Home

Kaspersky Lab Anti-Virus f/ Mac, 1u, 1Y

image

Contents

1. Comprehensive protection Recommended for hostile environment Action Prompt for action Block access iv Disinfect Wi Delete if disinfection fails Me Click the lock to prevent further changes Figure 17 Application settings window File Anti Virus ANTI VIRUS PROTECTION OF YOUR COMPUTER S FILE SYSTEM 3 Select the General tab in the window that opens see the figure below General Protection scope Additional File types _ Scan all files Scan programs and documents by content Scan programs and documents by extension Optimization W Scan only new and changed files Compound files Scan archives Scan installation packages v Scan embedded objects Extract archives in background if larger than 0 MB E Do not process archives larger than 8 ME i ff 4 7 Cancel Jt OK Figure 18 File Anti Virus Configuring scan settings CREATING A PROTECTION SCOPE By default File Anti Virus scans all files the moment they are accessed regardless of the media they are stored on whether it is a hard disk drive a CD DVD ROM or a flash card KASPERSKY ANTI VIRUS To restrict the protection scope 1 Open the application settings window on page 15 and select the Protection section see figure below OOO Preferences 6 aQ O8bUG U Protection Virus Scan Threats Update Network Reports Service Appearance General VW Enable File Anti Virus Security
2. KASPERSKY ANTI VIRUS This General Public License does not permit incorporating your program into proprietary programs If your program is a subroutine library you may consider it more useful to permit linking proprietary applications with the library If this is what you want to do use the GNU Library General Public License instead of this License GNU LESSER GENERAL PUBLIC LICENSE Version 2 1 February 1999 Copyright 1991 1999 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed This is the first released version of the Lesser GPL It also counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it You can use it too but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case
3. Figure 15 Application settings window File Anti Virus If you disable File Anti Virus in the application settings window it will not be started automatically when Kaspersky Anti Virus restarts To restore file system protection you will need to check the Enable File Anti Virus box CONFIGURING FILE PROTECTION The way of protecting files on your computer is determined by the following settings e Security level The security level is a set of parameters that define the balance between thoroughness and speed of scanning of objects There are three preset security levels see section Selecting the file security level on page 32 with settings developed by Kaspersky Lab specialists e Action on detected object An action see section Selecting actions on objects on page 40 defines how Kaspersky Anti Virus will react when an infected or potentially infected object is detected KASPERSKY ANTI VIRUS IN THIS SECTION Selecting the file security level ccccccsssssessesseeeeeeeeeeeeeeeeeeaaaaeasssseeeeeeeeeeeeeeeeeeeaaaaausaadeeeeeeeeeeeeeeesessaaaaaagseeeeeeeeeeeeeeseesaaas 32 Specifying the types of files tO SCAN cccecccseesecccceeeceeeeeeceeeeeeeaeeeeeceeeeeeeeeeeseeeeeeeseeesseceeeesssseeseeeeeeeesseasseeeeeeessaaaeeeseeeeeess 33 Greating A protection SCODE asc ere scsi seers cgenecies xb aiaei a aa ianea PaE eee taeueesedanabeechosnoersd ep a ridae iaaa 35 Configuring additional settings eeeeecccccceceeeeeeeeee
4. c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing this distribution d If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place e Verify that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any data and utility programs needed for reproducing the executable from it However as a special exception the materials to be distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined librar
5. ri E Click the lock to prevent further changes Figure 10 Application settings window Service CREATING A PROTECTION SCOPE Kaspersky Anti Virus protection scope is defined on the Threats tab of the application settings window see section Application settings window on page 15 They include e list of threats against which Kaspersky Anti Virus will ensure the protection e list of objects in the trusted area which will be excluded from protection IN THIS SECTION Selecting malicious programs tO DE monitored ccccccccsseeeceeceeeeeeecaeeeeeeeeseueeeeesseueeeeesseaeceeeseeaeeeeeseeeeeeessaeeeeeeseeseeeeeeas 26 Tr sted zone Cie AON ass acc pn ceesccceteg teeta cedetic ec cee pcceuceteeeatere a A EEN ERE AEO ERDERA 27 SELECTING MALICIOUS PROGRAMS TO BE MONITORED Kaspersky Anti Virus protects against various types of malware Regardless of your settings the application always protects your computer against the most dangerous types of malware such as viruses Trojans and hack tools These programs may cause significant damage to your computer To achieve a greater level of security for your computer you can expand the list of threats that the application will detect so that it will monitor additional types of potentially dangerous programs To select which malware types Kaspersky Anti Virus will protect from open the application settings window on page 15 and select the Threats tab see the figure below
6. Kaspersky Anti Virus Protection Of Turn Protection On Quick Scan Update Preferences Kaspersky Anti Virus Exit Figure 8 Enabling protection from the contextual menu e From the Security Assistant See section What is the protection status of your computer on page 18 interface You significantly increase the risk of infecting your computer if you pause or stop protection so this threat is immediately logged by the Security Assistant EXPORTING AND IMPORTING KASPERSKY ANTI VIRUS SETTINGS Kaspersky Anti Virus allows you to export and import its settings This is useful if for example the application is installed both on your home and office computers You can configure the application to a convenient mode save those settings in a special configuration file on a disk and then import them quickly onto your office workstation Settings are stored ina special configuration file To export current application settings 1 Open the application settings window on page 15 and select the Service section see figure below 2 Inthe Configuration manager section click the Save button 3 Enter the name of the configuration file and specify a location to save it To import settings from a configuration file 1 Open the application settings window on page 15 and select the Service tab see figure below MULTI TASKED PROTECTION MANAGEMENT 2 Inthe Configuration manager section click the Load button and
7. To delete such archives click the Delete archive button in the dangerous object detection notification window This notification is displayed after the program has started processing objects detected during the scan You can also delete infected archives manually SCANNING FOR VIRUSES e Scan attachments scan objects embedded in files for example Excel spreadsheets or a macro embedded in a Microsoft Word file email attachments etc e Scan email format files scan email format files and email databases If this box is checked Kaspersky Anti Virus scans each component of the email message body and any attachments If this box is not checked the email file will be scanned as a single object e Scan password protected archives enable scanning of password protected archives With this feature enabled a password will be requested before scanning archived objects If this box is not checked password protected archives will be skipped when scanning 7o configure the settings for objects to scan please do the following 1 Open the application settings window on page 15 and select the Virus Scan tab 2 Click the Preferences button in the Security level section see the figure below 950A Preferences e kd Protection Virus Scan Threats Memel T Reports Service Appearance Quick Scan Security level a F Maximum protection l l i Comprehensive protection Full can P P Recommended for hostile environment
8. Virus Scan Preferences Default Action Prompt for action when the scan is complete O Prompt for action during scan O Do not prompt for action MW Disinfect MW Delete if disinfection fails Other task You can apply the specified preferences to all virus scan tasks preterences Apply tt T E Click the lock to prevent further changes Figure 31 Application settings window Scanning for viruses KASPERSKY ANTI VIRUS 3 Select the General tab in the window that will open see the figure below File types _ Scan all files Sean programs and documents by content C Scan programs and documents by extension Optimization vf Skip if scan takes longer than 30 sec W Do not scan archives larger than 100 ME l Scan only new and changed files I Use iSwift technology Compound files 1 Scan archives I Scan attachments Scan email format files Scan password protected archives Figure 32 Scanning for viruses Configuring scan settings SELECTING ACTIONS ON OBJECTS If an anti virus scan shows that a file is infected or suspected of being infected Kaspersky Anti Virus subsequent actions depend on the object s status and the action selected One of the following statuses can be assigned to the object after the scan e status of a malicious program for example virus Trojan e potentially infected when the scan cannot determine whether the object is infected or not The
9. dmg and select the Kaspersky Anti Virus Uninstaller assistant The uninstallation assistant is a sequence of steps You can switch between them using the Continue go to the next step of installation and Go Back go one step back buttons Let us take a closer look at the application uninstallation procedure 1 Reading important information Note that removing Kaspersky Anti Virus exposes your computer to the risk of infection It is recommended that you process all objects stored in quarantine and backup before starting the uninstallation procedure All stored objects that have not been processed will be deleted without any opportunity to restore them in the future To start the uninstallation procedure click the Delete button and enter the administrator s password to confirm The application will then be uninstalled 2 Completing the uninstallation procedure The last window of the uninstallation assistant displays the information about the successful completion of the uninstallation process To exit the uninstallation assistant click the Finish button The computer does not have to be restarted after the uninstallation APPLICATION INTERFACE Kaspersky Anti Virus has a simple and easy to use interface In this section we will take a closer look at its basic elements main application window application settings window and the Kaspersky Anti Virus icon You can change the appearance of the application by using various graphic e
10. or static library versions not from Info ZIP must be plainly marked as such and must not be misrepresented as being the Original source or if binaries compiled from the original source Such altered versions also must not be misrepresented as being Info ZIP releases including but not limited to labeling of the altered versions with the names Info ZIP or any variation thereof including but not limited to different capitalizations Pocket UnZip WiZ or MacZip without the explicit permission of Info ZIP Such altered versions are further prohibited from misrepresentative use of the Zip Bugs or Info ZIP e mail addresses or the Info ZIP URL s such as to imply Info ZIP will provide support for the altered versions 4 Info ZIP retains the right to use the names Info ZIP Zip UnZip UnZipSFX WiZ Pocket UnZip Pocket Zip and MacZip for its own source and binary releases LZMA SDK 4 43 LIBRARY Copyright 1999 2006 Igor Pavlov RFC1321 BASED RSA FREE MD5 LIBRARY LIBRARY The RFC1321 based RSA free MD5 library Copyright 1999 2002 Aladdin Enterprises library was used when developing the application All rights reserved All right reserved under zlib libpng license This software is provided as is without any express or implied warranty In no event will the authors be held liable for any damages arising from the use of this software Permission is granted to anyone to use this software for any purpose
11. selected it will be removed from quarantine and a copy of it will be placed into the backup storage see page 78 If the scan proves that an object is not infected and the databases have been updated within the last three days the object will be restored from the storage to its current location If more than three days have passed since the most recent database update the object will remain in the storage To cancel the scan of objects in quarantine 1 Open the application settings window on page 15 and select the Update section see figure below UPDATING THE APPLICATION 2 Uncheck the Rescan quarantine box in the Action after update section Preferences Run mode Automatically Every 1 day Edit C Manually Update W Update application modules Action after update El Rescan quarantine Roll back update If the databases are corrupted you can roll back to the previous database version Roll back update of Click the lock to prevent further changes Figure 45 Application settings window Update CONFIGURING PROXY SERVER SETTINGS If you use a proxy server to establish the Internet connection you will need to configure connection settings Kaspersky Anti Virus uses these settings to update the databases and modules KASPERSKY ANTI VIRUS To configure the proxy server settings 1 Open the application settings window on page 15 and select the Network tab see figure b
12. software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any late
13. 02110 1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things KASPERSKY ANTI VIRUS To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gra
14. 4 to keep intact all notices c You must license the entire work as a whole under this License to anyone who comes into possession of a copy This License will therefore apply along with any applicable section 7 additional terms to the whole of the work and all its parts regardless of how they are packaged This License gives no permission to KASPERSKY ANTI VIRUS license the work in any other way but it does not invalidate such permission if you have separately received it d Ifthe work has interactive user interfaces each must display Appropriate Legal Notices however if the Program has interactive interfaces that do not display Appropriate Legal Notices your work need not make them do so A compilation of a covered work with other separate and independent works which are not by their nature extensions of the covered work and which are not combined with it such as to form a larger program in orona volume of a storage or distribution medium is called an aggregate if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation s users beyond what the individual works permit Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate 6 Conveying Non Source Forms You may convey a covered work in object code form under the terms of sections 4 and 5 provided that you also convey the machine readable Correspondi
15. Contacting Technical Support on page 9 General information on the scan results is grouped on the following tabs e All dangerous objects detected during the task are listed on the Detected tab see section The Detected tab on page 83 The tab contains the full path to the location of each object and the status assigned to the KASPERSKY ANTI VIRUS object by Kaspersky Anti Virus if the malicious program that has infected the object is revealed this object is assigned the corresponding status For example virus Trojan etc lf the type of malicious effect cannot be exactly established the object is assigned the status of suspicious Next to the status the action taken on the object is specified detected not found disinfected e The Events tab shows the complete list of events that have occurred during task execution see section The Events tab on page 84 The events can have the following statuses e information event for example object not processed skipped by type e warning for example a virus is detected e note for example archive is password protected e Statistics appear on the corresponding tab see section The Statistics tab on page 84 Here you will find the total number of scanned objects and further columns show how many archives dangerous objects disinfected objects quarantined objects etc have been processed out of the total number of objects scanned e Preferences of task execution are dis
16. INFRINGEMENT INNO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY WHETHER IN CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE LIBCURL 7 19 3 LIBRARY The libcurl 7 19 3 copyright 1996 2009 Daniel Stenberg daniel haxx se mailto daniel haxx se library was used when developing the application All rights reserved Permission to use copy modify and distribute this software for any purpose with or without fee is hereby granted provided that the above copyright notice and this permission notice appear in all copies THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS INNO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE Except as contained in this notice the name of a copyright holder shall not be used in advertising or otherwise to promote the sale use or other dealings in this Software without prior written authorization of the copyright holder LIBPNG 1 2 8 LIBRARY The libpng 1 2 8 copyright 2004 2006 2008 Glenn Ran
17. License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license KASPERSKY ANTI VIRUS would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is belie
18. The Malware categories section lists threat types grouped by severity of threat e Viruses worms Trojans hack tools This group contains the most common and dangerous categories of malware This is the minimum admissible security level In accordance with the recommendations of Kaspersky Lab experts Kaspersky Anti Virus always monitors this category of malware e Spyware and Adware This group includes potentially dangerous software that could cause inconvenience or significant damage to a user e Auto dialers This group includes programs which set up hidden dial up connections such as adult services auto dialers e Potentially dangerous software riskware This group includes programs that are not malicious or dangerous but which under certain circumstances could be used to cause harm to your computer The groups listed above govern the complete use of the Kaspersky Anti Virus databases when scanning objects with File Anti Virus see section Anti virus protection of your computer s file system on page 30 and when scanning for viruses see section Scanning for viruses on page 43 on your computer If all groups are selected Kaspersky Anti Virus provides the maximum possible anti virus protection for your computer If the first group is selected the application will disregard riskware and other programs which could be installed on your computer and which could cause you data loss or material damage CREATING A PROTECTION SCO
19. The Security Assistant lets you review all the current threats and begin to eliminate them a Databases are out of date The databases that the application uses to protect your computer are out of date It means that protection of your data may be inadequate You are advised to update the application databases as soon as possible Update databases Co sak Figure 5 Security Assistant interface To browse the list of existing threats click the Continue or Go Back buttons A detailed description is provided for each threat and the following actions are available e Eliminate threat immediately To eliminate the threat click the button with the recommended action For example if infected objects were detected the recommended action will be Disinfect infected objects if databases are obsolete the recommended action will be Update databases To obtain detailed information on this threat you can view the report file See section Reports on page 81 e Postpone threat elimination If for any reason you cannot immediately eliminate the threat you can postpone this action and return to it later To do this use the Postpone button Note that the second option is not available for serious threats Such threats include for example malicious objects not yet disinfected File Anti Virus operation failure or corrupted Kaspersky Anti Virus database files KASPERSKY ANTI VIRUS If you still have threats left after you
20. Updates can be downloaded in one of the following modes e Automatically Kaspersky Anti Virus checks for an update package in the update source at time intervals you have set During virus outbreaks the check frequency may increase and decrease when they are gone If Kaspersky Anti Virus detects new updates it downloads and installs them on the computer This is the default mode e By schedule Kaspersky Anti Virus is updated according to a specified schedule e Manually You launch the updating procedure manually When the update is in progress the application modules and databases on your computer are compared against those at the update source If your computer has the most recent version of databases and application modules installed you will see a message confirming that the protection of your computer is up to date If databases and modules on your computer and those on the update server differ the application downloads only the missing part of the updates Databases and modules are not downloaded in their entirety this significantly increases the speed of updating and reduces Internet traffic Before updating the application databases Kaspersky Anti Virus creates backup copies of them these backup copies can be used if you want to use them again for any reason You might need the rollback see section Rolling back the latest update on page 62 option for example if you have updated the databases and they have been corrupted during
21. as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detai
22. as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the
23. configure the missed task to start automatically as soon as it becomes possible To do this check the Run task if skipped box in the schedule window RUNNING SCAN TASKS UNDER THE USER ACCOUNT The option of running tasks under different user account is implemented in the application This service is disabled by default and tasks are started under the current account with which you are registered in OS For example running the scan task can require access rights to the object being scanned Using this service you can configure running a task under the account of the user possessing the necessary privileges KASPERSKY ANTI VIRUS To specify an account please do the following 1 Open the application settings window on page 15 open the Virus Scan tab and select the Virus Scan task in the list see figure below E AAA Preferences g a r Protection Virus Scan Threats Update Network Reports Service Appearance Ly Quick Scan Objects to scan You can create a new list of objects to scan Full Scan or edit the existing list Virus Scan Security level n V an Recommended l i Optimal protection Appropriate for most users Action Prompt for action when the scan is complete O Prompt for action during scan O Do not prompt for action 1 Disinfect W Delete if disinfection fails Run mode Every 1 day Edit of Click the lock to prevent further changes Figure 35 Applic
24. contrast the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program to make sure it remains free software for all its users We the Free Software Foundation use the GNU General Public License for most of our software it applies also to any other work released this way by its authors You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for them if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to prevent others from denying you these rights or asking you to surrender the rights Therefore you have certain responsibilities if you distribute copies of the software or if you modify it responsibilities to respect the freedom of others For example if you distribute copies of such a program whether gratis or for a fee you must pass on to the recipients the same freedoms that you received You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights Developers that use the GNU GPL protect your rights with two steps 1 assert copyright on the software and 2 offer
25. during fourteen years of continuous battle against computer viruses Thorough analysis of computer virus activities enables the company s specialists to anticipate trends in the development of malware and to provide our users with timely protection against new types of attacks This advantage is the basis of Kaspersky Lab s products and services The company s products remain one step ahead of other vendors in delivering comprehensive anti virus coverage to our clients Years of hard work have made the company one of the top anti virus software developers Kaspersky Lab was the first to develop many of the modern standards for anti virus software The company s flagship product Kaspersky Anti Virus reliably protects all types of computer systems against virus attacks including workstations file servers mail systems firewalls Internet gateways and hand held computers Its easy to use management tools maximize the automation of anti virus protection for computers and corporate networks A large number of developers worldwide use the Kaspersky Anti Virus kernel in their products including Nokia ICG USA Aladdin Israel Sybari USA G Data Germany Deerfield USA Alt N USA Microworld India and BorderWare Canada Kaspersky Lab s customers enjoy a wide range of additional services that ensure both stable operation of the company s products and full compliance with the customer s specific business requirements We design implement and
26. each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c Ifthe modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exce
27. enter the object s name or the name mask in the field or browse for the object in the window that opens by clicking the Select button If the All objects option is selected all objects on your computer which are of the threat type specified in the field below will be excluded from the scan e Threat type All threats Exclude objects from scan based on the threat type assigned according to the Virus Encyclopedia classification To enter the name of the threat use the values of the dropdown list start with contain end with and specify the corresponding fragment of the name in the field to the right of the list For example if the start with not a virus value is selected then legal but potentially dangerous programs will be excluded from scan Specifying the name of the threat by mask see section Allowed exclusion masks according to the Virus Encyclopedia classification on page 92 is also admissible If the All threats value is selected then all objects specified in the field above will be excluded from the scan regardless of the threat type assigned to them If both the exclusion object and the threat type are selected the rule will apply as follows e If you specify a certain file as the object and a certain status as the threat type the specified file will only be excluded if during the scan it is assigned the selected threat status e If you select an area or folder as the object and a status or a mask as the threat type objects
28. if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we ha
29. implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU General Public License along with this program If not see lt http Awww gnu org licenses gt gt gt Also add information on how to contact you by electronic and paper mail If the program does terminal interaction make it output a short notice like this when it starts in an interactive mode lt program gt Copyright lt year gt lt name of author gt This program comes with ABSOLUTELY NO WARRANTY for details type show w This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course your program s commands might be different for a GUI interface you would use an about box USING THIRD PARTY CODE You should also get your employer if you work as a programmer or school if any to sign a copyright disclaimer for the program if necessary For more information on this and how to apply and follow the GNU GPL see lt http www gnu org licenses gt gt gt The GNU General Public License does not permit incorporating your program into proprietary programs If your program is a Subroutine library you may consider it more useful to permit linking proprietary applications with
30. in the dir folder where can represent any single character e dir test only the single file dir test 3 Masks with relative file paths e dir or dir all files in all folders called dir e dir test all test files in dir folders KASPERSKY ANTI VIRUS e dir zip all files with the zip extension in all dir folders e dir zi all files with the zi extension in all dir folders where can represent any single character The exclusion mask can only be used if you also assign a threat type to exclude using the nomenclature of the Virus Encyclopedia In this case the application will not look for the specified threat in any objects Using this mask without selecting a threat type essentially disables monitoring ALLOWED EXCLUSION MASKS ACCORDING TO THE VIRUS ENCYCLOPEDIA CLASSIFICATION When adding a new threat exclusion using the Virus Encyclopedia classification you can specify e full name of the threat as stated in the Virus Encyclopedia at www viruslist com www viruslist com e g not a virus RiskWare RemoteAdmin RA 311 or Flooder Win32 Fuxx e The threat name by mask For example e not a virus exclude legal but potentially dangerous programs from the scan as well as joke programs e Riskware exclude all potential dangerous programs such as riskware from the scan e RemoteAdmin exclude all remote administration programs from the scan Examples of threat names may be viewed in the
31. increase network traffic Use the update distribution service to save Internet traffic To do this set up update distribution as follows 1 One of the computers on the network retrieves the Kaspersky Anti Virus update package from the Kaspersky Lab web servers or from another web resource hosting the current set of updates The updates retrieved are placed in a shared folder 2 Other networked computers access the shared folder to retrieve updates To connect to the update distribution service 1 Open the application settings window on page 15 and select the Update section see figure below Mm AM Preferences Protection Virus Scan Threats Update Network Reports Service Appearance Run mode Automatically Every 1 day f Edit O Manually Update Eil Update application modules Action after update El Rescan quarantine Roll back update If the databases are corrupted you can roll back to the previous database version d Roll back update n E Click the lock to prevent further changes Figure 43 Application settings window Update 2 Click the Preferences button in the Update section 3 Inthe window that opens select the Additional tab see the figure below Check the Copy updates to folder box and specify the shared folder where retrieved updates will be placed in the field below You can enter the path manually or select it in the window that opens by clicking the Select button I
32. is covered by this License only if the output given its content constitutes a covered work This License acknowledges your rights of fair use or other equivalent as provided by copyright law You may make run and propagate covered works that you do not convey without conditions so long as your license otherwise remains in force You may convey covered works to others for the sole purpose of having them make modifications exclusively for you or provide you with facilities for running those works provided that you comply with the terms of this License in conveying all material for which you do not control copyright Those thus making or running the covered works for you must do so exclusively on your behalf under your direction and control on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you Conveying under any other circumstances is permitted solely under the conditions stated below Sublicensing is not allowed section 10 makes it unnecessary Protecting Users Legal Rights From Anti Circumvention Law No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996 or similar laws prohibiting or restricting circumvention of such measures When you convey a covered work you waive any legal power to forbid circumvention of technological measures
33. materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any data and utility programs needed for reproducing the executable from it However as a special exception the materials to be distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things a Accompany the combined library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under the terms of the Sections above b Give prominent notice with the combined library of the fact that part of i
34. of the scan When the scan is complete the reports window see section The Detected tab on page 83 will be displayed on screen with a list of infected and potentially infected objects detected and you will be asked if you want to process the objects Prompt for action during scan After each detection of a dangerous object Kaspersky Anti Virus will display a warning message with the information about which malicious code has infected potentially infected the file and offers you the choice of the following actions These actions may vary depending on the object s status KASPERSKY ANTI VIRUS If the action you have selected is when an infected or potentially infected object is detected Do not prompt for action Kaspersky Anti Virus records information about detected objects in the report without processing them We do not recommend enabling this operation mode since infected and potentially infected objects persist on your computer and it is practically impossible to avoid infection Do not prompt for action Kaspersky Anti Virus attempts to disinfect infected objects without prompting the user for confirmation If the object is successfully Disinfect disinfected it becomes accessible to the user If the object cannot be disinfected its location will not be changed If the object cannot be disinfected its location will not be changed Relevant information is logged in the report See section Reports on page 81 To gai
35. parties with this License If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on co
36. report window on the Detected tab see section The Detected tab on page 83 in the quarantine See section Quarantine on page 75 and in the backup see section Backup on page 78 and in the windows of notification see section Notifications on page 87 of dangerous objects detection USING THIRD PARTY CODE Third party code was used during Kaspersky Anti Virus development IN THIS SECTION Re ce ctu atelectasis teenie re ected pecans ENE A A E ESA A EA A E E 93 EO Ot Ee 0 MRAM AA E E N E A AE AET ETE E E E E E E TEE E E E E E S 93 Wl ee a era 0 E a et ete ee er ET E E A eee 94 LOPA We 22 WAY etre creeetem rece A S E E A E E E 94 LBCD IY eae E E E E E 95 Bleie Ce IOV ANY e EA E IEE T E A A T EE ES P T EEA E A A E 105 oea e E T E E E A E E E E A T E PEE E TT E E E E T 11 Eo hi a i s E EE E EE ATE E E ee asia soca E E A E E EEA E E 11 MZE O N e E ae eee a ee ee acres ee er 11 ZNA DRAA O g s 11 RFC1321 based RSA free MD5 LIBRARY library snsosiarioirsrannoranininannei naaraana airiai aii 11 rA Ae E e T E A EEEE A N A E EE E E E NE E E E E N E E 11 6 7 50 i 0 kc e eee ee eee ee eee ee ee ee ee ee ee ee eee 11 Sound elects Dray oriniai NE r EE EEE EE SAES EE EAEE ii 125 CRYPTOEX LLC To create and verify digital signatures Kaspersky Anti Virus uses Crypto Ex LLC s data security software library Crypto C CryptoEx LLC holds a license from the Federal Agency for Government Communications and Information a b
37. scan task list and select Copy 3 Enter a name for the task in the window that opens and click the OK button A task with the name you have specified will appear in the task list The new task inherits all the properties of the task from which it was created You need to carry out an additional configuration by creating a list of objects to scan see section Creating the list of objects to scan on page 45 specifying the preferences see section Configuring virus scan tasks on page 48 which will define the task execution and configuring a schedule for the task autorun see section Configuring the scan task schedule on page 54 The application limits a maximum number of tasks created by the user to six To rename a created task please do the following tt 1 Select the task from the list click the button under the scan task list and select the Rename button KASPERSKY ANTI VIRUS 2 Enter anew name for the task in the window that will open and click the OK button The task name will change To delete a created task please do the following tt 1 Select the task from the list click the button under the scan task list and select Delete 2 Confirm the task deletion in the window that will prompt you for confirmation The task will be deleted from the task list You can only rename and delete tasks that you have created CONFIGURING VIRUS SCAN TASKS The following settings determine how objects ar
38. select the file you want to import Kaspersky Anti Virus settings from AA Preferences Ci E A Virus Scan Threats Update Network Reports Service Appearance Autorun W Launch application at startup Configuration You can save the current protection preferences to a configuration file or load previously saved preferences from the file ri E Click the lock to prevent further changes Figure 9 Application settings window Service EXITING KASPERSKY ANTI VIRUS If for any reason you need to close Kaspersky Anti Virus click the Kaspersky Anti Virus icon on page 15 in the Mac OS Menu Bar or in the Dock and select the Exit command in the menu that opens The application will close which means that your computer will be running unprotected If you have closed Kaspersky Anti Virus you can enable the protection of your computer by loading the application manually Protection can also be started automatically after restarting your operating system To enable this mode open the application settings window on page 15 select the Service section see figure below and check the Launch application at startup box in the Autorun section On Preferences eports ee Virus Scan Threats Teri ermare R Ed Ee Appearance ee Autorun W Launch application at startup Configuration You can save the current protection preferences to a configuration file or load previously saved preferences from the file
39. tab on page 84 There you can view which files have been distributed and which ones have been replaced The settings used to manage the update are listed on the tab with the same name see section The Preferences tab on page 86 To switch to editing the component settings use the Change preferences button LICENSE MANAGEMENT Ability to use Kaspersky Anti Virus is determined by a license obtained by purchasing the product and granting you the right to use the application as soon as you install your license Without a license unless a trial version has been activated Kaspersky Anti Virus will run in one update mode The application will not download any new updates If a trial version has been activated after the trial period expires Kaspersky Anti Virus will not run When the license expires the program will continue working but you will not be able to update application databases As before you will be able to scan your computer for viruses and use File Anti Virus but using only the databases that you had when the license expired We cannot guarantee that you will be protected from viruses that appear after your program license expires To protect your computer from infection from new viruses we recommend that you renew your application license Kaspersky Anti Virus will notify you in advance of the impending expiration date of your license The corresponding message will be displayed every time the application starts To vie
40. terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt othe
41. the operation You can easily roll back to the previous version of databases and try to update them again You can distribute downloaded updates to a local source while updating Kaspersky Anti Virus See section Update distribution on page 67 This feature enables you to update databases and modules used by the application on networked computers to reduce internet traffic KASPERSKY ANTI VIRUS IN THIS SECTION Staring the 0 8 6 2 cae eee ee ete nT ere ed Pr er ne Oe ere ee eee ere eee eee ee 62 Rolling back the latest update sua sestcccdeasceaeteoteedeednciauneessaadd mactoet an seadaeincsounsusteecdecactart tae tetieadssiauneestcGadeasaeateteeseedaedurbiunecnees 62 COn e 6 0 aere ee een ee ene ee ene nee eee ee eee ene ee 63 Configuring proxy server Settings cccccccccceseeeeeeeeeeeceeeeeeeeeeeesauseseceeeeessaeesseeeeeeesaeesseceeeesseeeeseeeeeeesssaaeeeeeeeesssaaeeeeeeeeeas 69 UTS SASS AE SE AE NEEE A E tar bade E E E E E SO E 71 STARTING THE UPDATE Application updates keep your computer s protection up to date If you do not perform updates for some time the protection of your data becomes out of date The main application window displays summary information on the application update see section Main application window on page 13 Here you can see the database release date and the number of records in the databases installed on your computer The number of records is the number of threats from which
42. the window that opens use the Forum button Help system KASPERSKY ANTI VIRUS The complete Help system contains information on how to manage computer protection view protection status scan various areas of the computer for viruses and execute other tasks To open the help file select the Help Kaspersky Anti Virus Help System command in the Kaspersky Anti Virus main menu or click the button in the main application window on page 13 If you have any questions regarding a separate window or tab of Kaspersky Anti Virus you can refer to the context help To open the context help open the window or the tab you want and press the button Documentation The user guide for Kaspersky Anti Virus contains detailed information on installing and using the application If you do not find a solution to your problem in the Knowledge Base the Users forum the help system or documentation we recommend that you contact Kaspersky Lab Technical Support see section Contacting Technical Support on page 9 CONTACTING TECHNICAL SUPPORT If you have already purchased Kaspersky Anti Virus you can obtain information about it from the Technical Support Service either by phone or through the Internet Technical Support Service specialists will answer your questions on installing and using the application and if your computer has been infected they will help you overcome the effects of malware To view information on an of receivin
43. virus EICAR Test File modificatic File Volumes NO NAME virus SUSP Eicar3 com File Anti virus D deleted virus EICAR Test File modificati File Volumes NO NAME virus SUSP Eicar4 com deleted virus EICAR Test File modificatic File Volumes NO NAME virus SUSP EicarS com eee deleted virus EICAR Test File modificatic File Volumes NO NAME virus SUSP Eicar6 com i deleted virus EICAR Test File modificatic File Volumes NO NAME virus SUSP Eicar7 com eee deleted virus EICAR Test File modificatic File Volumes NO NAME virus SUSP Eicar8 com Q Virus Scan deleted virus EICAR Test File modificatic File Volumes NO NAME virus SUSP Eicar9 com Update O deleted virus EICAR Test File modificatic File Volumes NO NAME virus WARN Eicarl com Update O deleted virus EICAR Test File modificatic File Volumes NO NAME virus WARN Eicar10 com File Anti virus deleted virus EICAR Test File modificatic File Volumes NO NAME virus WARN Eicar2 com update deleted virus EICAR Test File modificatic File Volumes NO NAME virus WARN Eicar3 com G peer ae deleted virus EICAR Test File modificatic File Volumes NO NAME virus WARN Eicar4 com Soe deleted virus EICAR Test File modificatic File Volumes NO NAME virus WARN EicarS com ved ERE deleted virus EICAR Test File modificatic File Volumes NO NAME virus WARN Eicar6 com LJ File Anti Virus deleted virus EICAR Test File modificatic File Volumes NO NAME virus WARN Eicar7 com deleted
44. which you cannot fix yourself and you require help from the Technical Support Service In this case you need to send a report in text format to the Support service so our specialists can study the situation in greater depth and help you as quickly as possible To export a report to a text file open the report window and select the Export command using the menu that opens by clicking the fa button IN THIS SECTION Contouring the repon o 1110 0 caeeeeeee ee eon er enero One fret ene nrc neNr vner is i eERr neve ne rt Enron eet tomer wan See Nr vr On or terenie eer marr errr ta en Preteens 82 The Deiected TAD craoinn eee aes Eee ane ee Sa eee ene eee ee Ee ee ee eee oer tere 83 EE EVOM 26 eae ee er ee ee ee ee ee ee ee ee ee eC ee ee A eee 84 OS eS TN SU e E ate together nsec eee E E E cinoma dere sara seco A A cesses EE 84 The Freferences TNO aera terse cece E E E EEE AEE AEE R EEE EEEE EE EE AE EAEE EEE NEEE 86 CONFIGURING THE REPORT SETTINGS To configure the settings for creating and saving reports 1 Open the application settings window on page 15 and select the Reports section see figure below h h Preferences OSO Protection Virus Scan Threats Update Network Reports Service Appearance Reports Log non critical events Keep only recent events Delete reports after 30 days Quarantine and Backup V Delete objects after 30 days E Click the lock to prevent further changes F
45. with that status will be excluded from the scan only in that area or folder e Component All components Specify which Kaspersky Anti Virus components should use the rule you are creating File Anti Virus or Virus scan If the All components option is selected then all virus scan tasks and File Anti Virus will use this rule i Fa Fg Exclusion rule Exclude from the scan if all conditions are met Object Volumes UNTITLED eicar Threats type start with not a virus Component File Anti Virus Figure 14 Creating an exclusion rule ANTI VIRUS PROTECTION OF YOUR COMPUTER S FILE SYSTEM Your computer s file system may contain viruses and other malicious programs that persist for years having initially penetrated the computer from a removable disk drive or from the Internet and never causing any trouble But once the infected file is opened the virus will be activated immediately File Anti Virus is the component that monitors the computer s file system in real time mode By default it launches on operating system startup stays in RAM and scans all files that are opened started or saved on your computer and all associated disk drives The scan process comprises the following steps 1 Each attempt by a user or a program to access any file is intercepted by the component 2 File Anti Virus scans the iSwift See section Configuring additional settings on page 37 database for information about the fil
46. you this License giving you legal permission to copy distribute and or modify it For the developers and authors protection the GPL clearly explains that there is no warranty for this free software For both users and authors sake the GPL requires that modified versions be marked as changed so that their problems will not be attributed erroneously to authors of previous versions KASPERSKY ANTI VIRUS Some devices are designed to deny users access to install or run modified versions of the software inside them although the manufacturer can do so This is fundamentally incompatible with the aim of protecting users freedom to change the software The systematic pattern of such abuse occurs in the area of products for individuals to use which is precisely where it is most unacceptable Therefore we have designed this version of the GPL to prohibit the practice for those products If such problems arise substantially in other domains we stand ready to extend this provision to those domains in future versions of the GPL as needed to protect the freedom of users Finally every program is threatened constantly by software patents States should not allow patents to restrict development and use of software on general purpose computers but in those that do we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary To prevent this the GPL assures that patents cannot be used to render
47. 00 33 15 Untreated 29 Mr lI G Start Pause L Stop Clear all Figure 55 Events occurred in component s operation THE STATISTICS TAB Detailed statistics of File Anti Virus see section Anti virus protection of your computer s file system on page 30 operation or virus scan see section Scanning for viruses on page 43 task execution are logged on this tab see figure below Here you can learn e how many objects were scanned for viruses in this session by File Anti Virus or by the scan task the number of scanned archives compressed files and password protected and corrupted objects is also shown REPORTS e how many dangerous objects were detected and how many of them were deleted quarantined or not disinfected OOO Reports Kaspersky Anti Virus i pipio _ n Statistics Preferences _ m E Object Scanned Danger Untreat Packed Passwor Corrupt E Quarantine All objects 1443 29 29 58 0 0 0 12 0 0 0 0 Backup RUNNING TASKS COMPLETED TASKS All Last 20 E Update amp Update File Anti Virus Update File Anti Virus W File Anti virus File Anti virus oo Status Dangerous objects detected Scanned 1443 Start 12 3 09 12 05 53 PM Detected 29 Duration 00 34 44 Untreated 29 te i BEL Figure 56 Component statistics KASPERSKY ANTI VIRUS THE PREFERENCES TAB The Preferen
48. AN A FILE FOLDER OR DISK FOR VIRUSES It is useful to be able to scan a part of your computer for viruses rather than the entire computer for example the hard drive containing applications games or email databases which have been transferred from work Toscan an individual object for viruses gt 1 Open the main application window on page 13 and click the button on 2 Selectthe y Virus Scan task and in the window that opens create the list of objects to scan see section Creating the list of objects to scan on page 45 To add the object to the scan scope drag n drop it to the window To start the task click the Start button To view task execution results open report window see section Virus scan statistics on page 59 To view or edit current task settings 1 Open the application settings window on page 15 and select the Virus Scan tab 2 Inthe list on the left select the Virus Scan task In the right hand part of the window view the settings that will be used for a task security level See section Selecting a security level on page 48 and action see section Selecting actions on objects on page 52 that will be taken on dangerous objects If you install an add in module for the Finder context menu you can start scan of any object from its contextual menu directly To do this select Scan for viruses from the menu HOW TO UPDATE THE APPLICATION Kaspersky Lab updates Kaspersky Anti Virus databa
49. E THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program and you want it to be of the greatest possible use to the public the best way to achieve this is to make it free software which everyone can redistribute and change under these terms To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found lt one line to give the program s name and a brief idea of what it does gt Copyright lt year gt lt name of author gt This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 2 of the License or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WA
50. KS detected virlas ECAR TESIR Volumes NO NAME virus WARN Eicar6 com 73 bytes 12 3 09 12 42 17 PM File anti virus o detected ns Se Volumes NO NAME virus SUSP Eicar6 com 73 bytes 12 3 09 12 42 17 PM detected virus EICAR Test Fi Volumes NO NAME virus WARN Eicar8 com 73 bytes 12 3 09 12 42 17 PM COMPLETED TASKS detected virus EICAR Test Fi Volumes NO NAME Vvirus Eicar10 com 68 bytes 12 3 09 12 42 13 PM All detected virus EICAR Test Fi Volumes NO NAME virus SUSP Eicar2 com 73 bytes 12 3 09 12 42 16 PM Last 20 detected virus EICAR Test Fi Volumes NO NAME virus SUSP EicarS com 73 bytes 12 3 09 12 42 16 PM Qj Virus Scan detected viris EICAR Test Fi Volumes NO NAME virus Eicar2 com 68 bytes 12 3 09 12 42 14 PM Update O detected a SU ei Volumes NO NAME virus SUSP Eicar8 com 73 bytes 12 3 09 12 42 17 PM detected virus EICAR Test Fi Volumes NO NAME virus Eicar8 com 68 bytes 12 3 09 12 42 14 PM miare 2 detected virus EICAR Test Fi Volumes NO NAME Vvirus Eicar9 com 68 bytes 12 3 09 12 42 14 PM W File Anti virus detected virus EICAR Test Fi Volumes NO NAME virus SUSP Eicar3 com 73 bytes 12 3 09 12 42 16 PM Update detected virus EICAR Test Fi Volumes NO NAME virus SUSP Eicar7 com 73 bytes 12 3 09 12 42 17 PM W File Anti virus detected virus EICAR Test Fi Volumes NO NAME Vvirus Eicar com 68 bytes 12 3 09 12 42 14 PM File Anti virus detected virus EICAR Test Fi Volumes NO NAME virus WARN Eica
51. Kaspersky Anti Virus for Mac USER GUIDE PROGRAM VERSION 8 0 CRITICAL FIX 2 KASPERSKY Dear User Thank you for choosing our product We hope that this documentation will help you in your work and will provide answers regarding this software product Any type of reproduction and distribution of any materials including translation thereof is allowed only by a written permission of Kaspersky Lab This document and graphic images related to it can be used exclusively for information non commercial or personal purposes Kaspersky Lab reserves the right to change the document at any time without notice For the latest version of this document refer to Kaspersky Lab s website at http www kaspersky com docs Kaspersky Lab assumes no liability for the content quality relevance or accuracy of any materials used in this document for which the rights are held by third parties or for the potential damages associated with using such documents This document involves the registered trademarks and service marks which are the property of their respective owners Revision date 11 30 09 1997 2009 Kaspersky Lab ZAO All Rights Reserved http www kaspersky com http support kaspersky com TABLE OF CONTENTS KASPERSKY FAINT VAS ccceetcrocena eciseececcsissenavetice EO n Ere EARO EEEE EEEE ENE EEEE EOE EEEE EAR A ESEO 6 Hardware and software system reQuireMents cccccccccsseeeeeeeeeeeeaeeeeeeeeeeeeeaeeeeeeeeeeeaaaac
52. Level ns Maximum protection Comprehensive protection Recommended for hostile environment Action Prompt for action Block access V Disinfect V Delete if disinfection fails Click the lock to prevent further changes Figure 19 Application settings window File Anti Virus 2 Click the Preferences button in the Security level section 3 Inthe window that opens select the Protection scope tab see the figure below The tab contains the list of objects which will be scanned by File Anti Virus By default all objects located on hard removable and network disk drives connected to your computer are protected You can fill in or edit the list using the buttons located under the list To limit the number of objects subject to protection you can 1 Specify folders drives or files that should be protected 2 Create a list of objects which do not need protection ANTI VIRUS PROTECTION OF YOUR COMPUTER S FILE SYSTEM 3 Combine the first and second ways i e create a protection scope and exclude a number of objects from it General Protection scope Additional WI _ All removable drives wi E All hard drives wi All network drives edit Figure 20 File Anti Virus Creating a protection scope CONFIGURING ADDITIONAL SETTINGS You can configure the following additional settings for File Anti Virus scan mode for the file system objects use of iSwift technology which increases perfo
53. ODE This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License also called this License Each licensee is addressed as you A library means a collection of software functions and or data prepared so as to be conveniently linked with application programs which use some of those functions and data to form executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it For a library complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running a program using the Library is not restricted and output
54. PE Kaspersky Lab does not recommend disabling monitoring of Soyware Adware and Auto dialers If Kaspersky Anti Virus classifies a program as riskware which you do not consider dangerous you can configure an exclusion for it See section Trusted zone creation on page 27 aan Preferences Malware categories Wi Wiru ses worms Trojans hack tools W Spyware and Adware Auto dialers Potentially dangerous software riskware understand that some legal programs can be classified as potentially dangerous software and want them to be recognized as a threat on this computer Exclusions Compose the list of trusted files processes and applications that should not be monitored and scanned Trusted zone E Click the lock to prevent further changes Figure 11 Application settings window Threats TRUSTED ZONE CREATION Trusted zone is a user created list of objects which Kaspersky Anti Virus does not monitor In other words it is a set of exclusions from protection The user creates a trusted zone based on the features of the objects he or she uses and the programs installed on his or her computer You might need to create such an exclusion list if for example Kaspersky Anti Virus blocks access to an object or program which you know is safe Exclusion rules are sets of conditions under which Kaspersky Anti Virus does not scan objects You can exclude files using several criteria file format file name usi
55. RE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE INFO ZIP 5 51 LIBRARY This is version 2007 Mar 4 of the Info ZIP license The definitive version of this document should be available at ftp ftp info Zip org pub infozip license html indefinitely and a copy at http www info zip org pub infozip license html The Info ZIP 5 51 Copyright 1990 2007 The Info ZIP 5 51 library was used when developing the application All rights reserved under Info ZIP license For the purposes of this copyright and license Info ZIP is defined as the following set of individuals Mark Adler John Bush Karl Davis Harald Denker Jean Michel Dubois Jean loup Gailly Hunter Goatley Ed Gordon lan Gorman Chris Herborth Dirk Haase Greg Hartwig Robert Heath Jonathan Hudson Paul Kienitz David Kirschbaum Johnny Lee Onno van der Linden Igor Mandrichenko Steve P Miller Sergio Monesi Keith Owens George Petrov Greg Roelofs Kai Uwe Rommel Steve Salisbury Dave Smith Steven M Schweda Chr
56. RRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU General Public License along with this program if not write to the Free Software Foundation Inc 51 Franklin St Fifth Floor Boston MA 02110 1301 USA Also add information on how to contact you by electronic and paper mail If the program is interactive make it output a short notice like this when it starts in an interactive mode Gnomovision version 69 Copyright year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY for details type show w This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course the commands you use may be called something other than show w and show c they could even be mouse clicks or menu items whatever suits your program You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the program if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the program Gnomovision which makes passes at compilers written by James Hacker lt signature of Ty Coons 1 April 1989 Ty Coon President of Vice
57. TH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION USING THIRD PARTY CODE 16 INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library and you want it to be of the greatest possible use to the public we recommend making it free software that everyone can redistribute and change You can do so by permitting redistribution under these terms or alternatively under the terms of the ordinary General Public License To apply these terms attach the following notices to the library It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found lt one line to give the library s nam
58. TIONS How to Apply These Terms to Your New Programs If you develop a new program and you want it to be of the greatest possible use to the public the best way to achieve this is to make it free software which everyone can redistribute and change under these terms USING THIRD PARTY CODE To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found lt one line to give the program s name and a brief idea of what it does gt Copyright lt year gt lt name of author gt This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 2 of the License or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU General Public License along with this program if not write to the Free Software Foundation Inc 51 Franklin St Fifth Floor Boston MA 02110 1301 USA Also add information on how to contact you by electronic and paper mail If the program is in
59. UCH DAMAGES 17 Interpretation of Sections 15 and 16 If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program and you want it to be of the greatest possible use to the public the best way to achieve this is to make it free software which everyone can redistribute and change under these terms To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found lt one line to give the program s name and a brief idea of what it does gt Copyright lt year gt lt name of author gt This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 3 of the License or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the
60. Y INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library and you want it to be of the greatest possible use to the public we recommend making it free software that everyone can redistribute and change You can do so by permitting redistribution under these terms or alternatively under the terms of the ordinary General Public License To apply these terms attach the following notices to the library It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found lt one line to give the library s name and a brief idea of what it does gt Copyright lt year gt lt name of author gt This library is free software you can redistribute it and or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation either version 2 1 of the License or at your option any later version USING THIRD PARTY CODE This library is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the impl
61. accessors and small macros and small inline functions ten lines or less in length then the use of the object file is unrestricted regardless of whether it is legally a derivative work Executables containing this object code plus portions of the Library will still fall under Section 6 Otherwise if the work is a derivative of the Library you may distribute the object code for the work under the terms of Section 6 Any executables containing that work also fall under Section 6 whether or not they are linked directly with the Library itself 6 As an exception to the Sections above you may also combine or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must include the copyright notice for the Library among them as well as a reference directing the user to the copy of this License Also you must do one of these things a Accompany the work with the complete corresponding machine readable source code for the Library including whatever changes wer
62. ake payment to the third party based on the extent of your activity of conveying the work and under which the third party grants to any of the parties who would receive the covered work from you a discriminatory patent license a in connection with copies of the covered work conveyed by you or copies made from those copies or b primarily for and in connection with specific products or compilations that contain the covered work unless you entered into that arrangement or that patent license was granted prior to 28 March 2007 Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law No Surrender of Others Freedom If conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot convey a covered work So as to Satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not convey it at all For example if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program Use with the GNU Affero General Public License Notwithstand
