifications made by that Contributor with its Contributor Version or portions of such combination the licenses granted in Sections 2 2 a and 2 2 b are effective on the date Contributor first makes Commercial Use of the Covered Code Notwithstanding Section 2 2 b above no patent license is granted 1 for any code that Contributor has deleted from the Contributor Version 2 separate from the Contributor Version 3 for infringements caused by i third party modifications of Contributor Version
15. Contributor Version directly or indirectly infringes any patent where such claim is resolved such as by license or settlement prior to the initiation of patent infringement litigation then the reasonable value of the licenses granted by such Participant under Sections 2 1 or 2 2 shall be taken into account in determining the amount or value of any payment or license 8 4 In the event of termination under Sections 8 1 or 8 2 above all end user license agreements excluding distributors and resellers which have been validly granted by You or any distributor hereunder prior to termination shall survive termination 9 Limitation of liability Under no circumstances and under no legal theory whether tort including negligence contract or otherwise shall you the initial developer any other contributor or any distributor of covered code or any supplier of any of such parties be liable to any person for any indirect special incidental or consequential damages of any character including without limitation damages for loss of goodwill work stoppage computer failure or malfunction or any and all other commercial damages or losses even if such party shall have been informed of the possibility of such damages This limitation of liability shall not apply to liability for death or personal injury resulting from such party s negligence to the extent applicable law prohibits such limitation Some jurisdictions do not allow the exclusion or limita
16. How to Apply These Terms to Your New Programs If you develop a new program and you want it to be of the greatest possible use to the public the best way to achieve this is to make it free software which everyone can redistribute and change under these terms To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found lt one line to give the program s name and a brief idea of what it does gt Copyright C lt year gt lt name of author gt This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 3 of the License or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU General Public License along with this program If not see lt http www gnu org licenses gt Also add information on how to contact you by electronic and paper mail If the program does terminal interaction make it output a short notice like this when it starts in an interactive mode
17. IP address of the server on which Kaspersky Anti Virus is being installed IMPLEMENTATION GUIDE e lt path to installation database gt ls the path to the installation database relative to the data directory of the server e Inthe Lotus Notes client open the installation database located in the data directory of the server This will open the setup window All further operations to install the application are performed in this window If Kaspersky Anti Virus is not installed on the server the setup window will display the text of the License Agreement If the application is already installed on the server the setup window will display information about the system and the Delete button To reinstall Kaspersky Anti Virus you should first delete the previously installed version of the application see section Deleting Kaspersky Anti Virus on page 47 STEP 2 ACCEPTING THE LICENSE AGREEMENT You can read the text of the License Agreement in the setup window To continue the installation you must accept the terms and conditions mW To accept the terms and conditions of the License Agreement Click the Accept button The following information is displayed in the setup window see figure below e System information e Deployment settings e Security e Kaspersky Anti Virus installation directories DEPLOYING THE APPLICATION e List of automatic installation steps Kaspersky Anti Virus 8 0 for Lotus Domino Syste
18. LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library and you want it to be of the greatest possible use to the public we recommend making it free software that everyone can redistribute and change You can do so by permitting redistribution under these terms or alternatively under the terms of the ordinary General Public License To apply these terms attach the following notices to the library It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found one line to give the library s name and an idea of what it does Copyright C year name of author This library is free software you can redistribute it and or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation either version 2 1 of the License or at your option any later version This library is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU Lesser General Public License for more details You should have received a copy of the GNU Lesser General Public Licen
19. Russian Federation European Union and the United States as well as other countries and international treaties This Agreement does not grant to You any rights to the intellectual property including any the Trademarks or Service Marks of the Rightholder and or its partners Trademarks You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice including identification of the Trademark owner s name Such use of any Trademark does not give you any rights of ownership in that Trademark The Rightholder and or its partners own and retain all right title and interest in and to the Software including without limitation any error corrections enhancements Updates or other modifications to the Software whether made by the Rightholder or any third party and all copyrights patents trade secret rights trademarks and other intellectual property rights therein Your possession installation or use of the Software does not transfer to you any title to the intellectual property in the Software and you will not acquire any rights to the Software except as expressly set forth in this Agreement All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software Except as stated herein this Agreement does not grant you any intellectual property rights in the Software and you acknowledge that the License as further defined her
20. a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission other than the making of an exact copy The resulting work is called a modified version of the earlier work or a work based on the earlier work A covered work means either the unmodified Program or a work based on the Program To propagate a work means to do anything with it that without permission would make you directly or secondarily liable for infringement under applicable copyright law except executing it on a computer or modifying a private copy Propagation includes copying distribution with or without modification making available to the public and in some countries other activities as well To convey a work means any kind of propagation that enables other parties to make or receive copies Mere interaction with a user through a computer network with no transfer of a copy is not conveying An interactive user interface displays Appropriate Legal Notices to the extent that it includes a convenient and prominently visible feature that 1 displays an appropriate copyright notice and 2 tells the user that there is no warranty INFORMATION ABOUT THIRD PARTY SOFTWARE for the work except to the extent that warranties are provided that licensees may convey the work under this License and how to view a copy of this License If the interface presents a list of user commands or options such as a menu a prominent
21. acquired on a physical medium or specified during acquisition if the Software was acquired via the Internet Updates of the Software via the Internet when and as the Rightholder publishes them on its website or through other online services Any Updates that you may receive become part of the Software and the terms and conditions of this Agreement apply to them Technical Support via the Internet and Technical Support telephone hotline Activation and Term If You modify Your Computer or make changes to other vendors software installed on it You may be required by the Rightholder to repeat activation of the Software or license key file installation The Rightholder reserves the right to use any means and verification procedures to verify the validity of the License and or legality of a copy of the Software installed and or used on Your Computer If the Software was acquired on a physical medium the Software can be used upon your acceptance of this Agreement for the period that is specified on the package commencing upon acceptance of this Agreement If the Software was acquired via the Internet the Software can be used upon your acceptance of this Agreement for the period that was specified during acquisition You have the right to use a trial version of the Software as provided in Clause 2 1 without any charge for the single applicable evaluation period 30 days from the time of the Software activation according to this Agreem
22. application has been installed see more details in the Administrator s Guide CONFIGURING SECURITY SETTINGS FOR THE LOTUS NOTES CLIENT If installation is being performed through the Lotus Notes client you should first set up the action control table on the workstation from which the connection to the server will be made Assign the following access rights and permissions to perform actions on the workstation to the account that was used to sign the installation database see figure below e Access rights e File system e External code e Current Notes database e Environment variables e External programs e Non Notes databases e Permissions e Send mail e Read other Notes databases e Export data IMPLEMENTATION GUIDE e Modify other Notes databases Execution Security Alert Notes has been asked to execute a potentially dangerous action by a program on pour sistem ou have not authorized the signer of the program to perfora this action Program signed Du TestServer 1 0rgal Or 15 11 2010 04 48 78 ls attempting Ability to modify other databases With the action NotesSession DocumentContext Allowing this action to continue could damage your system or expose confidential information Disallovieg it could cause the current actrvity to display Incorrectly or not complete Do NOT execute the action Execute the action this one time Trust the signer to execute this action for this Notes session Start tr
23. completion of the first stage the server automatically reboots The sequence of actions at this stage fully coincides with the sequence of actions at step 3 when deleting Kaspersky Anti Virus from the last server in a distributed deployment scheme see section Deleting from the last server in a distributed deployment scheme on page 48 On completion of all stages of the deletion close the deletion window CONTACTING TECHNICAL SUPPORT If you have already purchased Kaspersky Anti Virus you can obtain information about it from Technical Support either by phone or over the Internet Technical Support will answer any of your questions about installing and using the application They will also help you to eliminate the consequences of malware if your computer has been infected Before contacting Technical Support please read the Support rules for Kaspersky Lab s products htto support kaspersky com support rules Email request to Technical Support You can send your question to Technical Support by filling out the Helpdesk web form http support kaspersky com helpdesk html In order to send an email request you must indicate the customer ID obtained during registration at the Technical Support website along with the password If you are not a registered user of Kaspersky Lab s applications yet you can fill out a registration form at https support kaspersky com en personalcabinet registration form When registeri
24. conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement INFORMATION ABOUT THIRD PARTY SOFTWARE These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object cod
25. gt Figure 6 Successful installation completion window You can move to the Activating the license step See section Step 5 Activate the license on page 43 using the License activation button or skip this step and immediately perform the Finishing the installation step See section Step 6 Finishing the installation on page 44 using the Restart server button In this instance the installation will finish without activating the license IN THIS SECTION Performing automatic stages for primary Setup 41 Performing automatic stages for installation on an additional eener 42 PERFORMING AUTOMATIC STAGES FOR PRIMARY SETUP The automatic stages for primary setup are performed in the following order 1 Checking installation setup At this stage the installation settings are checked see section Primary setup configuring settings on page 38 2 Creating databases IMPLEMENTATION GUIDE At this stage the following databases are created in the directory containing the Kaspersky Anti Virus databases e Setup log kavsetuplog nsf e Control center kavcontrolcenter nsf e Worklog and statistics kaveventslog nsf e Quarantine kavquarantine nsf e Help kavhelp nsf e Service database kavlocale nsf Each database is signed by the account of the server on which the installation is being performed An Access Control List ACL is generated for each database as soon as it is created The groups of users and
26. is legally a derivative work Executables containing this object code plus portions of the Library will still fall under Section 6 Otherwise if the work is a derivative of the Library you may distribute the object code for the work under the terms of Section 6 Any executables containing that work also fall under Section 6 whether or not they are linked directly with the Library itself 6 As an exception to the Sections above you may also combine or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work that the Library is used in it and that the Library and Its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must include the copyright notice for the Library among them as well as a reference directing the user to the copy of this License Also you must do one of these things a Accompany the work with the complete corresponding machine readable source code for the Library including whatever changes were used in the work which must be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machin
27. item in the list meets this criterion 1 Source Code The source code for a work means the preferred form of the work for making modifications to it Object code means any non source form of a work A Standard Interface means an interface that either is an official standard defined by a recognized standards body or in the case of interfaces specified for a particular programming language one that is widely used among developers working in that language The System Libraries of an executable work include anything other than the work as a whole that a is included in the normal form of packaging a Major Component but which is not part of that Major Component and b serves only to enable use of the work with that Major Component or to implement a Standard Interface for which an implementation is available to the public in source code form A Major Component in this context means a major essential component kernel window system and so on of the specific operating system if any on which the executable work runs ora compiler used to produce the work or an object code interpreter used to run it The Corresponding Source for a work in object code form means all the source code needed to generate install and for an executable work run the object code and to modify the work including scripts to control those activities However it does not include the work s System Libraries or general purpose tools or generally availabl
28. number of objects that contain an identical threat The control module also notifies administrators if an excessive number of objects are detected ina specified time interval e License management License activation analysis of license information installation and key file deletion e Email and replication scan module Performs anti virus scans of email messages and replications e Database scan module Performs anti virus scans of Domino server databases All modules are loaded automatically when the Domino server is started Information about modules can be recorded in the Worklog and statistics database written to the log files and displayed on the Domino server console All databases are stored in the staging directory for Kaspersky Anti Virus databases by default the kavdatabases directory The application includes the following databases e Control center database kavcontrolcenter nsf is used to manage and store Kaspersky Anti Virus settings e Quarantine database kavquarantine nsf is used to store quarantined objects and take actions on them e Worklog and statistics database kaveventslog nsf is used to store events registered in Kaspersky Anti Virus operation and statistical information about scanned objects and actions taken on them e Help database kavhelp nsf contains reference information about Kaspersky Anti Virus The above databases are accessed via the user interface of the Control center database AP
29. of individuals Mark Adler John Bush Karl Davis Harald Denker Jean Michel Dubois Jean loup Gailly Hunter Goatley Ed Gordon lan Gorman Chris Herborth Dirk Haase Greg Hartwig Robert Heath Jonathan Hudson Paul Kienitz David Kirschbaum Johnny Lee Onno van der Linden Igor Mandrichenko Steve P Miller Sergio Monesi Keith Owens George Petrov Greg Roelofs Kai Uwe Rommel Steve Salisbury Dave Smith Steven M Schweda Christian Spieler Cosmin Truta Antoine Verheijen Paul von Behren Rich Wales Mike White This software is provided as is without warranty of any kind express or implied In no event shall Info ZIP or its contributors be held liable for any direct indirect incidental special or consequential damages arising out of the use of or inability to use this software Permission is granted to anyone to use this software for any purpose including commercial applications and to alter it and redistribute it freely subject to the above disclaimer and the following restrictions 1 Redistributions of source code in whole or in part must retain the above copyright notice definition disclaimer and this list of conditions 2 Redistributions in binary form compiled executables and libraries must reproduce the above copyright notice definition disclaimer and this list of conditions in documentation and or other materials provided with the distribution The sole exception to this condition is redistribution of a stan
30. of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU General Public License This license the GNU Lesser General Public License applies to certain designated libraries and is quite different from the ordinary General Public License We use this license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a library whether statically or using a shared library the combination of the two is legally speaking a combined work a derivative of the original library The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom The Lesser General Public License permits more lax criteria for linking other code with the library We call this license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary General Public License It also provides other free software developers Less of an advantage over competing non free programs These disadvantages are the reason we use the ordinary General Public License for many libraries However the Lesser license provides advantages in certain special circumstances For example on rare occasions there may be a special need to encourage the widest possible use of a certain library so that it becomes a de facto standard To achie
31. of this License or b Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it or c Prohibiting misrepresentation of the origin of that material or requiring that modified versions of such material be marked in reasonable ways as different from the original version or d Limiting the use for publicity purposes of names of licensors or authors of the material or e Declining to grant rights under trademark law for use of some trade names trademarks or service marks or f Requiring indemnification of licensors and authors of that material by anyone who conveys the material or modified versions of it with contractual assumptions of liability to the recipient for any liability that these contractual assumptions directly impose on those licensors and authors All other non permissive additional terms are considered further restrictions within the meaning of section 10 If the Program as you received it or any part of it contains a notice stating that it is governed by this License along with a term that is a further restriction you may remove that term If a license document contains a further restriction but permits relicensing or conveying under this License you may add to a covered work material governed by the terms of that license document provided that the further restriction does not survive such relicensing or conveyin
32. on page 23 You will need to define the composition of these groups during installation of the application The functional groups are formed only during the primary setup of Kaspersky Anti Virus To simplify the procedure for granting permissions it is recommended that functional groups contain not individual users but groups of users from the Address book of the Domino server Before starting the installation in the Address book of the Domino server create user groups that you will use to grant permissions to operate the application There are no restrictions on the names of the groups For example create the following groups e SecurityAdmins a group that will be included in the Security administrators functional group e ControlCenterAdmins a group that will be included in the Control center administrators functional group e RestrictedAdmins a group that will be included in the Administrators with limited privileges functional group The composition of each functional group is defined during installation of the application see section Primary setup configuring settings on page 38 When Kaspersky Anti Virus is first installed the user groups that will be granted permissions under the Control center administrators and Administrators with limited privileges functional groups can be empty Following installation of the application users that require certain permissions can be added to them A user group that will be grante
33. or ii the combination of Modifications made by that Contributor with other software except as part of the Contributor Version or other devices or 4 under Patent Claims infringed by Covered Code in the absence of Modifications made by that Contributor IMPLEMENTATION GUIDE 3 Distribution Obligations 3 1 Application of License The Modifications which You create or to which You contribute are governed by the terms of this License including without limitation Section 2 2 The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6 1 and You must include a copy of this License with every copy of the Source Code You distribute You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients rights hereunder However You may include an additional document offering the additional rights described in Section 3 5 3 2 Availability of Source Code Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an Executable version available and if made available via Electronic Distribution Mechanism must remain available for at least twelve 12 months after th
