A SERVICE OF

logo

94 Kaspersky
®
Administration Kit
The anti-virus protection feature includes:
Anti-virus scanning of e-mail traffic on the level of data transmission
protocol (POP3, IMAP and NNTP for incoming mail and SMTP for outgo-
ing messages) irrespectively of the mail client being used. The program
includes plug-ins for popular e-mail clients (Microsoft Office Outlook, Mi-
crosoft Outlook Express and The Bat!) and supports disinfection of their
e-mail databases.
Real-time anti-virus scanning of Internet traffic transferred via HTTP.
File system protection: anti-virus scanning of individual files, directories
or drives. In addition, the application can perform anti-virus analysis ex-
clusively for critical areas of the operating system and start-up objects of
Microsoft Windows.
Proactive protection: the program performs constant monitoring of ap-
plication activity and processes running in random-access memory pre-
venting dangerous changes to the file system and registry, and restores
the system after malicious influence.
Protection against Internet-fraud is guaranteed owing to the ability to
recognize phishing attacks, which helps prevent confidential data leaks (first of
all, your passwords, bank account and credit card numbers), and block execution
of dangerous scripts on web pages, pop-up windows and advertisement
banners. The feature blocking charged phone calls helps identify software that
attempts to use your modem for hidden unauthorized connection to paid phone
services and prevents such activity.
Kaspersky
®
Internet Security 6.0 registers attempts to scan the ports of your
computer, which frequently precede network attacks, and successfully defends
against typical hacker attacks. The program uses defined rules as a basis for
control over all network transactions tracking all incoming and outgoing data
packets. Stealth mode (owing to the SmartStealth™ technology) prevents
computer detection from outside. When you switch into that mode, the system
will block all network activity except for a few transactions allowed in user-
defined rules.
The program employs complex approach to anti-spam filtering of incoming e-mail
messages:
Verification against black and white lists of recipients (including addresses
of phishing sites).
Inspection of phrases in message body.
Analysis of message text using a self-learning algorithm.
Recognition of spam sent in image files.