63. allation You can edit the default installation settings To do this click the Edit installation folder button and specify another disk To switch to custom installation of Kaspersky Anti Virus click the Preferences button Selecting installation type This step of the installation assistant will appear if the custom installation option is selected You will be offered to specify which application components should be installed on your computer e Virus scan Scan of objects from the user defined scan scopes Please note that this component will be unconditionally installed e File Anti Virus Real time scan of all objects being opened executed or saved e Finder Contextual Menu Scan of objects displayed in Finder Scan is started from the object contextual menu KASPERSKY ANTI VIRUS Once the components are selected please click the Install button and enter the administrator s password to confirm the installation To restore the default installation settings click the Standard installation button 5 Completing the installation The last window of the installation assistant displays information about the successful completion of the installation process To exit the installation assistant click the Close button When the installation assistant is closed Kaspersky Anti Virus runs automatically The computer does not need to be restarted To remove Kaspersky Anti Virus from your computer run the installation file
64. also meet all of these conditions a The modified work must itself be a software library b You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change KASPERSKY ANTI VIRUS c You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License d Ifa facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility other than as an argument passed when the facility is invoked then you must make a good faith effort to ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this function must be optional if the application does not supply it the square root function must still compute square roots These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Library and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works Bu
65. among other rights permit the user to copy modify and redistribute certain programs or portions thereof and have access to the source code If such licenses require that for any software which is distributed to someone in an executable binary format that the source code also be made available to those users then the source code should be made available by sending the request to source kaspersky com SOUND EFFECTS LIBRARY Sound effects are provided by www sound effects library com KASPERSKY LAB Kaspersky Lab was founded in 1997 Today it is the leading developer of a wide range of high performance information security software products including anti virus anti spam and anti hacking systems Kaspersky Lab is an international company Headquartered in the Russian Federation the company has offices in the United Kingdom France Germany Japan the Benelux countries China Poland Romania and the USA California A new company office the European Anti Virus Research Centre has recently been established in France Kaspersky Lab s partner network includes over 500 companies worldwide Today Kaspersky Lab employs over a thousand highly qualified specialists including 10 MBA degree holders and 16 PhD degree holders All Kaspersky Lab s senior anti virus experts are members of the Computer Anti Virus Researchers Organization CARO Our company s most valuable assets are the unique knowledge and collective expertise accumulated
66. ample an event can inform you on the successful completion of an update or can detect an error in the operation of File Anti Virus that should be eliminated immediately During Kaspersky Anti Virus operation the following types of events occur e Critical events are events of a critical importance about which it is highly recommended to receive notifications since they indicate problems with Kaspersky Anti Virus or vulnerabilities in protection of your computer for example application databases corrupted or the license has expired e Failure events that make Kaspersky Anti Virus non operable for example no license key and no application databases e Important events are events that should be attented to since they reflect important situations in Kaspersky Anti Virus operation for example protection disabled or computer has not been scanned for viruses for a long time e Informational events are reference type messages which as a rule do not contain important information for example all dangerous objects disinfected In order to keep up with the events in Kaspersky Anti Virus operation you can use the notification service Notices can be delivered in one of the following ways e pop up messages on screen e audio message To use this service 1 Open the application settings window on page 15 and select the Appearance tab see figure below Preferences Protection Virus Scan Threats Update Network Reports Service App
67. an tasks see section Creating virus scan tasks on page 46 if such tasks were created OOO Kaspersky Anti Virus Figure 26 Virus scan tasks Information on currently running tasks is displayed in the left part of the main window and also in the Running tasks section of the reports window see section Reports on page 81 Information on the performed tasks displayed in the Completed tasks section of the report window To pause a virus scan task 1 Open the Kaspersky Anti Virus report window To do this click the B globe icon in the main window see section Main application window on page 13 SCANNING FOR VIRUSES 2 Inthe list on the left select the name of the virus scan task see figure below and click the Pause button This will pause the scan until you start the task again manually or it starts again automatically according to the schedule To start the scan manually click the Start button oy Oy OO Reports Kaspersky Anti Virus peteced MECA Events Statistics Preferences Status Object E Events GE AS CPS Ea e ue FE VOUS NAME YUS WARN ECAT COTTI Pa Quarantine deleted virus EICAR Test File modificatic File Volumes NO NAME virus SUSP Eicar2 com ly Backup deleted virus EICAR Test File modificatic File Volumes NO NAME virus SUSP Eicar10 com deleted virus EICAR Test File modificatic File Volumes NO NAME virus SUSP Eicarl com RUNNING TASKS deleted
68. and compound files KASPERSKY ANTI VIRUS In the Compound files section specify which compound files should be scanned for viruses e Scan archives scan archives in ZIP CAB RAR ARJ formats e Scan installation packages scan self unpacking archives for viruses e Scan attachments scan objects embedded in files such as Excel spreadsheets or a macro embedded in a Microsoft Office Word file or email attachments To specify which files should not be scanned for viruses use the following settings e Extract archive in background if larger than MB If the size of the compound object exceeds this limit it will be scanned by Kaspersky Anti Virus as a single object header scanned and become operable for the user The objects it contains will be scanned later If the box is not checked access to files larger than the specified value will be blocked until the object scan is complete e Do not process archives larger than MB Any file larger than the specified value will be skipped without being scanned for viruses To specify types of objects to be scanned by File Anti Virus 1 Open the application settings window on page 15 and select the Protection tab 2 Click the Preferences button in the Security level section see the figure below A A O Preferences CQar eB UG k eon Virus Scan Threats Update Network Reports Service Appearance General v Enable File Anti Virus Security Level n Maximum protection
69. aseeees 6 BY EO UO FOU este te E ec A E E EA E E E AN A P E ets hen tt E E AR E E ELA A E EE E ys E E E E A 7 DEVICE TOM FEGISICLEO USCIS e ceikedaninsel assawebedaceuieiccaweliceine a E E vaudecteushhecedecdeiechcaiedars 7 Obtaining information about the application ccccceeeeeeccceeceeeeeeeeceeeeeeeaeeseeeeeeeesaeeeeeeeeeeesseeeeeeeeeeeessaeseeeeeeeessseeaeeeeeeeesaaas 7 HARDWARE AND SOFTWARE SYSTEM REQUIREMENTS Your computer should meet the following minimum requirements for Kaspersky Anti Virus to run properly e Intel based Macintosh computer PowerPC processor not supported e 512 MB free RAM KASPERSKY ANTI VIRUS e 80 MB free hard drive space e Mac OS X 10 4 11 operating system or higher DISTRIBUTION KIT You may purchase Kaspersky Anti Virus box edition from our distributors or at an online store Such as www kaspersky com eStore section If you are purchasing the product in a box the following will be included in the software product distribution kit e sealed envelope with the Installation CD that stores product files and documentation in PDF format e license agreement which specifies the conditions of using the software product you have purchased Before breaking the seal on the installation disk envelope carefully read through the EULA If you cannot accept the provisions of the License Agreement you may return the box with the product to the distributor you have purchased it from and you wi
70. at the Technical Support service website In the Personal Cabinet you can e Send requests to the Technical Support without prior registering e Exchange messages with the Technical Support without using email e Monitor requests in real time e View the complete history of your requests to the Technical Support service e Obtain a backup copy of the key file Requesting the Technical Support service by email KASPERSKY ANTI VIRUS To contact Technical Support Service open the web form of the customer request processing system Helpdesk http support kaspersky com helpdesk html On the Technical Support Service page that opens enter your Personal Cabinet and fill in the request form You can send your question in Russian English German French or Spanish In order to send your question by email specify the Customer ID obtained when registering at the Technical Support service website along with your password A Technical Support service specialist will reply to your request in your Personal Cabinet and at the email address you have specified in your request Describe the problem you have encountered in the request web form providing as much detail as possible Specify the following in the required fields e Request type Select the subject that best matches the problem you have encountered such as Product installation uninstallation problem or Virus scan removal problem If you have not found an appropriate topic se
71. ation program that uses the facility other than as an argument passed when the facility is invoked then you must make a good faith effort to ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this function must be optional if the application does not supply it the square root function must still compute square roots These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Library and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Library the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of deriv
72. ation settings window Full scan task 2 Enable task running by the schedule in the Run mode section and click the Edit button SCANNING FOR VIRUSES 3 In the schedule configuring window see figure below in the Start from the user s account select the account under which the task will be started from the Drop down menu Frequency Weeks Schedule Mon Tue C lWwed Tho preferences M Fri vI Sat ISun M Time 12 41 B e Run task if skipped Start from the user s kas pe rsky Lab account Figure 36 Configuring the task schedule ASSIGNING UNIFORM SCAN SETTINGS TO ALL TASKS Each scan task is performed according to its own settings By default all tasks created when installing Kaspersky Anti Virus on your computer use the settings recommended by Kaspersky Lab You can specify uniform scan settings for all tasks by starting with the Virus Scan task settings used to scan an individual object KASPERSKY ANTI VIRUS To assign uniform scan settings for all tasks 1 Open the application settings window on page 15 open the Virus Scan tab and select the Virus Scan task in the list see figure below SOO Preferences ee Virus sey Threats Teen Network Reports Service Appearance Quick Scan Security level Maximum protection Full Scan l l Comprehensive protection Recommended for hostile environment Action Prompt for action when the scan is complete O Prompt fo
73. ative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work based on the Library on a volume of a storage or distribution medium does not bring the other work under the scope of this License KASPERSKY ANTI VIRUS 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that version instead if you wish Do not make any other change in these notices Once this change is made in a given copy it is irreversible for that copy so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy This option is useful when you wish to copy part of the code of the Library into a program that is not a library 4 You may copy and distribute the Library or a portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customa
74. based on the explanations below When we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it For example if you distribute copies of the library whether gratis or for a fee you must give the recipients all the rights that we gave you You must make sure that they too receive or can get the source code If you link other code with the library you must provide complete object files to the recipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there i
75. can Threats Update Network Reports Service Appearance General V Enable File Anti Virus Security Level n Maximum protection Comprehensive protection Recommended for hostile environment Action Prompt for action Block access V Disinfect WV Delete if disinfection fails A E Click the lock to prevent further changes Figure 25 Application settings window File Anti Virus KASPERSKY ANTI VIRUS FILE PROTECTION STATISTICS The main application window displays summary statistics related to the current performance of File Anti Virus including the number of objects scanned during File Anti Virus current session the number of dangerous objects detected and the name of the file currently being scanned see section Main application window on page 13 To view the detailed report of the component s performance click the button in the main application window and select File Anti Virus from the Running tasks section in the report window that opens If File Anti Virus is currently disabled for some reason you may view the detailed report on its performance during its previous startup in the Completed tasks area of the report window If File Anti Virus returns an error when closing view the report and try to restart the component If you cannot solve the problem on your own please contact Kaspersky Lab s Technical Support Service see section Contacting Technical Support on page 9 Gen
76. can disable File Anti Virus and file protection on your computer using one of the methods described below However before doing so you should determine why you want to disable the component It may be possible to solve your problem in another way such as by changing the security level see section Selecting the file security level on page 32 or by disabling protection only for certain files For example if you are working with a database that you know to be free from viruses just specify the folder containing its files as an exclusion see section Trusted zone creation on page 27 ANTI VIRUS PROTECTION OF YOUR COMPUTER S FILE SYSTEM To disable File Anti Virus click the Kaspersky Anti Virus icon see page 15 in the Dock or in the Mac OS Menu Bar and select the Turn Protection Off command You also can disable file protection from the application settings window see section Application settings window on page 15 To do this select the Protection tab and uncheck the Enable File Anti Virus box see the figure below ha f i Preferences CQrOB LIB kd Protection Virus Scan Threats Update Network Reports Service Appearance General V Enable File Anti Virus Security Level mn Maximum protection Comprehensive protection Recommended for hostile environment Action Prompt for action Block access WV Disinfect i Delete if disinfection fails rr Click the lock to prevent further changes
77. car2 com not disinfected skipped by user COMPLETED TASKS 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar3 com detecte st File All 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar3 com not disinfected skipped by user Last 20 12 3 09 12 37 27 PM File Volumes NO NAME Vvirus Eicar4 com detecte st File 12 3 09 12 37 27 PM File Volumes NO NAME Vvirus Eicar4 com not disinfected skipped by user Sree 12 3 09 12 37 27 PM File Vol NO NAME virus EicarS com d File ipdate O iaid ae Vo umes A ALLEN icar com etecte st ile 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar5 com not disinfected skipped by user ee eras 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar6 com detecte st File Update 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar6 com not disinfected skipped by user File Anti Virus 12 3 09 12 37 27 PM File Volumes NO NAME Vvirus Eicar7 com detecte st File File Anti virus 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar7 com not disinfected skipped by user File Anti virus 12 3 09 12 37 27 PM File Volumes NO NAME Vvirus Eicar8 com detecte st File 12 3 09 12 37 27 PM File Volumes NO NAME Vvirus Eicar8 com not disinfected 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar9 com detecte st File skipped by user ree Status Dangerous objects detected Scanned 1420 Start 12 3 09 12 05 53 PM Detected 29 Duration
78. cases when you modify the work You may place additional permissions on material added by you to a covered work for which you have or can give appropriate copyright permission Notwithstanding any other provision of this License for material you add to a covered work you may if authorized by the copyright holders of that material supplement the terms of this License with terms a Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License or b Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it or c Prohibiting misrepresentation of the origin of that material or requiring that modified versions of such material be marked in reasonable ways as different from the original version or d Limiting the use for publicity purposes of names of licensors or authors of the material or e Declining to grant rights under trademark law for use of some trade names trademarks or service marks or f Requiring indemnification of licensors and authors of that material by anyone who conveys the material or modified versions of it with contractual assumptions of liability to the recipient for any liability that these contractual assumptions directly impose on those licensors and authors All other non permissive additional terms are considered further restrictions within the mea
79. ces tab see the figure below gives a complete overview of the settings for File Anti Virus s operation see section Anti virus protection of your computer s file system on page 30 including virus scan see section Scanning for viruses on page 43 tasks and application updates see section Updating the application on page 61 The tab also shows File Anti Virus general security level what level virus scans are running at and what actions are being taken on dangerous objects To go to settings modification click the Change preferences buiton Aa AA Reports Kaspersky Anti Virus peel F Detected Preferences etecte i a Parameter Value Security level Recommended H anning Action Prompt for action Backup File types Scan programs and documents by content Scan only new and changed files Yes RUNNING TASKS Scan archives No i Scan installation packages No COMPLETED TASKS Scanning attachments only new All Postponed scan 0 MB Last 20 Update A Update amp File Anti virus Update File Anti virus File Anti virus i File Anti Virus Status Dangerous objects detected Scanned 1429 Detected 29 Untreated 29 m m Start Fause Stop Change preferences Figure 57 Component settings NOTIFICATIONS Various types of events occur when Kaspersky Anti Virus runs They may be of an informative nature or contain important information For ex
80. commended for hostile environment Virus Scan Action Prompt for action when the scan is complete O Prompt for action during scan O Do not prompt for action MW Disinfect W Delete if disinfection fails Other task You can apply the specified preferences to all virus scan tasks preferences ot F E Click the lock to prevent further changes Figure 38 Application settings window Scanning for viruses VIRUS SCAN STATISTICS You can view the information on results of Virus Scan in the Completed tasks section of the report see section Reports on page 81 on application operation If the task is being executed at the present moment brief information about it is displayed in the main window see section Main application window on page 13 To view a detailed report on current task performance open the report window and select the necessary task from the Running tasks section Information about the progress of the task is displayed in the lower part of the window If everything is successful the summary statistics of task execution results will be displayed These statistics contain the information on the number of objects scanned number of malicious objects detected and objects needing to be processed Scan start time estimated completion time and duration are also displayed If any errors occur during the scan run the task again If the attempt returns an error contact the Technical Support Service see section
81. connection is unavailable you can perform the activation later or connect to the Internet from a different computer and obtain a key using an activation code by registering on the Kaspersky Lab Technical Support Service website You may postpone the product activation To do this click the Cancel button In this case activation will be skipped Kaspersky Anti Virus will be installed on your computer and all its functions will be accessible to you except for the update you will be able to update the application once after installation ENTERING THE ACTIVATION CODE To activate the application you should enter the activation code If Kaspersky Anti Virus was purchased via the Internet the activation code will be sent to you by email If you purchase a retail boxed version of the application the activation code will be printed on the envelope containing the installation disk The activation code is a sequence of numbers and letters delimited with hyphens in four groups of five symbols without spaces for example 11AA1 11AAA 1AA11 1A111 Please note that the activation code should only be entered in Latin characters RECEIVING KEY FILE The Activation assistant connects to Kaspersky Lab s servers and sends them registration data activation code and contact information to be verified by the server If the activation code is verified the Assistant will receive a key from the server If you are installing a trial version of the applicat
82. cros pp Microsoft Office PowerPoint documents and files including pps Microsoft Office PowerPoint slide ppt presentation pptx Microsoft Office PowerPoint 2007 presentation pptm Microsoft Office PowerPoint 2007 presentation supporting macros potx Microsoft Office PowerPoint 2007 presentation template potm Microsoft Office PowerPoint 2007 presentation template supporting macros ppsx Microsoft Office PowerPoint 2007 slide show ppsm Microsoft Office PowerPoint 2007 slide show supporting macros ppam Microsoft Office PowerPoint 2007 add in supporting macros md Microsoft Office Access documents and files including mda Microsoft Office Access workgroup mdb database etc sldx Microsoft Office PowerPoint 2007 slide sldm Microsoft Office PowerPoint 2007 slide supporting macros thmx Microsoft Office 2007 theme The actual file format may differ from that indicated in the file extension ALLOWED FILE EXCLUSION MASKS There are several ways to create file masks when creating file exclusion lists 1 Masks without file paths e zip all files with the zip extension e zi all files with the zi extension where can represent any single character e test all files named test 2 Masks with absolute file paths e dir or dir all files in the dir folder e dir zip all files with the zip extension in dir folder e dir zi all files with the zi extension
83. d a notification will appear on screen which lets you decide how to proceed If you check the Apply to all box in the notification window the selected action will be applied to all objects with the same status in the list before processing Starts Click the Clear button to remove a record about a detected object from the report Note that the dangerous objects you have detected will then stay on your computer E ry E Reports Kaspersky Anti Virus REPORTS Te Detected Ponda Events Statistics Preferences Events Status Object l detected virus EICAR Test File modification File Volumes NO NAME virus WARN Eicar9 com oa detected virus EICAR Test File File Volumes NO NAME virus Eicar10 com ff Backup detected virus EICAR Test File File Volumes NO NAME virus Eicar2 com RUANIN TARE detected virus EICAR Test File File Volumes NO NAME virus Eicar3 com Ta detected virus EICAR Test File File Volumes NO NAME virus Eicar4 com y EE detected virus EICAR Test File File Volumes NO NAME virus EicarS com COMPLETED TASKS detected virus EICAR Test File File Volumes NO NAME virus Eicar6 com All detected virus EICAR Test File File Volumes NO NAME virus Eicar7 com Last 20 detected virus EICAR Test File File Volumes NO NAME virus Eicar8 com Update O detected ae eee File Volumes NO NAME virus Eicar9 com e mae O detected virus EICAR Test File modification File Vol
84. d be specified in range from 5 to 59 minutes e Hours Update frequency is calculated in hours Specify the interval in the schedule settings as Every N th hour and specify the value of N For example to download updates every hour select Every 1 hour e Days The time between scan startups is measured in days In the schedule settings specify the update start frequency Also in the Time field specify what time of day or night the task will run e Weeks The application is updated on certain days of the week If this option is selected in the schedule settings check the boxes for the days of the week on which you want the scan task to run Specify the time in the Time field UPDATING THE APPLICATION e Months The task will run once a month at the specified time e Ata specified time The task will run once at the date and time that you have specified e At application startup The task starts every time that Kaspersky Anti Virus starts You can also set an interval between the application startup and the task startup If a scan update did not start for any reason for example the computer was shut down at that time you can configure the missed task to start automatically as soon as it becomes possible To do this check the Run task if skipped box in the schedule window UPDATE DISTRIBUTION If your computers are linked in a LAN updates do not need to be downloaded and installed on each of them individually since this will
85. d to the list with the added by user status KASPERSKY ANTI VIRUS A file moved to quarantine manually may change its status if it had been scanned using the updated databases not earlier than three days after it was scanned for the first time after being placed in quarantine Later the file will be restored if it is assigned the false positive status or removed with a copy placed in the backup if it is considered infected oe a 9 0 Reports Kaspersky Anti Virus REPORTS gt Detected hen E re Status Object Size Added z Added by user test viruses eicarcom zip 146 bytes 12 3 09 12 22 18 PM Uivarantine Al Backup RUNNING TASKS File Anti virus D COMPLETED TASKS All Last 20 Update Update File Anti Virus Update File Anti virus Y File Anti virus File Anti virus oo ue Ill 7 Delete Restore Add Clear all Scan all Figure 48 Quarantine storage e Scan and disinfect all potentially infected objects in quarantine using the current Kaspersky Anti Virus databases To do this click the Scan all button After scanning and disinfecting any quarantined object its status can change to infected potentially infected false operation OK etc Quarantined objects status only can change if they are scanned using the databases released not more than three days after the file has been quarantined The infected status means that the object has been id
86. ders Pehrson library was used when developing the application All rights reserved under zlib libpng license This copy of the libpng notices is provided for your convenience In case of any discrepancy between this copy and the notices in the file png h that is included in the libpng distribution the latter shall prevail COPYRIGHT NOTICE DISCLAIMER and LICENSE If you modify libpng you may insert additional notices immediately following this sentence libpng version 2 1 06 December 3 2004 is Copyright 2004 Glenn Randers Pehrson and is distributed according to the same disclaimer and license as libong 2 1 05 with the following individual added to the list of Contributing Authors Cosmin Truta libpng versions 1 0 7 July 1 2000 through 2 1 05 October 3 2002 are Copyright 2000 2002 Glenn Randers Pehrson and are distributed according to the same disclaimer and license as libopng 1 0 6 with the following individuals added to the list of Contributing Authors Simon Pierre Cadieux Eric S Raymond Gilles Vollant and with the following additions to the disclaimer There is no warranty against interference with your enjoyment of the library or against infringement There is no warranty that our efforts or the library will fulfill any of your particular purposes or needs This library is provided with all faults and the entire risk of satisfactory quality performance accuracy and effort is with the user libpng versions 0 97 Jan
87. dified version of the Library The precise terms and conditions for copying distribution and modification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License also called this License Each licensee is addressed as you A library means a collection of software functions and or data prepared so as to be conveniently linked with application programs which use some of those functions and data to form executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the wor
88. disinfected it becomes available for use If the object cannot be disinfected its location is not be changed To gain access to an object objects in the report should be processed see section The Detected tab on page 83 When a potentially infected object is detected the application blocks access to this object and quarantines it on page 75 Block access Disinfect Application blocks access to the object and attempts to disinfect it If the object is successfully disinfected it becomes accessible to the user If the object cannot be disinfected it will be deleted Block access Disinfect Delete if disinfection fails Application blocks access to the object and deletes it Block access Delete Before disinfecting the object or deleting it Kaspersky Anti Virus creates a backup copy and places it to the backup on page 78 in case the object will need to be restored or it becomes possible to disinfect it RESTORING DEFAULT FILE PROTECTION SETTINGS When modifying the File Anti Virus settings it is always possible to restore the default settings Kaspersky Lab considers these settings to be optimal and have collected them in the Recommended protection level To restore default protection settings 1 Open the application settings window on page 15 and select the Protection tab see figure below 2 Click the Default button in the Security level section T AA A Preferences g a K Protection Virus S
89. dpl Borland Delphi packed library dil Microsoft Windows dynamic link library scr Microsoft Windows screen saver file cpl Microsoft Windows control panel module ocx Microsoft OLE Object Linking and Embedding object tsp Microsoft Windows program that works in time share mode drv driver for a Microsoft Windows device vxd driver for a Microsoft Windows virtual device pif Microsoft Windows file with information about a program Ink Microsoft Windows link file reg Microsoft Windows system registry key file ini Microsoft Windows initialization file KASPERSKY ANTI VIRUS cla Java Class vbs Visual Basic script vbe BIOS video extension js jse JavaScript source text htm hypertext document htt Microsoft Windows hypertext template hta hypertext program for Microsoft Internet Explorer asp Active Server Pages script chm compiled HTML file pht HTML file with embedded PHP scripts php script embedded in HTML files wsh Microsoft Windows Script Host file wsf Microsoft Windows script the Microsoft Windows 95 desktop theme file hip help file in Win Help format eml Microsoft Outlook Express email message nws new Microsoft Outlook Express email message msg Microsoft Mail email message plg email message mbx extension for saved Microsoft Office Outlook message doc Microsoft Office Word document including doc Micros