34. other materials 2 Grant of License 2 1 You are given a non exclusive license to store load install execute and display to use the Software on a specified number of Computers in order to assist in protecting Your Computer on which the Software is installed from threats described in the User Manual according to the all technical requirements described in the User Manual and according to the terms and conditions of this Agreement the License and you accept this License Trial Version If you have received downloaded and or installed a trial version of the Software and are hereby granted an evaluation license for the Software you may use the Software only for IMPLEMENTATION GUIDE 2 2 2 3 2 4 2 0 3 1 3 2 3 0 3 4 3 5 3 6 Dile 3 8 evaluation purposes and only during the single applicable evaluation period unless otherwise indicated from the date of the initial installation Any use of the Software for other purposes or beyond the applicable evaluation period is strictly prohibited Multiple Environment Software Multiple Language Software Dual Media Software Multiple Copies Bundles If you use different versions of the Software or different language editions of the Software if you receive the Software on multiple media if you otherwise receive multiple copies of the Software or if you received the Software bundled with other software the total permitted number of your Comput
35. servers specified during configuring installation setupare used to generate the ACL see section Primary setup configuring settings on page 38 Groups of users and servers are generated at the preparatory stage See section Preparing for installation on page 29 The ACL also include the Default and Anonymous records They are assigned the No Access level 3 Configuration At this stage a profile for the protected server is generated in the Control center database 4 Copying service files At this stage the libraries executable files and initial set of anti virus databases are built up 5 Generating environment variables At this stage the paths to the Lotus Notes databases for Kaspersky Anti Virus are automatically configured On completion of the step the message Installation successfully completed is displayed in the lower part of the setup window On completion of this step you can click the License activation button to move to the Activating the license step see section Step 5 Activating the license on page 43 or the Restart server button to move to the Finishing the installation step without activating the license see section Step 6 Finishing the installation on page 44 PERFORMING AUTOMATIC STAGES FOR INSTALLATION ON AN ADDITIONAL SERVER The automatic stages for installation on an additional server are performed in the following order 1 Checking installation setup At this stage the installation setti
36. system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 12 If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation 14 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to
37. that transaction who receives a copy of the work also receives whatever licenses to the work the party s predecessor in interest had or could give under the previous paragraph plus a right to possession of the Corresponding Source of the work from the predecessor in interest if the predecessor has it or can get it with reasonable efforts You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License For example you may not impose a license fee royalty or other charge for exercise of rights granted under this License and you may not initiate litigation including a cross claim or counterclaim in a lawsuit alleging that any patent claim is infringed by making using selling offering for sale or importing the Program or any portion of it 11 Patents A contributor is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based The work thus licensed is called the contributor s Contributor version A contributor s essential patent claims are all patent claims owned or controlled by the contributor whether already acquired or hereafter acquired that would be infringed by some manner permitted by this License of making using or selling its contributor version but do not include claims that would be infringed only as a consequence of further modification of the contributor version For purposes of this definition control includes th
38. the property of their respective owners Last revised 19 11 2010 1997 2010 Kaspersky Lab ZAO All Rights Reserved http www kaspersky com http support kaspersky com KASPERSKY LAB END USER LICENSE AGREEMENT IMPORTANT LEGAL NOTICE TO ALL USERS CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE YOU START USING THE SOFTWARE BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR BY ENTERING CORRESPONDING SYMBOL S YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT CANCEL THE INSTALLATION OF THE SOFTWARE AND DO NOT INSTALL THE SOFTWARE IF LICENSE CONTRACT OR SIMILAR DOCUMENT ACCOMPANIES SOFTWARE TERMS OF THE SOFTWARE USE DEFINED IN SUCH DOCUMENT PREVAIL OVER CURRENT END USER LICENSE AGREEMENT AFTER CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR AFTER ENTERING CORRESPONDING SYMBOL S YOU HAVE THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THIS AGREEMENT 1 Definitions Software means software including any Updates and related materials Rightholder owner of all rights whether exclusive or otherwise to the Software means Kaspersky Lab ZAO a com
39. this section must be in a format that is publicly documented and with an implementation available to the public in source code form and must require no special password or key for unpacking reading or copying 7 Additional Terms Additional permissions are terms that supplement the terms of this License by making exceptions from one or more of its conditions Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License to the extent that they are valid under applicable law If additional permissions apply only to part of the Program that part may be used separately under those permissions but the entire Program remains governed by this License without regard to the additional permissions When you convey a copy of a covered work you may at your option remove any additional permissions from that copy or from any part of it Additional permissions may be written to require their own removal in certain cases when you modify the work You may place additional permissions on material added by you to a covered work for which you have or can give appropriate copyright permission Notwithstanding any other provision of this License for material you add to a covered work you may if authorized by the copyright holders of that material supplement the terms of this License with terms a Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16
40. 1 1 No action regardless of form arising out of the transactions under this Agreement may be brought by either party hereto more than one 1 year after the cause of action has occurred or was discovered to have occurred except that an action for infringement of intellectual property rights may be brought within the maximum applicable statutory period 12 Entire Agreement Severability No Waiver 12 1 This Agreement is the entire agreement between you and Rightholder and supersedes any other prior agreements proposals communications or advertising oral or written with respect to the Software or to subject matter of this Agreement You acknowledge that you have read this Agreement understand it and agree to be bound by its terms If any provision of this Agreement is found by a court of competent jurisdiction to be invalid void or unenforceable for any reason in whole or in part such provision will be more narrowly construed so that it becomes legal and enforceable and the entire Agreement will not fail on account thereof and the balance of the Agreement will continue in full force and effect to the maximum extent permitted by law or equity while preserving to the fullest extent possible its original intent No waiver of any provision or condition herein shall be valid unless in writing and signed by you and an authorized representative of Rightholder provided that no waiver of any breach of any provisions of this Agreement will constitu
41. AW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program and you want it to be of the greatest possible use to the public the best way to achieve this is to make it free software which everyone can redistribute and change under these terms To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found one line to give the program s name and an idea of what it does Copyright C yyyy name of author This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 2 of the License or at your option any later version
42. GUIDE e Configure the security settings for each workstation on which Kaspersky Anti Virus will run see section Preparing for operation on page 45 e Activate the license to run the application on each server where Kaspersky Anti Virus is installed if it was activated during the installation process see Administrator s Guide DEPLOYING THE APPLICATION This chapter contains a description of how to install and delete Kaspersky Anti Virus Kaspersky Anti Virus can be installed on one or more Domino servers When installed on a second and subsequent servers the application can be run in isolation see section Isolated deployment scheme on page 27 or using a distributed scheme see section Distributed deployment scheme on page 26 This chapter also describes the actions that should be taken before installing the application see section Preparing for installation on page 29 and before using the application see section Preparing for operation on page 45 and gives a list of modifications made to the system as a result of installing Kaspersky Anti Virus See section System modifications after installation on page 44 The application can be installed either through the Lotus Notes client or the web browser The installation procedure does not depend on the selected method or the operating system installed on the Domino server However the preparing for installation See section Preparing for installation on page 29 an
43. ION Primary Sello coniguring Seng S scores eri ore as 38 Installation on an additional Server setup cccccccseeeeeeeeeeeeeeeeeeeeeeeeeeaaeaseeeeeeeeesaeaeeeeeeeesaeaaceeeeeeeesaaaaeeeeeeeessaaeeeeeeseesaaeaes 39 IMPLEMENTATION GUIDE PRIMARY SETUP CONFIGURING SETTINGS SW To setup primary setup do the following 1 Ifthe installation is performed by means of the Lotus Notes client make sure that the Primary setup check box is checked see figure below Kaspersky Anti Virus 8 0 for Lotus Domino K ASPE R KV System information El Operating system Windows 2003 5 2 Intel Pentium Domain Test Server name Testserver 1 Orgal Server version Release 8 0 1 Path to installation database KAV Installer nsf Server data directory C Program Files IBM Lotus Domino data Server installation directory C Program Files IBM Lotus Domino Deployment settings m Primary setup KR Store quarantine objects in all replicas Security Managed servers LocalDomainServers ei Security administrators LocalDomainAdmins as Control center administrators LocalDomainAdmins as Administrators with limited privileges LocalDomainAdmins as Kaspersky Anti Virus installation directories Databases directory C Program Files IBM Lotus Domino data kavdatabases Service files directory kavcommon lt lt Exit Next gt gt Checking installation settings 3 Creating databases 5 Building configuration 3 Copying service fi
44. L Project LICENSE ISSUES The OpenSSL toolkit stays under a dual license e both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit See below for the actual license texts Actually both licenses are BSD style Open Source licenses In case of any license issues related to OpenSSL please contact openssl core openssl org OpenSSL License Copyright c 1998 2006 The OpenSSL Project All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 All advertising materials mentioning features or use of this software must display the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org 4 The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission For written permission please contact openssl core openssl org 5 Products derived from this software may not be called OpenSSL nor may
45. OTHER PECUNIARY OR OTHER LOSS WHATSOEVER ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES INFORMATON SOFTWARE AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT INCLUDING NEGLIGENCE MISREPRESENTATION ANY STRICT LIABILITY OBLIGATION OR DUTY OR ANY BREACH OF STATUTORY DUTY OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER AND OR ANY OF ITS PARTNERS EVEN IF THE RIGHTHOLDER AND OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES YOU AGREE THAT IN THE EVENT THE RIGHTHOLDER AND OR ITS PARTNERS ARE FOUND LIABILE THE LIABILITY OF THE RIGHTHOLDER AND OR ITS PARTNERS SHALL BE LIMITED BY THE COSTS OF THE SOFTWARE IN NO CASE SHALL THE LIABILITY OF THE RIGHTHOLDER AND OR ITS PARTNERS EXCEED THE FEES PAID FOR THE SOFTWARE TO THE RIGHTHOLDER OR THE PARTNER AS MAY BE APPLICABLE NOTHING IN THIS AGREEMENT EXCLUDES OR LIMITS ANY CLAIM FOR DEATH AND PERSONAL INJURY FURTHER IN THE EVENT ANY DISCLAIMER EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE EXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS EXCLUSIONS AND LIMITATIONS GNU and Other
46. PLICATION ARCHITECTURE IN THIS SECTION Anti Virus server protection SCH IG E 17 Managing Kaspersky Anti Virus settings siria A ica 20 Configuring the Domino server security settings cccccccnccnnnnooooccoonnnnnnnnnnnnnnnnnnnnnononnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnrnnnnnnnnnnnss 22 Managing WS Sl permis SiON EN 22 ANTI VIRUS SERVER PROTECTION SCHEME Kaspersky Anti Virus protects replications and scans databases stored on the server Server protection consists of the following components mail protection replication protection and database scanning Database scanning Protection of external mall Figure 1 Domino anti virus server protection scheme IMPLEMENTATION GUIDE IN THIS SECTION ojo eo fe ocio AAPP e 18 ARIES SAI E e Led Tu piero 18 Attachment iterng eh ONE EE 19 Processing objects and actions performed ON em 20 APPLICATION OPERATION SCHEME The application operation scheme provides for the following 1 Control module receives information from the Domino server about an incoming message to the mail box service database on the protected server or about an attempt to perform a replication on the protected server Control module sends an email message or a document that was modified as a result of replication to Email and replication scan module 2 Email and replication scan module scans the message or document and processes it in accordance with the email or replication prote
47. R PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 Limitation of Liability INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MODIFIES AND OR CONVEYS THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES 17 Interpretation of Sections 15 and 16 If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee END OF TERMS AND CONDITIONS
48. S ee EE 66 SA no ee en E E E ee en ene ee ee 70 SOFTWARE Information about third party software used to create the application BOOST 1 30 Copyright C 2003 Christof Meerwald EXPAT 1 2 Copyright C 1998 1999 2000 Thai Open Source Software Center Ltd Permission is hereby granted free of charge to any person obtaining a copy of this software and associated documentation files the Software to deal in the Software without restriction including without limitation the rights to use copy modify merge publish distribute sublicense and or sell copies of the Software and to permit persons to whom the Software is furnished to do so subject to the following conditions The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE GECKO SDK 1 8 Copyright C 1998 2008 Mozilla Foundation IMPLEMENTATION GUIDE Mozilla Public License Version 1 1 1 Definitions 1 0 1 Commercial Use means di
49. Service Pack 2 e Novell SUSE Linux Enterprise Server 10 Service Pack 2 e Red Hat Enterprise Linux 5 Service Pack 3 64 bit platforms e Microsoft Windows Server 2003 x64 Edition Service Pack 2 e Novell SUSE Linux Enterprise Server 10 Service Pack 2 e Red Hat Enterprise Linux 5 Service Pack 3 Supported Lotus Notes Domino servers e Lotus Notes Domino version 6 5 e Lotus Notes Domino version 7 0 e Lotus Notes Domino version 8 0 e Lotus Notes Domino version 8 5 Supported browsers e Windows Internet Explorer 7 e Windows Internet Explorer 8 e Mozilla Firefox 3 6 e Google Chrome APPLICATION ARCHITECTURE Kaspersky Anti Virus consists of the following modules e Control module Provides the following functions in Kaspersky Anti Virus e Application management Initiates scans of email and replications and runs scans of databases and scheduled updates of anti virus databases e Settings management Receives and applies new settings e Storage and analysis of statistical information Logs statistical information and information about operational events in the Worklog and statistics database and sends notifications to administrators e Notifications Sends email notifications about infected potentially infected and damaged objects detected during scanning e Notifications about epidemics Monitors the number of infected potentially infected and damaged objects detected during scanning of email messages and monitors the
50. TATION GUIDE Before starting Kaspersky Anti Virus you should activate the license to run the application on each server if it was not activated during installation The application will run with restricted functionality until the license is activated The license activation procedure is described in the Administrator s Guide Kaspersky Anti Virus is configured and operated via the Control center database interface kavcontrolcenter nsf A standard Lotus Notes client or web browser is used to connect to the kavcontrolcenter nsf database If a Lotus Notes client is used to operate the database the security settings should first be configured on the workstation which will be used to connect to the server There is no need to configure the security settings on the workstation used to install Kaspersky Anti Virus since they were configured when preparing for installation see section Configuring security settings for the Lotus Notes client on page 33 Add the account of the server used to sign elements of the Lotus Notes databases for Kaspersky Anti Virus to the action control table see figure below and assign this account the following access rights and permissions to perform actions on the workstation e Access rights e File system e Current Notes database e Environment variables e External programs e Permissions e Read other Notes databases DEPLOYING THE APPLICATION e Modify other Notes databases Execution Security Ale
51. TS PARTNERS MAKE NO WARRANTY CONDITION REPRESENTATION OR TERM EXPRESSED IMPLEMENTATION GUIDE fils 8 1 OR IMPLIED WHETHER BY STATUTE COMMON LAW CUSTOM USAGE OR OTHERWISE AS TO ANY MATTER INCLUDING WITHOUT LIMITATION NONINFRINGEMENT OF THIRD PARTY RIGHTS MERCHANTABILITY SATISFACTORY QUALITY INTEGRATION OR APPLICABILITY FOR A PARTICULAR PURPOSE YOU ASSUME ALL FAULTS AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS AND FOR THE INSTALLATION OF USE OF AND RESULTS OBTAINED FROM THE SOFTWARE WITHOUT LIMITING THE FOREGOING PROVISIONS THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER Exclusion and Limitation of Liability TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL INCIDENTAL PUNITIVE INDIRECT OR CONSEQUENTIAL DAMAGES WHATSOEVER INCLUDING BUT NOT LIMITED TO DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION FOR BUSINESS INTERRUPTION FOR LOSS OF PRIVACY FOR CORRUPTION DAMAGE AND LOSS OF DATA OR PROGRAMS FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE FOR NEGLIGENCE FOR ECONOMIC LOSS AND FOR ANY
52. Third Party Licenses The Software may include some software programs that are licensed or sublicensed to the user under the GNU General Public License GPL or other similar free software licenses which among other rights permit the user to copy modify and redistribute certain programs or portions thereof and have access to the source code Open Source Software If such licenses require that for any software which is distributed to someone in an executable binary format that the source code also be made available to those users then the source code should be made available by sending the request to source kaspersky com or the source code is supplied with the Software If any Open Source Software licenses require that the Rightholder provide rights to use copy or modify an Open Source Software program that are broader than the rights granted in this Agreement then such rights shall take precedence over the rights and restrictions herein Intellectual Property Ownership KASPERSKY LAB END USER LICENSE AGREEMENT 9 1 You agree that the Software and the authorship systems ideas methods of operation documentation and other information contained in the Software are proprietary intellectual property and or the valuable trade secrets of the Rightholder or its partners and that the Rightholder and its partners as applicable are protected by civil and criminal law and by the law of copyright trade secret trademark and patent of the
53. ULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 10 INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS Appendix How to Apply These Terms to Your New Programs If you develop a new program and you want it to be of the greatest possible use to humanity the best way to achieve this is to make it free software which everyone can redistribute and change under these terms To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found INFORMATION ABOUT THIRD PARTY SOFTWARE lt one line to give the program s name an
54. a is not supported and changes to the server settings are always made to the open replica The Control center database can be run simultaneously from several workstations or in parallel through a web browser and Lotus Notes client In such a case a conflict in the replications could occur if the settings of a profile or server are modified by two or more users simultaneously In addition it is not recommended to simultaneously modify the server settings and the settings of the profile that contains the server The server settings can be automatically redefined when the new profile settings are applied IMPLEMENTATION GUIDE CONFIGURING THE DOMINO SERVER SECURITY SETTINGS In order to correctly run install and delete Kaspersky Anti Virus you need to configure the Domino server security settings as specified in the table Table 1 List of Domino server security settings Using a remote Domino server Creating databases and database templates Creating database replicas Performing unrestricted methods and operations Trusted servers Sending console Commande to the primary and secondary setup server Creating a database of templates with a server used to sign the design of the Installing Kaspersky Anti Virus database Creating a database replica with the primary and secondary setup server Background agents use run commands with the server file system create directories view directory contents call external s
55. able version does not attempt to limit or alter the recipient s rights in the Source Code version from the rights set forth in this License If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone not by the Initial Developer or any Contributor You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer 3 7 Larger Works You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product In such a case You must make sure the requirements of this License are fulfilled for the Covered Code 4 Inability to Comply Due to Statute or Regulation If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute judicial order or regulation then You must a comply with the terms of this License to the maximum extent possible and b describe the limitations and the code they affect Such description must be included in the legal file described in Section 3 4 and must be included with all distributions of the Source Code Except to the extent prohibited by statute or regulation such description must be sufficiently detailed for a recipient of ord
56. agement tools maximize the automation of anti virus protection for computers and corporate networks A large number of developers worldwide use the Kaspersky Anti Virus kernel in their products including Nokia ICG USA Aladdin Israel Sybari USA G Data Germany Deerfield USA Alt N USA Microworld India and BorderWare Canada Kaspersky Lab s customers enjoy a wide range of additional services that ensure both stable operation of the company s products and full compliance with the customer s specific business requirements We design implement and support corporate anti virus systems Kaspersky Lab s anti virus database is updated every hour The company provides its customers with 24 hour technical support in several languages If you have any questions comments or suggestions you can contact us through our dealers or at Kaspersky Lab directly We will be glad to assist you via phone or email in any matters related to our products You will receive full and comprehensive answers to all your questions Kaspersky Lab official site http www kaspersky com Virus Encyclopedia http Awww securelist com Anti Virus Lab newvirus kaspersky com only for sending suspicious objects in archives http support kaspersky ru virlab helpdesk html LANG en for sending requests to virus analysts INFORMATION ABOUT THIRD PARTY SOFTWARE Third party software was used to create the application IN THIS SECTION EE 53 GV GOD
57. al to the document scanning algorithm in the Message and replication scan module ANTI VIRUS SCANNING ALGORITHM Kaspersky Anti Virus analyzes objects sent for anti virus scanning according to the following algorithm 1 Objects are scanned on the basis of records in the anti virus databases Kaspersky Anti Virus compares objects with database records and determines whether they are harmful to which category of dangerous programs they belong and which treatments can be applied to them APPLICATION ARCHITECTURE The anti virus databases contains descriptions of and ways to neutralize all types of potentially dangerous programs that are known of when the anti virus databases are created malware joke applications potentially dangerous applications and programs that are not potentially harmful but that could be part of software to develop harmful applications Incremental scanning is used to check objects files are rescanned only when they are modified that is if the date of the last revision precedes the date of the most recent scan the file will not be scanned Incremental scanning can be disabled by setting the following variable KAVNonIncrementalScan 1 By default this variable is not set Based on the scan results the object is assigned one of the following statuses e Not infected The object does not contain any threats e Object which cannot be disinfected The object contains a threat that cannot be neutralize
58. also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the program if necessary Here a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the program Gnomovision a program to direct compilers to make passes at assemblers written by James Hacker lt signature of Ty Coon gt 1 April 1989 Ty Coon President of Vice That s all there is to it GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 51 Franklin Street Fifth Floor Boston MA 02110 1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead You can apply it to your programs too IMPLEMENTATION GUIDE When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have th
59. and objects not scanned that are detected in messages They also are notified of any remedies undertaken e Notification of the threat of virus epidemics Kaspersky Anti Virus notes any attempts for mass distribution of infected potentially infected and damaged objects in messages and notifies administrators e Kaspersky Anti Virus notifies administrators of objects detected when scanning replicated documents and database documents and of remedies undertaken e Kaspersky Anti Virus stores infected and potentially infected objects in Quarantine Saved messages and documents identified during a replication scan and documents identified during a database scan are grouped by type mail replications scanning e Information detected about objects that are infected potentially infected and not scanned and information about actions performed is stored in the Worklog and statistics database and is also displayed in the Domino server console e Anti virus databases are updated over the Internet both automatically and manually Kaspersky Lab s FTP and HTTP update servers on the Internet FTP and HTTP servers containing updates and local and network directories can serve as update resources Search for threats and disinfection of infected objects are performed on the basis of anti virus database records The anti virus databases contain descriptions of all currently known threats and of methods to disinfect objects infected with these malicious pro
60. any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c If the modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these
61. ation as such 14 Revised Versions of this License The Free Software Foundation may publish revised and or new versions of the GNU General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies that a certain numbered version of the GNU General Public License or any later version applies to it you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation If the Program does not specify a version number of the GNU General Public License you may choose any version ever published by the Free Software Foundation If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used that proxy s public statement of acceptance of a version permanently authorizes you to choose that version for the Program IMPLEMENTATION GUIDE Later license versions may give you additional or different permissions However no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version 15 Disclaimer of Warranty THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHE
62. butors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION O This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in
63. can be left out if the rouines from the library being used are not cryptographic related 4 If you include any Windows specific code or a derivative thereof from the apps directory application code you must include an acknowledgement This product includes software written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY O SUCH DAMAGE INFORMATION ABOUT THIRD PARTY SOFTWARE The licence and distribution terms for any publically available version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution licence including the GNU Public Licence PCRE 7 4 Copyright C 1997 2008 University of Cambridge PCRE LICENCE PCRE is a library of functions to support regular expressions whose synta
64. capes SSL This library is free for commercial and non commercial use as long as the following conditions are aheared to The following conditions apply to all code found in this distribution be it the RC4 RSA lIhash DES etc code not just the SSL code The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson tjh cryptsoft com Copyright remains Eric Young s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be given attribution as the author of the parts of the library used This can be in the form of a textual message at program startup or in documentation online or textual provided with the package Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 All advertising materials mentioning features or use of this software must display the following acknowledgement This product includes cryptographic software written by Eric Young eay cryptsoft com The word cryptographic
65. cation protection and database scanning settings See section Processing objects and actions performed on them on page 20 The application can apply the following filters to attachments e Filter by size Kaspersky Anti Virus checks the size of attached objects If the size of an object exceeds the maximum value allowed the object is assigned the status specified by the filter settings and is skipped by the anti virus scan Objects that do not exceed the maximum size are sent to be scanned e Filter by name Kaspersky Anti Virus checks the names of objects attached to a message If the name of the object satisfies the filter mask the object is assigned the status specified by the filter settings and is skipped by the scan If the name of the object does not match any of the filter mask values the object is sent for anti virus scanning If the protection settings are configured for both types of attachment filtering Kaspersky Anti Virus first scans the size of the object Next if the size of the object is less than the value set in the filter settings Kaspersky Anti Virus scans the name of the object If the size of the object is more than the value set in the filter settings Kaspersky Anti Virus does not scan the name of the object Based on the scan results the object can be assigned one of the following statuses e Not infected e Cannot be disinfected e Not scanned IMPLEMENTATION GUIDE e Potentially infected The attachm
66. cess with rights to create delete replicate and copy documents SETTING SERVER PERMISSIONS If a distributed deployment scheme is in use each server on which installation was performed must be granted permission to do the following e Use the full remote console as an administrator e Signor run unrestricted methods and operations e Create databases amp templates e Create new replicas In addition all servers on which Kaspersky Anti Virus was installed must be included in the Trusted Servers list of each server Security settings and servers are configured on the Security tab of the Server document IMPLEMENTATION GUIDE To manage server permissions it is recommended that you use a group created in the Address book see section Creating a group of installation servers in the address book on page 31 Following the successful installation of all the servers you can remove permissions from the installation servers to do the following e create databases amp templates e create new replicas These permissions are not required for Kaspersky Anti Virus to operate properly CREATING A GROUP OF USERS FOR GRANTING PERMISSIONS Users are granted permissions to operate Kaspersky Anti Virus by including them in the following functional groups Security administrators Control center administrators and Administrators with limited privileges see section Managing permissions at the ACL level of the Kaspersky Anti Virus databases
67. ction Step 1 Starting the installation on page 35 This opens a window for deleting the application The deletion window displays system information the list of deletion stages and the Delete button If the Lotus Notes client is used to perform the deletion clear the Deleting from the last server in configuration check box The fields in the deletion window will be updated see figure below In the Primary setup server field specify the server on which the replicas of the Kaspersky Anti Virus databases are stored Select a server from the Address book of the Domino server by clicking the button to the right of the input field or enter the name of the server manually In the Databases directory for primary setup server field enter the path to the directory containing the Lotus Notes databases for Kaspersky Anti Virus on the server selected at the previous step Click the Delete button A query about rebooting the Domino server will be displayed onscreen Confirm the reboot The first stage of deleting the application will begin At this stage the following operations are automatically performed e the modifications made as a result of installing Kaspersky Anti Virus are deleted from the notes ini file see section Modifying the Domino configuration file on page 45 e information from the replica of the Control center database specified at step 3 is deleted about the server from which Kaspersky Anti Virus is being deleted On
68. ction 3 apply to Netscape except to the extent specified in this Amendment Section V 2 and V 3 V 2 Other Products Netscape may include Covered Code in products other than the Netscape s Branded Code which are released by Netscape during the two 2 years following the release date of the Original Code without such additional products becoming subject to the terms of this License and may license such additional products on different terms from those contained in this License V 3 Alternative Licensing Netscape may license the Source Code of Netscape s Branded Code including Modifications incorporated therein without such Netscape Branded Code becoming subject to the terms of this License and may license such Netscape Branded Code on different terms from those contained in this License VI Litigation Notwithstanding the limitations of Section 11 above the provisions regarding litigation in Section 11 a b and c of the License shall apply to all disputes relating to this License EXHIBIT A Netscape Public License The contents of this file are subject to the Netscape Public License Version 1 1 the License you may not use this file except in compliance with the License You may obtain a copy of the License at http www mozilla org NPL Software distributed under the License is distributed on an AS IS basis WITHOUT WARRANTY OF ANY KIND either express or implied See the License for the specific language governing
69. ction settings The following actions are performed e Scanned objects are selected Email messages are divided into header message body attachments and OLE objects In a document fields in Rich Text format attachments and OLE objects are selected e Attached objects are filtered see section Attachment filtering algorithm on page 19 by size and or by name e Objects are scanned for threats see section Anti virus scanning algorithm on page 18 e Not infected objects are skipped and other objects are processed according to the protection settings see section Processing objects and actions performed on them on page 20 A copy of an object can be saved in the Quarantine database before it is processed e Processed messages are sent to the Lotus Domino system for dispatch Processed documents are stored in the databases 3 Control module sums up in accordance with the settings for notifications about epidemics the number of infected potentially infected and damaged objects detected when scanning email messages and the number of objects containing an identical threat 4 In accordance with the database scanning schedule or a manual command to begin scanning the Control module sends a command to the Database scan module to begin scanning Database scan module generates a list of scanned documents in accordance with the scan settings and then scans the documents according to this list The algorithm to scan documents is identic
70. d See the License for the specific language governing rights and limitations under the License The Original Code is The Initial Developer of the Original Code is Portions created by are Copyright C All Rights Reserved Contributor s Alternatively the contents of this file may be used under the terms ofthe license the __ License in which case the provisions of License are applicable instead of those above If you wish to allow use of your version of this file only under the terms of the License and not to allow others to use IMPLEMENTATION GUIDE your version of this file under the MPL indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the __ License If you do not delete the provisions above a recipient may use your version of this file under either the MPL or the __ License NOTE The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications AMENDMENTS The Netscape Public License Version 1 1 NPL consists of the Mozilla Public License Version 1 1 with the following Amendments including Exhibit A Netscape Public License Files identified with Exhibit A Netscape Public License are governed by the Netscape Public License Version
71. d permissions under the Security administrators functional group must contain at least one user from the Address book PREPARING AN INSTALLATION DATABASE The Lotus Notes database file represents the installation file Before starting the installation of Kaspersky Anti Virus move the installation database to the data directory of the server on which the installation is being performed and sign its account which is authorized to perform operation on the server see section Setting server permissions on page 31 It is recommended that you sign the installation database of the account of the server on which the installation is being performed If the application is being installed on several servers the signed installation database should be placed on each server When installing on an additional server you can use the installation database that was signed prior to the primary setup Copy it from the data directory of the primary setup server Reboot the Domino server DEPLOYING THE APPLICATION PREPARING A KEY FILE If the key file is available you can activate the license during installation of the application In order to be able to activate the license during installation of the application make sure that the key file is accessible via the file system of the client computer from which the installation database was opened If the key file is not available at the start of installation the license can be activated after the
72. d a brief idea of what it does gt Copyright C 19yy lt name of author gt This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 1 or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU General Public License along with this program if not write to the Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Also add information on how to contact you by electronic and paper mail If the program is interactive make it output a short notice like this when it starts in an interactive mode Gnomovision version 69 Copyright C 19xx name of author Gnomovision comes with ABSOLUTELY NO WARRANTY for details type show w This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course the commands you use may be called something other than show w and show c they could even be mouse clicks or menu items whatever suits your program You should
73. d by using current anti virus databases no remedy is available for such objects e Disinfectable The object contains a threat that can be neutralized by using current anti virus databases after treatment the object will be assigned the not infected status e Not scanned Kaspersky Anti Virus was unable to scan the object the object can be a password protected archive or an archive compressed with an unknown algorithm or the scan encountered an error or timed out 2 After being scanned by anti virus databases an object that is classified as not infected is then scanned by the heuristic analyzer Kaspersky Anti Virus uses special mechanisms to analyze the activity of objects being scanned in the system If such activity is typical of harmful objects the object will be classified as potentially infected This means that the object code contains either modified code from a known virus or code that resembles a virus but which has yet to be identified and described in Kaspersky Lab s anti virus databases ATTACHMENT FILTERING ALGORITHM Kaspersky Anti Virus filters objects attached to email messages and documents If an object satisfies the filter conditions it is assigned the status set by the filter values No further anti virus scans are carried out on the object Objects are processed according to the status assigned to them during filtering Actions configured for objects of this status are applied according to mail protection repli
74. d on the Library on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that version instead if you wish Do not make any other change in these notices Once this change is made in a given copy it is irreversible for that copy so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy This option is useful when you wish to copy part of the code of the Library into a program that is not a library 4 You may copy and distribute the Library or a portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code fro
75. d preparing for operation see section Preparing for operation on page 45 stages differ depending on the installation method To start installation through the web browser an HTTP task must be launched IN THIS SECTION FS DAC TON MNS Vea AAPP o US EE CPU E EES 29 Mstaling TING ele CAO EE 34 System modifications after installatiON ooonccccnnccooocnncconnnonononnncnnnnnnononannnnnnnnnnnnnnnnnnnnnononnnnnnnnnnnnnnnnnnnrnnnnnnnnnnnnnnnnnns 44 Propanno Ol OD Shea E 45 Deleting Kaspersky Ant Vis 47 PREPARING FOR INSTALLATION This section describes in detail the actions that should be performed before installing the application Before starting the installation make sure that the computer s hardware and software specification match the requirements of Kaspersky Anti Virus see section Hardware and software requirements on page 15 IMPLEMENTATION GUIDE IN THIS SECTION Deleting the previous version of Kaspersky Anti Virus and other anti virus programs for Lotus Notes Domino 30 Settings permissions for the user performing the installation o ccccccccnnconnccnnnnconononnncnnnnnnnnnnnnccnnnononnnnnnnnnnnnnonnnnarennnnos 30 Creating a group of installation servers in the Address book 31 Setting server EE 31 Creating a group of users for granting permissions ccceccccecseeecececeeeeeeeeceeeeeeeeceeeeeeeesaeeeeeeesseueeeeeseaaeeeeessaceeeeessaneeeeees 32 Preparing an installation da
76. d to satisfy these requirements e Convey the object code using peer to peer transmission provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d A separable portion of the object code whose source code is excluded from the Corresponding Source as a System Library need not be included in conveying the object code work A User Product is either 1 a consumer product which means any tangible personal property which is normally used for personal family or household purposes or 2 anything designed or sold for incorporation into a dwelling In INFORMATION ABOUT THIRD PARTY SOFTWARE determining whether a product is a consumer product doubtful cases shall be resolved in favor of coverage For a particular product received by a particular user normally used refers to a typical or common use of that class of product regardless of the status of the particular user or of the way in which the particular user actually uses or expects or is expected to use the product A product is a consumer product regardless of whether the product has substantial commercial industrial or non consumer uses unless such uses represent the only significant mode of use of the product Installation Information for a User Product means any methods procedures authorization keys or other information required to install and execute modified versi
77. dalism acts of God acts of terrorism power failures or surges casualty alteration non permitted modification or repairs by any party other than Rightholder or any other third parties or Your actions or causes beyond Rightholder s reasonable control y any defect not made known by You to Rightholder as soon as practical after the defect first appears and 2 incompatibility caused by hardware and or software components installed on Your Computer You acknowledge accept and agree that no software is error free and You are advised to back up the Computer with frequency and reliability suitable for You The Rightholder does not provide any guarantee that the Software will work correctly in case of violations of the terms described in the User Manual or in this Agreement The Rightholder does not guarantee that the Software will work correctly if You do not regularly download Updates specified in Clause 2 5 of this Agreement The Rightholder does not guarantee protection from the threats described in the User Manual after the expiration of the period specified in Clauses 3 2 or 3 3 of this Agreement or after the License to use the Software is terminated for any reason THE SOFTWARE IS PROVIDED AS IS AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE EXCEPT FOR ANY WARRANTY CONDITION REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW THE RIGHTHOLDER AND I
78. dard UnZipSFX binary including SFXWiz as part of a self extracting archive that is permitted without inclusion of this license as long as the normal SFX banner has not been removed from the binary or disabled 3 Altered versions including but not limited to ports to new operating systems existing ports with new graphical interfaces versions with modified or added functionality and dynamic shared or static library versions not from Info ZIP must be plainly marked as such and must not be misrepresented as being the original source or if binaries compiled from the original source Such altered versions also must not be misrepresented as being Info ZIP releases including INFORMATION ABOUT THIRD PARTY SOFTWARE but not limited to labeling of the altered versions with the names Info ZIP or any variation thereof including but not limited to different capitalizations Pocket UnZip WiZ or MacZip without the explicit permission of Info ZIP Such altered versions are further prohibited from misrepresentative use of the Zip Bugs or Info ZIP e mail addresses or the Info ZIP URL s such as to imply Info ZIP will provide support for the altered versions 4 Info ZIP retains the right to use the names Info ZIP Zip UnZip UnZipSFX WiZ Pocket UnZip Pocket Zip and MacZip for its own source and binary releases LIBNKFM 2 0 5 Copyright C KUBO Takehiro OPENSSL 0 9 8D Copyright C 1998 2007 The OpenSS