90. e A decision whether to scan the file is made based on the information retrieved 3 The file is analyzed for viruses Malicious objects are recognized based on the Kaspersky Anti Virus databases These databases contain descriptions of all the currently known malicious programs and the means to neutralize them 4 Following the analysis one of the following Kaspersky Anti Virus operation modes may be applied a Ifa malicious code is detected in a file File Anti Virus blocks the file and attempts to disinfect it After successful disinfection the file will become accessible If disinfection fails the file will be deleted When the file is disinfected or deleted a copy of it is placed into the backup storage on page 78 b Ifa code that is similar to a malicious one is detected in the file but cannot be proved to be definitely malicious the file will be placed into a special storage area called quarantine on page 75 The application will attempt to disinfect it later using updated databases c If no malicious code is detected in the file it will immediately become accessible IN THIS SECTION Pausing disabling file protection ccccccsssecceccesececcceeseeeeecauueeeeeceeueeeeeseeeeeeeessaueceeeseaueeeeessaaeeeeessaeeeeessageeesssaaeeeessaaages 30 Configuring file protection ee eee 31 File protection Statis oro een cere ener re enn a EE eee rn Sere eee a EE eee ee oe ee eee 42 PAUSING DISABLING FILE PROTECTION You
91. e 27 MULTI TASKED PROTECTION MANAGEMENT There are several ways to disable computer protection e Click the Kaspersky Anti Virus icon on page 15 in the Dock or in the Mac OS Menu Bar and select the Turn Protection Off command from the menu that opens one 3 amp Kaspersky Anti Virus Protection O l Turn Protection Off Quick Scan Update Preferences kaspersky Anti Virus Exit Figure 6 Disabling protection from the contextual menu e Open the application settings window on page 15 select the Protection tab and uncheck the Enable File Anti Virus box AARP Preferences gae 0 BOB B Protection Virus Scan Threats Update Network Reports Service Appearance General V Enable File Anti Virus Security Level es G Maximum protection Comprehensive protection Recommended for hostile environment Action Prompt for action Block access V Disinfect V Delete if disinfection fails L Click the lock to prevent further changes Figure 7 Application settings window File Anti Virus RESTORING PROTECTION ON YOUR COMPUTER If you have paused or fully disabled your computer s protection you can re enable it in the following ways KASPERSKY ANTI VIRUS e From the menu that opens by clicking the Anti Virus icon see section Kaspersky Anti Virus icon on page 15 in the Mac OS Menu Bar or in the Dock To do this select the Turn Protection On item
92. e Base Knowledge Base is a separate section of the Technical Support Service website http Awww kaspersky com support kavmac which provides recommendations for working with Kaspersky Lab s products This page contains articles published by Technical Support service specialists These articles provide useful information recommendations and answers to frequently asked questions related to the purchase installation and use of Kaspersky Anti Virus These answers are grouped by topics for example Working with key files Updating the databases or Troubleshooting The articles may answer questions which are related not only to Kaspersky Anti Virus but also to other Kaspersky Lab products they also may contain Technical Support service news To switch to Knowledge Base open the main application window on page 13 click the iD button and in the window that opens use the Technical Support Service button Users forum If your question does not require an urgent answer you can discuss it with Kaspersky Lab s specialists and other users in our forum http forum kaspersky com It is also made into a separate section at the Technical Support service website and contains Kaspersky Anti Virus users questions feedback and requests In this forum you can view existing topics leave your comments create new topics and use the search engine To go to this resource open the main application window on page 13 click the a button and in
93. e Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros and small inline functions ten lines or less in length then the use of the object file is unrestricted regardless of whether it is legally a derivative work Executables containing this object code plus portions of the Library will still fall under Section 6 USING THIRD PARTY CODE Otherwise if the work is a derivative of the Library you may distribute the object code for the work under the terms of Section 6 Any executables containing that work also fall under Section 6 whether or not they are linked directly with the Library itself As an exception to the Sections above you may also combine or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work that the L
94. e Onaccess and modification File Anti Virus scans objects as they are opened or edited e On access only scans objects when an attempt is made to open them e On execution only scans objects when an attempt is made to run them ANTI VIRUS PROTECTION OF YOUR COMPUTER S FILE SYSTEM Note that the files being opened will be intercepted and scanned by File Anti Virus regardless of the mode you have selected General Protection scope Additional Scan mode Smart mode On access and modification On access On execution Performance W Use iSwift technology Pause task On schedule Schedule Q cancel 0k Figure 22 File Anti Virus Configuring additional settings iSwift technology can increase the speed of the File Anti Virus by excluding certain objects from the scan An object is excluded from the scan using a special algorithm that takes into account the release date of the database the date the object was last scanned and any modifications to the scan settings This technology works with objects of any format size and type There are limitations to iSwift it is bound to a specific file location in the file system and can apply only to objects in HFS To enable ISwift during the scan check the Use iSwift technology box in the Performance section You might need to pause File Anti Virus when performing tasks that require significant resources from the operat
95. e and a brief idea of what it does gt Copyright lt year gt lt name of author gt This library is free software you can redistribute it and or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation either version 2 1 of the License or at your option any later version This library is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU Lesser General Public License for more details You should have received a copy of the GNU Lesser General Public License along with this library if not write to the Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Also add information on how to contact you by electronic and paper mail You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the library if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the library Frob a library for tweaking knobs written by James Random Hacker lt signature of Ty Coon gt 1 April 1990 Ty Coon President of Vice That s all there is to it The described above libraries are distributed with our product and licensed or sublicensed to the user under the GNU General Public License GPL or other free software licenses which
96. e any questions concerning the purchase installation or use of Kaspersky Anti Virus answers are readily available Kaspersky Lab provides a variety of information sources about the application You can choose the most suitable according to the importance and urgency of your question KASPERSKY ANTI VIRUS IN THIS SECTION Sources of information to research ON your OWN cccccceseeeecccceeccaeeeeeceeeeeesaeeeeeeeeceeeseeeeeeeeeeeesseeeseeeeeeesseaeaseeeeeesssaaaeeeeeeeeeas 8 Contaciing Technical SUPPONI ixccsececaccecectnccu2seigacesecenenteeeidecocnotecendueigaduqeacnacthceed caceauesasieadaenechadnectceeiddneceatneansesdeenncteteseaseat 9 Contacting Sales De Om UI se sscencexiescececeerecaceqced eset veceenatenetesnosiontcesaeandatasieseeeeenmeesecteecteueesedanabeeehosnmersd ep eoe meceaecpedeseb saian 10 SOURCES OF INFORMATION TO RESEARCH ON YOUR OWN You can refer to the following sources of information about the application e Page at the Kaspersky Lab website e Page at the Technical Support Service website Knowledge Base e Kaspersky Lab products users forum e Help system e Documentation Page on the Kaspersky Lab website This page http www kaspersky com kaspersky anti virus for mac will provide you with general information on the application its features and options You can purchase Kaspersky Anti Virus or extend your license in our eStore Application page on the Technical Support Service website Knowledg
97. e databases if you are working with quarantine Set the maximum duration for storing objects in quarantine By default the term for storing objects in quarantine is 30 days at the end of which the objects will be deleted You can change the maximum period for storing potentially infected objects or cancel this restriction Toconfigure the settings for storing objects in quarantine 1 2 Open the application settings window on page 15 and select the Reports tab see figure below In the Quarantine and Backup check Delete objects after box and set the term for keeping objects in the storage after which they will be automatically deleted Please note that this setting value will also apply to backup on page 78 O UOU O Preferences a e OmO0OA B Protection Virus Scan Threats aaa Network Reports Service Appearance Reports Log non critical events Keep only recent events v Delete reports after 30 days Quarantine and C Backup Fal Delete objects after 30 days i E Click the lock to prevent further changes Figure 49 Application settings window Reports BACKUP Sometimes when disinfecting the objects their integrity cannot be saved If the disinfected file contained important information and after disinfection it became partly or completely inaccessible you can attempt to restore the original object from its backup copy Backup copy is a copy of the original dangerous object that is cr
98. e network server or other readily accessible means then you must either 1 cause the Corresponding Source to be so available or 2 arrange to deprive yourself of the benefit of the patent license for this particular work or 3 arrange in a manner consistent with the requirements of this License to extend the patent license to downstream recipients Knowingly relying means you have actual knowledge that but for the patent license your conveying the covered work in a country or your recipient s use of the covered work in a country would infringe one or more identifiable patents in that country that you have reason to believe are valid If pursuant to or in connection with a single transaction or arrangement you convey or propagate by procuring conveyance of a covered work and grant a patent license to some of the parties receiving the covered work authorizing them to use propagate modify or convey a specific copy of the covered work then the patent license you grant is automatically extended to all recipients of the covered work and works based on it A patent license is discriminatory if it does not include within the scope of its coverage prohibits the exercise of or is conditioned on the non exercise of one or more of the rights that are specifically granted under this License You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software under which you m
99. e occasions there may be a special need to encourage the widest possible use of a certain library so that it becomes a de facto standard To achieve this non free programs must be allowed to use the library A more frequent case is that a free library does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public License In other cases permission to use a particular library in non free programs enables a greater number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library The precise terms and conditions for copying distribution and modification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION USING THIRD PARTY C
100. e scanned on your computer e Security level The security level is a set of parameters that define the balance between thoroughness and speed of scanning of objects There are three preset security levels see section Selecting the file security level on page 32 with settings developed by Kaspersky Lab specialists e Action on detected object An action defines how Kaspersky Anti Virus See section Selecting actions on objects on page 40 will react when an infected or potentially infected object is detected e Schedule Automatically running tasks by a schedule see section Configuring the scan task schedule on page 54 enables you to scan your computer for viruses at a time convenient for you Additionally you can specify uniform settings for running all tasks IN THIS SECTION SElSCIING BL SCCUMILY OVE E A T E A AE A EAE A E T E N 48 Specifying the types of objects to be SCANNEM ceeccccccseeeceeeceeeceeeeaeeeeeeeceeeeeeeesseeeeeeesseaeeeeessaaeeeeessaaseeeessecseeeseneeseeees 50 ISG TING CUMS ONC NCC e wacieen nciaste veteasnoce eastieeanasteasscastancbeuseaceeeetiereesyiaadseeore 52 Configuring the scan task SCNECUIEC ccccsseeecccceeecseeeeeeeeeeeseeeeeeeeeeeeseaaeesceeeeeeseeeeseeeeeesseseeseeeeeeeessaaaseeeeeeesssaeeeeeeeeeeas 54 Running scan tasks under the user ACCOUNL cccccseeeccceeeeeceeeeeeceeeeeasueeesaaueeeseaeeesseueeecsaueeeseueeeeseeeessueeeeseeeeesseneeesaages 55 Assigning unif
101. e task name Full Scan or Quick Scan In the right part of the window in the Objects to scan section press the Edit button This will open the window containing a list of objects see figure below Edit the list of objects if you need it To add the object to the list drag n drop it to the window or click the button In the latter case the standard file selection dialog will be opened If the object being added contains embedded items that should also be scanned for example subfolders check the Include subfolders box in the file selection window KASPERSKY ANTI VIRUS To delete an object select it from the list and click the ea button You can temporarily disable scanning of individual objects for any task without deleting them from the list To do this uncheck the box beside the object that you do not want to scan You can create edit a list of objects to scan for users task See section Creating virus scan tasks on page 46 in the same way Place here one or several objects to scan using the drag n drop option M E Users Shared Edit Cose _ Figure 28 Creating a list of objects to scan In addition to full and quick scan Kaspersky Anti Virus includes the file folder scan task Virus Scan This task does not have a predefined list of objects to scan You will be invited to create a list of objects to scan every time you run the task To select one or several objects to scan 1 Open t
102. e used in the work which must be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machine readable work that uses the Library as object code and or source code so that the user can modify the Library and then relink to produce a modified executable containing the modified Library It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions b Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version that the work was made with USING THIRD PARTY CODE c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing this distribution d If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place e Verify that the user has already received a copy of these
103. earance Events notification Y Enable notifications Additional Show application C in Menu Bar a O In Dock Changes made to the setting will apply at the next startup of the application n E Click the lock to prevent further changes Figure 58 Application settings window Appearance KASPERSKY ANTI VIRUS 2 Check the Enable notifications in the Events notification section and switch to advanced settings To do this click the Additional button In the window that opens see the figure below you may configure the following types of notices about events listed above e Pop up message on screen which contains information about an event that has occurred To use this type of notification check the box in the Balloon field next to the event you want to be notified of e Audio message If you want this notice to be accompanied by a sound file check the box in the Sound field next to the event name Event Balloon Sound All notifications r Critical notifications Detection of viruses worms Trojans hack tools Detection of possibly infected object Disinfection impossible License validity period has expired Databases are obsolete Functional failure License is missing corrupted or blacklisted Update error Task can not execute Databases are missing or corrupted Important notifications Detection of adware spyware etc License validity period expires
104. eated when first disinfecting or deleting the object and saved in backup Backup is a special repository that contains backup copies of dangerous objects subject to processing or deletion The main function of backup is the ability to restore an original object at any time Files in backup are saved in a special format and are not dangerous IN THIS SECTION Actions ON DACKUD COPIES i cnatuosuceiicwsnisnl eae crinuadusnniswisiniesinesakiwn duaetesiucuasn canistwusainebscow EERE EAE NEETER EEREN TEENETE aE Ae 78 Configuring the backup settings ccccccccccceseeeeeeeeeeeceeeeeeeeeeeesaeeeeeceeeeeseeeuseeeeeeeeeeeeuseeeeesssaaeseeeeeeessseaeeeeeeeeesaeaaeeseeeeeees 79 ACTIONS ON BACKUP COPIES The list of backup copies of stored objects is displayed in the Backup section of the report window see the figure below To view the backup areas 1 Open the main application window on page 13 and click the button 2 Inthe left part of the window that will open select the Backup item see the figure below Content of the storage will be displayed in the right hand part of the window A list of backup copies is displayed in the storage The following information is provided for each copy the full name of the object with the path to its original location time when the object was moved to the storage the status of the object assigned after the scan and its size You can restore selected copies using the Restore button An obj
105. ecipients to copy the Corresponding Source along with the object code If the place to copy the object code is a network server the Corresponding Source may be on a different server operated by you or a third party that supports equivalent copying facilities provided you maintain clear directions next to the object code saying where to find the Corresponding Source Regardless of what server hosts the Corresponding Source you remain obligated to ensure that it is available for as long as needed to satisfy these requirements e Convey the object code using peer to peer transmission provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d A separable portion of the object code whose source code is excluded from the Corresponding Source as a System Library need not be included in conveying the object code work A User Product is either 1 a consumer product which means any tangible personal property which is normally used for personal family or household purposes or 2 anything designed or sold for incorporation into a dwelling In determining whether a product is a consumer product doubtful cases shall be resolved in favor of coverage For a particular product received by a particular user normally used refers to a typical or common use of that class of product regardless of the status of the particular user or of the way in wh
106. ect is restored from the backup with the same name that it had prior to disinfection If there is an object with the same name in the original location this situation is possible when restoring an object with a copy created prior to disinfection a corresponding warning will pop up on screen You can change the location of the object being restored or rename it We recommend that you scan the object for viruses immediately after restoring it It is possible that you will manage to disinfect it without losing its integrity using the updated databases We do not recommend that you restore backup copies of objects unless absolutely necessary This could lead to an infection on your computer We recommend that you periodically view the repository content and clear it using the Delete button To clear the backup BACKUP storage completely click the Clear all button You can also set up the application so that it independently deletes the oldest copies from backup see section Configuring the backup settings on page 79 OLOO Reports Kaspersky Anti Virus REPORTS i Detected Status Object Size Time C trenes Se oe ae ie aa A detected lla Ele eh Volumes NO NAME Vvirus WARN Eicar9 com 73 bytes 12 3 09 12 42 17 PM detected virus EICAR Test Fi Volumes NO NAME virus Eicar4 com 68 bytes 12 3 09 12 42 14 PM om id Bicis detected virus EICAR Test Fi Volumes NO NAME virus SUSP Eicar9 com 73 bytes 12 3 09 12 42 17 PM RUNNING TAS
107. eeeeaeeeseeeeeeeesaeseeeceeeeessaeeeeeeeeeeseaeesseeeeeeessseeseeeeeeeessasseeeeeeeessaeseeeeeeeeeas 37 SEICCIING ACHONS OM ODJECE errore nenen an EEEE EEEE Ee rr E dkcipet be usecase KENA NA oa RENEE OSERE KETEN t 40 Restoring default file protection S ttiNnGS ccccccsssccccccseeeceecceeeeceeceeeeceeeseeeceeessaeeeeesseseeeeesuaaeeeesseaeeeesseaaeeeesssageeessssees 41 SELECTING THE FILE SECURITY LEVEL File Anti Virus uses a security level to determine which objects to scan There are three preset levels see the figure below e Maximum protection is the most complete scan of the files you open save or start e Recommended This is the level with the settings recommended by Kaspersky Lab experts e Maximum speed this level enables you to comfortably use other applications that require significant system resources since the range of files scanned is smaller The default setting for file protection is the Recommended level You can raise or lower the scan s security level by selecting a new level or by modifying the settings for the current level To change the security level adjust the slider bar Changing the security level changes the balance between scan speed and the total number of files scanned the fewer the files scanned for viruses the higher the scan speed If none of the preset security levels meets your needs you can customize the protection settings You are advised to select as a basis the level closest to yo
108. eeeeeeeeesaeeeeeeeeeessaaneeeeeeeeees 6 DIS CS OID seassa a EEEE E A E ENEE EE AA EEEE EERS 7 Service for registered USES ccccccccsssseeccceeeceaeeeeeeceeeeeeaeeeeeeeeeesaeeeeeeeeeeeeseeeeeeeeeeeeseeeeeeeeeeeseeaeaseeeeeeessaaaageeeeeeeseeagees 7 Obtaining information about the application ccccccecccssssseeeeeeeeeeeeeeeeeeeeeeeeaaaueessdeeeeeeeeeeeeeeeeeesaaaesasseeeeeeeeeeeeeeeseeaaas 7 Sources of information to research ON your OWN ccccccccceccsseeecccceecaeeeeeeeceeeesaueeeeeeeeeessaeesseeeeeesssaaaseeeeeeessaaaees 8 Contacting Technical SUpport ssscsecessccieeosostvecdamesvancrentcecnedectincaseetvesdaltoanseegneticeybedoaticensustivaensbnevnedbecsyedaiustaearaedcescene 9 Contacting Sales DEP AMMO scsceceesenwertscosaseessnsnedssnscnececaedesdeaedateueucasesddeesdeedeeasessiasedatedeundsacdedpscbedeenvsewacendebectcs 10 INSTALLING AND REMOVING KASPERSKY ANTI VIRUS cccccccceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeees 11 APPLICATION INTERFACE sorrenc inepe eeii a a E riia ERa E Erebas EE r r EE aibad 13 Main application WINGOW so ccacasenins as vencndonstioncoietenmodesatsetodsameavamssienwoes Aa AEAEE EEA a TAN A RESA 13 Application settings WINdOW cccccceeseeeeeeeeneeeeeeeaaeeeeeeeaaeeeeeeeaaeeeeeeeaaaeeeeesaaaeeeeseaaaeeeeesaaaeeesssaaaeeesesaaaeeesseaaeeeesaeaes 15 PAS OS GRY Anti WEL GH CON issic e Ear OTa EE E EEEN saad pa ET aae EEE EEES 15 Configuring the Kaspersky Anti Vi
109. eeeseeeeeeseneessaaees 55 Assigning uniform scan settings to all taSkS cccccesecccsseeeeceeeeeeceeeceeseeeeeeaeeeeessaueeeseeeessaeeeessaueeeseneeessaeeessaes 57 Restoring default scan settings cccccccccssseccecceeseececcaeeeeeecseueeeeecaeaeeeessaeaeceessauaeceeesaeaeeeesssaaeeeeessaeeeessaeneeesess 58 Virus scai St AU SUG S cossa Tonei O EE RT EE E E Ee eE aa aai 59 UPDATING THE APPLICA TION psrritnistpnne niena e EARE EE EER EE rA RA NEES EA EEEN ERIRE NERE RIES 61 Staring the Update ssseescrenireiepinenn one RARESA rE PREE E EEEN RENTRER E EER REENE AR EEDAN RARE NEEN Re 62 Rolling back the latest update vcicccccs nisactscichaasedeanestoccodaiaedccnctsdeataneedecdapiiganceadecediasidthah secs dusiansitenseaednaunaticbchataaearens 62 Conigunng he TOA sses as cece ces ce e E E E E E 63 Selecting an update SOUNCS oa osiaes cnet ice cteseidececteeinen oben dened seb saiesievexldaaysn nee redienlbe dene cindlncondickuisGeess baling antec deoekxekewsccexaannce 64 Selecting the Update mode and objects cccccccccssesseececeeeeeaeeeeeeeeeeeeeeseeeeeeessaaeeeeeeeeeseseaeaeeeeeesssaaeseeseeeeneas 65 Configuring the Update task SCNECUIE cccccccccccceeesseeeeeeeseeaeeseeeeeessesaeesseeeeeessseeeeceeeeesseaeseeeeeeeesssaaseeseeenteas 66 Gate I SID UNO p Me E E E A E E E EA E E E E AE E E 67 ACUOSA ODO e E E E E E E E 68 Configuring proxy server Settings ccccccccceeeseeeeceecceeeeeeeeeeeeseeeeseeeeeeeeseeeeeueeeee
110. eetoee cece 115 GGO AO TIDY cesera nA E eR EER EE REEE ER E REE EEEE EE 116 S nd effects lirar y scaceseeeosaiestseaiananecteneoneesceutvetenaseicesceneceebat a PEE EAEE E AE ctennaceecces aeseaieaeenseaseeees 125 KAOPERO RT EA D sir en eee E E ee ee ee ee ee 126 KASPERSKY ANTI VIRUS Kaspersky Anti Virus for Mac hereinafter referred to as Kaspersky Anti Virus is the new generation of information protection solutions It is designed to protect computers managed by Mac OS against viruses and malware The following functions are implemented in the application e Real time protection of your computer s file system through interception and analysis of attempts to access the file system disinfection deletion and isolation of potentially infected objects for further analysis e Searching and deactivating malicious code at the user s request search and analysis of infected and potentially infected objects in the designated scan areas disinfection deletion or isolation of objects for further analysis The most useful virus scan tasks are included in the Kaspersky Anti Virus package full computer scan and quick scan of critical areas e Updating the databases and modules of Anti Virus from Kaspersky Lab s update servers creating backup copies of all the updated files to allow a future roll back copying the updates into a local source to allow other networked computers to access them so as to reduce Internet traffic e Quarantini
111. eferences gt E Protection Virus Scan Threats pdate Network Reports Service Appearance Run mode Automatically Every 1 day Edit Manually Update Eil Update application modules Preferences Action after update Fal Rescan quarantine Roll back update If the databases are corrupted you can roll back to the previous database version Roll back update E Click the lock to prevent further changes Figure 41 Application settings window Update If there are currently module updates on the update source Kaspersky Anti Virus will download the required updates and apply them after the computer restarts The downloaded module updates will not be installed until the computer restarts KASPERSKY ANTI VIRUS If the next application update occurs before the computer restarts and the program module updates downloaded earlier are installed only the databases will be updated Update mode determines how the update is launched One of the following modes can be selected in the Run mode section see the figure above e Automatically Kaspersky Anti Virus checks for an update package in the update source at the set time intervals see section Selecting an update source on page 64 If Kaspersky Anti Virus detects new updates it downloads and installs them on the computer This update mode is used by default The next attempt to update will be performed by Kaspe
112. eleie lene NEN EN 40 Restoring default file protection SEttiNGS cccccccccccccseeeeececeeeeeeeeceeeeeeeeeeeeseeeesseseeeeesseaeeeeeseeaeeeeessaeeeeeesaeneeeeees 41 FS POROUS COU Statis Cate erderceesmestieitaa vena aa E eE E E a eaaa aie 42 SCANNING FOR VIRUSES siescecssceascscececcncssehccaideeacecnstiossacedeadecd ioa iaaa baaie eTe d aieea iaai 43 Managing virus scan taskS sscssiseseernirereeseinnsnreninnininirni nenni ennan annann aneian anainn inkaen aa nana anai an 43 Creating the list of objects tO SCAN cccccccccsesseeccceeeceeeeseeeeeeeeeeeeeseceeeeeeseeeeeeeeeeeseseeseeueeeeesesaeaeeeeeeeeeseaeageeeeeesessaaaes 45 Gea VFS SCAN a E a E E 46 COn O VUS eCa aE e E E eee ee eee 48 KASPERSKY ANTI VIRUS Selecting a security IOVEl ec ceeceeecccceeceeeeseeeeeeeeeseeeeeeeeeeeeseeeeeeeeeeeeeseeaeeseceeeeesaeesseeeeeeeeseasaeeeeeessssaeeeseeeeneas 48 Specifying the types of Objects to DE scanned cccccccssseecccceeseececcaaueeceeceuueeeeeeaaueeeessueaueeeseueaeeeeessaaeeeeseaaaeees 50 Selecting actions on US teeta terete cece en cet ee eevee penn bencne aaeiese cate ecto setna ser pence dey ouraesheseeceetenehem secu enuetessenaeuesecnto ose 52 Configuring the Scan task schedule cccceceecccceeceeeeseeeceeeceeaeeeeeeeeeeeeeaeeeseeeeesssseeeeceeeessseaeaeeeeeeeessuaeeeeeeeeeeas 54 Running scan tasks under the user ACCOUNT ccccseecceceeeeeeeeeeeeeeeeeeeceeeeeeeeeeeseaeeeeseueeeseaeeeessae
113. elow Aa A A Preferences Haa Virus Scan Threats Update veen PER Service Appearance General Eil Use proxy server If you are using a proxy server for your Internet connection check the corresponding box and specify its preferences below Proxy server Use system proxy server preferences O Use specified proxy server preferences Address Port 80 W Bypass proxy server for local addresses Use authentication User name Password TETTTETIT nE Click the lock to prevent further changes Figure 46 Application settings window Network 2 Check the Use proxy server box and specify which proxy server settings you need to use e Use system proxy server preferences if this option is selected Kaspersky Anti Virus uses the proxy server settings specified in the MAC OS settings e Use specified proxy server preferences use a proxy server different from that specified in the Mac OS settings In the Address field enter either the IP address or the character name of a proxy server and specify the proxy server port in the Port field To exclude the use of a proxy server when updating from a local or network folder check the Bypass proxy server for local addresses box 3 Specify if authentication is required on the proxy server Authentication is the procedure of verifying user registration data for access control purposes If the authentication is required to connect to the proxy server check the Use authentica
114. ence of various problems in the operation or configuration of the application For more detailed information on these problems and their quick elimination use the Security Assistant see section What is the protection status of your computer on page 18 that opens when you click on the color indicator In addition to the color indicator the left part of the main window contains a block of text which describes the protection status and lists any security threats logged by the Security Assistant If you have virus scan or update tasks running at this time information on their progress as percentage completion will also be displayed in the left part of the main window The lower part of the window displays summary statistics on the operation of File Anti Virus and information about the databases being used by the application From the main window you can start the Kaspersky Anti Virus update modify settings for virus scan tasks in specified areas and run them and manage the licenses To do this use these buttons gt Run Kaspersky Anti Virus updater This opens a report window with detailed information about the task s execution Go to virus scan tasks quick scan full scan and scan for viruses in the user defined scope Switch to managing the licenses needed to enable Kaspersky Anti Virus You can view information on the current license key files delete keys and install new ones The navigation bar is located in the upper part