79. ducing the executable from it However as a special exception the materials to be distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things a Accompany the combined library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under the terms of the Sections above INFORMATION ABOUT THIRD PARTY SOFTWARE b Give prominent notice with the combined library of the fact that part of it is a work based on the Library and explaining where to find the accompanying uncombined form of the same work 8 You may not copy modify
80. e database directory of the Domino server 4 Inthe Databases directory field enter the path to the directory in which the Lotus Notes databases for Kaspersky Anti Virus will be installed The default value of the field is the kavdatabases directory STEP 4 LAUNCHING AND PERFORMING AUTOMATIC INSTALLATION STEPS This installation step consists of several stages The stages are performed automatically Some stages differ for primary setup See section Performing automatic stages for primary setup on page 41 and installation on an additional server see section Performing automatic stages for installation on an additional server on page 42 The list of stages is displayed in the lower part of the setup window Check the settings in the setup window carefully To start executing the automatic installation stages click the Next button located under the list of stages The first stage will begin On completion of each stage a symbol v is displayed in the list to indicate s if the stage was completed successfully or returned an error If the stage was completed successfully the application will start the next installation stage If the stage returned an error the installation will stop In such case make sure that all preparatory actions were correctly taken and repeat the stage If an error occurs you can also contact the Technical Support Service see page 50 To stop the installation click the Exit button Information about
81. e date it initially became available or at least six 6 months after a subsequent version of that particular Modification has been made available to such recipients You are responsible for ensuring that the Source Code version remains available even if the Electronic Distribution Mechanism is maintained by a third party 3 3 Description of Modifications You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change You must include a prominent statement that the Modification is derived directly or indirectly from Original Code provided by the Initial Developer and including the name of the Initial Developer in a the Source Code and b in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code 3 4 Intellectual Property Matters a Third Party Claims If Contributor has knowledge that a license under a third party s intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2 1 or 2 2 Contributor must include a text file with the Source Code distribution titled LEGAL which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact If Contributor obtains such knowledge after the Modification is made available as described in Section 3 2 Contributor shall promptly modif
82. e free programs which are used unmodified in performing those activities but which are not part of the work For example Corresponding Source includes interface definition files associated with source files for the work and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require such as by intimate data communication or control flow between those subprograms and other parts of the work The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source The Corresponding Source for a work in source code form is that same work 2 Basic Permissions All rights granted under this License are granted for the term of copyright on the Program and are irrevocable provided the stated conditions are met This License explicitly affirms your unlimited permission to run the unmodified Program The output from running a covered work is covered by this License only if the output given its content constitutes a covered work This License acknowledges your rights of fair use or other equivalent as provided by copyright law You may make run and propagate covered works that you do not convey without conditions so long as your license otherwise remains in force You may convey covered works to others for the sole purpose of having them make modifications exclusively for you or provide you with facilities for running those work
83. e freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistri
84. e granted hereunder and may result in criminal and or civil prosecution against You You shall not transfer the rights to use the Software to any third party You shall not provide the activation code and or license key file to third parties or allow third parties access to the activation code and or license key which are deemed confidential data of Rightholder You shall not rent lease or lend the Software to any third party You shall not use the Software in the creation of data or software used for detection blocking or treating threats described in the User Manual Your key file can be blocked in case You breach any of the terms and conditions of this Agreement lf You are using the trial version of the Software You do not have the right to receive the Technical Support specified in Clause 4 of this Agreement and You don t have the right to transfer the license or the rights to use the Software to any third party Limited Warranty and Disclaimer The Rightholder guarantees that the Software will substantially perform according to the specifications and descriptions set forth in the User Manual provided however that such limited warranty shall not apply to the following w Your Computers deficiencies and related infringement for which Rightholder s expressly disclaims any warranty responsibility x malfunctions defects or failures resulting from misuse abuse accident neglect improper installation operation or maintenance theft van
85. e inside them although the manufacturer can do so This is fundamentally incompatible with the aim of protecting users freedom to change the software The systematic pattern of such abuse occurs in the area of products for individuals to use which is precisely where it is most unacceptable Therefore we have designed this version of the GPL to prohibit the practice for those products lf such problems arise substantially in other domains we stand ready to extend this provision to those domains in future versions of the GPL as needed to protect the freedom of users Finally every program is threatened constantly by software patents States should not allow patents to restrict development and use of software on general purpose computers but in those that do we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary To prevent this the GPL assures that patents cannot be used to render the program non free The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS 0 Definitions This License refers to version 3 of the GNU General Public License Copyright also means copyright like laws that apply to other kinds of works such as semiconductor masks The Program refers to any copyrightable work licensed under this License Each licensee is addressed as you Licensees and recipients may be individuals or organizations To modify
86. e installation server or the user installing Kaspersky Anti Virus is not included in this group the ACL of the installation server should be edited before starting the installation The ACL cannot include the Anonymous user or grant the account the necessary rights for the installation database The Anonymous account cannot be used to collect the necessary setup information which will cause the installation to return an error It is important that the installation be performed by an administrator with the necessary rights DEPLOYING THE APPLICATION Include the user performing the installation in the ACL of the installation database or in the group and grant him her access at the Manager level and rights to create delete replicate and copy documents CREATING A GROUP OF INSTALLATION SERVERS IN THE ADDRESS BOOK During the primary setup you will need to specify the servers on which Kaspersky Anti Virus is to be installed see section Primary setup configuring settings on page 38 The specified servers will be automatically included in the ACL of the Kaspersky Anti Virus databases The installation servers in the ACL are granted access at the Manager access level with rights to create delete replicate and copy documents If a distributed deployment scheme is in use during the primary setup you should specify all the servers on which Kaspersky Anti Virus is to be installed Additional servers not specified during the primary setup need
87. e is created in the staging directory of the Kaspersky Anti Virus database when the application is installed by default this is the kavdatabases directory At the same time a profile is created in the database and the protected server is added The profile and server settings are assigned the default values If Kaspersky Anti Virus uses a distributed deployment scheme see page 26 the kavcontrolcenter nsf database contains information about the operation of Kaspersky Anti Virus on each of the servers on which the application is installed A database is created on one of these servers during installation and a replica of the existing Control center database is created on each subsequent server A database from one of the servers selected by the administrator on which Kaspersky Anti Virus is already installed is taken as a basis The new protected server is added to the profile containing the server from which the replica kavcontrolcenter nsf database was created The server settings are assigned the default values When Kaspersky Anti Virus is deleted from one of the servers information about this server is deleted from the profile and from the Control center database If there is an isolated deployment scheme the kavcontrolcenter nsf database is placed on one server and contains information about the configuration of this server only To configure and manage Kaspersky Anti Virus open the kavcontrolcenter nsf database Rights to open the kavcon
88. e notice Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License If your rights have been terminated and not permanently reinstated you do not qualify to receive new licenses for the same material under section 10 9 Acceptance Not Required for Having Copies You are not required to accept this License in order to receive or run a copy of the Program Ancillary propagation of a covered work occurring solely as a consequence of using peer to peer transmission to receive a copy likewise does not require acceptance However nothing other than this License grants you permission to propagate or modify any covered work These actions infringe copyright if you do not accept this License Therefore by modifying or propagating a covered work you indicate your acceptance of this License to do so 10 Automatic Licensing of Downstream Recipients Each time you convey a covered work the recipient automatically receives a license from the original licensors to run modify and propagate that work subject to this License You are not responsible for enforcing compliance by third parties with this License An entity transaction is a transaction transferring control of an organization or substantially all assets of one or subdividing an organization or merging organizations If propagation of a covered work results from an entity transaction each party to
89. e or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components
90. e readable work that uses the Library as object code and or source code so that the user can modify the Library and then relink to produce a modified executable containing the modified Library It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions b Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing this distribution d If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place e Verify that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any data and utility programs needed for repro
91. e right to grant patent sublicenses in a manner consistent with the requirements of this License Each contributor grants you a non exclusive worldwide royalty free patent license under the contributor s essential patent claims to make use sell offer for sale import and otherwise run modify and propagate the contents of its contributor version INFORMATION ABOUT THIRD PARTY SOFTWARE In the following three paragraphs a patent license is any express agreement or commitment however denominated not to enforce a patent Such as an express permission to practice a patent or covenant not to sue for patent infringement To grant such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party If you convey a covered work knowingly relying on a patent license and the Corresponding Source of the work is not available for anyone to copy free of charge and under the terms of this License through a publicly available network server or other readily accessible means then you must either 1 cause the Corresponding Source to be so available or 2 arrange to deprive yourself of the benefit of the patent license for this particular work or 3 arrange in a manner consistent with the requirements of this License to extend the patent license to downstream recipients Knowingly relying means you have actual knowledge that but for the patent license your conveying the covered work i
92. ed out for each server and profile separately Only users with permissions from one of the three functional groups can be assigned as Profile administrator and Server administrator By default users and or user groups included in the Control center administrators functional group during installation are specified as administrators in the profile and server settings Users from the Security administrators and Control center administrators functional groups are granted the right to edit the settings of all servers and profiles regardless of their functional role To grant restricted permissions for example to edit the settings of only one profile server users from the Administrators with limited privileges functional group should be assigned as profile server administrators Users from this group are granted the right to edit the settings of only the profiles servers for which they have been assigned as administrators A user from this group who is assigned as a profile administrator is also granted the right to edit the settings of all servers in this profile TYPICAL DEPLOYMENT SCHEMES This chapter contains a description of the deployment schemes in Kaspersky Anti Virus The following deployment options are provided e Isolated deployment scheme Kaspersky Anti Virus is installed in isolated on several servers In this case the databases of Kaspersky Anti Virus are deployed autonomously on each server e Distributed deploy
93. ein granted under this Agreement only provides you with a right of limited use under the terms and conditions of this Agreement Rightholder reserves all rights not expressly granted to you in this Agreement 9 2 You agree not to modify or alter the Software in any way You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software 10 Governing Law Arbitration 10 1 This Agreement will be governed by and construed in accordance with the laws of the Russian Federation without reference to conflicts of law rules and principles This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods the application of which is expressly excluded Any dispute arising out of the interpretation or application of the terms of this Agreement or any breach thereof shall unless it is settled by direct negotiation be settled by in the International Commercial Arbitration Court at the Russian Federation Chamber of Commerce and Industry in Moscow the Russian Federation Any award rendered by the arbitrator shall be final and binding on the parties and any judgment on such arbitration award may be enforced in any court of competent jurisdiction Nothing in this Section 10 shall prevent a Party from seeking or obtaining equitable relief from a court of competent jurisdiction whether before during or after arbitration proceedings 11 Period for Bringing Actions 1
94. eloper Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License 7 Disclaimer of warranty Covered code is provided under this license on an as is basis without warranty of any kind either expressed or implied including without limitation warranties that the covered code is free of defects merchantable fit for a particular purpose or non infringing The entire risk as to the quality and performance of the covered code is with you Should any covered code prove defective in any respect you not the initial developer or any other contributor assume the cost of any IMPLEMENTATION GUIDE necessary servicing disinfection or correction This disclaimer of warranty constitutes an essential part of this license No use of any covered code is authorized hereunder except under this disclaimer 8 Termination 8 1 This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach All sublicenses to the Covered Code which are properly granted shall survive any termination of this License Provisions which by their nature must remain in effect beyond the termination of this License shall survive 8 2 If You initiate litigation by asserting a patent infringement claim excluding declatory judgment actions against Initial Developer or a C
95. ent filter settings are configured in the mail protection replication protection and database scan seitings for each protection component individually PROCESSING OBJECTS AND ACTIONS PERFORMED ON THEM Kaspersky Anti Virus processes objects in accordance with the status assigned to them as a result of anti virus scanning see section Anti virus scanning algorithm on page 18 and filtering of attachments see section Attachment filtering algorithm on page 19 Not infected objects are returned without any modifications to the Lotus Domino server databases replication protection and database scanning or to the Lotus Domino mail system mail protection The following actions can be performed on the remaining objects e Disinfect Kaspersky Anti Virus disinfects the object on the basis of information in the anti virus databases about the threat detected The threat is neutralized and the object is classified as not infected and is stored in the database by its source address or returned to the mail system The action is only provided for disinfectable objects Regardless of the application settings OLE objects are disinfected by deleting only e Skip Kaspersky Anti Virus passes the object without any modifications e Delete Kaspersky Anti Virus deletes the object from a document or email message Actions to be performed by the application are defined separately for each status in the mail protection replication protection and database sca
96. ent provided that the trial version does not entitle You Updates and Technical support via the Internet and Technical support telephone hotline Your License to Use the Software is limited to the period of time as specified in Clauses 3 2 or 3 3 as applicable and the remaining period can be viewed via means described in User Manual If You have acquired the Software that is intended to be used on more than one Computer then Your License to Use the Software is limited to the period of time starting from the date of activation of the Software or license key file installation on the first Computer Without prejudice to any other remedy in law or in equity that the Rightholder may have in the event of any breach by You of any of the terms and conditions of this Agreement the Rightholder shall at any time without notice to You be entitled to terminate this License without refunding the purchase price or any part thereof You agree that in using the Software and in using any report or information derived as a result of using this Software you will comply with all applicable international national state regional and local laws and regulations including without limitation privacy copyright export control and obscenity law 3 9 4 1 4 2 Od 5 2 5 3 5 4 5 9 5 6 9 7 6 1 6 2 6 3 6 4 6 5 6 6 KASPERSKY LAB END USER LICENSE AGREEMENT Except as otherwise specifically provided herein you may no
97. ers on which all versions of the Software are installed shall correspond to the number of computers specified in licenses you have obtained provided that unless the licensing terms provide otherwise each acquired license entitles you to install and use the Software on such a number of Computer s as is specified in Clauses 2 2 and 2 3 lf the Software was acquired on a physical medium You have the right to use the Software for protection of such a number of Computer s as is specified on the Software package If the Software was acquired via the Internet You have the right to use the Software for protection of such a number of Computers that was specified when You acquired the License to the Software You have the right to make a copy of the Software solely for back up purposes and only to replace the legally owned copy if such copy is lost destroyed or becomes unusable This back up copy cannot be used for other purposes and must be destroyed when you lose the right to use the Software or when Your license expires or is terminated for any other reason according to the legislation in force in the country of your principal residence or in the country where You are using the Software From the time of the Software activation or after license key file installation with the exception of a trial version of the Software You have the right to receive the following services for the defined period specified on the Software package if the Software was
98. erver side applications handle RichText content Background agents of the secondary setup server refer to the primary setup server database Sending console commands to any server using a common Control center replica Not required Not required Background agents use run commands with the server file system create directories view directory contents call external server side applications handle RichText content Server background agents refer to database of any other server using a common Control center replica MANAGING USER PERMISSIONS Automatically rebooting the Domino server before deleting service data Not required Not required Background agents use run commands with the server file system create directories view directory contents call external server side applications handle RichText content The agent refers to the Installing Kaspersky Anti Virus database of the secondary setup server and to the Control center database of the primary setup server User permissions are managed at the ACL level of the Kaspersky Anti Virus databases and at the level of individual documents profile settings and server settings Permissions at the ACL level are granted through functional groups Permissions set at the document level are granted through functional roles see section Managing permissions at the level of profile and server settings on page 25 IN THIS SECTION Managing permissi
99. es default path C Program Files IBM Lotus Domino e For Linux operating systems in the Domino server s data directory default path local notesdata e The directory containing the Kaspersky Anti Virus databases is specified by the user during installation see section Step 3 Configuring installation settings on page 37 The directory is located at the following address e Under Microsoft Windows in the Domino server s directory of data files default path C Program Files IBM Lotus Domino Data e For Linux operating systems in the Domino server s data directory default path local notesdata DEPLOYING THE APPLICATION The following databases are created in the directory containing the Kaspersky Anti Virus databases e kavsetuplog nsf Setup log e kavcontrolcenter nsf Control center e kaveventslog nsf Worklog and statistics e kavquarantine nsf Quarantine e kavhelp nsf Help e kavlocale nsf Kaspersky Anti Virus service database MODIFYING THE DOMINO CONFIGURATION FILE As a result of installing the application the following modifications are made to the Domino configuration file notes ini e the name of the KAVControl task is added to the ServerTasks variable so that the tasks is automatically launched on rebooting the Domino server e the line kavmailhook Windows or lt full path to Domino data directory gt libnkavmailhook so Linux the names of the libraries that trap documents is added t
100. events registered during installation are recorded in the setup log kavsetuplog nsf and the Domino server log output to the server console and displayed onscreen as messages DEPLOYING THE APPLICATION On completion of the final automatic installation stage Generating environment variables the License activation and Restart server buttons are displayed under the list of stages see figure below Kaspersky Anti Virus 8 0 for Lotus Domino WA PE D KY System information a Operating system Windows 2003 5 2 Intel Pentium Domain Test Server name TestServer 1 Orgal Server version Release 8 0 1 Path to installation database KAV Installer nsf Server data directory C Program Files IBM Lotus Domino data Server installation directory C Program Files IBM Lotus Domino Deployment settings Primary setup Store quarantine objects in all replicas Security Managed servers LocalDomainservers Security administrators LocalDomainAdmins Control center administrators LocalbomainAdmins Administrators with limited privileges LocalbomainAdmins Kaspersky Anti Virus installation directories Databases directory C Program Files IBM Lotus Domino data kavdatabase S Service files directory kavcommon License activation Restart server Checking installation settings d Creating databases d Building configuration d Copying service files d Generating environment variables d The installation has completed successfully A E DEE
101. f though there may be fees involved in handling the item It also means that recipients of the item may redistribute it under the same conditions they received it 1 You may make and give away verbatim copies of the source form of the Standard Version of this Package without restriction provided that you duplicate all of the original copyright notices and associated disclaimers 2 You may apply bug fixes portability fixes and other modifications derived from the Public Domain or from the Copyright Holder A Package modified in such a way shall still be considered the Standard Version 3 You may otherwise modify your copy of this Package in any way provided that you insert a prominent notice in each changed file stating how and when you changed that file and provided that you do at least ONE of the following a place your modifications in the Public Domain or otherwise make them Freely Available such as by posting said modifications to Usenet or an equivalent medium or placing the modifications on a major archive site such as uunet uu net or by allowing the Copyright Holder to include your modifications in the Standard Version of the Package b use the modified Package only within your corporation or organization c rename any non standard executables so the names do not conflict with standard executables which must also be provided and provide a separate manual page for each non standard executable that clearly documents how it differs
102. for warranty support indemnity or liability obligations to one or more recipients of Covered Code However You may do so only on Your own behalf and not on behalf of the Initial Developer or any Contributor You must make it absolutely clear than any such warranty support indemnity or liability obligation is offered by You alone and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty support indemnity or liability terms You offer INFORMATION ABOUT THIRD PARTY SOFTWARE 3 6 Distribution of Executable Versions You may distribute Covered Code in Executable form only if the requirements of Sections 3 1 3 2 3 3 3 4 and 3 5 have been met for that Covered Code and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License including a description of how and where You have fulfilled the obligations of Section 3 2 The notice must be conspicuously included in any notice in an Executable version related documentation or collateral in which You describe recipients rights relating to the Covered Code You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice which may contain terms different from this License provided that You are in compliance with the terms of this License and that the license for the Execut
103. g IMPLEMENTATION GUIDE If you add terms to a covered work in accord with this section you must place in the relevant source files a statement of the additional terms that apply to those files or a notice indicating where to find the applicable terms Additional terms permissive or non permissive may be stated in the form of a separately written license or stated as exceptions the above requirements apply either way 8 Termination You may not propagate or modify a covered work except as expressly provided under this License Any attempt otherwise to propagate or modify it is void and will automatically terminate your rights under this License including any patent licenses granted under the third paragraph of section 11 However if you cease all violation of this License then your license from a particular copyright holder is reinstated a provisionally unless and until the copyright holder explicitly and finally terminates your license and b permanently if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation Moreover your license from a particular copyright holder is reinstated permanenily if the copyright holder notifies you of the violation by some reasonable means this is the first time you have received notice of violation of this License for any work from that copyright holder and you cure the violation prior to 30 days after your receipt of th
104. ght C 1989 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The license agreements of most software companies try to keep users at the mercy of those companies By contrast our General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users The General Public License applies to the Free Software Foundation s software and to any other program whose authors commit to using it You can use it for your programs too When we speak of free software we are referring to freedom not price Specifically the General Public License is designed to make sure that you have the freedom to give away or sell copies of free software that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things INFORMATION ABOUT THIRD PARTY SOFTWARE To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of a such a program whether gratis or for a fee you must give the
105. grams The databases also contain descriptions of potentially dangerous software lt is extremely important to keep anti virus databases up to date because new threats appear every day The anti virus databases on Kaspersky Lab s servers are updated every hour We recommend that you update the application s anti virus databases just as frequently IMPLEMENTATION GUIDE e Managing Kaspersky Anti Virus installed on several servers using profiles e Access to Kaspersky Anti Virus settings and control is restricted at the server and profile levels e Managing Kaspersky Anti Virus through the Lotus Notes client Domino console server and web browser e The application can be installed or deleted through the Lotus Notes client or web browser HARDWARE AND SOFTWARE REQUIREMENTS To function properly Kaspersky Anti Virus has the following minimum requirements Hardware requirements e Intel Pentium 32 bit 64 bit or higher or equivalent e 512 MB of RAM 1GB or more recommended e 1 GB of free space on the hard drive 3 GB or more recommended e Recommended size of swap file twice as large as the physical memory Software requirements Supported operating systems 32 bit platforms e Microsoft Windows 2000 Server Service Pack 4 or higher e Microsoft Windows 2000 Advanced Server Service Pack 4 or higher e Microsoft Windows Server 2003 Standard Edition Service Pack 2 e Microsoft Windows Server 2003 Enterprise Edition
106. he United Nations Convention on Contracts for the International Sale of Goods is expressly INFORMATION ABOUT THIRD PARTY SOFTWARE excluded Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License 12 Responsibility for claims As between Initial Developer and the Contributors each party is responsible for claims and damages arising directly or indirectly out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis Nothing herein is intended or shall be deemed to constitute any admission of liability 13 Multiple licensed code Initial Developer may designate portions of the Covered Code as Multiple Licensed Multiple Licensed means that the Initial Developer permits you to utilize portions of the Covered Code under Your choice of the MPL or the alternative licenses if any specified by the Initial Developer in the file described in Exhibit A Exhibit A Mozilla Public License The contents of this file are subject to the Mozilla Public License Version 1 1 the License you may not use this file except in compliance with the License You may obtain a copy of the License at http www mozilla org MPL Software distributed under the License is distributed on an AS IS basis WITHOUT WARRANTY OF ANY KIND either express or implie
107. he recipient automatically receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License 7 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances IMPLEMENTATION GUIDE It is not the purpose of this section to induce you to infringe any patents or other pr
108. his Lesser General Public License also called this License Each licensee is addressed as you A library means a collection of software functions and or data prepared so as to be conveniently linked with application programs which use some of those functions and data to form executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it For a library complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running a program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library doe
109. hsPedayadentiaedaeaudetapiendonsasdedeuatuass 47 Deleting from the last server in a distributed deployment scheme oocccccccnocccnnccnnnccnncononnnnncnnnnnnnnnononnnnnnnnnanennos 48 Deleting from a server in a distributed deployment SCNEME ccccccecceeeeeeeeeeeeeeaaeseeeeeeeeeaauaneeeeeeeeeeaaeeeeeees 49 CONTACTING TECHNICAL SUPPORT ccccccccccceeeeeeceeeeeesseeeeeeeeeeeeeeeeeeeaaaaaeesaeeeeeeeeeeeeeeseeseaaaaaaeseeeeeeeeeseeeeeseeaaas 50 LO EE 51 KASPERSKIY LAB E 52 INFORMATION ABOUT THIRD PARTY GOETIWARE nenn 53 EE 59 BOO AP eee eee ree eee ae ae eee ee 53 ye ee 53 EIER ER E 53 A A PA 62 MP e A 63 EZMA SONAS EE 63 IFEN E E aro ooo 63 PORE T DE 65 RFC1321 BASED RSA FREE MDS LIBRARY secoctcnica econo 66 ZN MN EE 66 ES SIO ONT IOO rss aerea 66 AUTO CONF A 66 AUTOMAKE EE 66 AWE a T e E E o TO o cae ca aoe ewe ee tmreeee eeeees 66 Ee E 67 q e 67 q e 67 co E E A res pte EEE neater shee EE A EAE EAE A 67 ELE e E 67 ONU MAKE EE 68 GREER EE 68 D AE 68 e ER BE 70 nn n 70 GNU GENERAL PUBLIC LICENSE ooooccocccnnnccccccccccccocccocccoccnonnnoconnnnnnococnnonnnnnnnnnnnccnncnnnnnnonnnnnncncnnnnnncannnenenennss 70 ADDITIONAL SOURCES OF INFORMATION ABOUT THE APPLICATION If you have any questions related to purchasing installing or using Kaspersky Anti Virus 8 0 answers are available from a variety of different sources You can choose the most suitable source of information depending o
110. ich applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 INNO EVENT UNLESS REQUIRED BY APPLICABLE L
111. in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this function must be optional if the application does not supply it the square root function must still compute square roots These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Library and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Library the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work base
112. inary skill to be able to understand it 5 Application of this License This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code 6 Versions of the License 6 1 New Versions Netscape Communications Corporation Netscape may publish revised and or new versions of the License from time to time Each version will be given a distinguishing version number 6 2 Effect of New Versions Once Covered Code has been published under a particular version of the License You may always continue to use it under the terms of that version You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License 6 3 Derivative Works If You create or use a modified version of this License which you may only do in order to apply it to code which is not already Covered Code governed by this License You must a rename Your license so that the phrases Mozilla MOZILLAPL MOZPL Netscape MPL NPL or any confusingly similar phrase do not appear in your license except to note that your license differs from this License and b otherwise make it clear that Your version of the license contains terms which differ from the Mozilla Public License and Netscape Public License Filling in the name of the Initial Dev
113. is Any addition to or deletion from the contents of a file containing Original Code or previous Modifications Any new file that contains any part of the Original Code or previous Modifications 1 10 Original Code means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code and which at the time of its release under this License is not already Covered Code governed by this License INFORMATION ABOUT THIRD PARTY SOFTWARE 1 10 1 Patent Claims means any patent claim s now owned or hereafter acquired including without limitation method process and apparatus claims in any patent Licensable by grantor 1 11 Source Code means the preferred form of the Covered Code for making modifications to it including all modules it contains plus any associated interface definition files scripts used to control compilation and installation of an Executable or source code differential comparisons against either the Original Code or another well Known available Covered Code of the Contributor s choice The Source Code can be in a compressed or archival form provided the appropriate decompression or de archiving software is widely available for no charge 1 12 You or Your means an individual or a legal entity exercising rights under and complying with all of the terms of this License or a future version of this License issued under Section 6 1 For legal ent
114. ities You includes any entity which controls is controlled by or is under common control with You For purposes of this definition control means a the power direct or indirect to cause the direction or management of such entity whether by contract or otherwise or b ownership of more than fifty percent 50 of the outstanding shares or beneficial ownership of such entity 2 Source Code License 2 1 The Initial Developer Grant The Initial Developer hereby grants You a world wide royalty free non exclusive license subject to third party intellectual property claims under intellectual property rights other than patent or trademark Licensable by Initial Developer to use reproduce modify display perform sublicense and distribute the Original Code or portions thereof with or without Modifications and or as part of a Larger Work and under Patents Claims infringed by the making using or selling of Original Code to make have made use practice sell and offer for sale and or otherwise dispose of the Original Code or portions thereof the licenses granted in this Section 2 1 a and b are effective on the date Initial Developer first distributes Original Code under the terms of this License Notwithstanding Section 2 1 b above no patent license is granted 1 for code that You delete from the Original Code 2 separate from the Original Code or 3 for infringements caused by i the modification of the Original
115. l and others Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 1 of the License The Artistic License Preamble The intent of this document is to state the conditions under which a Package may be copied such that the Copyright Holder maintains some semblance of artistic control over the development of the package while giving the users of the package the right to use and distribute the Package in a more or less Customary fashion plus the right to make reasonable modifications Definitions Package refers to the collection of files distributed by the Copyright Holder and derivatives of that collection of files created through textual modification Standard Version refers to such a Package if it has not been modified or has been modified in accordance with the wishes of the Copyright Holder as specified below Copyright Holder is whoever is named in the copyright or copyrights for the package You is you if you re thinking about copying or distributing this Package INFORMATION ABOUT THIRD PARTY SOFTWARE Reasonable copying fee is whatever you can justify on the basis of media cost duplication charges time of people involved and so on You will not be required to justify it to the Copyright Holder but only to the computing community at large as a market that must bear the fee Freely Available means that no fee is charged for the item itsel
116. le automatically wnen Kaspersky Anti Virus is installed on them Server documents are deleted from the profile automatically when the application is deleted Only protected Kaspersky Anti Virus servers are included in the profile You can create and delete profiles Servers with Kaspersky Anti Virus installed on them can be moved from one profile to another APPLICATION ARCHITECTURE You can use profiles to set the Kaspersky Anti Virus settings for a group of servers for example based on their geographical location functions or other factors This makes it easier to manage the application if it is installed on several servers and allows the anti virus security status on all computers to be controlled centrally You can also use profiles to create a protection system with various levels of security for example for mail servers or database servers To do this you can create several profiles with different settings To assign a specified security level to a server or group of servers simply move the servers to the profile with the required settings You can use server settings to configure individual values corresponding to the functions of the server in the organization s network For example the server settings can be used to configure a centralized scheme to update anti virus databases All information about the Kaspersky Anti Virus settings is stored in the Control center database kavcontrolcenter nsf The Control center databas
117. les 3 Generating environment variables E LN EE gt Figure 4 Primary setup settings 2 Inthe Deployment settings field check the Store quarantine objects in all replicas check box e lfthis check box is checked the Quarantine database will store all objects from its own server and all other servers included in the distributed configuration The system information displays the Store quarantine objects in all replicas value e If this check box is not checked all replicas of the Quarantine database will store only objects from their own servers The system information displays the Quarantine replicas contain only objects from their server value 3 Inthe Managed servers field specify the group of servers on which Kaspersky Anti Virus is to be installed You can specify the names of groups of servers or the names of individual servers To simplify the procedure for managing permissions it is recommended that you use groups see section Creating groups of installation servers in the Address book on page 31 Select a group of servers from the Address book of the Domino server by clicking the button to the right of the input field or enter the name of the group manually You can specify one or more groups in each field The default value in the Managed servers field is the LocalDomainServers group DEPLOYING THE APPLICATION 4 Inthe Security administrators Control center administrators and Administrators with limited
118. lient are adjusted see section Configuring security settings for the Lotus Notes client on page 33 IN THIS SECTION Deleting from the last server in a distributed deployment scheme ooocccccccnncccncccnoccnnnonnnnnnnnnonancnnnnnnnnnnnnnnnnncnnnnnnnrnnnnnnnnos 48 Deleting from a server in a distributed deployment scheme oooocccccccccnnnnnnnononcncncnnnnnnncnnnnnnnnnnnnnnnnnrrnnnnnnnnnnnnnnnnnnnnnnnnnnnnnns 49 DELETING FROM THE LAST SERVER IN A DISTRIBUTED DEPLOYMENT SCHEME To delete Kaspersky Anti Virus from the last server in a distributed deployment scheme do the following 1 Open the installation database through the Lotus Notes client or web browser see section Step 1 Starting the installation on page 35 This opens a window for deleting the application see figure below The deletion window displays system information the list of deletion stages and the Delete button Kaspersky Anti Virus 8 0 for Lotus Domino System information Operating system Windows 2003 5 2 Intel Pentium Domain Test Server name Testserver 1 Orgal Server version Release 8 0 1 Path to installation database KAV Installer nsf Server data directory C Program Files IBM Lotus Domino data Server installation directory C Program Files IBM Lotus Domino Pr A AAA AS Kaspersky Anti Virus installation directories Databases directory C Program Files IBM Lotus Domino data kavdatabase S Service files directory kavcommon
119. luded in the Security administrators group have the maximum number of permissions in Kaspersky Anti Virus and can perform the following actions e Managing permissions at the ACL level of the Kaspersky Anti Virus databases IMPLEMENTATION GUIDE e Creating and deleting profiles e Editing the settings of all profiles and servers e Deleting records from Quarantine and Worklog and statistics databases Users included in the Control center administrators group can perform the following actions in Kaspersky Anti Virus e Creating and deleting profiles e Editing the settings of all profiles and servers e Deleting records from the Quarantine and Worklog and statistics databases By default users included in the Administrators with limited privileges group do not have the right to edit profile and server settings or to delete records from the Quarantine and Worklog and statistics databases Users are granted the rights needed to use the application through functional roles see section Managing permissions at the level of profile and server settings on page 25 Users in all three functional groups have the right to view records in the Quarantine Worklog and statistics and Help databases GRANTING FUNCTIONAL GROUP PERMISSIONS TO USERS When installing Kaspersky Anti Virus the administrator can include both individual Domino users and user groups in the three functional groups To simplify the procedure for granting permissions it is recom
120. m information Operating system Windows 2003 5 2 Intel Pentium Domain Test Server name TestServer 1 Orgal Server version Release 8 0 1 Path to installation database KA Installer nsf Server data directory C Program Files IBM Lotus Domino data Server installation directory C Program Files IBM Lotus Domino Deployment settings KR Primary setup KR Store quarantine objects in all replicas Security Managed servers LocalDomainServers am Security administrators LocalDomainAdmins as Control center administrators LocalDomainAdmins as Administrators with limited privileges LocalDomainAdmins as Kaspersky Anti Virus installation directories Databases directory C Program Files IBM Lotus Domino data kavdatabases Service files directory kavcommon lt lt Exit Next gt gt Checking installation settings Creating databases Building configuration Copying service files Generating environment variables Figure 3 Kaspersky Anti Virus installation window The Next button is used to launch the automatic installation steps STEP 3 CONFIGURING INSTALLATION SETTINGS Configure the installation settings The sequence of actions is different for primary setup see section Primary setup configuring settings on page 38 and installation on an additional server see section Installation on an additional server setup on page 39 The primary setup sequence is the default option IN THIS SECT
121. m the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this License IMPLEMENTATION GUIDE However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros and small inline functions ten lines or less in length then the use of the object file is unrestricted regardless of whether it