115. entified as infected but the application did not manage to treat it The application will remove such an object from quarantine saving a copy of it in the backup storage see section Backup on page 78 All the objects with the false positive status will be restored to their original locations e Restore files in the folder specified by the user or in the folders from which the files were moved to quarantine default option To restore an object select it from the list and click the Restore button When restoring objects quarantined from archives mail databases and mail format files you should also specify the directory in which they will be restored We recommend that you only restore objects with the false operation OK and disinfected statuses since restoring other objects may infect your computer e Delete any quarantined object or group of selected objects Only delete objects that cannot be disinfected In order to delete objects select them in the list and click the Delete button To clear the quarantine storage completely click the Clear all button QUARANTINE CONFIGURING QUARANTINE SETTINGS You can configure the settings for the composition and operation of quarantine specifically Set the automatic scan mode for quarantined objects after each application database update see section Actions after update on page 68 Kaspersky Anti Virus will not be able to scan quarantined objects immediately after updating th
116. eral information about the component s performance is grouped on the following tabs e All dangerous objects detected when protecting the file system are listed on the Detected tab see section The Detected tab on page 83 The tab contains the full path to the location of each object and the status assigned to the object by the File Anti Virus If the malicious program that has infected the object is revealed this object is assigned the corresponding status for example virus Trojan etc If the type of malicious effect cannot be exactly established the object is assigned the status of suspicious Next to the status the action taken on the object is specified detected not found disinfected e The Events tab shows the complete list of events that have occurred during File Anti Virus operation see section The Events tab on page 84 The events can have the following statuses e information event for example object not processed skipped by type e warning for example a virus is detected e note for example archive is password protected e Statistics appear on the corresponding tab see section The Statistics tab on page 84 Here you will find the total number of scanned objects and further columns show how many archives dangerous objects disinfected objects quarantined objects etc have been processed out of the total number of objects scanned e Preferences enabled for File Anti Virus are displayed on the tab with the sa
117. esseeseeeeeeeeseseeaeeeeeeeeeseaaaeeeeeeesessaaees 69 updo Tai GS oee E E T E E E E neem guesses 71 UCENE MANACEMERT anean E een eee ee ee ee meee re eee 72 PAIN TIN aroen A EE e E E E A 75 ACTIONS on guarantined ODISCCUS vai siitsenicscsinccarcanisanchvaweiwunsaicdawa ctinbanekaaiiduchvali OPENEN ENE ANAE ENANA NES OrE PEN na rA NEE a ra see Ninia 75 Conigurning g arantine Seinge ssesssrrcnn a E E 77 BA FUP a a E E E E 78 Actions OM DAGKUD COPIES ssieraarenna ENE sapsusard canoinelye are PENE EErEE EEEREN i PENE TEREA ETRE Nero aE NE EENEN ai 78 Configuring the backup SETtINGS ccccccccccseeseeceeeeeeeeeeeeeeeceeseeeeeeeeeeeeeesseeeeeeeeeeeeseeeseeeeeessseeaeeeceeeeseeeaeeeeeesssaaaees 79 RE RORI ee a A S E ence saceeaatebeeeecnce ceetemeeccccouuas 81 Configuring the report Settings ccecccccccceceeeseeeceeeeeeeeeseeeeeeeeeseeeeseeeeeeeeeseeeeeeeeeeeesseaeeeceeeessseeeeeeeeeesssaaaeeseeeesseaaees 82 The Detected tap eicere E i ENON nE NE a sei neon cleanse EOE neve iene E A 83 EAEE TUES TA ee a E E E E E E E ss een eden 84 FeS S e E E E E desaatetacacshe 84 TePe Tan OS TA e E eee aesaeeeseanmeaeeseeess 86 KOTIRO ATION o erae cee E E E E A E A E ceedesanaaaees 87 FE CP INFORMATION erre E TE 89 List of objects to scan by extension mimcnsctcsesar amon daaacaaue Moameotitnaunees eetaondaeatebee deadeanaabexneealoiseanttioeeds deageehiebouersaMarert 89 Allowed file exclusion masks se apse tec ace ce detoecree co aston aies shee seidveeence
118. f the box is checked updates will automatically be copied to this folder when they are retrieved KASPERSKY ANTI VIRUS Kaspersky Anti Virus only retrieves its own update package from Kaspersky Lab s servers Update source Additional Copy updates to folder Users Shared Updates Select J ox Figure 44 Configuring update distribution service f you want other computers on the network to update from the folder containing updates copied from the Internet you should do the following 1 Grant public access to this folder 2 Specify the shared folder as the update source on the networked computers in the update service settings ACTIONS AFTER UPDATE Every Kaspersky Anti Virus database update contains new records that protect your computer from the most recent threats Kaspersky Lab experts recommend that you scan the quarantined objects each time after the database is updated on page 75 Why should these objects be scanned Quarantine contains objects for which the malware that had caused the infection has not been identified It is possible that after the database update Kaspersky Anti Virus may be able to identify the threat and eliminate it Kaspersky Anti Virus scans quarantined objects after each update by default If an object still has the potentially infected status it will remain in the storage If the status changes to infected the object will be processed according to the action
119. from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee You may modify your copy or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a software library b You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change c You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License d Ifa facility in the modified Library refers to a function or a table of data to be supplied by an applic
120. g support for Kaspersky Anti Virus open the main application window on page 13 and click the button Before contacting Technical Support Service please read the support rules http support kaspersky com support rules If problems occur when using Kaspersky Anti Virus first check if troubleshooting instructions for the problem are provided in this documentation help system in the Knowledge Base on the Kaspersky Lab Technical Support website or on the Users Forum see section Sources of information to research on your own on page 8 If you do not find a solution to your problem we recommend that you contact Kaspersky Lab Technical Support Please note that you have to be a registered user of the commercial version of Kaspersky Anti Virus to obtain technical support No support is provided to users of trial versions A new user Is registered using the Activation assistant see section License management on page 72 if you are activating Kaspersky Anti Virus using the activation code Under this option once registration is complete a customer ID will be assigned to you Customer ID is a personal user ID which is required for phone or web form based technical support If you are activating the Kaspersky Anti Virus using a key file you have to pass the registration procedure at the Technical Support Service website The customer ID and password received when registering are needed to access your Personal Cabinet your own section
121. gram below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based o
122. h between them using the Continue go to the next step of installation and Go Back go one step back buttons Let us take a closer look at the steps of installation 1 Reading important information Please read the information about the application you are installing and make sure that your computer meets the system requirements specified To print the information click the Print button To save the information as a text file click the Save button Reading License Agreement Please thoroughly read through the License Agreement for using Kaspersky Anti Virus between you and Kaspersky Lab The text of the agreement is available in several languages To print the text of the agreement click the Print button To save the agreement as a text file click the Save button If you accept all the terms of the agreement click the Continue button and confirm that you accept the terms of license agreement in the window that opens Kaspersky Anti Virus installation will continue To return to the text of the license agreement click the Read license button If the Disagree option is selected installation will be interrupted Change install location This window contains the information about the disk on which the application is to be installed and the free disk space needed for the installation If default settings of the installation meet your requirements click the Install button and enter the administrator s password to confirm the inst
123. have finished using the Security Assistant the main window color will indicate security problems If you postpone the elimination of some threats they will not be present in the list of active threats the next time Security Assistant is opened However you can still return to view and eliminate postponed threats by clicking the View postponed threats button in the last window of the Security Assistant How TO SCAN YOUR COMPUTER FOR VIRUSES When installation is complete Kaspersky Anti Virus will notify you that the full computer scan has not yet been performed and will advise you to run the Full computer scan task immediately To open the Full computer scan task 1 Open the main application window on page 13 and click the button 2 Runthe amp Full Scan task To view task execution results open report window see section Virus scan statistics on page 59 To view or edit current task settings 1 Open the application settings window on page 15 and select the Virus Scan tab 2 Select the Full Scan task in the dropdown list on the left In the right hand part of the window edit the list of objects to scan see section Creating the list of objects to scan on page 45 view the settings that will be used for a task security level see section Selecting a security level on page 48 and action see section Selecting actions on objects on page 52 that will be taken on dangerous objects If required configure a task
124. he Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free
125. he color will be supplemented by informative messages The Traffic Light Colour can be e Green This status indicates that your computer is properly protected This means that the databases are updated File Anti Virus is enabled Kaspersky Anti Virus is running with the settings recommended by Kaspersky Lab and either no malicious objects have been discovered by a virus scan or all detected malicious objects have been disinfected QUICK START e Yellow Your computer s protection is below the previous level This protection status indicates that there are problems in the performance or settings of Kaspersky Anti Virus Such problems include for example slight deviations from the recommended operation settings or the Kaspersky Anti Virus databases have not been updated for several days e Red Your computer is at serious risk of infection This status indicates that there are problems which may lead to the infection of your computer and the loss of data Such problems include for example a failure in File Anti Virus operation the Kaspersky Anti Virus databases have not been updated for a long time malicious objects have been detected and urgently need to be disinfected or the application has not been activated If there are problems in the protection system you are advised to fix them immediately To do this use the Security Assistant see the figure below which opens if you click on the color indicator in the main window
126. he main application window on page 13 and click the button 2 Inthe menu that opens select the Virus Scan task This will open the window containing a list of objects see figure above Edit the list using the algorithm described above CREATING VIRUS SCAN TASKS To scan objects on your computer for viruses you can use the scan tasks which are installed with Kaspersky Anti Virus or create your own tasks New tasks are created by modifying existing ones SCANNING FOR VIRUSES To create a new virus scan task 1 Open the application settings window on page 15 select the Virus Scan tab and select the task with the settings closest to your needs in the dropdown list on the left see figure below OO Preferences Q F OB LU ee Virus Scan Threats ieee enaae Reports Service Appearance Quick Scan tid Objects to scan You can create a new list of objects to scan k or edit the existing list Edit Full Scan ae Virus Scan Security level n V an Recommended l i l Optimal protection Appropriate for most users Preferences Default Action Prompt for action when the scan is complete G Prompt for action during scan O Do not prompt for action W Disinfect W Delete if disinfection fails Run mode Every 1 day 4 Edit 3 J Pt Click the lock to prevent further changes Figure 29 Application settings window Full scan task 2 Click the ea button located under the virus
127. how application In Menu Bar con C In Dock Changes made to the setting will apply at the next startup of the application Skin Select Click the lock to prevent further changes Figure 3 Application settings window Appearance If you selected the option of displaying application icon in MAC OS menu bar the icon will not appear in Dock when the application is started or main window is opened CONFIGURING THE KASPERSKY ANTI VIRUS INTERFACE Kaspersky Anti Virus gives you the option of changing the appearance of the program by creating and using various graphic elements and selected color schemes To configure Kaspersky Anti Virus open application settings window on page 15 and select the Appearance tab see figure below APPLICATION INTERFACE All the colors fonts icons and texts used in the Kaspersky Anti Virus interface can be changed You can create your own skins for the application or localize it in another language To activate a skin specify the path to the folder in the Skin field To select a folder use the Select button AAP Preferences Ci E kd en Virus Scan Threats Thee Network Reports Service Appearance Events notification Y Enable notifications Additional Show application In Menu Bar een C In Dock Changes made to the setting will apply at the next startup of the application skin w Click the lock to prevent further changes Figure 4 Application
128. ibrary is used in it and that the Library and its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must include the copyright notice for the Library among them as well as a reference directing the user to the copy of this License Also you must do one of these things a Accompany the work with the complete corresponding machine readable source code for the Library including whatever changes were used in the work which must be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machine readable work that uses the Library as object code and or source code so that the user can modify the Library and then relink to produce a modified executable containing the modified Library It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions b Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version that the work was made with
129. iccscaicasssravnansieeiddnasanveancscaidadareavkaneideiddnassareausideidadesbatwaneineiddpesseveausiseitagevbervivvies 65 Configuring the update task schedule lt cscivscccescescesicivnciacweccatesadsonceeceusndatassvedecanenedetindteciandaxvadatebteciecnsecadetedvansdecsssededebisedeost 66 Update diS IDUNON sonisesoenre o EAR REA EE E OARE EEO EE ERER EAR ORE EEEE R 67 AGON AE AU 619 gt e E E E E E eee 68 SELECTING AN UPDATE SOURCE Update source is a resource that contains the updates for databases and internal modules of Kaspersky Anti Virus Update sources can be HTTP and FTP servers local or network folders Kaspersky Lab update servers are the main source of updates These are special websites where updates for databases and internal modules of all Kaspersky Lab products are stored Update source Additional wi Kaspersky Lab s update servers Figure 40 Selecting an update source To assign an update source 1 Open the application settings window on page 15 and select the Update tab 2 Click the Preferences button in the Update section 3 In the window that opens go to the Update source tab see figure above UPDATING THE APPLICATION By default the list contains only Kaspersky Lab update servers When the update is in progress Kaspersky Anti Virus accesses this list selects the address of the first server and tries to download updates from this server If updates cannot be downloaded from the selected ser
130. ich the particular user actually uses or expects or is expected to use the product A product is a consumer product regardless of whether the product has substantial commercial industrial or non consumer uses unless such uses represent the only significant mode of use of the product Installation Information for a User Product means any methods procedures authorization keys or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made USING THIRD PARTY CODE If you convey an object code work under this section in or with or specifically for use in a User Product and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term regardless of how the transaction is characterized the Corresponding Source conveyed under this section must be accompanied by the Installation Information But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product for example the work has been installed in ROM The requirement to provide Installation Information does not include a re
131. ied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU Lesser General Public License for more details You should have received a copy of the GNU Lesser General Public License along with this library if not write to the Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Also add information on how to contact you by electronic and paper mail You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the library if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the library Frob a library for tweaking knobs written by James Random Hacker lt signature of Ty Coon gt 1 April 1990 Ty Coon President of Vice That s all there is to it LIBSTDC LIBRARY The libstdt copyright 2009 Free Software Foundation Inc library was used when developing the application GNU GENERAL PUBLIC LICENSE Version 3 29 June 2007 Copyright 2007 Free Software Foundation Inc hitp fsf org http www fsf org Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The GNU General Public License is a free copyleft license for software and other kinds of works The licenses for most software and other practical works are designed to take away your freedom to share and change the works By
132. ied later version of the GNU General Public License GPL with the option of using any subsequent versions published by the FSF GPL compatible Software is software whose conditions of propagation modification and use would permit combination with GCC in accord with the license of GCC Target Code refers to output from any compiler for a real or virtual target processor architecture in executable form or suitable for input to an assembler loader linker and or execution phase Notwithstanding that Target Code does not include data in any format that is used as a compiler intermediate representation or used for producing a compiler intermediate representation The Compilation Process transforms code entirely represented in non intermediate languages designed for human written code and or in Java Virtual Machine byte code into Target Code Thus for example use of source code generators and preprocessors need not be considered part of the Compilation Process since the Compilation Process can be understood as starting with the output of the generators or preprocessors A Compilation Process is Eligible if it is done using GCC alone or with other GPL compatible software or if it is done without using any work based on GCC For example using non GPL compatible Software to optimize any GCC intermediate representations would not qualify as an Eligible Compilation Process 1 Grant of Additional Permission You have permission to propagate a w
133. igure 53 Application settings window Reports 2 Carry out the necessary configuration in the Reports section as follows REPORTS e Allow or block logging information events As a rule these events are not important for security To detect these events in the report check Log non critical events box e Allow storing in the report only for the important events occurring since the last time the task was run This saves disk space by reducing the report size If the Keep only recent events box is checked the information in the report will be updated every time you restart the task in this case important information such as records about detected malicious objects will be saved and non critical information will be overwritten e Set the storage term for reports By default the term for storing reports is 30 days at the end of which the copies will be deleted You can change the maximum term for storing copies or remove this restriction THE DETECTED TAB This tab see figure below contains the list of dangerous objects detected by File Anti Virus See section Anti virus protection of your computer s file system on page 30 or virus scan task see section Scanning for viruses on page 43 The full name is indicated for each object and also the status assigned to it by Kaspersky Anti Virus when it was scanned or processed The dangerous objects can be processed by clicking the Disinfect all button After each object is processe
134. including commercial applications and to alter it and redistribute it freely subject to the following restrictions 1 The origin of this software must not be misrepresented you must not claim that you wrote the original software If you use this software in a product an acknowledgment in the product documentation would be appreciated but is not required 2 Altered source versions must be plainly marked as such and must not be misrepresented as being the Original software 3 This notice may not be removed or altered from any source distribution L Peter Deutsch ZLIB 1 2 LIBRARY The zlib 1 2 copyright 1995 2005 Jean loup Gailly and Mark Adler library was used when developing the application All rights reserved under zlib libpng license This software is provided as is without any express or implied warranty In no event will the authors be held liable for any damages arising from the use of this software Permission is granted to anyone to use this software for any purpose including commercial applications and to alter it and redistribute it freely subject to the following restrictions 1 The origin of this software must not be misrepresented you must not claim that you wrote the original software If you use this software in a product an acknowledgment in the product documentation would be appreciated but is not required KASPERSKY ANTI VIRUS 2 Altered source versions must be plainly marked as such and must n
135. ing system To lower the load and ensure that the user obtains access to files quickly we recommend configuring the component to disable at a certain time To pause the functioning of the component for a while in the window that opens check the On schedule box and set the time limits for disabling the component by clicking the Schedule button see the figure below To do this enter a value in the HH MM format in corresponding fields 2 Pause task Pause task at 3 00 Resume task at 5 00 C Cancel OK i Figure 23 Pausing File Anti Virus KASPERSKY ANTI VIRUS SELECTING ACTIONS ON OBJECTS If an anti virus scan shows that a file is infected or suspicious File Anti Virus subsequent actions depend on the object s status and the action selected When the scan is complete the object may be identified as e malicious for example virus Trojan e potentially infected when the scan cannot determine whether the object is infected or not The application has probably found in the file a sequence of code from an unknown virus or of modified code from a known virus By default all infected objects undergo disinfection and all potentially infected files are quarantined To change the action on an object open the application settings window on page 15 and select the Protection tab see figure below In the table below you can find descriptions of all available File Anti Virus actions on
136. ing any other provision of this License you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work and to convey the resulting work The terms of this License will continue to apply to the part which is the covered work but the special requirements of the GNU Affero General Public License section 13 concerning interaction through a network will apply to the combination as such Revised Versions of this License The Free Software Foundation may publish revised and or new versions of the GNU General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version Is given a distinguishing version number If the Program specifies that a certain numbered version of the GNU General Public License or any later version applies to it you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation If the Program does not specify a version number of the GNU General Public License you may choose any version ever published by the Free Software Foundation If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used that proxy s public statement of acceptance of a version permanently authorizes yo
137. interface displays Appropriate Legal Notices to the extent that it includes a convenient and prominently visible feature that 1 displays an appropriate copyright notice and 2 tells the user that there is no warranty for the work except to the extent that warranties are provided that licensees may convey the work under this License and how to view a copy of this License If the interface presents a list of user commands or options such as a menu a prominent item in the list meets this criterion 1 Source Code The source code for a work means the preferred form of the work for making modifications to it Object code means any non source form of a work A Standard Interface means an interface that either is an official standard defined by a recognized standards body or in the case of interfaces specified for a particular programming language one that is widely used among developers working in that language The System Libraries of an executable work include anything other than the work as a whole that a is included in the normal form of packaging a Major Component but which is not part of that Major Component and b serves only to enable use of the work with that Major Component or to implement a Standard Interface for which an implementation is available to the public in source code form A Major Component in this context means a major essential component kernel window system and so on of the specific operating sy
138. ion the Activation assistant will receive a trial key file without needing an activation code The file will be automatically installed to ensure the application s operability and the activation completion window will open showing detailed information about the key When this activation method is selected Kaspersky Anti Virus does not download a physical key file with key extension from the server but receives the relevant information to save in the operating system To obtain a real key file you must complete the user registration at Kaspersky Lab s website If the activation code is not verified the Assistant will display this information on the screen In this case contact the software vendor you purchased Kaspersky Anti Virus from for information SELECTING THE KEY FILE If you have a key file for Kaspersky Anti Virus the Assistant window will ask if you want to install it To do this use the Select button and select the path for the file with the key extension in the standard file selection window KASPERSKY ANTI VIRUS Information about the current key will be displayed in the bottom part of the window including the key number the key type commercial trial etc and the license key expiration date COMPLETING ACTIVATION The Activation assistant will inform you that the application has been successfully activated In addition information about the installed key is displayed including key number key type for i
139. ion is useful when you wish to copy part of the code of the Library into a program that is not a library 4 You may copy and distribute the Library or a portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses th
140. ion settings window on page 15 and select the Threats section see figure below O On Preferences Malware categories Ei Viruses worms Trojans hack tools W Spyware and Adware Auto dialers _ Potentially dangerous software riskware understand that some legal programs can be classified as potentially dangerous software and want them to be recognized as a threat on this computer Exclusions Compose the list of trusted files processes and applications that should not be monitored and scanned Trusted zone of Click the lock to prevent further changes Figure 12 Application settings window Threats 2 Click the Trusted zone button in the Exclusions section see figure above This will open the window containing a list of objects excluded from protection see figure below Object m l Threat type ral Volumes UNTITLED eicar not a Virus Edit Figure 13 The list of exclusion objects CREATING A PROTECTION SCOPE To edit the exclusion rule you are using select it from the list and click the Edit button To delete a rule click the button To add a new exclusion rule click the button and specify the exclusion conditions in the rule creation window see figure below e Object All objects Specify the exclusion object which may be a file a folder or a file mask See section Allowed file exclusion masks on page 91 You can manually
141. istian Spieler Cosmin Truta Antoine Verheijen Paul von Behren Rich Wales Mike White This software is provided as is without warranty of any kind express or implied In no event shall Info ZIP or its contributors be held liable for any direct indirect incidental special or consequential damages arising out of the use of or inability to use this software Permission is granted to anyone to use this software for any purpose including commercial applications and to alter it and redistribute it freely subject to the above disclaimer and the following restrictions USING THIRD PARTY CODE 1 Redistributions of source code in whole or in part must retain the above copyright notice definition disclaimer and this list of conditions 2 Redistributions in binary form compiled executables and libraries must reproduce the above copyright notice definition disclaimer and this list of conditions in documentation and or other materials provided with the distribution The sole exception to this condition is redistribution of a standard UnZipSFX binary including SFXWiz as part of a self extracting archive that is permitted without inclusion of this license as long as the normal SFX banner has not been removed from the binary or disabled 3 Altered versions including but not limited to ports to new operating systems existing ports with new graphical interfaces versions with modified or added functionality and dynamic shared
142. it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler Kernel and so on of the operating system on which the executable runs unless that component itself accompanies
143. k for making modifications to it For a library complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running a program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you
144. l to address new problems or concerns Each version Is given a distinguishing version number If the Library specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WI