122. mary setup the kavsetuplog nsf setup log is created in the directory containing the Kaspersky Anti Virus databases see section Performing automatic stages for primary setup on page 41 The log records information about events registered during installation of the application including errors Information about errors is additionally recorded in the Domino server log output to the server console and displayed as messages in a separate window There follows a detailed description of each step for installing Kaspersky Anti Virus IN THIS SECTION ss e EEE a EEEE E E er iaa 35 Step 2 Accepting the License Agreement 36 Step 3 Configuring installation seitmgs 37 Step 4 Launching and performing automatic installation steps 40 Step 5 Activating th ICONS tios 43 Step 6 Finishing the installation EE 44 STEP 1 STARTING THE INSTALLATION Before starting the installation make sure that your account has all the necessary permissions see section Setting permissions for the user performing the installation on page 30 User authorization is required for installation via the web browser as for the Lotus Notes client Installation is not possible if authorization is disabled To begin installing Kaspersky Anti Virus do one of the following e Open your browser and enter the following address in the Address bar http lt server name gt lt path to installation database gt 0OpenDatabase where e lt server name gt is the name or
123. me Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of the license which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of the license you may choose any version ever published by the Free Software Foundation 8 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 9 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTIC
124. me siccccsiesccnacccsuscugxsnessenndensnaavinsocsadampidssndeaediequssawsantvinsessneasnWsahounsiddmedstawsaueniesessacasibaskenmeesiancdeuiake 26 Isolated deployment scheme E 27 DISTRIBUTED DEPLOYMENT SCHEME The distributed deployment scheme in Kaspersky Anti Virus includes the following stages 1 Preparing for installation Before installing Kaspersky Anti Virus do the following e Delete any previous version of Kaspersky Anti Virus and other anti virus programs for Lotus Notes Domino from each server on which the application will be installed see section Deleting the previous version of Kaspersky Anti Virus and other anti virus programs for Lotus Notes Domino on page 30 e Set permissions for the user performing the installation see section Setting permissions for the user performing the installation on page 30 e Inthe Address book of the primary setup server create a group of servers on which Kaspersky Anti Virus is to be installed see section Creating a group of installation servers in the Address book on page 31 TYPICAL DEPLOYMENT SCHEMES e Set permissions for each server on which the application will be installed see section Setting server permissions on page 31 e Inthe Address book of the server create a group of Domino users to be granted permissions to use the application see section Creating a group of users for granting permissions on page 32 e Move the installation database to the data directo
125. mended that you include in the functional groups not individual users but groups created in the Address book of the Domino server see section Creating a group of users for granting permissions on page 32 During installation these groups are included in the ACL of the Kaspersky Anti Virus databases and are assigned functional group permissions see section Functional group permissions on page 2323 The Domino server administrator can subsequently grant permissions to users or restrict them by modifying the groups in the Address Book including or excluding users If during installation of the application only individual users not user groups are included in the functional groups the ACL of all the Kaspersky Anti Virus databases will need to be edited manually to manage the permissions To deny a user functional group permissions the user account must be deleted from the ACL of all the Kaspersky Anti Virus databases To grant a user functional group permissions the user account must be included in the ACL of all databases The ACL of the Kaspersky Anti Virus databases can only be modified by users with permissions belonging to the Security administrators functional group It is recommended that user accounts in the ACL of the Kaspersky Anti Virus databases be included in the group SW To grant a user functional group permissions 1 Create in the Address book of the Domino server a group with a unique name for example ControlCenterAdmins
126. ment but changing it is not allowed This is the first released version of the Lesser GPL It also counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it You can use it too but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case based on the explanations below When we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These re
127. ment or that patent license was granted prior to 28 March 2007 Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law 12 No Surrender of Others Freedom If conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not convey it at all For example if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program 13 Use with the GNU Affero General Public License Notwithstanding any other provision of this License you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work and to convey the resulting work The terms of this License will continue to apply to the part which is the covered work but the special requirements of the GNU Affero General Public License section 13 concerning interaction through a network will apply to the combin
128. ment scheme Kaspersky Anti Virus is installed on several Domino servers and all installed copies of Kaspersky Anti Virus represent a single distributed system If the network contains several Domino servers or a cluster of servers it is recommended that Kaspersky Anti Virus be installed on each server and use a distributed deployment scheme Server partitioning is not supported Kaspersky Anti Virus is installed for each server separately If Kaspersky Anti Virus uses a distributed deployment scheme see section Distributed deployment scheme on page 26 an Primary setup is carried out first The server on which the application is first installed is called the primary setup server Kaspersky Anti Virus is then installed on the additional servers The Kaspersky Anti Virus databases are created on the primary setup server The configuration and databases are subsequently replicated on the additional servers During installation of each consecutive additional server any of the servers on which Kaspersky Anti Virus is already installed can be selected as the primary setup server If the Domino network uses a star topology for replications it is recommended that the central hub server be selected as the primary setup server If an isolated deployment scheme is used primary setup of Kaspersky Anti Virus is carried out on each Domino server see section Isolated deployment scheme on page 27 IN THIS SECTION Distributed deployment sche
129. n Test Server name Testserver 1 Orgal Server version Release 8 0 1 Path to installation database KAWInstaller msf Server data directory C Program Files IBMiLotusiDominoidata Server installation directory C Program Files IBMiLotusiDomino Deployment settings T Primary setup Primary setup server Ae Databases directory for primary setup server kavdatabases LocalDomainServers ei LocalDomainAdming reat LocalDomainAdmins as LocalDomainAdmins as Kaspersky Anti Virus installation directories Databases directory C Program Files IBM Lotus Domino data kavdatabases Service files directory kavcommon lt lt Exit Next gt gt Checking installation settings Building configuration Creating databases Copying service files Generating environment variables Figure 5 Settings of installation on an additional server 2 Inthe Primary setup server field specify the server on which the application is already installed The Kaspersky Anti Virus databases will be replicated from this server onto the additional server Select a server IMPLEMENTATION GUIDE from the Address book of the Domino server by clicking the button 1 to the right of the input field or enter the name of the server manually 3 Inthe Databases directory for primary setup server field enter the path to the Lotus Notes databases for Kaspersky Anti Virus on the primary setup server The path is specified relative to th
130. n a country or your recipient s use of the covered work in a country would infringe one or more identifiable patents in that country that you have reason to believe are valid If pursuant to or in connection with a single transaction or arrangement you convey or propagate by procuring conveyance of a covered work and grant a patent license to some of the parties receiving the covered work authorizing them to use propagate modify or convey a specific copy of the covered work then the patent license you grant is automatically extended to all recipients of the covered work and works based on it A patent license is discriminatory if it does not include within the scope of its coverage prohibits the exercise of or is conditioned on the non exercise of one or more of the rights that are specifically granted under this License You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software under which you make payment to the third party based on the extent of your activity of conveying the work and under which the third party grants to any of the parties who would receive the covered work from you a discriminatory patent license a in connection with copies of the covered work conveyed by you or copies made from those copies or b primarily for and in connection with specific products or compilations that contain the covered work unless you entered into that arrange
131. n the importance and urgency of your inquiry IN THIS SECTION Sources of information to research ON vour OWN ccseeeeeccccecceeeeeeeceeeeeceeeeeeeceeeeseaesseeeeeeeseeeeeeeeeeseseeaeeeeeeeesseaeegeseeeeeeeaas 11 Contacting the Sales Department 12 Contact the Technical Documentation Development Team 12 Discussing Kaspersky Lab applications on the web forum 12 SOURCES OF INFORMATION TO RESEARCH ON YOUR OWN You can refer to the following sources of information about the application e Application page on the Kaspersky Lab website e Application page on the Technical Support website in the Knowledge Base e Help system e Documentation Page on the Kaspersky Lab website http www kaspersky com anti virus lotus domino This page contains general information about Kaspersky Anti Virus its features and specifics of working with it You can purchase Kaspersky Anti Virus or extend your license at the online store Application page at the Technical Support website Knowledge Base http support kaspersky com lotus On this page you can find articles created by Technical Support specialists These articles contain useful information recommendations and answers to frequently asked questions FAQ related to purchasing installing and using Kaspersky Anti Virus They are grouped by topic for example Working with key files Updating databases or Troubleshooting The articles may contain answers to questions related not only t
132. nd routed email on the Domino server The text of messages file attachments and embedded OLE objects are scanned for threats Kaspersky Anti Virus detects all malware objects inside attached archives and packed exe files except those protected by passwords e Documents modified after replication are scanned Documents on the protected server that are modified as a result of replication are scanned for threats Outgoing replications are not scanned Fields in Rich Text format attached files and embedded OLE objects in documents are scanned for threats e Scanning of databases on the protected Domino server are performed according to a schedule or on demand Fields in Rich Text format attached files and embedded OLE objects in documents are scanned for threats e Objects are filtered by size and name mask when email messages replications and databases are scanned Filtered objects are processed according to rules set by the administrator e Processing of objects that are infected potentially infected and not scanned which are detected when email messages replicated documents and database documents are scanned Depending on the values of the protection scan settings Kaspersky Anti Virus disinfects deletes or skips the object notifies administrators of detected threats and processing results and saves statistical information e Senders and recipients of messages as well as administrators are notified of infected potentially infected
133. ng you will have to enter the activation code or the name of your license key file Technical Support will respond to your request in your Personal Cabinet httos support kaspersky com en PersonalCabinet and by the email you have specified in your request Describe the problem you have encountered in the request web form providing as much detail as possible Specify the following in the mandatory fields e Request type Select the subject that corresponds to the problem the most strictly for example Problem with product installation uninstallation or Problem with searching eliminating viruses If you have not found an appropriate topic select General Question e Application name and version number e Request text Describe the problem in as much detail as possible e Customer ID and password Enter the client number and the password you have received during the registration at the Technical Support website e Email address Technical Support will send an answer to your question to this email address Technical Support by phone If you have an urgent problem you can call your local Technical Support Before contacting Technical Support http support kaspersky com support international collect all information http support kaspersky com support details about your computer and the anti virus software installed on it This will allow our specialists help you more quickly GLOSSARY A ARCHIVE A file containing one o
134. ngs are checked see section Installation on an additional server setup on page 39 2 Configuration At this stage information about the new server is added to the Control center database located on the primary setup server The new server is added to same profile as the primary setup server DEPLOYING THE APPLICATION 3 Creating databases At this stage replicas of the Kaspersky Anti Virus databases created during the primary setup are made on the additional server e Setup log kavsetuplog nsf e Control center kavcontrolcenter nsf e Worklog and statistics kaveventslog nsf e Quarantine kavquarantine nsf e Help kavhelp nsf e Service database kavlocale nsf Make sure that database replicas have been created on the additional server and completed entirely If they have not create database replicas again on the additional server Only after that when the automatic stages of the procedure are completed you can start rebooting the server 4 Copying service files At this stage the libraries executable files and initial set of anti virus databases are built up 5 Generating environment variables At this stage the paths to the Lotus Notes databases for Kaspersky Anti Virus are automatically configured On completion of the step the message Installation successfully completed is displayed in the lower part of the setup window On completion of this step you can click the License activation button t
135. nning settings A copy of an object can be saved in the Quarantine database before it is processed Information about actions performed can be stored in the Worklog and statistics database Kaspersky Anti Virus can notify administrators and the senders and recipients of email messages mail protection about detected objects and actions taken MANAGING KASPERSKY ANTI VIRUS SETTINGS Kaspersky Anti Virus is managed by using the profile and server settings Profile is defined by the general settings for the group of servers in the profile The profile mechanism provides centralized control of the Kaspersky Anti Virus settings A profile can include one or more servers If Kaspersky Anti Virus uses an isolated deployment scheme see page 26 the profile contains only one server Profiles can be used to configure all application settings except the server license and Quarantine storage period These two settings are only for an individual server and are defined in the server settings In addition some server settings can be redefined by the profile This possibility allows values to be set for an individual server that correspond to the role of the server in the anti virus protection system and that differ from the values set in the profile Among such server settings for example are update settings settings for saving information about events logged by Kaspersky Anti Virus and statistical information Server documents are added to the profi
136. nnnononononnononnnnnnnnnnnnnnnnnonononnnnnnnnnnnnnnns 13 HARDWARE AND SOFTWARE REQUIREMENTS cccccccccccccccssssssseeeeecceeeceeeeeeseeeeeeeessseeeeeeeeeeeeessssseaaaasaeeeeeeeeeeess 15 APPLICATION gel enn RT 16 Anti Virus server protection scheme cccscsssecccsssssetecnsansetccssansetecssassetecssausetecssaueensessausensessausetsessansensensanseteeneans 17 Application operation scheme AEN 18 Anti virus scanning algorithm E 18 Attachment filtering algorit esiseina ne aia E aE naaie 19 Processing objects and actions performed ON em 20 Managing Kaspersky Anti Virus settmgs annene nnn 20 Configuring the Domino server security seiimges 22 Managing user permissions EE 22 Managing permissions at the ACL level of the Kaspersky Anti Virus daiabases 23 Managing permissions at the level of profile and server settings cccconncncccnnnnononnnnonanonononcnnonnnnnnnnanononanonos 25 TYPICAL DEPLOYMENT SCHEMES geg 26 Distributed deployment scheme ttt trtt rA EAEEEEEOAEEEEEEEEOAEEEEEEEEEEAEEEEEEEESEE EEE EEEE EEEE EEEE 26 Isolated deployment scheme A 27 DEPLOYING THEAPPOCA TIO No tratada 29 FO Abd IO e EE 29 Deleting the previous version of Kaspersky Anti Virus and other anti virus programs for Lotus Notes Domino30 Settings permissions for the user performing the installation cooccconnonnnccnnncccnnnnnnnnnnnnnnnnnnannnnnnnnnonananennnnos 30 Creating a group of installation servers in the Address book oooccccccccccconccoc
137. o Kaspersky Anti Virus but to other Kaspersky Lab products as well and may contain general Technical Support news IMPLEMENTATION GUIDE Help system Help contains information about how to manage server protection how to view protection status information configure component protection enable and disable protection components start a scan of the server database and update anti virus databases manually To open Help click the Help tab in the Control center window of databases Documentation The Kaspersky Anti Virus documentation package contains nearly all information necessary for working with the application It consists of the following documents e The Administrator s Guide contains information about how to use the application configure it and manage the protection of one server or a group of servers through a Lotus Notes client The guide also tells you about the application s web interface and the Domino server console e The Implementation Guide allows administrators to plan for deployment of the application on a network and contains practical recommendations on how to install set up or delete the application on one server or on all protected servers in the network CONTACTING THE SALES DEPARTMENT If you have questions about selecting or purchasing the Kaspersky Anti Virus or extending your license please phone the Sales Department in our Moscow Central Office at 7 495 797 87 00 7 495 645 79 39 7 495
138. o endorse or promote products derived from this software without specific prior written permission 10 THIS PACKAGE IS PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE SED 4 1 5 Copyright C 1989 1990 1991 1992 1993 1994 1995 1998 1999 2002 2003 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License OTHER INFORMATION Additional information about third party code Agava C program library developed by OOO R Alpha is used to check digital signature The Software may include some software programs that are licensed or sublicensed to the user under the GNU General Public License GPL or other similar free software licenses which among other rights permit the user to copy modify and redistribute certain programs or portions thereof and have access to the source code Open Source Software If such licenses require that for any software which is distributed to someone in an executable binary format that the source code also be made available to those users then the source code should be made available by sending the request to source kaspersky com or the source code is supplied with the Software GNU GENERAL PUBLIC LICENSE GNU GENERAL PUBLIC LICENSE Version 1 February 1989 Copyri
139. o move to the Activating the license step see section Step 5 Activating the license on page 43 or the Restart server button to move to the Finishing the installation step without activating the license see section Step 6 Finishing the installation on page 44 STEP 5 ACTIVATING THE LICENSE The key file must be accessible via the file system of the client computer from which the installation database was opened mw To activate the license do the following 1 Click the License activation button in the installation window This opens a window to select the key file 2 Select the key file and click the Open button As a result the license is automatically activated and a message appears onscreen to report its successful activation If during installation of the application the key file is not available you can skip this step and activate the license later see details in the Administrator s Guide Close the window and continue to the next step The key file can also be installed via the interface of the Domino server console see details in the Administrator s Guide IMPLEMENTATION GUIDE STEP 6 FINISHING THE INSTALLATION The Domino server needs to be rebooted to complete the installation To do this use the Restart server button If the installation is on an additional server before rebooting the server make sure that the Kaspersky Anti Virus databases have been successfully replicated The Restart server butt
140. o the EXTMGR_ADDINS variable e the EDITEXP1 variable is assigned the value ASCII Text 2 XTEXT C H PRN RIP TXT UNKNOWN 1 which converts RichText fields for further scan e the KAVDatabasesPath variable is created which specifies the path to the Kaspersky Anti Virus databases MODIFYING THE LIST OF PROCESSES As a result of installing Kaspersky Anti Virus the list of processes displays the following processes e KAVControl control module e KAVMonitor mail and replication scanning module e KAVScanner database scanning module PREPARING FOR OPERATION Kaspersky Anti Virus starts automatically when the Domino server is started Anti Virus protection starts after Kaspersky Anti Virus is installed and the server is loaded The list of loaded processes includes the KAVControl KAVMonitor and KAVScanner modules When the application is first launched an attempt is made to update the anti virus databases The default update settings are used for this If the network configuration differs from the default option the update will return an error The error message will be saved in the Worklog and statistics database and a notification will be sent to the administrators of the server and the profile that contains the server If the update returns an error it is recommended that you configure the update settings and perform the anti virus database update manually see details in the Administrator s Guide IMPLEMEN
141. of the License GCC 3 3 6 Copyright C 1987 1989 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License Distributed under the terms of the GNU Lesser General Public License as published by the Free Software Foundation version 2 1 of the License GCC 3 3 2 Copyright C 1999 2000 2001 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License IMPLEMENTATION GUIDE Distributed under the terms of the GNU Lesser General Public License as published by the Free Software Foundation version 2 1 of the License GNU MAKE 3 81 Copyright C 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License GREP 2 5 1 Copyright 1992 1997 1999 2000 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License PERL 5 8 8 Copyright C 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 Larry Wal