145. l virus scan tasks preterences Apply tt E Click the lock to prevent further changes Figure 30 Application settings window Scanning for viruses The default setting for object scan is the Recommended level You can raise or lower the scan s security level by selecting a new level or by modifying the settings for the current level To change the security level adjust the slider bar Changing the security level changes the balance between scan speed and the total number of files scanned the fewer the files scanned for viruses the higher the scan speed If none of the preset security levels meets your needs customize the scan settings You are advised to select as a basis the level which is the closest to your requirements and edit its settings This will change the name of the security level to Custom To modify the settings for the current security level 1 Open the application settings window on page 15 and select the Virus Scan tab see figure above KASPERSKY ANTI VIRUS 2 Click the Preferences button in the Security level section 3 Edit the file protection settings in the window that opens and click the OK button SPECIFYING THE TYPES OF OBJECTS TO BE SCANNED You can specify which types of objects will be scanned by specifying which file formats file sizes and drives will be scanned for viruses when this task runs The types of files to be scanned for viruses are determined in the File ty
146. launch schedule see section Configuring the scan task schedule on page 54 HOW TO PERFORM A QUICK SCAN OF YOUR COMPUTER Some areas on your computer are critical for security such as the folders that contain operating system files and system libraries These areas are the main targets for malware which aims to damage your computer lt is extremely important to protect these critical areas of your computer to ensure that it Keeps running For your convenience we have created a dedicated virus scan task for these areas To open the quick computer scan task 1 Open the main application window on page 13 and click the button 2 Startthe Quick Scan task To view task execution results open report window see section Virus scan Statistics on page 59 To view or edit current task settings 1 Open the application settings window on page 15 and select the Virus Scan tab 2 Inthe list on the left select the Quick Scan task In the right hand part of the window edit the list of objects to scan see section Creating the list of objects to scan on page 45 view the settings that will be used for a task security level see section Selecting a security level on page 48 and action see section Selecting actions on objects on page 52 that will be taken on dangerous objects If required configure a task launch schedule see section Configuring the scan task schedule on page 54 QUICK START How TO SC
147. le virus EICAR Test File modification Fi Report window contains the following sections e Reports Contain statistics on dangerous objects detected on objects placed in quarantine and backup and the Object Volumes NO NAME virus WARN Eicar9 com Volumes NO NAME virus Eicar10 com Volumes NO NAME virus Eicar2 com Volumes NO NAME virus Eicar3 com Volumes NO NAME virus Eicar4 com Volumes NO NAME virus EicarS com Molumes NO NAME virus Eicar6 com Volumes NO NAME virus Eicar com Volumes NO NAME virus Eicar8 com Volumes NO NAME virus Eicar9 com Volumes NO NAME virus SUSP Eicarl com Volumes NO NAME virus SUSP Eicar10 com Volumes NO NAME virus SUSP Eicar2 com Volumes NO NAME virus SUSP Eicar3 com Volumes NO NAME virus SUSP Eicar4 com Volumes NO NAME virus SUSP EicarS com Volumes NO NAME virus SUSP Eicar6 com Volumes NO NAME virus SUSP Eicar com Volumes NO NAME virus SUSP Eicar8 com Volumes NO NAME virus SUSP Eicar9 com Volumes NO NAME virus WARN Eicarl com Volumes NO NAME virus WARN Eicar10 com Volumes NO NAME virus WARN Eicar2 com Volumes NO NAME virus WARN Eicar3 com Volumes NO NAME virus WARN Eicar4 com vo Al JAR i Pg Pe l A Ty Disinfect all Figure 52 Kaspersky Anti Virus report window list of events logged during the application operation All statistics are divided into subsections e Detected The list of all dangerous and suspicious objects detected by File Anti Vi
148. le Anti virus Update File Anti virus W File Anti virus File Anti virus oo Reports Kaspersky Anti Virus Show disinfected objects detected detected detected detected _ detected detected detected detected detected detected detected detected detected detected detected detected detected detected detected detected detected detected detected detected detected PY detected IIl Status virus EICAR Test File modification File virus EICAR Test File File virus EICAR Test File File virus EICAR Test File File virus EICAR Test File File virus EICAR Test File File virus EICAR Test File File virus EICAR Test File File virus EICAR Test File File virus EICAR Test File File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification File virus EICAR Test File modification Fi
149. lect General question e Application name and version number e Request text Describe the problem in as much detail as possible e Customer ID and password Enter the customer ID and the password you received when registering at the Technical Support service website e Email address The Technical Support service will send an answer to your question at this email address Phone technical support If you encounter an urgent problem you can always call your local Technical Support service Before contacting specialists of the Russian http support kaspersky ru support support_ local or international http support kaspersky com support international Technical Support please collect information http support kaspersky com support details about your computer and anti virus application installed on it This will help our support specialists solve your problem more quickly CONTACTING SALES DEPARTMENT If you have questions about selecting or purchasing the application or extending your license contact the Sales Department specialists by email at sales kaspersky com INSTALLING AND REMOVING KASPERSKY ANTI VIRUS The Kaspersky Anti Virus installation package includes the installation assistant and the uninstallation assistant To install Kaspersky Anti Virus on your computer run the installation file dmg and select Anti Virus Installation The installation assistant is a sequence of steps You can switc
150. lements and selected color schemes IN THIS SECTION Main application WINGOW ser csicode seecncentetcndenastnessnnantasdessutncneenanddediesaninasdnantddedepaeecndensehiedeensiocutienapiaadensetsneenendcmdeaastaeseinnaebscayaneens 13 Applicaton setings WIC OW sesiiosrminaciiaevnininonsiriniania i aE Raa aa E Aa aa A Aaa aaia EEA a D ENa 15 FAS DST SI AN VIUS ICOMi tompon aaa aee enio i aaea 15 Configuring the Kaspersky Anti Virus interface ssssssseseeeeneeneeeereeerrrrrerrrerrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrtrtrrrrrrrrrtttrrttttttm 16 MAIN APPLICATION WINDOW The basic functions of the main window see the figure below are to inform the user of the computer s protection status and of possible problems with protection to provide information about the operation of Kaspersky Anti Virus components File Anti Virus virus scan and update tasks and to provide access to the main tasks and the application settings window AAA Kaspersky Anti Virus Protection enabled Kaspersky Anti Virus Figure 1 Kaspersky Anti Virus main window The color of the main window indicates the current protection status There are three possible values of the protection status See section What is the protection status of your computer on page 18 each of which is associated with a stop light color Green indicates that your computer s protection is at an optimal level while yellow and red warn of the KASPERSKY ANTI VIRUS pres
151. ll be refunded the sum you have paid for the product In this case the envelope with the installation CD should remain sealed Opening the envelope with the installation CD means acceptance of all the provisions of the License Agreement When purchasing Kaspersky Anti Virus online you download the product from Kaspersky Lab website which includes this documentation You will be sent a key file or activation code by email once payment has been made SERVICE FOR REGISTERED USERS Kaspersky Lab offers a broad range of services allowing legal users to increase the efficiency of the application After purchasing the license you become a registered application user so you can be provided the following services until the license key expiration date e Hourly update of application databases and provision of new versions of the software e Consultation on issues regarding installation configuration and use of the software product provided by phone and email e Notification of new software products release by Kaspersky Lab and of new viruses emerging all around the world This service is provided to users who have subscribed to Kaspersky Lab s news mail delivery at the Technical Support Service website http support kaspersky com subscribe Support on issues related to the performance and use of operating systems third party software and the operation of other technology is not provided OBTAINING INFORMATION ABOUT THE APPLICATION If you hav
152. lue is exceeded the object will be excluded from the scan e Do not scan archives larger than MB Check this box to set a limit on the scan of a single object by its size and enter the maximum size for an object in the field to the right If this value is exceeded the object will be excluded from the scan e Scan only new and changed files If the box is checked only new files and files that were modified since the time of the last scan will be scanned This operation mode can significantly shorten the duration of scans e Use iSwift technology Check iSwift technology box which increases performance of the objects processing by excluding certain objects from the scan An object is excluded from the scan using a special algorithm that takes into account the release date of the database the date the object was last scanned and any modifications to the scan settings This technology works with objects of any format size and type There are limitations to iSwift it is bound to a specific file location in the file system and can apply only to objects in HFS In the Compound files section specify which compound files should be scanned for viruses e Scan archives scan RAR ARJ ZIP CAB LHA JAR and ICE archives Certain archive files Such as ha uue tar cannot be deleted automatically since Kaspersky Anti Virus does not support their disinfection even if you select the Disinfect and Delete if disinfection fails options
153. me name see section The Preferences tab on page 86 To switch to editing the component settings use the Change preferences button SCANNING FOR VIRUSES In addition to the computer protection see section Anti virus protection of your computer s file system on page 30 provided by the File Anti Virus it is critical to periodically scan the computer for viruses This is required to stop the spread of malicious programs not detected by File Anti Virus because for instance a low protection level has been selected The following tasks are executed by Kaspersky Anti Virus to perform virus scans q Virus Scan Scan individual items for viruses such as files folders disks plug and play devices Full Scan Search for viruses on your computer with a thorough scan of all disk drives Quick Scan Scans only critical areas of the computer for viruses including folders with operating system files System and system libraries Library By default these tasks are executed using recommended settings You can edit these settings see section Configuring virus scan tasks on page 48 or create a schedule for running tasks see section Configuring the scan task schedule on page 54 You also have the option of creating users virus scan tasks see section Creating virus scan tasks on page 46 N THIS SECTION Managing virus scan tasks castaniins cou senxassqusestninassieenadceanstaleciouaapbendenti
154. n Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed This is the first released version of the Lesser GPL It also counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it You can use it too but we suggest you KASPERSKY ANTI VIRUS first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case based on the explanations below When we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that yo
155. n access to an object objects in the report should be processed When a potentially infected object is detected the application blocks access to it and quarantines it on page 75 Do not prompt for action Kaspersky Anti Virus attempts to disinfect detected objects without prompting the user for confirmation If the object is successfully Disinfect disinfected it becomes accessible to the user If the object cannot be disinfected it will be deleted Delete if disinfection fails Do not prompt for action Kaspersky Anti Virus deletes the object Delete Before disinfecting the object or deleting it Kaspersky Anti Virus creates a backup copy and places it to the backup on page 78 in case the object will need to be restored or it becomes possible to disinfect it CONFIGURING THE SCAN TASK SCHEDULE You can run any virus scan task manually or automatically using a schedule see section Managing virus scan tasks on page 43 To run a scheduled task check the box with the description of task autorun conditions in the Run mode section Task run settings can be edited in the Schedule window accessible using the Edit button Frequency Weeks Schedule Mon Tue iwed Thu preferences Fri v Sat Sun Time 12 41 Run task if skipped Start from the user s Kaspersky Lab a account Figure 34 Configuring the task schedule The most important step is to determine the startup frequency set for the viru
156. n of your computer s file system on page 30 You can quarantine an object by yourself by clicking the Quarantine button in the special notification window see section Notifications on page 87 that pops up when a potentially infected object is detected When you move an object to quarantine it is moved not copied the object is deleted from its original location on a disk and saved in the quarantine folder Files in quarantine are stored in a special format and are not dangerous IN THIS SECTION Actions on quarantined objects ccccccccesssseeeeeeeeeeeesseeeeeeeeeaeaseceeeeeeaeesseeeeeeeesaesseceeeeeeeaaaeeeeeeeeeaeauseeeeeeessaaaeeeeesesenaagses 75 Contouring g aranine SOMINGS sirere enei Reeri EEs a EAE E E EEEE EAD EREEREER 77 ACTIONS ON QUARANTINED OBJECTS The total number of quarantined objects is displayed in the Quarantine section of the main report window see the figure below To view the storage areas 1 Open the main application window on page 13 and click the B button 2 Inthe left part of the window that opens select Quarantine see figure below Content of the storage will be displayed in the right hand part of the window You can perform the following actions on objects in quarantine e Quarantine files that you suspect of being infected but not detected by Kaspersky Anti Virus To do this click the Add button and select the required file in the standard selection window It will be adde
157. n the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c Ifthe modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement USING THIRD PARTY CODE These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them
158. neacodoastandecieatnesancncitawnue ion vanteupiansinsuabatericapiecwoesawiensaenebseonslainews 43 Creating the list of objects to SCAN sas sca iene scare dats ween ices wiarenntie nana iden ska datieeaddenaiewantenateddion seeedaueebe dledekevaipsenudioncesetuuhebbeddanesersten 45 Creating vir s scan TASKS stozetegeueecdecencedeceectecsesese ences se sae gence seorect sesetue sae ceesheccecaeeeceece ce deekesdeteatestasieusene eeueaueeeatnsnedeeeeenecee 46 Oia IIIA virus scan Niel SS sce Ste sects oe eaten cree nee iieii erei iina cee teeaeetinc pc ecetes hevahaeueceteetieennheieccceaausudenageeseentestetecnt 48 MLS scan SLES CS eaters cuteness scis oacasenbsanatensiaeatuaeaeucinceeaccaamareodluncsanatesb acacia eutesnncesdauianitumbennaianentosnncbsanadenteeneteubacnsce vane 59 MANAGING VIRUS SCAN TASKS You can run a virus scan task either manually or automatically using a schedule see section Configuring the scan task schedule on page 54 To start a virus scan task manually 1 Open the main application window on page 13 and click the button KASPERSKY ANTI VIRUS 2 Inthe menu see figure below that opens select the required task Full Scan Quick Scan or Virus Scan If you select the latter the application will ask to select the object objects for scan see section Creating the list of objects to scan on page 45 Apart from the above listed tasks included in the application package the menu can also display users sc
159. ng Source under the terms of this License in one of these ways a Convey the object code in or embodied in a physical product including a physical distribution medium accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange b Convey the object code in or embodied in a physical product including a physical distribution medium accompanied by a written offer valid for at least three years and valid for as long as you offer spare parts or customer support for that product model to give anyone who possesses the object code either 1 a copy of the Corresponding Source for all the software in the product that is covered by this License on a durable physical medium customarily used for software interchange for a price no more than your reasonable cost of physically performing this conveying of source or 2 access to copy the Corresponding Source from a network server at no charge c Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source This alternative is allowed only occasionally and noncommercially and only if you received the object code with such an offer in accord with subsection 6b d Convey the object code by offering access from a designated place gratis or for a charge and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge You need not require r
160. ng a file mask location for example a folder or a program program processes or using the Virus Encyclopedia threat type classification An excluded object will not be scanned when the disk or folder where it is located is being scanned However if you select to scan this object specifically the exclusion rule will not be applied Threat type is the status that Kaspersky Anti Virus assigns to an object during the scan The status is based on the classification of malware and riskware listed in Kaspersky Lab s Virus Encyclopedia Riskware does not have any malicious function but can be used as an auxiliary component by malicious software since such programs contain holes and errors This category includes for example remote administration programs IRC clients FTP servers various utilities for stopping processes or hiding them keyloggers password macros and auto dialers Such programs are classified as not a virus They can be divided into several types such as Adware Joke and Riskware For more information about potentially dangerous programs see the Virus Encyclopedia www viruslist com Based on the scan results such programs may be blocked Since several of them are widely used by users you have the option of excluding them from the scan To do this add the threat name or threat name mask as defined in the Virus Encyclopedia to a trusted zone KASPERSKY ANTI VIRUS To create an exclusion list 1 Open the applicat
161. ng potentially infected objects saving potentially infected objects in the quarantine folder re scanning them with updated databases restoring objects from quarantine at the user s request e Creating a copy of each infected object to store in the backup area before disinfecting or deleting it so that it can later be restored preserving your valuable information e Creating a detailed report on the performance of each Kaspersky Anti Virus component e Notifying the user about certain events which occur when Kaspersky Anti Virus runs You can select the notification type for each event type sound or pop up message Kaspersky Anti Virus boasts an easy to use interface which ensures convenient access to any of the application s features You can change the appearance of Kaspersky Anti Virus by using various graphic elements and selected color schemes When working with Kaspersky Anti Virus you will be provided with complete information support the application returns messages on the protection status and offers detailed guidance Security Assistant see section What is the protection status of your computer on page 18 included in the application package can present a broad picture of current status of computer s protection and proceed to the immediate elimination of problems IN THIS SECTION Hardware and software system requirements ccccccccesssseeeeececeeeeeeeeeeeeeeaaeaeeeeeeeeeeeaaaeeeecessseaaeeeeeeessaaaaeeeeeeeesaaa
162. nges Figure 39 Application settings window Update CONFIGURING THE UPDATE Kaspersky Anti Virus will only be updated in accord with the following settings e Update source Update source is a resource that contains the latest database and module files for Kaspersky Anti Virus Update sources see section Selecting an update source on page 64 can be HTTP and FIP servers local or network folders e Update objects Update objects are the components that will be updated applications databases application modules Application databases are always updated and the application modules are only updated if the corresponding mode is enabled see section Selecting the update mode and objects on page 65 e Update mode Update mode determines whether the update will be launched automatically recommended by Kaspersky Lab specialists manually or according to a schedule If you select the latter see section Selecting the update mode and objects on page 65 you will have to assign schedule settings for the launch e Update distribution The update distribution option See section Update distribution on page 67 allows you to save the updates you have downloaded from the Internet in a local folder and grant access to them to other computers on your network to save Internet traffic KASPERSKY ANTI VIRUS IN THIS SECTION Selecting an Update SO sag eevee cn ch cea nei edge ener 64 Selecting the update mode and ODISCIS c i
163. ning of section 10 If the Program as you received it or any part of it contains a notice stating that it is governed by this License along with a term that is a further restriction you may remove that term If a license document contains a further restriction but permits relicensing or conveying under this License you may add to a covered work material governed by the terms of that license document provided that the further restriction does not survive such relicensing or conveying If you add terms to a covered work in accord with this section you must place in the relevant source files a statement of the additional terms that apply to those files or a notice indicating where to find the applicable terms Additional terms permissive or non permissive may be stated in the form of a separately written license or stated as exceptions the above requirements apply either way Termination KASPERSKY ANTI VIRUS You may not propagate or modify a covered work except as expressly provided under this License Any attempt otherwise to propagate or modify it is void and will automatically terminate your rights under this License including any patent licenses granted under the third paragraph of section 11 However if you cease all violation of this License then your license from a particular copyright holder is reinstated a provisionally unless and until the copyright holder explicitly and finally terminates your license and b
164. nsistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice KASPERSKY ANTI VIRUS This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 12 If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the F
165. nstance commercial or trial and the license key s expiration date QUARANTINE Quarantine is a special repository containing the objects that could have been infected with viruses Potentially infected objects are objects that are suspected of being infected with viruses or modifications of them Why are objects detected as potentially infected It is not always possible to exactly determine whether an object is infected or not This could be for the following reasons e The code of the object being analyzed resembles a known threat but is partially altered Kaspersky Anti Virus databases contain the information on the threats investigated to date by Kaspersky Lab specialists If a malicious program is modified and these changes are not yet entered into the databases Kaspersky Anti Virus classifies the object infected with the modified malicious program as a potentially infected object and will indicate without fail what threat this infection resembles e The code of the object detected resembles a malicious program by its structure however nothing similar is recorded in the Kaspersky Anti Virus databases It is quite possible that this is a new type of threat so Kaspersky Anti Virus classifies that object as a potentially infected object A potentially infected object can be detected and quarantined in the course of Virus Scan see section Scanning for viruses on page 43 or by File Anti Virus see section Anti virus protectio
166. objects T9 Preferences G a gt OBUR Protection Virus Scan Threats Update Network Reports Service Appearance General W Enable File Anti Virus Security Level mG Maximum protection Comprehensive protection Recommended for hostile environment Action Prompt for action Block access V Disinfect J Delete if disinfection fails A E Click the lock to prevent further changes Figure 24 Application settings window File Anti Virus Table 1 Descriptions of all available actions on objects If the action you have selected is when an infected or potentially infected object is detected Kaspersky Anti Virus will display a warning message with the information about which malicious code has infected potentially infected the file and offers you the choice of the following actions These actions may vary depending on the object s status Prompt for action Kaspersky Anti Virus blocks access to the object but its location will not be changed Relevant information is logged in the report To gain access to an object objects in the report should be processed see section The Detected tab on page 83 Block access ANTI VIRUS PROTECTION OF YOUR COMPUTER S FILE SYSTEM If the action you have selected is when an infected or potentially infected object is detected Kaspersky Anti Virus blocks access to the infected object and attempts to disinfect it If the object is successfully
167. of the main window and contains the following buttons Open the window which displays the report about the operation of Kaspersky Anti Virus to access quarantine and Backup Open the application settings window on page 15 Open the Kaspersky Anti Virus built in help Open the window with information on ways of obtaining technical support APPLICATION INTERFACE APPLICATION SETTINGS WINDOW Kaspersky Anti Virus settings window see the E below may be accessed from the main window see section Main application window on page 13 by clicking the button or by selecting Preferences from the application menu which will open if you click the Kaspersky Anti Virus icon on page 15 in Dock or Mac OS Menu Bar Preferences G a gt OBK Protection Virus Scan Threats Update Network Reports Service Appearance T A a A General v Enable File Anti Virus Security Level eG Maximum protection Comprehensive protection Recommended for hostile environment Action Prompt for action Block access Vi Disinfect V Delete if disinfection fails A Click the lock to prevent further changes Figure 2 Application settings window File Anti Virus The buttons in the upper part of the settings window give you quick access to the settings of File Anti Virus of virus scan tasks of updates and of Kaspersky Anti Virus tools To fine tune certain settings you will need to open the second and third level set
168. oft Office Word document docx Microsoft Office Word 2007 document supporting XML language docm Microsoft Office Word 2007 document supporting macros dot Microsoft Office Word document template including dot Microsoft Office Word document template dotx Microsoft Office Word 2007 document template dotm Microsoft Office Word 2007 document template supporting macros fom database program Microsoft Visual FoxPro start file rtf document in Rich Text Format shs Shell Scrap Object Handler object dwg AutoCAD drawing database msi Microsoft Windows Installer package otm VBA project for Microsoft Office Outlook pdf Adobe Acrobat document swf Shockwave Flash package object HELP INFORMATION jpg joeg png file in format for storing compressed images emf file in Enhanced Metafile format Next generation of Microsoft Windows metafile ico object icon file ov MS DOS executable files x Microsoft Office Excel documents and files including xla Microsoft Office Excel extension xlc chart xlt document template xlsx Microsoft Office Excel 2007 workbook xltm Microsoft Office Excel 2007 workbook supporting macros xlsb Microsoft Office Excel 2007 workbook in binary not XML format xltx Microsoft Office Excel 2007 template xlsm Microsoft Office Excel 2007 template supporting macros xlam Microsoft Office Excel 2007 add in supporting ma
169. oftware THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE GROWL 1 1 05 The Growl 1 1 5 Copyright 2004 The Growl Project library was used when developing the application Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 Neither the name of Growl nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE A
170. ollowing 1 Open the application settings window on page 15 and select the Reports section see figure below 4A 6 Preferences O E Protection Virus Scan Threats Update Network Reports Service Appearance Reports Log non critical events Keep only recent events Delete reports after 30 days Quarantine and Backup Y Delete objects after 30 days of Click the lock to prevent further changes Figure 51 Application settings window Reports 2 Inthe Quarantine and Backup check Delete objects after box and set the term for keeping objects in the storage after which objects in the storage will be automatically deleted Please note that this setting value will also apply to quarantine on page 75 REPORTS Kaspersky Anti Virus allows you to view detailed statistics of its results as well as for any events arising when the program runs A detailed report will also be created for each application component File Anti Virus see section Anti virus protection of your computer s file system on page 30 virus scan see section Scanning for viruses on page 43 and update see section Updating the application on page 61 To view reports open the main application window on page 13 and click the button Eh Eh Pa r4a ra rg REPORTS Detected B Events Quarantine Al Backup RUNNING TASKS i File Anti Virus COMPLETED TASKS All Last 20 E Update Update Fi
171. on is hereby granted to use copy modify and distribute this source code or portions hereof for any purpose without fee subject to the following restrictions 1 The origin of this source code must not be misrepresented 2 Altered versions must be plainlymarked as such and must not be misrepresented as being the original source 3 This Copyright notice may not be removed or altered from any source or altered source distribution The Contributing Authors and Group 42 Inc specifically permit without fee and encourage the use of this source code as a component to supporting the PNG file format in commercial products If you use this source code in a product acknowledgment is not required but would be appreciated A png_get_copyright function is available for convenient use in about boxes and the like printf s ong_ get _copyright NULL Also the PNG logo in PNG format of course is supplied in the files pngbar png and pngbar jpg 88x31 and ongnow png 98x31 Libpng is OSI Certified Open Source Software OSI Certified Open Source is a certification mark of the Open Source Initiative Glenn Randers Pehrson glennro users sourceforge net December 3 2004 LIBC LIBRARY The libc copyright 2009 Free Software Foundation Inc library was used when developing the application GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright 1989 1991 Free Software Foundation Inc 51 Franklin St Fifth Floor Boston MA
172. ons for copying distributing or modifying the Library or works based on it Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original licensor to copy distribute link with or modify the Library subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with this License If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section
173. ork of Target Code formed by combining the Runtime Library with Independent Modules even if such propagation would otherwise violate the terms of GPLv3 provided that all Target Code was generated by Eligible Compilation Processes You may then convey such a combination under terms of your choice consistent with the licensing of the Independent Modules 2 No Weakening of GCC Copyleft The availability of this Exception does not imply any general presumption that third party software is unaffected by the copyleft requirements of the license of GCC Hopefully that text is self explanatory If it isn t you need to speak to your lawyer or the Free Software Foundation EXPAT 1 2 LIBRARY The Expat 1 2 Copyright 1998 1999 2000 Thai Open Source Software Center Ltd library was used when developing the application All rights reserved used under the following conditions KASPERSKY ANTI VIRUS Permission is hereby granted free of charge to any person obtaining a copy of this software and associated documentation files the Software to deal in the Software without restriction including without limitation the rights to use copy modify merge publish distribute sublicense and or sell copies of the Software and to permit persons to whom the Software is furnished to do so subject to the following conditions The above copyright notice and this permission notice shall be included in all copies or substantial portions of the S
174. orm scan settings to all tasks ccccecseececceeeeeseeeeeceeseeesseeeeeseaeeeeseueeeesaeeeessaueeeseceeeeseeeeesseeesseeeeeeaeeeeesaes 57 Restoring default scan settings ctiiccicniscademeesciacenteinaletetwinieesascesnildeastint bivesaisiavlansestiesanines lewekeeleteetercaicemeciedalneneuiseiddeasneebiceodinenteonaseees 58 SELECTING A SECURITY LEVEL Virus scan task uses a security level to determine which objects to scan see the figure below There are three preset levels SCANNING FOR VIRUSES e Maximum protection The most complete scan of the entire computer or individual disks folders or files We recommend using this level if you suspect that a virus has infected your computer e Recommended This is the level with the settings recommended by Kaspersky Lab experts e Maximum speed This level enables you to comfortably use other applications that require significant system resources since the range of files scanned is smaller Pa Fa FY Preferences serra Virus Scan Threats Teram Network Reports Service Appearance E Quick Scan Security level 7 Maximum protection Full Scan l I i Comprehensive protection Recommended for hostile environment Virus Scan Action Prompt for action when the scan is complete O Prompt for action during scan O Do not prompt for action MW Disinfect Delete if disinfection fails Delete if disinfection fail Other task You can apply the specified preferences to al
175. ot be misrepresented as being the Original software 3 This notice may not be removed or altered from any source distribution GCC 4 0 1 LIBRARY The GCC 4 0 1 copyright 1987 1989 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 Free Software Foundation Inc library was used when developing the application GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright 1989 1991 Free Software Foundation Inc 51 Franklin St Fifth Floor Boston MA 02110 1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it
176. oundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDI
177. permanenily if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation Moreover your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means this is the first time you have received notice of violation of this License for any work from that copyright holder and you cure the violation prior to 30 days after your receipt of the notice Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License If your rights have been terminated and not permanently reinstated you do not qualify to receive new licenses for the same material under section 10 Acceptance Not Required for Having Copies You are not required to accept this License in order to receive or run a copy of the Program Ancillary propagation of a covered work occurring solely as a consequence of using peer to peer transmission to receive a copy likewise does not require acceptance However nothing other than this License grants you permission to propagate or modify any covered work These actions infringe copyright if you do not accept this License Therefore by modifying or propagating a covered work you indicate your acceptance of this License to do so Automatic Licensing of Downstream Recipients Each time you convey a covered work
178. pes section see the figure below Select one of the three options e Scan all files With this option all files will be scanned e Scan programs and documents by content If you select this group only potentially infected files will be scanned i e files which can host and activate a virus Before scanning a file for viruses its internal header is analyzed for file format txt doc exe etc e Scan programs and documents by extension Kaspersky Anti Virus will only scan potentially infected files but the file format will be determined based on the filename s extension see section List of objects to scan by extension on page 89 Do not forget that someone could send a virus to your computer with the txt extension although it might actually be an executable file renamed as a txt file If you select the Scan programs and documents by extension option such a file will be skipped by the scan If the Scan programs and documents by content option is selected ignoring extensions Kaspersky Anti Virus will analyze the file header which will reveal that the file is an exe file This file will be thoroughly scanned for viruses You can set time and file size limits for scanning an object and enable iChecker technology in the Optimization section e Skip if scan takes longer than sec Check this box to set a limit on the scan of a single object and enter the maximum scan time for an object in the field to the right If this va
179. played on the tab with the same name see section The Preferences tab on page 86 To switch to task settings quickly click the Change preferences button UPDATING THE APPLICATION Keeping protection up to date is a key to reliably protecting your computer As new viruses Trojans and malicious software emerge daily it is extremely important to update the application regularly to keep your data permanently protected Kaspersky Anti Virus update implies that the following components will be downloaded and installed on your computer e Application databases Protection of information stored on the computer is ensured thanks to databases File Anti Virus and virus scan tasks use databases when they scan for dangerous objects on your computer and disinfect them The databases are hourly renewed with records of new threats and methods of fighting them Therefore it is recommended to update them on a regular basis e Application modules In addition to the databases you can update the internal modules of Kaspersky Anti Virus Update packages are regularly released by Kaspersky Lab Special Kaspersky Lab update servers are the primary update source for Kaspersky Anti Virus Your computer should be connected to the Internet to successfully download updates from servers If the Internet connection is ensured by a proxy server you will need to configure connection settings see section Configuring proxy server settings on page 69
180. plication number of records in the databases update status are displayed in the main application window see section Main application window on page 13 If you have never updated Kaspersky Anti Virus there will be no information about the most recent update You can view the information on results of previous updates in the Completed tasks section of the report on application operation see section Reports on page 81 If an update is being executed at the present moment brief information about it is displayed in the main window To view a detailed report on current task performance open the report window and select the Update task from the Running tasks section The lower part of the update task report window contains the information on whether the procedure has been completed successfully or not If the update is completed successfully the window will display brief statistics giving information about the size of updates distributed and installed the speed of update execution the length of procedure and other information If the operation fails make sure that the settings for the update service are correct and that the update source is available Restart the update If the attempt returns an error contact the Technical Support Service see section Contacting Technical Support on page 9 The description of all operations performed during updating is displayed in the main part of the report on the Events tab see section The Events
181. program has probably found in the file a sequence of code from an unknown virus or of modified code from a known virus By default all infected files are subject to disinfection and all potentially infected files are sent to quarantine on page 75 SCANNING FOR VIRUSES To change the action on an object open the application settings window on page 15 open the Virus Scan tab and select the name of the required task In the table below you can find descriptions of all available actions on objects okoko Preferences Protection Virus Scan Threats Update Network Reports Service Appearance Quick Scan Objects to scan You can create a new list of objects to scan or edit the existing list Edit Full Scan Virus Scan Security level n V an Recommended l i l Optimal protection Appropriate for most users Preferences Default Action Prompt for action when the scan is complete O Prompt for action during scan O Do not prompt for action MW Disinfect Wi Delete if disinfection fails Run mode Every 1 day P Edit tt E Click the lock to prevent further changes 7 Figure 33 Application settings window Full scan task Table 2 Descriptions of all available actions on objects If the action you have selected is when an infected or potentially infected object is detected Prompt for action when the scan is complete The application postpones the processing of objects to the end
182. ption if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany
183. quirement to continue to provide support service warranty or updates for a work that has been modified or installed by the recipient or for the User Product in which it has been modified or installed Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network Corresponding Source conveyed and Installation Information provided in accord with this section must be ina format that is publicly documented and with an implementation available to the public in source code form and must require no special password or key for unpacking reading or copying Additional Terms Additional permissions are terms that supplement the terms of this License by making exceptions from one or more of its conditions Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License to the extent that they are valid under applicable law If additional permissions apply only to part of the Program that part may be used separately under those permissions but the entire Program remains governed by this License without regard to the additional permissions When you convey a copy of a covered work you may at your option remove any additional permissions from that copy or from any part of it Additional permissions may be written to require their own removal in certain
184. r action during scan O Do not prompt for action MW Disinfect W Delete if disinfection fails Other task You can apply the specified preferences to all virus scan tasks preferences tt ae Click the lock to prevent further changes C Figure 37 Application settings window Scanning for viruses 2 To modify the scan settings select the security level see section Selecting a security level on page 48 configure advanced level settings and select an action on objects see section Selecting actions on objects on page 52 3 To apply these settings to all tasks click the Apply button in the Other task preferences section Confirm the uniform settings that you have modified in the confirmation request window RESTORING DEFAULT SCAN SETTINGS When modifying task settings it is always possible to return to the default settings Kaspersky Lab experts consider these settings to be optimal and have collected them in the Recommended protection level To restore default scan settings 1 Open the application settings window on page 15 select the Virus Scan tab and then select the required task SCANNING FOR VIRUSES 2 Click the Default button in the Security level section see the figure below E aoe Preferences Protection Virus Scan Threats Update Network Reports Service Appearance Quick Scan Security level Maximum protection l l i Comprehensive protection Full Scan i ironme aaa Re
185. r version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY USING THIRD PARTY CODE 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUT
186. r3 com 73 bytes 12 3 09 12 42 17 PM File Anti virus detected virus EICAR Test Fi Volumes NO NAME virus Eicar6 com 68 bytes 12 3 09 12 42 14 PM detected virus EICAR Test Fi Volumes NO NAME Vvirus EicarS com 68 bytes 12 3 09 12 42 14 PM detected virus EICAR Test Fi Volumes NO NAME virus SUSP Eicar4 com 73 bytes 12 3 09 12 42 16 PM detected virus EICAR Test Fi Volumes NO NAME virus SUSP Eicarl com 73 bytes 12 3 09 12 42 15 PM detected virus EICAR Test Fi Volumes NO NAME virus SUSP Eicarl10 com 73 bytes 12 3 09 12 42 16 PM detected virus EICAR Test Fi Volumes NO NAME virus WARN Eicar7 com 73 bytes 12 3 09 12 42 17 PM detected virus EICAR Test Fi Volumes NO NAME virus WARN Eicar2 com 73 bytes 12 3 09 12 42 17 PM detected virus EICAR Test Fi Volumes NO NAME virus WARN Eicar10 com 73 bytes 12 3 09 12 42 17 PM detected virus EICAR Test Fi Volumes NO NAME Vvirus WARN EicarS com 73 bytes 12 3 09 12 42 17 PM III Delete Restore Figure 50 Backup storage CONFIGURING THE BACKUP SETTINGS Clear all You can determine the maximum period for storing copies in backup By default the term for storing copies of dangerous objects in quarantine is 30 days At the end of which the copies will be deleted You can change the maximum term for storing copies or remove this restriction KASPERSKY ANTI VIRUS To configure the settings for storing objects in the backup please do the f
187. ranch of the Federal Security Service and the Crypto C data security software library certificate CryptoEx LLC corporate website htip www cryptoex ru Exclusive rights for data security software library are reserved by CryptoEx LLC BoosT 1 30 0 LIBRARY The boost 1 30 0 copyright 2003 2004 Beman Dawes Daniel Frey David Abrahams copyright 2004 2005 Rene Rivera Boost Software License Version 1 0 August 17th 2003 Permission is hereby granted free of charge to any person or organization obtaining a copy of the software and accompanying documentation covered by this license the Software to use reproduce display distribute execute and transmit the Software and to prepare derivative works of the Software and to permit third parties to whom the Software is furnished to do so all subject to the following KASPERSKY ANTI VIRUS The copyright notices in the Software and this entire statement including the above license grant this restriction and the following disclaimer must be included in all copies of the Software in whole or in part and all derivative works of the Software unless such copies or derivative works are solely in the form of machine executable object code generated by a source language processor THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE TITLE AND NON
188. re If you cannot solve the problem on your own please contact Kaspersky Lab s Technical Support Service see section Contacting Technical Support on page 9 IN THIS SECTION What is the protection status Of your computer cccccseeeeceeceeeeeeeeeeeeeeeeeesaaeeeeeeseeeeeeeeseaeeeeeesseseeeessseeeeeessecseeeesaseeeeees 18 How to Scan Your Computer fOr VirUS S ccccccseeeeccccceeceeeeeeeeeeeeeeeeeeeeeeeeeessesaeeceeeeeseeeeeeeceeeesseeeaeeceeeessssaeseeeeeeessaaaeeeeees 20 How to Perform a Quick Scan Of Your Computer ccccccccceceececesseseessseeececeeeeeeeeeeeeeeaaesesssseeceeeeeeeeesessesaaaaasaseeeeeeeeees 20 How to Scan a File Folder or Disk for Viruses ccceceeeeceecceeeeeeceececeueeceeeneeeueeceeeneeeaeeseteneeeaeeseeeneeeaeeseeneesaeeeaesneesneeees 21 OW TO update HG GD PlICATOM esiisa E EE E EE E aE 21 WHAT IS THE PROTECTION STATUS OF YOUR COMPUTER Your computer s protection status gives you a summary of your computer s overall security level These threats include malicious programs detected and outdated application databases disabled File Anti Virus using minimum settings for the Kaspersky Anti Virus operation etc Protection status is displayed in the main application window see section Main application window on page 13 and is depicted by the corresponding stop light color Depending on the situation the color scheme of the window will change and if any security threats are detected t
189. ree Software Foundation 14 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRAR
190. ributor s contributor version A contributor s essential patent claims are all patent claims owned or controlled by the contributor whether already acquired or hereafter acquired that would be infringed by some manner permitted by this License of making using or selling its contributor version but do not include claims that would be infringed only as a consequence of further modification of the contributor version For purposes of this definition control includes the right to grant patent sublicenses in a manner consistent with the requirements of this License Each contributor grants you a non exclusive worldwide royalty free patent license under the contributor s essential patent claims to make use sell offer for sale import and otherwise run modify and propagate the contents of its contributor version In the following three paragraphs a patent license is any express agreement or commitment however denominated not to enforce a patent such as an express permission to practice a patent or covenant not to sue for patent infringement To grant such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party 15 USING THIRD PARTY CODE If you convey a covered work knowingly relying on a patent license and the Corresponding Source of the work is not available for anyone to copy free of charge and under the terms of this License through a publicly availabl
191. rily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and
192. rmance of objects processing and conditions for temporarily pausing the component KASPERSKY ANTI VIRUS To configure additional settings of File Anti Virus 1 Open the application settings window on page 15 and select the Protection section see figure below cs AN cs Preferences CGCQreOoOB LIE kd Protection Virus Scan Threats Update Network Reports Service Appearance General V Enable File Anti Virus Security Level ns Maximum protection Comprehensive protection Recommended for hostile environment Action Prompt for action Block access W Disinfect W Delete if disinfection fails L Click the lock to prevent further changes Figure 21 Application settings window File Anti Virus 2 Click the Preferences button in the Security level section 3 In the window that opens select the Additional tab see the figure below The object scanning mode determines File Anti Virus processing conditions You have the following options e Smart mode This mode is aimed at speeding up the processing of objects and returning them to the user When it is selected a decision to scan is made based on analyzing the operations performed with the object For example when using a Microsoft Office file Kaspersky Anti Virus scans the file when it is first opened and last closed All operations in between that overwrite the file are not scanned Smart mode of scanning the objects is used by default
193. rsky Anti Virus after the interval specified in the previous update package has elapsed This option can regulate the update frequency in case of virus outbreaks and other potentially dangerous situations Kaspersky Anti Virus will receive the latest updates for the databases and modules in timely fashion so malware cannot penetrate your computer e Onschedule Kaspersky Anti Virus is updated according to a specified schedule If you would like to switch to this update mode you will be offered to run the update on a daily basis by default To create a custom schedule see section Configuring the update task schedule on page 66 click the Edit button next to the mode title and make the required changes in the window that opens e Manually You launch the updating procedure manually Kaspersky Anti Virus notifies you when an update is required CONFIGURING THE UPDATE TASK SCHEDULE Kaspersky Anti Virus is automatically updated by default If this schedule does not suit you set the update start settings manually Frequency Days Schedule Every 1 day EY l Time 3 94 PM ole Run task if skipped Q _ Figure 42 Configuring the update task schedule The most important step is to determine the frequency of running the update task You can select one of the following options e Minutes The application is updated every few minutes Enter the number of minutes between scan startups in the schedule settings the value shoul
194. rus iINterfaCe cccccccccccceceeeeeeceeeeeeeeeeeeceeeeseseeeeseceeeesesaeseeeeeeeeessaeaeeeeeeeesaaeaes 16 ouk S TART e E E E nenesoes 2 18 What is the protection status Of your computer ccccccccceeeeeeeeeeeeeeaeseeeeeeeeeeaaeaseeeeeeeaaaeeeeeeeesssaaaceeeeeeessaaageeeees 18 How to Scan Your Computer for Viruses ssccccececeeeeecceeeaeesssseeeeceeeeeeeeeeeeeaaaauasaceeeeeeeeeeseeeeesaaaaaaasueseesereeees 20 How to Perform a Quick Scan of Your Computer 00ccceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeeeeeeeeeeeeeeeeseeeeeseeeeeeeeeeeeeeeeees 20 How to Scan a File Folder or Disk for Viruses cecceceeecceecceceeeeceeeceeeneeceeeceeeneeceeeeeeeaeeeaeeeeeeaeeseeeneeeneeseeeneeeneesenss 21 How to update the All CANO Miss coscsswcunciesncicnssepseveteciachasspantnenccaasuathipitieedeslonsaecpactieansennceatt ooduetanioniuecbactucnnieanseasbenductinn 21 MULTI TASKED PROTECTION MANAGEMENT cccccccccccccccssssssseeececcceeeeeeeeeseeaaeeeessseecececeeeeeesseseeeaaeaaeeeeeeeeeeess 22 Disabling computer protection wicscescsitnccccevncteneeSnestecavacsnenetdadiatecustxsaudaesdavennatsnavenadGstavecivenadaeisetaessannocedeianiecasteneedaeens 22 Restoring protection ON your COMPUTES ccecceeeeeceeceeeeeeeeceaaaeeeeesaaaeeeeeeaaaeeeeseeaaaeeeeseaaeeeesssaaaeeesseaaaeeeseeaaeeeeseaes 23 Exporting and importing Kaspersky Anti Virus S ttinGS c ccccccsseececseeeeeceeeeeeseeeeeaeeeeeeeeeeee
195. rus or Virus Scan tasks To disinfect the dangerous objects immediately click the Disinfect all button Click the Show disinfected objects button for the information about disinfected objects to be displayed on the list To remove records about detected objects from the report click the Clear button Note that all the dangerous objects you have detected will then stay on your computer Discard all e Events List of all events logged during operation of Kaspersky Anti Virus To delete information from the list click the Clear button e Quarantine List of objects placed to Quarantine on page 75 e Backup List of objects placed to the Backup storage on page 78 e Running tasks List of tasks being performed at the moment If no task is active and File Anti Virus is disabled the list will be empty KASPERSKY ANTI VIRUS e Completed tasks List of completed tasks You may view all completed tasks or the last twenty ones To clear the list click the a button in the lower left corner of the report window and select the Delete all completed tasks command From the report window you can manage the operation of File Anti Virus virus scan and update tasks start stop and pause them To do this use the buttons with the same name in the report window of the specific task You can export the whole report to a text file This option can be useful if for example an error occurred during File Anti Virus operation and
196. rwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this
197. s see section Scanning for viruses on page 43 or application updates see section Updating the application on page 61 IN THIS SECTION Disabling computer protection i icxicacsviesioraedasnicecneviccasnnasdansenovesianncaceidasunxined snaesipinsesaviciennedacaWeceexaense eateinsnaevesmsnaceduincteaneiaeneteeusane 22 Restoring the protection ON your COMPUTEL cccecceeceeeeeeeeeeeeneeeeeeeaaeeeeeseaaeeeeeseaaeeeesssaaaeeesssaaaeeeessaaaeeeeesaaaeeesseaaeeeeessaes 23 Exporting and importing Kaspersky Anti Virus settings c csccccccsseeecceeeeeceeeeeeseeeeeeeeeecsaueeesaueeessaneeeseuseeesaeeeesaeeeesaaees 24 Exiting Kaspersky Anti Virus ccccsccccccsseececeeeecaeeeeeceeeeeeseeeeseeeeessaeeesseeeeseaeeeesaeeessaeeeseaueeeseueeessageeessaeeessageeesaeeeeesaaes 25 DISABLING COMPUTER PROTECTION Disabling protection means stopping File Anti Virus see section Anti virus protection of your computer s file system on page 30 Virus scan on page 43 and update see section Updating the application on page 61 tasks will continue to run If protection is fully disabled it can only be re enabled manually by the user In this case File Anti Virus will not be automatically enabled after the system or Kaspersky Anti Virus restarts Note that if Kaspersky Anti Virus conflicts with other program s installed on your computer you can pause File Anti Virus or create an exclusion list see section Trusted zone creation on pag
198. s license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary General Public License It also provides other free software developers Less of an advantage over competing USING THIRD PARTY CODE non free programs These disadvantages are the reason we use the ordinary General Public License for many libraries However the Lesser license provides advantages in certain special circumstances For example on rare occasions there may be a special need to encourage the widest possible use of a certain library so that it becomes a de facto standard To achieve this non free programs must be allowed to use the library A more frequent case is that a free library does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public License In other cases permission to use a particular library in non free programs enables a greater number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a mo
199. s no warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU General Public License This license the GNU Lesser General Public License applies to certain designated libraries and is quite different from the ordinary General Public License We use this license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a library whether statically or using a shared library the combination of the two is legally speaking a combined work a derivative of the original library The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom The Lesser General Public License permits more lax criteria for linking other code with the library We call thi
200. s scan task You can select one of the following options SCANNING FOR VIRUSES e Minutes The interval between scan task startups is measured in minutes Enter the number of minutes between scan startups in the schedule settings the value should be specified in range from 5 to 59 minutes e Hours The interval between scan startups is measured in hours Specify the interval in the schedule settings as Every N th hour and specify the value of N For example to run the task every hour enter Every 1 hour e Days The time between scan startups is measured in days In the schedule settings specify the update start frequency Also in the Time field specify what time of day or night the task will run e Weeks The task will run on certain days of week If this option is selected in the schedule settings check the boxes for the days of the week on which you want the scan task to run Specify the start time in the Time field e Months The task will run once a month at the specified time e Ata specified time The task will run once at the date and time that you have specified e At application startup The task starts every time that Kaspersky Anti Virus starts You can also set an interval between the application startup and the task startup e After every update The task starts after each update of the application databases If a scan update did not start for any reason for example the computer was shut down at that time you can
201. seeeeesaeeeeseeeeessaeeessaes 24 EXITING Kaspersky ANU VS cskern arpe a ER rO E OES 25 CREATING A PROTECTION SCOPE ec esae S theese ence e eee eire a aE Sa aE ete eee rE e E iei 26 Selecting malicious programs tO be monitored ccceeeececcceeeeeeeeeeeeeeeeeeaeeeeeceeeeeeseeeeeceeeesesseaeeeeeeeesseaaeeeeeeeeeaaaaes 26 BB Uri ye fede qt oie lt 2 6 Ieee ete eet nee se se tee ae ee E eee ee ee ree eee ne eee 27 ANTI VIRUS PROTECTION OF YOUR COMPUTER S FILE SYSTEM ccccccccceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeess 30 Pausing disabling file protection waccinseccecasscetcedasdeneeshestecenetienesedcueieetnedetnen iindoexinteedeustaetceiedteleeshisiacededesdecedeusivedeieet 30 COMMO UNNG Me Prote COM eier ra ETE AE A 31l Selecting the file security IOVEl eee ccccccccccseeseeceeeeeeeaeeeeeeeeeeeeaeeeeecceeeeeeseeseeeeeeeeseeeeseeeeeeeessaeaseeeeeeesssaaaeeeeeeeeeas 32 Specifying the types of files tO SCAM cc cceeeeceeccceecceeeeeeeeeeeeeeaeeeeceeeeeeeeaeeeeeceeeeeseeeesseeeeeesssaeeeeeeeeeeessaaeeseeeeeeas 33 Creating a protection SCOpe sdecincectearateececcastaxesacteecdicctictedealeaddsdessaunecseesedecceicendesdeadgeneceecndcaheeadeesteavadasswarastesieuncs 35 Configuring additional settings cee eeccccescesseeeeceeeeeeeeeeseeeeeeeseeeeseeceeeeesssaeeeeceeeesseeeseeeeeeeesssaeaeeeceeeessaaaeeeeeeeeeas of SEISCIMG ACTIONS OM ODICCIS aseran aae aR oiewsdueyssedantidccwed bene Sortie KENEEN aE dew
202. ses and modules using dedicated update servers Kaspersky Lab s update servers are Kaspersky Lab s Internet sites to which the Kaspersky Anti Virus updates are uploaded You will need an Internet connection to update Kaspersky Anti Virus from these servers By default Kaspersky Anti Virus automatically checks for updates on Kaspersky Lab s servers If a server contains a new set of updates Kaspersky Anti Virus will download and install them in the background To update Kaspersky Anti Virus open the main application window on page 13 and click the wy button As a result Kaspersky Anti Virus will start updating MULTI TASKED PROTECTION MANAGEMENT By default Kaspersky Anti Virus starts when the operating system starts and protects your computer during the entire session File Anti Virus activity is indicated by the Kaspersky Anti Virus icon on page 15 in the Dock or in the Mac OS Menu Bar If the icon is active your computer s protection is enabled if the icon is inactive the protection is disabled Kaspersky Lab specialists strongly recommend that you do not disable real time protection provided by Anti Virus since this could lead to an infection of your computer and loss of data Note that the icon indicates the status of protection provided by File Anti Virus see section Anti virus protection of your computer s file system on page 30 Disabling or pausing File Anti Virus does not impact the execution of virus scan task
203. settings window Appearance Modifications applied to the Kaspersky Anti Virus interface settings are not saved if you restore default settings or uninstall the application QUICK START One of the main goals of Kaspersky Lab specialists when they designed the application was to ensure optimum configuration of Kaspersky Anti Virus to provide your computer with protection immediately after the installation You are advised to perform the following actions after completing the installation and starting the application on your computer e Activate your copy of Kaspersky Anti Virus see section License management on page 72 Using a licensed version will let you update the application s databases on a regular basis and access the Technical Support Service e Evaluate the current protection status see section What is the protection status of your computer on page 18 to make sure that Kaspersky Anti Virus ensures the appropriate level of protection e Update Kaspersky Anti Virus See section How to update the application on page 21 Kaspersky Anti Virus databases should be kept up to date so that they are always ready to help detect and eliminate viruses or other malware e Scan your entire computer see section How to Scan Your Computer for Viruses on page 20 for viruses If problems or errors occur in the application s operation please view the report see section Reports on page 81 which may indicate the cause of failu