142. oland Romania and the USA California A new company office the European Anti Virus Research Centre has recently been established in France Kaspersky Lab s partner network includes over 500 companies worldwide Today Kaspersky Lab employs over a thousand highly qualified specialists including 10 MBA degree holders and 16 PhD degree holders All the Kaspersky Lab s senior anti virus experts are members of the Computer Anti Virus Researchers Organization CARO Our company s most valuable assets are the unique knowledge and collective expertise accumulated during fourteen years of continuous fighting against computer viruses A thorough analysis of computer virus activities enables the company s specialists to anticipate trends in the development of malware and to provide our users with timely protection against new types of attacks This advantage is the basis of Kaspersky Lab s products and services The company s products remain one step ahead of other vendors in delivering comprehensive anti virus coverage to our clients Years of hard work have made the company one of the top anti virus software developers Kaspersky Lab was the first to develop many of the modern standards for anti virus software The company s flagship product Kaspersky Anti Virus reliably protects all types of computer systems against virus attacks including workstations file servers mail systems firewalls Internet gateways and hand held computers Its easy to use man
143. omovision which makes passes at compilers written by James Hacker signature of Ty Coon 1 April 1989 Ty Coon President of Vice This General Public License does not permit incorporating your program into proprietary programs If your program is a subroutine library you may consider it more useful to permit linking proprietary applications with the library If this is what you want to do use the GNU Lesser General Public License instead of this License GNU GENERAL PUBLIC LICENSE Version 3 29 June 2007 Copyright O 2007 Free Software Foundation Inc lt http fsf org gt Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The GNU General Public License is a free copyleft license for software and other kinds of works The licenses for most software and other practical works are designed to take away your freedom to share and change the works By contrast the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program to make sure it remains free software for all its users We the Free Software Foundation use the IMPLEMENTATION GUIDE GNU General Public License for most of our software it applies also to any other work released this way by its authors You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are de
144. on is displayed in the setup window immediately on completion of the automatic installation stages at step 4 see figure below You can skip step 5 and complete the installation without activating the license On completion of step 5 the Restart server button is also displayed in the setup window see figure below ww To complete the installation of the application click the Restart server button The installation window will close The Domino server will reboot SYSTEM MODIFICATIONS AFTER INSTALLATION As a result of installing Kaspersky Anti Virus the following modifications are made to the system e files and directories are created see section Files and directories on page 44 e the Domino configuration file notes ini is modified see section Modifying the Domino configuration file on page 45 e the list of processes is modified see section Modifying the list of processes on page 45 IN THIS SECTION Files and OSOS talca co rip 44 Modifying the Domino Configuration file 45 us ls sadasascacaeiautcecdinnsenen dactcedeeausiernaeateacaenaseaieseosasddenssaeauiestcodsaaceecesnatcecsesestacteees lt d 45 FILES AND DIRECTORIES As a result of installing the application the following directories are created on the server e kavcommon the Kaspersky Anti Virus service directory The directory is located at the following address e For Microsoft Windows operating systems in the Domino server s directory of binary fil
145. onal group permissions to users FUNCTIONAL GROUP PERMISSIONS The permissions of the functional groups in the ACL of the Kaspersky Anti Virus databases are listed in the table below CONTROL CENTER DATABASE FUNCTIONAL GROUPS Manager access level with rights to create delete replicate and copy documents SECURITY ADMINISTRATORS AppAdmin role Author access level with rights to create delete replicate and copy documents CONTROL CENTER ADMINISTRATORS AppAdmin role Author access level with the right to replicate or copy documents ADMINISTRATORS WITH LIMITED PRIVILEGES WORKLOG AND STATISTICS DATABASE Manager access level with rights to create delete replicate and copy documents Author access level with rights to create delete replicate and copy documents Author access level with the right to replicate or copy documents Table 2 Functional group permissions QUARANTINE HELP DATABASE DATABASE Manager access level with rights to create delete replicate and copy documents Manager access level Author access level Reader access level with rights to create delete replicate and copy documents Author access level Reader access level with the right to replicate or copy documents After Kaspersky Anti Virus is installed users and user groups included in the functional groups are granted the permissions required to use the application Users inc
146. onnoncnonononnnonnannnnnonnnncnnnonnnnroncnnnnnos 31 Setting Server perMiSSiONS oooocccccnnnnnnccccccoooooonnnnnncnnnnnnnnnnnnnnn ona nan n RR RRE RR RR RR RR RR RR RR RR N nn RR RRRRRRRRRRRRRrnrrnrnnnnnannnnenns 31 Creating a group of users for granting Dermmissions 32 Preparing an installation database neeeennneeeeeetntneennttrrtnttenttrtttttettnrttttEAE EEEE EEEEEEEEEEEEEEEE EEEE EEE REEE EErEE 32 PO ARMING aKey TN sorse n pE EE O AEI 33 Configuring security settings for the Lotus Notes dent 33 Installing the ele e de rnnnteranEtE CEEE EEeAEEEErAEEEEE AEE EEEE Erenn Eneee 34 Step 1 Starting Me Instala EE 35 Step 2 Accepting the License Agreement 36 Step 3 Configuring installation settings cece ccccccccssseseeceeeeeeeeeeeeececeeeceeeeeceeeeeseeeeeeeeeeeeessaeaeeeeeeeesssaeeeeseeeeteas 37 Step 4 Launching and performing automatic installation steps cccoonnnnnccnnncccnnnnncnnnnncnonnnnnnnnnnnnnnnnanncnnnnnos 40 o E 43 Step 6 Finishing the WiSteall QUO E 44 System modifications after installation oooonccccnnccconoonncnnnnnononennncnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnonnnnnannnnnnnnnss 44 Files aie Ee Wee 44 Modifying the Domino configuration fie 45 Modifying the list Of processes nn nnnn nn nnnnnnnnnnnnnnneronnnrenannnrrnnnanenannns 45 IMPLEMENTATION GUIDE Propano TOP OD GIAO ME 45 Deleting Kaspersky ANti ViIrUS cuisine obadeneionaasdedetiojaetiannqacedatehsesianc
147. ons at the ACL level of the Kaspersky Anti Virus databases Managing permissions at the level of profile and server settings APPLICATION ARCHITECTURE MANAGING PERMISSIONS AT THE ACL LEVEL OF THE KASPERSKY ANTI VIRUS DATABASES To grant permissions at the ACL level of the Kaspersky Anti Virus databases the application provides three functional groups Security administrators Control center administrators and Administrators with limited privileges The composition of each functional group is defined during installation The administrator who installs the application creates the functional groups by selecting users and or user groups from the Address Book of the Domino server During installation the elements of each functional group are automatically included in the ACL of the Kaspersky Anti Virus Lotus Notes databases The ACL of the Kaspersky Anti Virus databases also includes the Default and Anonymous records and the servers on which the application is installed Servers to be included in the ACL are specified by the administrator during installation of the application see Step 3 Configuring installation settings on page 37 The servers are assigned the Manager access level with rights to create delete replicate and copy documents The No access level is set for the Default and Anonymous records in the ACL of the Kaspersky Anti Virus databases IN THIS SECTION Functional group el dag tots 6 odds 23 Granting functi
148. ons of a covered work in that User Product from a modified version of its Corresponding Source The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made If you convey an object code work under this section in or with or specifically for use in a User Product and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term regardless of how the transaction is characterized the Corresponding Source conveyed under this section must be accompanied by the Installation Information But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product for example the work has been installed in ROM The requirement to provide Installation Information does not include a requirement to continue to provide support service warranty or updates for a work that has been modified or installed by the recipient or for the User Product in which it has been modified or installed Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network Corresponding Source conveyed and Installation Information provided in accord with
149. ontributor the Initial Developer or Contributor against whom You file such action is referred to as Participant alleging that such Participant s Contributor Version directly or indirectly infringes any patent then any and all rights granted by such Participant to You under Sections 2 1 and or 2 2 of this License shall upon 60 days notice from Participant terminate prospectively unless if within 60 days after receipt of notice You either i agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of Modifications made by such Participant or ii withdraw Your litigation claim with respect to the Contributor Version against such Participant If within 60 days of notice a reasonable royalty and payment arrangement are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn the rights granted by Participant to You under Sections 2 1 and or 2 2 automatically terminate at the expiration of the 60 day notice period specified above any software hardware or device other than such Participant s Contributor Version directly or indirectly infringes any patent then any rights granted to You by such Participant under Sections 2 1 b and 2 2 b are revoked effective as of the date You first made used sold distributed or had made Modifications made by that Participant 8 3 If You assert a patent infringement claim against Participant alleging that such Participant s
150. operty right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version Is given a distinguishing version number If the Program specifies a version number of this License wh
151. opriately publish on each copy an appropriate copyright notice keep intact all notices stating that IMPLEMENTATION GUIDE this License and any non permissive terms added in accord with section 7 apply to the code keep intact all notices of the absence of any warranty and give all recipients a copy of this License along with the Program You may charge any price or no price for each copy that you convey and you may offer support or warranty protection for a fee 5 Conveying Modified Source Versions You may convey a work based on the Program or the modifications to produce it from the Program in the form of source code under the terms of section 4 provided that you also meet all of these conditions a The work must carry prominent notices stating that you modified it and giving a relevant date b The work must carry prominent notices stating that it is released under this License and any conditions added under section 7 This requirement modifies the requirement in section 4 to keep intact all notices c You must license the entire work as a whole under this License to anyone who comes into possession of a copy This License will therefore apply along with any applicable section 7 additional terms to the whole of the work and all its parts regardless of how they are packaged This License gives no permission to license the work in any other way but it does not invalidate such permission if you have separately received it
152. pany incorporated according to the laws of the Russian Federation 1 3 Computer s means hardware s including personal computers laptops workstations personal digital assistants smart phones hand held devices or other electronic devices for which the Software was designed where the Software will be installed and or used 1 4 End User You Your means individual s installing or using the Software on his or her own behalf or who is legally using a copy of the Software or if the Software is being downloaded or installed on behalf of an organization such as an employer You further means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf For purposes hereof the term organization without limitation includes any partnership limited liability company corporation association joint stock company trust joint venture labor organization unincorporated organization or governmental authority wesch wech hi 1 5 Partner s means organizations or individual s who distributes the Software based on an agreement and license with the Rightholder 1 6 Update s means all upgrades revisions patches enhancements fixes modifications copies additions or maintenance packs etc 1 7 User Manual means user manual administrator guide reference book and related explanatory or
153. pecific prior written permission IMPLEMENTATION GUIDE THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE RFC1321 BASED RSA FREE MDS LIBRARY Copyright C 1999 2002 Aladdin Enterprises ZLIB 1 2 Copyright C 1995 2005 Jean loup Gailly and Mark Adler DEVELOPMENT TOOLS Information about development tools and other means used by third party developers to create the application AUTOCONF 2 61 Copyright C 1992 1993 1994 1998 2000 2001 2002 2003 2004 2005 2006 Free Software Foundation Inc Distributed under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License AUTOMAKE 1 10 Copyright C 1994 1995 1996 1997 1998 2001 2003 Free Software Foundation Inc
154. privileges fields specify the Domino user groups to be included in the functional groups of the same name see section Creating a group of users for granting permissions on page 32 You can specify the names of user groups or the names of individual users To simplify the procedure for managing permissions it is recommended that you use groups see section Managing permissions at the ACL level of the Kaspersky Anti Virus databases on page 23 Select a group of users from the Address book of the Domino server by clicking the button to the right of the input field or enter the name of the group manually You can specify one or more groups in each field The default value of the Security administrators Control center administrators and Administrators with limited privileges is the LocalDomainAdmins group 5 Inthe Database directory field enter the path to the directory in which the Lotus Notes databases for Kaspersky Anti Virus will be installed on the server The default value of the field is the kavdatabases directory INSTALLATION ON AN ADDITIONAL SERVER SETUP To set up installation on an additional server do the following 1 Ifthe Lotus Notes client is used to perform the installation clear the Primary setup check box The fields in the setup window will be updated see figure below Kaspersky Anti Virus 8 0 for Lotus Domino K ASPE R KV System information a Operating system Windows 2003 5 2 Intel Pentium Domai
155. r several other objects that can also be archives D DATABASE UPDATES One of the functions performed by a Kaspersky Lab application that enables it to keep protection current During the update the databases are downloaded from the Kaspersky Lab update servers onto the computer and are automatically connected to the application K KEY FILE A file with the key extension that represents your personal key for work with the Kaspersky Lab application The key file is included in the product distribution kit if the product was purchased from a Kaspersky Lab distributor or sent to you by email if purchased from the eStore O OLE OBJECT An object attached to or embedded in another file The application can scan OLE objects for viruses For example if you insert a table from Microsoft Office Excel into a Microsoft Office Word document the table will be scanned as an OLE object U UPDATE SERVERS A list of HTTP and FTP servers at Kaspersky Lab from which the application copies databases and module updates to your computer KASPERSKY LAB Kaspersky Lab was founded in 1997 Today it is the leading developer of a wide range of high performance information security software products including anti virus anti spam and anti hacking systems Kaspersky Lab is an international company Headquartered in the Russian Federation the company has offices in the United Kingdom France Germany Japan the Benelux countries China P
156. r spare parts or customer support for that product model to give anyone who possesses the object code either 1 a copy of the Corresponding Source for all the software in the product that is covered by this License on a durable physical medium customarily used for software interchange for a price no more than your reasonable cost of physically performing this conveying of source or 2 access to copy the Corresponding Source from a network server at no charge c Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source This alternative is allowed only occasionally and noncommercially and only if you received the object code with such an offer in accord with subsection 6b d Convey the object code by offering access from a designated place gratis or for a charge and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge You need not require recipients to copy the Corresponding Source along with the object code If the place to copy the object code is a network server the Corresponding Source may be on a different server operated by you or a third party that supports equivalent copying facilities provided you maintain clear directions next to the object code saying where to find the Corresponding Source Regardless of what server hosts the Corresponding Source you remain obligated to ensure that it is available for as long as neede
157. recipients all the rights that you have You must make sure that they too receive or can get the source code And you must tell them their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations The precise terms and conditions for copying distribution and modification follow GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any work containing the Program or a portion of it either verbatim or with modifications Each licensee is addressed as you 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and approp
158. revious version of Kaspersky Anti Virus and other anti virus programs for Lotus Notes Domino on page 30 e Set permissions for the user performing the installation see section Setting permissions for the user performing the installation on page 30 e Inthe Address book create a group of servers on which Kaspersky Anti Virus is to be installed see section Creating a group of installation servers in the Address book on page 31 e Set permissions for each server on which the application will be installed see section Setting server permissions on page 31 e Inthe Address book of the installation servers create a group of Domino users to be granted permissions to use the application see section Creating a group of users for granting permissions on page 32 e Move the installation database to the data directory of each Domino server on which the application will be installed and sign it see section Preparing an installation database on page 32 e Configure the security settings on the workstation if the installation is performed through a Lotus Notes client see section Configuring security settings for the Lotus Notes client on page 33 2 Primary setup on a server consecutively for all servers on which Kaspersky Anti Virus is to be installed see section Primary setup configuring settings on page 38 3 Preparing for operation Before you start using Kaspersky Anti Virus do the following IMPLEMENTATION
159. riately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this General Public License and to the absence of any warranty and give any other recipients of the Program a copy of this General Public License along with the Program You may charge a fee for the physical act of transferring a copy 2 You may modify your copy or copies of the Program or any portion of it and copy and distribute such modifications under the terms of Paragraph 1 above provided that you also do the following a cause the modified files to carry prominent notices stating that you changed the files and the date of any change and b cause the whole of any work that you distribute or publish that in whole or in part contains the Program or any part thereof either with or without modifications to be licensed at no charge to all third parties under the terms of this General Public License except that you may choose to grant warranty protection to some or all third parties at your option c If the modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the simplest and most usual way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the u
160. rights and limitations under the License The Original Code is Mozilla Communicator client code released March 31 1998 The Initial Developer of the Original Code is Netscape Communications Corporation Portions created by Netscape are Copyright C 1998 1999 Netscape Communications Corporation All Rights Reserved Contributor s Alternatively the contents of this file may be used under the terms of e _ license the __ License in which case the provisions of License are applicable instead of those above If you wish to allow use of your version of this file only under the terms of the License and not to allow IMPLEMENTATION GUIDE others to use your version of this file under the NPL indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the __ License If you do not delete the provisions above a recipient may use your version of this file under either the NPL or the License INFO ZIP 5 51 Copyright C 1990 2007 Info ZIP Info ZIP license This is version 2007 Mar 4 of the Info ZIP license The definitive version of this document should be available at ftp ftp info Zip org pub infozip license html indefinitely and a copy at http www info zip org pub infozip license html Copyright c 1990 2007 Info ZIP All rights reserved For the purposes of this copyright and license Info ZIP is defined as the following set
161. roduced as output from the programs of this Package do not automatically fall under the copyright of this Package but belong to whoever generated them and may be sold commercially and may be aggregated with this Package If such scripts or library files are aggregated with this Package via the so called undump or unexec methods of producing a binary executable image then distribution of such an image shall neither be construed as a distribution of this Package nor shall it fall under the restrictions of Paragraphs 3 and 4 provided that you do not represent such an executable image as a Standard Version of this Package 7 C subroutines or comparably compiled subroutines in other languages supplied by you and linked into this Package in order to emulate subroutines and variables of the language defined by this Package shall not be considered part of this Package but are the equivalent of input as in Paragraph 6 provided these subroutines do not change the language in any way that would cause it to fail the regression tests for the language 8 Aggregation of this Package with a commercial distribution is always permitted provided that the use of this Package is embedded that is when no overt attempt is made to make this Package s interfaces visible to the end user of the commercial distribution Such use shall not be construed as a distribution of this Package IMPLEMENTATION GUIDE 9 The name of the Copyright Holder may not be used t