204. soon Other important events a e IRAAAAACARAAAAARAAA lA A A A A A A A A A A A A A A A Figure 59 Configuring notifications receiving service HELP INFORMATION This manual section contains help information about the formats of files being scanned and allowed masks being used when configuring Kaspersky Anti Virus settings IN THIS SECTION List of Objects to SCAN DY extension cccccccecccceeseeceeeeeeeaesseeceeeeeeaaasseeeeeeeesaesaaeeeeeeeeeaaaaeceeeeeesaeaeeeeeeesesaaseeeeeesssaaasaeeees 89 Allowed file exclusion MASKS ccccceccceccecsceceueeeueeeeceueeeeueeuceuuueaueeaeeuuueuueeaeeueueaueeausuaeeaueeaueaeusuueeaesuaeeauueausuaeeuaueaeenaeeueeeuess 91 Allowed exclusion masks according to the Virus Encyclopedia ClaSSifiCation ccccccceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeaeaeeeeenaaed 92 LIST OF OBJECTS TO SCAN BY EXTENSION If you have selected Scan programs and documents by extension in the settings of File Anti Virus or Virus scan objects with the following extensions will be scanned for viruses com Microsoft Windows executable file of no larger than 64 KB exe executable file Microsoft Windows self unpacking archive sys Microsoft Windows system file prg dBase Clipper or Microsoft Visual FoxPro text WAVmaker package program bin Microsoft Windows binary file bat Microsoft Windows batch file cmd Microsoft Windows NT command file as bat file for DOS OS 2
205. stem if any on which the executable work runs or a compiler used to produce the work or an object code interpreter used to run it The Corresponding Source for a work in object code form means all the source code needed to generate install and for an executable work run the object code and to modify the work including scripts to control those activities However it does not include the work s System Libraries or general purpose tools or generally USING THIRD PARTY CODE available free programs which are used unmodified in performing those activities but which are not part of the work For example Corresponding Source includes interface definition files associated with source files for the work and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require such as by intimate data communication or control flow between those subprograms and other parts of the work The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source The Corresponding Source for a work in source code form is that same work Basic Permissions All rights granted under this License are granted for the term of copyright on the Program and are irrevocable provided the stated conditions are met This License explicitly affirms your unlimited permission to run the unmodified Program The output from running a covered work
206. support corporate anti virus systems Kaspersky Lab s anti virus database is updated every hour The company provides its customers with technical support in several languages If you have any questions comments or suggestions you can contact us through our dealers or at Kaspersky Lab directly We will be glad to assist you by phone or email in any matters related to our products You will receive full and comprehensive answers to all your questions Kaspersky Lab official site http Awww kaspersky com Virus Encyclopedia http Awww viruslist com Anti Virus laboratory newvirus kaspersky com only for sending suspicious objects in archives http support kaspersky com virlab helpdesk html for virus analysts queries Kaspersky Lab forum http forum kaspersky com
207. t is a work based on the Library and explaining where to find the accompanying uncombined form of the same work You may not copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Library or works based on it Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original licensor to copy distribute link with or modify the Library subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third
208. t when you distribute the same sections as part of a whole which is a work based on the Library the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work based on the Library on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that version instead if you wish Do not make any other change in these notices Once this change is made in a given copy it is irreversible for that copy so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy This opt
209. tent File Anti Virus will only scan potentially infected files i e files which can host and activate a virus Before scanning a file for viruses its internal header is analyzed for file format txt doc exe etc If the analysis reveals that the file format is uninfectable the file will not be scanned for viruses and will immediately be accessible If the file format is at risk of infection the file will be scanned for viruses e Scan programs and documents by extension File Anti Virus will only scan potentially infected files but the file format will be determined based on the filename s extension see section List of objects to scan by extension on page 89 Do not forget that someone could send a virus to your computer with the txt extension although it might actually be an executable file renamed as a txt file If you select the Scan programs and documents by extension option such a file will be skipped by the scan If the Scan programs and documents by content option is selected ignoring extensions File Anti Virus will analyze the file header which will discover that the file is an exe file This file will be thoroughly scanned for viruses To shorten the duration of scans and increase the operating speed of the application you can opt to scan only new files and files modified since the last scan To enable this mode check the Scan only new and changed files box in the Optimization section This mode extends to simple
210. teractive make it output a short notice like this when it starts in an interactive mode Gnomovision version 69 Copyright year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY for details type show w This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course the commands you use may be called something other than show w and show c they could even be mouse clicks or menu items whatever suits your program You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the program if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the program Gnomovision which makes passes at compilers written by James Hacker lt signature of Ty Coon gt 1 April 1989 Ty Coon President of Vice This General Public License does not permit incorporating your program into proprietary programs If your program is a subroutine library you may consider it more useful to permit linking proprietary applications with the library If this is what you want to do use the GNU Library General Public License instead of this License GNU LESSER GENERAL PUBLIC LICENSE Version 2 1 February 1999 Copyright 1991 1999 Free Software Foundatio
211. the application on page 61 There are three main types of events e Critical events are events of a critical importance that indicate the problems in Kaspersky Anti Virus performance or gaps in protection of your computer for example virus detected operation failure e Important events are events that should be attented to since they reflect important situations while the application is running for example processing error e Informational events are reference type messages which as a rule do not contain important information for example ok not processed If it is not necessary to log such events in the report uncheck the Log non critical events box in the report settings window see section Configuring the report settings on page 82 1 ft 1 Reports Kaspersky Anti Virus REPORTS aa Detected Events Statistics Preferences gt Detected Time Name Status Reason Events 12 3 09 12 37 22 PM File Volumes NO s WARN Eicar9 com detecte st File F aa 12 3 09 12 37 27 PM File Volumes NO s WARN Eicar9 com not disinfected skipped by user i Backup 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar10 com detecte st File AEI 12 3 09 12 37 27 PM File Volumes NO NAME virus Eicar10 com not disinfected skipped by user 12 3 09 12 37 27 PM File Volumes NO NAME Vvirus Eicar2 com detecte st File eaii 4 12 3 09 12 37 27 PM File Volumes NO NAME virus Ei
212. the executable KASPERSKY ANTI VIRUS If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy distribute or modify t
213. the library If this is what you want to do use the GNU Lesser General Public License instead of this License But first please read lt http www gnu org philosophy why not Igpl html gt gt gt GCC RUNTIME LIBRARY EXCEPTION Free Software Foundation Inc http www fsf org Version 3 1 31 March 2009 Copyright 2009 Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed This GCC Runtime Library Exception Exception is an additional permission under section 7 of the GNU General Public License version 3 GPLvs It applies to a given file the Runtime Library that bears a notice placed by the copyright holder of the file stating that the file is governed by GPLv3 along with this Exception When you use GCC to compile a program GCC may combine portions of certain GCC header files and runtime libraries with the compiled program The purpose of this Exception is to allow compilation of non GPL including proprietary programs to use in this way the header files and runtime libraries covered by this Exception 0 Definitions A file is an Independent Module if it either requires the Runtime Library for execution after a Compilation Process or makes use of an interface provided by the Runtime Library but is not otherwise based on the Runtime Library GCC means a version of the GNU Compiler Collection with or without modifications governed by version 3 or a specif
214. the program non free The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS 0 Definitions This License refers to version 3 of the GNU General Public License Copyright also means copyright like laws that apply to other kinds of works such as semiconductor masks The Program refers to any copyrightable work licensed under this License Each licensee is addressed as you Licensees and recipients may be individuals or organizations To modify a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission other than the making of an exact copy The resulting work is called a modified version of the earlier work or a work based on the earlier work A covered work means either the unmodified Program or a work based on the Program To propagate a work means to do anything with it that without permission would make you directly or secondarily liable for infringement under applicable copyright law except executing it on a computer or modifying a private copy Propagation includes copying distribution with or without modification making available to the public and in some countries other activities as well To convey a work means any kind of propagation that enables other parties to make or receive copies Mere interaction with a user through a computer network with no transfer of a copy is not conveying An interactive user
215. the recipient automatically receives a license from the original licensors to run modify and propagate that work subject to this License You are not responsible for enforcing compliance by third parties with this License An entity transaction is a transaction transferring control of an organization or substantially all assets of one or subdividing an organization or merging organizations If propagation of a covered work results from an entity transaction each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party s predecessor in interest had or could give under the previous paragraph plus a right to possession of the Corresponding Source of the work from the predecessor in interest if the predecessor has it or can get it with reasonable efforts You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License For example you may not impose a license fee royalty or other charge for exercise of rights granted under this License and you may not initiate litigation including a cross claim or counterclaim in a lawsuit alleging that any patent claim is infringed by making using selling offering for sale or importing the Program or any portion of it Patents A contributor is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based The work thus licensed is called the cont
216. tings windows To prevent users without administrator privileges from editing Kaspersky Anti Virus settings click on the lock icon in the lower part of the window You will need to enter the administrator s username and password to access the settings The button provides access to Kaspersky Anti Virus help system with the description of settings for the current application window KASPERSKY ANTI VIRUS ICON Immediately after Kaspersky Anti Virus is installed its icon appears in the Mac OS Menu Bar The icon is in itself an indicator for the application s operation mode If the icon is active this means that the computer protection against malware in real time mode is enabled The inactive icon indicates that the protection is disabled Additionally the icon provides access to the commands in Kaspersky Anti Virus main menu By default the icon is located on the Mac OS Menu Bar You can change the icon s location by replacing it onto the Dock To move the application icon onto the Dock 1 Open the application settings window on page 15 and select the Appearance section see figure below KASPERSKY ANTI VIRUS 2 Inthe Show application icon section select the In Dock option Note that this modification will take place only after Kaspersky Anti Virus is restarted mary Preferences oR Reports Service Appearance Protection Virus Scan Threats Events notification Y Enable notifications Additional S
217. tion box and specify the username and password in the fields below If the proxy server requires authentication and you did not enter a username and password or the data specified was not accepted by the proxy server for some reason a window will open asking for a username and password for authentication If the authentication has been successful the specified username and password will be remembered for subsequent use if you check the Remember this password box Otherwise the authentication settings will be requested again When you click the Cancel button the current update source in the authentication settings request window will be replaced with the following one on the list Authentication settings specified in the current window or mentioned in the application interface will be ignored UPDATING THE APPLICATION If you are downloading the update from an FTP server the server is connected to in passive mode by default If this connection fails it will attempt to connect in active mode By default the time assigned to connect to an update server is one minute If the connection fails once this time has elapsed the application will attempt to connect to the next update server This continues until a connection is successfully established or until all the available update servers are attempted UPDATE STATISTICS Some statistics regarding current performance of the update service release date for the databases used by the ap
218. tis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Pro
219. to the extent such circumvention is effected by exercising rights under this License with respect to the covered work and you disclaim any intention to limit operation or modification of the work as a means of enforcing against the work s users your or third parties legal rights to forbid circumvention of technological measures Conveying Verbatim Copies You may convey verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice keep intact all notices stating that this License and any non permissive terms added in accord with section 7 apply to the code keep intact all notices of the absence of any warranty and give all recipients a copy of this License along with the Program You may charge any price or no price for each copy that you convey and you may offer support or warranty protection for a fee Conveying Modified Source Versions You may convey a work based on the Program or the modifications to produce it from the Program in the form of source code under the terms of section 4 provided that you also meet all of these conditions a The work must carry prominent notices stating that you modified it and giving a relevant date b The work must carry prominent notices stating that it is released under this License and any conditions added under section 7 This requirement modifies the requirement in section
220. u can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it For example if you distribute copies of the library whether gratis or for a fee you must give the recipients all the rights that we gave you You must make sure that they too receive or can get the source code If you link other code with the library you must provide complete object files to the recipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the
221. u to choose that version for the Program Later license versions may give you additional or different permissions However no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version Disclaimer of Warranty KASPERSKY ANTI VIRUS THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 Limitation of Liability INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MODIFIES AND OR CONVEYS THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF S
222. uary 1998 through 1 0 6 March 20 2000 are Copyright 1998 1999 Glenn Randers Pehrson and are distributed according to the same disclaimer and license as libpng 0 96 with the following individuals added to the list of Contributing Authors Tom Lane Glenn Randers Pehrson Willem van Schaik USING THIRD PARTY CODE libpng versions 0 89 June 1996 through 0 96 May 1997 are Copyright 1996 1997 Andreas Dilger Distributed according to the same disclaimer and license as libpng 0 88 with the following individuals added to the list of Contributing Authors John Bowler Kevin Bracey Sam Bushell Magnus Holmgren Greg Roelofs Tom Tanner libpng versions 0 5 May 1995 through 0 88 January 1996 are Copyright 1995 1996 Guy Eric Schalnat Group 42 Inc For the purposes of this copyright and license Contributing Authors is defined as the following set of individuals Andreas Dilger Dave Martindale Guy Eric Schalnat Paul Schmidt Tim Wegner The PNG Reference Library is supplied AS IS The Contributing Authors and Group 42 Inc disclaim all warranties expressed or implied including without limitation the warranties of merchantability and of fitness for any purpose The Contributing Authors and Group 42 Inc assume no liability for direct indirect incidental special exemplary or consequential damages which may result from the use of the PNG Reference Library even if advised of the possibility of such damage Permissi
223. umes NO NAME virus SUSP Eicarl com ki detected virus EICAR Test File modification File Volumes NO NAME virus SUSP Eicar10 com W File Anti virus detected virus EICAR Test File modification File Volumes NO NAME Vvirus SUSP Eicar2 com Update detected virus EICAR Test File modification File Volumes NO NAME virus SUSP Eicar3 com File Anti virus detected virus EICAR Test File modification File Volumes NO NAME virus SUSP Eicar4 com ie File Anti Virus detected virus EICAR Test File modification File Volumes NO NAME virus SUSP Eicar5 com W File Anti Virus detected virus EICAR Test File modification File Volumes NO NAME virus SUSP Eicar6 com detected virus EICAR Test File modification File Volumes NO NAME virus SUSP Eicar7 com detected virus EICAR Test File modification File Volumes NO NAME virus SUSP Eicar8 com Status Dangerous objects detected Scanned 1451 Start 12 3 09 12 05 53 PM Detected 29 Duration 00 35 29 Untreated 29 Pran T C Start Pause Stop Disinfect all Discard all Figure 54 List of dangerous object detected KASPERSKY ANTI VIRUS THE EVENTS TAB The Events tab see figure below logs all important events which occur during File Anti Virus s See section Anti virus protection of your computer s file system on page 30 operation including virus scan tasks see section Scanning for viruses on page 43 and update tasks see section Updating
224. ur requirements and edit its settings This will change the name of the security level to Custom To modify the settings for the current security level 1 Open the application settings window on page 15 and select the Protection tab see figure below 2 Click the Preferences button in the Security level section ANTI VIRUS PROTECTION OF YOUR COMPUTER S FILE SYSTEM 3 Edit the file protection settings in the window that opens and click the OK button a es AO Preferences oa T omn Protection Virus Scan Threats Update Network Reports Service Appearance General V Enable File Anti Virus Security Level n O Maximum protection Comprehensive protection Recommended tor hostile environment Action Prompt for action Block access V Disinfect V Delete if disinfection fails p Click the lock to prevent further changes Figure 16 Application settings window File Anti Virus SPECIFYING THE TYPES OF FILES TO SCAN You can specify which types of files will be scanned by File Anti Virus using the criteria of file size file format or location whenever they are opened executed or saved The types of files to be scanned for viruses are determined in the File types section see the figure below Select one of the three options e Scan all files In this case all file system objects being opened launched or saved will be subject to the scan e Scan programs and documents by con
225. users of a free program by obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU General Public License This license the GNU Lesser General Public License applies to certain designated libraries and is quite different from the ordinary General Public License We use this license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a library whether statically or using a shared library the combination of the two is legally speaking a combined work a derivative of the original library The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom The Lesser General Public License permits more lax criteria for linking other code with the library We call this license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary General Public License It also provides other free software developers Less of an advantage over competing non free programs These disadvantages are the reason we use the ordinary General Public License for many libraries However the Lesser license provides advantages in certain special circumstances For example on rar
226. usta sane a twats ss cannes oe ezaee ue to casd nando wscecensseeents 91 Allowed exclusion masks according to the Virus Encyclopedia classification ccccccseeeeeseeeeeeeeeeeeseeeeeeseeeeesaes 92 USING THIRD PARTY CODE ois nanese cena ceeaccinnaeeceaas etecusciceaisnaasepescesceedacsa cwicqeaneeduseseebsecann essausecesceeaseesecasaeieseceenice 93 CY eG aap cee cone xe eee cece sae N E pace sens E eee eeececeee cue scaeeececouene 93 BOOSTS I O I a a ee ee Re Se ee ee ee eee 93 CIECO FM 8 WON Y ar e 22 tere nc cits ce a ware eid cee elves eso tree neta oe E ee gecneamtnieente ss coanee dees 94 CIDA Te S 2 4 ieee ene ae ee Ce ee ee eee 94 HG MOV AY asec pe celenssoctemecs insane E us adennceannetseseia seve antcengareesndaeesencmeuecaseed 95 Bil oks olor a ale g geen eee ee em ner Reo E T A Re ee ee eee T eee 105 Bae Weg WY AAEE E E cere ta deci see tesa op nar iso satan E AAE E E AE A EE eaeesceaes 113 ON a sess sec cicza eps cc essa ep seca asco ceases a Sassen sees ean ecdaceains ac eassete ead seats esa ea sacssuams se asses geet Scher eosencseess 114 TABLE OF CONTENTS PMOSZ17 3 01 DAIRY sien naeitietns E E E E E A E E E A E A E E 114 EZMA SDK AAS DUY eee eee ee eee E aE TAEA EEE TAAA AE EAA EERE EE AT NE eee AE 115 RFC1321 based RSA free MD5 LIBRARY library cccescsesssssssssssssssssseseesesesessssseeeseesseeesaasaaaeeeaaaaeaaaaaaaaaaaas 115 2M Ws O a a E E jaaeesucenireeeactebacoasaarepocencn
227. ve made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you USING THIRD PARTY CODE Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on
228. ved to be a consequence of the rest of this License 8 Ifthe distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software F
229. ver the application tries to connect and retrieve the updates from the next server You can edit the source list using the button to add a new source and the button to remove a source from the list When adding a new source it is admissible to specify the path to a folder that contains the set of updates or the address of an FTP HTTP site Kaspersky Anti Virus adds a new update source to the top of the list and automatically marks this source as enabled by checking the box next to it Click the Edit button to edit a source that you have selected from the list The only type of sources you cannot edit or delete are Kaspersky Lab update servers If you select a resource outside the LAN as an update source you should have an Internet connection established to perform an update SELECTING THE UPDATE MODE AND OBJECTS When configuring Kaspersky Anti Virus update settings it is important to define the update mode and objects Update objects are the components that will be updated applications databases application modules Databases are always updated and the application modules are only updated if the corresponding mode is enabled If you want to download and install updates for Kaspersky Anti Virus modules on your computer when the update is in progress open the application settings window on page 15 select the Update tab see figure below and check the Update application modules box in the Update section A Ar Pr
230. virus EICAR Test File modificatic File Volumes NO NAME virus WARN Eicar8 com 7 Result All threats have been successfully neutralized Scanned 29 Start 12 3 09 12 42 10 PM Detected 29 Duration 00 00 07 Untreated 0 Completion 12 3 09 12 42 17 PM ill Start Pause Stop Disinfect all Discard all Figure 27 Managing virus scan tasks from the report To stop a virus scan task please do the following 1 Open the Kaspersky Anti Virus report window To do so click the B globe icon in the main window see section Main application window on page 13 2 Inthe list on the left select the name of the virus scan task see figure above and click the Stop button This will pause the scan until you start the task again manually or it starts again automatically according to the schedule Next time you run the task the application will ask whether you want to continue the task where it stopped or start again CREATING THE LIST OF OBJECTS TO SCAN The application package includes two virus scan tasks with already created lists of objects to scan Full Scan and Quick Scan The first task allows you to scan your computer and all connected devices for viruses The second task only scans vulnerable objects system folders and libraries boot folder To browse the list of scan objects or edit the list 1 Open the application settings window on page 15 and select the Virus Scan tab 2 Inthe list on the left select th
231. w information on the license in use open the main window of Kaspersky Anti Virus on page 13 and click the button License number and type commercial or trial maximum number of hosts expiration date and time and days remaining until the expiration are all displayed in the window that opens see the figure below Having a license enables you to use all the application s features and gives you access to application updates and technical support 1088 000500 07371100 Commercial key for 1 computer 3 Your license will expire on 11 24 10 11 59 59 PM Remain 336 days Figure 47 License management To purchase a new license click the Purchase button The web page that opens contains all the information on purchasing a key through Kaspersky Lab eStore or corporate partners Kaspersky Lab regularly organizes special pricing offers on license renewals for our products Check for special offers at the Kaspersky Lab website in the eStore section If you purchase online a key file or an activation code will be mailed to you at the address specified in the purchase order once payment has been made To activate Kaspersky Anti Virus using the activation code you have obtained or a key file click the Activate button Before activating Kaspersky Anti Virus make sure that the computer s time and date settings are correct Activating the application requires you to install a key file which is used to verify the license to use Kaspersk
232. y provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things a Accompany the combined library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under the terms of the Sections above b Give prominent notice with the combined library of the fact that part of it is a work based on the Library and explaining where to find the accompanying uncombined form of the same work You may not copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance KASPERSKY ANTI VIRUS You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License to do so and all its terms and conditi
233. y Anti Virus The key contains the service information required for the application to be fully functional and some additional data e support information who provides the support where it can be obtained LICENSE MANAGEMENT e key name and number and its expiration date The application is activated using the Activation assistant Let us take a closer look at its steps SELECTING APPLICATION ACTIVATION TYPE There are several options for activating the application depending on whether you have a key for Kaspersky Anti Virus or need to obtain one from a Kaspersky Lab server e Activate using activation code Select this activation option if you purchased the full commercial version and the activation code has been sent to you Using this activation code you will obtain a key file which provides access to Kaspersky Anti Virus full functionality throughout the effective term of the license agreement e Use existing key file Activate the application using the key file obtained earlier e Activate trial version Select this activation option if you want to install the trial version before deciding whether you will purchase the commercial version You will be given a free license key which will expire as stated in the license agreement for the trial version An Internet connection will be required if you try to activate the application with an activation code or activate a trial version If at the time of installation an Internet
234. your computer is now protected You will also see a Status that informs you if the databases in use are up to date You can start Kaspersky Anti Virus updates at any time To do this click the wy globe icon in the main window To view a detailed report on current task performance open the report window Updates will also be distributed to the local source during the update process see section Update distribution on page 67 provided that this service is enabled ROLLING BACK THE LATEST UPDATE Every time you run the application update Kaspersky Anti Virus first creates a backup copy of the databases and application modules in use and only after that starts updating them This allows you to roll back to the previous version of databases if the update fails To roll back to the previous database version 1 Open the application settings window on page 15 and select the Update section see figure below UPDATING THE APPLICATION 2 Click the Roll back update button Protection Wirus pean Threats Run mode Update Action after update Roll back update Preferences ieee Network Reports Service Appearance Automatically Every 1 day Manually 4 Edit 5 Preferences vI Update application modules Fal Rescan quarantine If the databases are corrupted you can roll back to the previous database version Roll back update 3 f E Click the lock to prevent further cha

Download Pdf Manuals

image

Related Search

Related Contents

HERMA Address labels Premium A4 199.6x289.1 mm white paper matt 100 pcs.  User`s Manual - PLANET Technology Corporation.  MODEL B1750 POSITIVE DISPLACEMENT FLOW METER  Cassaforte - Wall safes - Coffre-forts - Cajas - Tresor  エドワーズ MICS用骨鉗子  V7 Standard USB Keyboard, US / NL  LevelOne FCS-7111  Wharfedale LY22T3CBW-UM Flat Panel Television User Manual  USER MANUAL  

Copyright © All rights reserved.
Failed to retrieve file