162. rt Notes has been asked to execute a potentially dangerous action by a program on pour sistem ou have not authorized the signer of the program to perfora this action Program signed Du TestServer 1 0rgal Un 15 11 2010 04 48 78 ls attempting Ability to modify other databases With the action NotesSession DocumentContext Allowing this action to continue could damage your system or expose confidential information Disallovieg it could cause the current actrvity to display Incorrectly or not complete Do NOT execute the action Execute the action this one time Trust the signer to execute this action for this Notes session E A Figure 7 Adjusting the security settings of the Lotus Notes client to work with Anti Virus Setup is performed on each workstation from which the Control center database will be accessed DELETING KASPERSKY ANTI VIRUS Kaspersky Anti Virus can be deleted using the installation database The application is deleted on each server separately If a distributed deployment scheme is in use you can delete Kaspersky Anti Virus from all the servers on which it is installed or from just one or several of them If you need to delete Kaspersky Anti Virus from one or more servers on each of these servers delete the application from one of the servers in the distributed deployment scheme see section Deleting from a server in a distributed deployment scheme on page 49 On deleting Kaspersky Anti Vi
163. rus from one of the servers in a distributed deployment scheme information about the server is deleted from the replicas of the Control center databases located on the remaining servers in the distributed scheme Deleting Kaspersky Anti Virus from one or more servers will not affect the application on the remaining servers If you need to delete Kaspersky Anti Virus from all the servers on which it is installed delete it consecutively on each server as on the last server in a distributed deployment scheme see section Deleting from the last server in a distributed deployment scheme on page 48 If Kaspersky Anti Virus is installed in isolation delete it as on the last server in a distributed deployment scheme see section Deleting from the last server in a distributed deployment scheme on page 48 Before deleting Kaspersky Anti Virus you should do the following IMPLEMENTATION GUIDE e move the signed installation database to the data directoryg of the server from which the application is to be deleted see section Preparing the installation database on page 32 e make sure that the permissions are correctly configured for the server see section Setting server permissions on page 31 and the user performing the deletion see section Setting permissions for the user performing the installation on page 30 e if the Lotus Notes client is used to delete the application make sure that the security settings of the Lotus Notes c
164. ry of each Domino server on which the application will be installed and sign it see section Preparing an installation database on page 32 e Configure the security settings on the workstation if the installation is performed through a Lotus Notes client see section Configuring security settings for the Lotus Notes client on page 33 2 Primary setup on a server see section Primary setup configuring settings on page 38 3 Installation on an additional server consecutively for each additional server see section Primary setup configuring settings on page 38 Additional servers must be accessible to the primary setup server 4 Preparing for operation Before you start using the application do the following e Configure the security settings for each workstation on which Kaspersky Anti Virus will run See section Preparing for operation on page 45 e Activate the license to run the application on each server where Kaspersky Anti Virus is installed if it was activated during the installation process see Administrator s Guide ISOLATED DEPLOYMENT SCHEME The isolated deployment scheme in Kaspersky Anti Virus includes the following stages 1 Preparing for installation Before installing Kaspersky Anti Virus do the following e Delete any previous version of Kaspersky Anti Virus and other anti virus programs for Lotus Notes Domino from each server on which the application will be installed see section Deleting the p
165. s provided that you comply with the terms of this License in conveying all material for which you do not control copyright Those thus making or running the covered works for you must do so exclusively on your behalf under your direction and control on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you Conveying under any other circumstances is permitted solely under the conditions stated below Sublicensing is not allowed section 10 makes it unnecessary 3 Protecting Users Legal Rights From Anti Circumvention Law No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996 or similar laws prohibiting or restricting circumvention of such measures When you convey a covered work you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work and you disclaim any intention to limit operation or modification of the work as a means of enforcing against the work s users your or third parties legal rights to forbid circumvention of technological measures 4 Conveying Verbatim Copies You may convey verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appr
166. s and what the program that uses the Library does INFORMATION ABOUT THIRD PARTY SOFTWARE 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a software library b You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change c You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License d If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility other than as an argument passed when the facility is invoked then you must make a good faith effort to ensure that
167. se along with this library if not write to the Free Software Foundation Inc 51 Franklin Street Fifth Floor Boston MA 02110 1301 USA Also add information on how to contact you by electronic and paper mail You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the library if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the library Frob a library for tweaking knobs written by James Random Hacker signature of Ty Coon 1 April 1990 Ty Coon President of Vice That s all there is to it A PVA WIS TOOLS CUO EE 17 C Gonfiguring security Settings siii tbn tete 22 33 D PE RE 30 47 48 49 A a o 0 En o 47 A Pe A a e o E E NE 26 27 BS dE CHE 29 H HARDWARE REQIREMEN deteccion 15 K KAGPERSKY LAB EE 52 L License da A A A 33 Me E PO OO E paren tncagdenusterhinesceceesectatnecniaecdecsceacees 36 S SOFTWARE REQUIRE MENTO ieee a a 15
168. ser how to view a copy of this General Public License d You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee Mere aggregation of another independent work with the Program or its derivative on a volume of a storage or distribution medium does not bring the other work under the scope of these terms 3 You may copy and distribute the Program or a portion or derivative of it under Paragraph 2 in object code or executable form under the terms of Paragraphs 1 and 2 above provided that you also do one of the following a accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Paragraphs 1 and 2 above or b accompany it with a written offer valid for at least three years to give any third party free except for a nominal charge for the cost of distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Paragraphs 1 and 2 above or IMPLEMENTATION GUIDE c accompany it with the information you received as to where the corresponding source code may be obtained This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form alone Source code for a work means the preferred form of the work for making modifications to it For an executable file complete so
169. signed to make sure that you have the freedom to distribute copies of free software and charge for them if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to prevent others from denying you these rights or asking you to surrender the rights Therefore you have certain responsibilities if you distribute copies of the software or if you modify it responsibilities to respect the freedom of others For example if you distribute copies of such a program whether gratis or for a fee you must pass on to the recipients the same freedoms that you received You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights Developers that use the GNU GPL protect your rights with two steps 1 assert copyright on the software and 2 offer you this License giving you legal permission to copy distribute and or modify it For the developers and authors protection the GPL clearly explains that there is no warranty for this free software For both users and authors sake the GPL requires that modified versions be marked as changed so that their problems will not be attributed erroneously to authors of previous versions Some devices are designed to deny users access to install or run modified versions of the softwar
170. stribution or otherwise making the Covered Code available to a third party 1 1 Contributor means each entity that creates or contributes to the creation of Modifications 1 2 Contributor Version means the combination of the Original Code prior Modifications used by a Contributor and the Modifications made by that particular Contributor 1 3 Covered Code means the Original Code or Modifications or the combination of the Original Code and Modifications in each case including portions thereof 1 4 Electronic Distribution Mechanism means a mechanism generally accepted in the software development community for the electronic transfer of data 1 5 Executable means Covered Code in any form other than Source Code 1 6 Initial Developer means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A 1 7 Larger Work means a work which combines Covered Code or portions thereof with code not governed by the terms of this License 1 8 License means this document 1 8 1 Licensable means having the right to grant to the maximum extent possible whether at the time of the initial grant or subsequently acquired any and all of the rights conveyed herein 1 9 Modifications means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications When Covered Code is released as a series of files a Modification
171. strictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it For example if you distribute copies of the library whether gratis or for a fee you must give the recipients all the rights that we gave you You must make sure that they too receive or can get the source code If you link other code with the library you must provide complete object files to the recipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library IMPLEMENTATION GUIDE To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version
172. t limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other
173. t transfer or assign any of the rights granted to you under this Agreement or any of your obligations pursuant hereto Technical Support The Technical Support described in Clause 2 5 of this Agreement is provided to You when the latest Update of the Software is installed except for a trial version of the Software Technical support service http support kaspersky com Users Data specified in Personal Cabinet My Kaspersky Account can be used by Technical Support specialists only during processing User s request Limitations You shall not emulate clone rent lend lease sell modify decompile or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non waivable right granted to You by applicable legislation and you shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software or any subset of the licensed Software nor permit any third party to do so except to the extent the foregoing restriction is expressly prohibited by applicable law Neither Software s binary code nor source may be used or reverse engineered to re create the program algorithm which is proprietary All rights not expressly granted herein are reserved by Rightholder and or its suppliers as applicable Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the Licens
174. tabase AAA oe Preparing a key ie nn nnn nn nn enn nn R RR RR RR R RR RR n RR RRnn nn nn nnnnnnrnnnnrerannnrenananennnes 33 Configuring security settings for the Lotus Notes dent 33 DELETING THE PREVIOUS VERSION OF KASPERSKY ANTI VIRUS AND OTHER ANTI VIRUS PROGRAMS FOR LOTUS NOTES DOMINO Kaspersky Anti Virus 8 0 for Lotus Domino is incompatible with other anti virus programs for Lotus Notes Domino Running Kaspersky Anti Virus concurrently with other anti virus programs could lead to system problems If other anti virus programs for Lotus Notes Domino are installed on the computer it is recommended that you delete them before installing Kaspersky Anti Virus 8 0 for Lotus Domino Updates for Kaspersky Anti Virus for Lotus Domino earlier than version 8 0 are not carried out SETTINGS PERMISSIONS FOR THE USER PERFORMING THE INSTALLATION The user installing Kaspersky Anti Virus must be granted permissions to do the following e Create files at the file system security level e Signor run unrestricted methods and operations e Access the server s Address book not lower than the Reader level Before starting the installation make sure that your account has these permissions By default the ACL of the installation database includes the Default record with the No access level and the LocalDomainAdmins group with access at the Manager level and rights to create delete replicate and copy documents If the LocalbomainAdmins group is not on th
175. te a waiver of any prior concurrent or subsequent breach Rightholder s failure to insist upon IMPLEMENTATION GUIDE or enforce strict performance of any provision of this Agreement or any right shall not be construed as a waiver of any such provision or right 13 Rightholder Contact Information Should you have any questions concerning this Agreement or if you desire to contact the Rightholder for any reason please contact our Customer Service Department at Kaspersky Lab ZAO 10 build 1 1 Volokolamsky Proezd Moscow 123060 Russian Federation Tel 7 495 797 8700 Fax 7 495 645 7939 E mail info kaspersky com Web site www kaspersky com 1997 2010 Kaspersky Lab ZAO All Rights Reserved The Software and any accompanying documentation are copyrighted and protected by copyright laws and international copyright treaties as well as other intellectual property laws and treaties CONTENTS KASPERSKY LAB END USER LICENSE AGPREEMENT 3 ADDITIONAL SOURCES OF INFORMATION ABOUT THE APPLICATION ooccccccccncnnnnnnnnnnnnnnnnnnnnnnnnononononnnnnnnnnnnnnos 11 Sources of information to research ON your own 11 Contacting the Sales Department 12 Contact the Technical Documentation Development Team 12 Discussing Kaspersky Lab applications on the Web forum ooooccccncccccnnocnccnnccnnnnnnnnnnnnnnnnnnnnnncnnnnnnnnnnnnrnnnnnnnnnnannrinnns 12 KASPERSKY ANTI VIRUS 8 0 FOR LOTUS DOMINO oooocccccccnnncnccccccccccononcnnccnnnnnn
176. the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND IMPLEMENTATION GUIDE PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE
177. tion of incidental or consequential damages so this exclusion and limitation may not apply to you 10 U S government end users The Covered Code is a commercial item as that term is defined in 48 C F R 2 101 Oct 1995 consisting of commercial computer software and commercial computer software documentation as such terms are used in 48 C F R 12 212 Sept 1995 Consistent with 48 C F R 12 212 and 48 C F R 227 7202 1 through 227 7202 4 June 1995 all U S Government End Users acquire Covered Code with only those rights set forth herein 11 Miscellaneous This License represents the complete agreement concerning subject matter hereof If any provision of this License is held to be unenforceable such provision shall be reformed only to the extent necessary to make it enforceable This License shall be governed by California law provisions except to the extent applicable law if any provides otherwise excluding its conflict of law provisions With respect to disputes in which at least one party is a citizen of or an entity chartered or registered to do business in the United States of America any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California with venue lying in Santa Clara County California with the losing party responsible for costs including without limitation court costs and reasonable attorneys fees and expenses The application of t
178. to be included in the ACL of the Kaspersky Anti Virus databases manually To simplify the procedure for granting permissions during installation it is recommended that you specify a group of servers from the Address book rather than individual installation servers Before starting the installation create a group of servers for example KavProtectedServers in the Address book and include in it all the servers on which Kaspersky Anti Virus is to be installed You can then manage the server permissions by modifying this group in the Address book If the installation servers were not combined into a group and during the primary setup an additional server was not included in the ACL it is recommended that you do the following to grant permissions to it 1 Create in the Address book of the Domino server a group with a unique name for example KavProtectedServers 2 Add the server that requires permissions to the KavProtectedServers group 3 Logon to the system under the user account in the Security administrators functional group The ACL of the Kaspersky Anti Virus databases can only be modified by users with permissions belonging to the Security administrators functional group 4 Add the KavProtectedServers group to the ACL of the Kaspersky Anti Virus databases Control center Worklog and statistics Quarantine and for the KavProtectedServers group define the permissions corresponding to those of the installation server Manager level ac
179. trolcenter nsf database and configure and manage Kaspersky Anti Virus are granted only to authorized users from one of three functional groups Security administrators Control center administrators and Administrators with limited privileges see section Managing permissions at the ACL level of the Kaspersky Anti Virus databases on page 23 Before opening the database make sure that the user account is authorized to perform the required operations create delete and configure profiles configure servers and so forth The kavcontrolcenter nsf database can be opened on any of the protected servers using the Lotus Notes client or web browser By default changes to the profile and server settings are made to the database replica which is located on the server to which it is connected During the replication process any changes are distributed to all other protected servers There may be some delay before the new settings are applied For this reason the topology of the replications must be taken into account when selecting the server on which to configure the settings If you are using Kaspersky Anti Virus through a Lotus Notes clients changes to the settings can be made to the Control center database replica located on the server whose settings you are editing regardless of which server is connected In this case the new server settings will be applied much faster When using a browser the option of making changes to the Control center replic
180. urce code means all the source code for all modules it contains but as a special exception it need not include source code for modules which are standard libraries that accompany the operating system on which the executable file runs or for standard header files or definitions files that accompany that operating system 4 You may not copy modify sublicense distribute or transfer the Program except as expressly provided under this General Public License Any attempt otherwise to copy modify sublicense distribute or transfer the Program is void and will automatically terminate your rights to use the Program under this License However parties who have received copies or rights to use copies from you under this General Public License will not have their licenses terminated so long as such parties remain in full compliance 5 By copying distributing or modifying the Program or any work based on the Program you indicate your acceptance of this license to do so and all its terms and conditions 6 Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein 7 The Free Software Foundation may publish revised and or new versions of the General Public License from time to ti
181. usting the signer to execute this action E Ge Figure 2 Adjusting the security settings of the Lotus Notes client to work with Anti Virus INSTALLING THE APPLICATION This section describes how to install the application Primary setup and installation on an additional server share many common steps see table below If the steps differ the actions for each type of installation are described separately in the relevant subsections DEPLOYING THE APPLICATION Table 3 Steps for primary setup and installation on an additional server PRIMARY SETUP INSTALLATION ON AN ADDITIONAL SERVER 1 Starting the installation 1 Starting the installation 2 Accepting the License Agreement 2 Accepting the License Agreement 3 Setting up primary setup 3 Setting up installation on an additional server 4 Starting and performing installation 4 Starting and performing installation a Checking installation setup a Checking installation setup b Creating databases b Configuration c Configuration c Creating databases d Copying service files d Copying service files e Generating environment variables e Generating environment variables 5 Activating the license the step can be skipped if the key 5 Activating the license the step can be skipped if the key file is not available file is not available 6 Finishing the installation 6 Finishing the installation At the Creating databases step during the pri
182. ve this non free programs must be allowed to use the library A more frequent case is that a free library does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public License In other cases permission to use a particular library in non free programs enables a greater number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library The precise terms and conditions for copying distribution and modification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of t
183. x and semantics are as close as possible to those of the Perl 5 language Release 7 of PCRE is distributed under the terms of the BSD licence as specified below The documentation for PCRE supplied in the doc directory is distributed under the same terms as the software itself The basic library functions are written in C and are freestanding Also included in the distribution is a set of C wrapper functions THE BASIC LIBRARY FUNCTIONS Written by Philip Hazel Email local part ph10 Email domain Cam ac Ok University of Cambridge Computing Service Cambridge England Copyright c 1997 2007 University of Cambridge All rights reserved THE C WRAPPER FUNCTIONS Contributed by Google Inc Copyright c 2007 Google Inc All rights reserved THE BSD LICENCE Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution Neither the name of the University of Cambridge nor the name of Google Inc nor the names of their contributors may be used to endorse or promote products derived from this software without s
184. y the LEGAL file in all copies Contributor makes available thereafter and shall take other steps such as notifying appropriate mailing lists or newsgroups reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained b Contributor APIs If Contributor s Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API Contributor must also include this information in the legal file c Representations Contributor represents that except as disclosed pursuant to Section 3 4 a above Contributor believes that Contributor s Modifications are Contributor s original creation s and or Contributor has sufficient rights to grant the rights conveyed by this License 3 5 Required Notices You must duplicate the notice in Exhibit A in each file of the Source Code If it is not possible to put such notice in a particular Source Code file due to its structure then You must include such notice in a location such as a relevant directory where a user would be likely to look for such a notice If You created one or more Modification s You may add your name as a Contributor to the notice described in Exhibit A You must also duplicate this License in any documentation for the Source Code where You describe recipients rights or ownership rights relating to Covered Code You may choose to offer and to charge a fee

Download Pdf Manuals

image

Related Search

Related Contents

ELEVATORI A FUNE PER IMPALCATURE  Memorex MPH4385 Telephone User Manual  取扱説明書 / Extrap Soil DNA Kit Plus ver.2  カタログ  NVR Station User Guide    Manual de Operação e Segurança  Schornsteinbau - Bosy  

Copyright © All rights reserved.
Failed to retrieve file