User manual KASPERSKY LAB MOBILE SECURITY 8.0

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual KASPERSKY LAB MOBILE SECURITY 8.0. We hope that this KASPERSKY LAB MOBILE SECURITY 8.0 user guide will be useful to you.


KASPERSKY LAB MOBILE SECURITY 8.0 : Download the complete user guide (6552 Ko)

You may also download the following manuals related to this product:

   KASPERSKY LAB MOBILE SECURITY 8.0 (8333 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (6556 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (6425 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (5669 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (8007 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (9876 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (6227 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (5254 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (6172 ko)
   KASPERSKY LAB MOBILE SECURITY 8.0 (5541 ko)

Manual abstract: user guide KASPERSKY LAB MOBILE SECURITY 8.0

Detailed instructions for use are in the User's Guide.

[. . . ] We hope that this documentation will help you in your work and will provide answers regarding this software product. This document is a property of Kaspersky Lab's and all rights to this document are reserved by the copyright laws of the Russian Federation and international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. Any type of reproduction and distribution of any materials, including translation thereof, is allowed only by a written permission of Kaspersky Lab. [. . . ] In the window that will open select a folder that you wish to encrypt. In order to move around the file system use the stylus or joystick buttons of your device: Up, Down ­ to move within the selected folder, Left, Right ­ to move one level up or down from the current folder. To start the process of encryption of the selected folder, use Encrypt in the Options menu. 69 KASPERSKY MOBILE SECURITY 8. 0 Figure 58: Data encryption The data in the folder will be encrypted once the command is executed and then data will be encrypted and decrypted "on the fly" at the moment there data is placed into the folder, extracted from it or accessed. You can encrypt only one folder using the Encryption function. If you wish to encrypt another folder, you have to decrypt the current encrypted folder. After encryption, the Encrypt item will turn into Decrypt and using it you can decrypt the encrypted data (see section "Data decryption" on page 70). DATA DECRYPTION You can completely decrypt data which was previously encrypted (see section "Data encryption" on page 69). For full dencryption of the folder encrypted earlier, select Decrypt on the Encryption tab (see Figure below). 70 KASPERSKY MOBILE SECURITY FOR SYMBIAN OS Figure 59: Data decryption After decryption, the Decrypt item will turn into Encrypt and you can use it again to encrypt data (see section "Data encryption" on page 69). INFORMATION ABOUT ENCRYPTED DATA If encryption is enabled, you can check which folder is currently encrypted. In order to view which folder is currently encrypted, perform the following actions (see Figure below): 1. The path to the encrypted folder will be displayed. Figure 60: Information about encrypted data 71 KASPERSKY MOBILE SECURITY 8. 0 BLOCKING ACCESS TO ENCRYPTED DATA You can block access to encrypted data instantly or with a delay. After this you will have to enter your secret code to access the encrypted data. To ensure data protection when the device is switched into the sleep mode, you can configure automatic blocking of data access. The Block access setting determines the device's idle time after the backlight is turned off and the device is switched to the sleep mode, after which you will need to enter the secret code to access the encrypted data. By default the access is blocked immediately after the backlight is turned off (value No delay is selected). To enable delayed blocking, perform the following actions (see Figure below): 1. Press OK to save changes. Figure 61: Blocking access to encrypted data You can also instantly block access to the encrypted data and enable the prompt for the secret code. For instant access blocking, press buttons 0 and 1 at the same time. 72 KASPERSKY MOBILE SECURITY FOR SYMBIAN OS UPDATING THE PROGRAM BASES This section contains information about the Update component. Regular bases update is necessary to ensure reliable operation of Kaspersky Mobile Security. IN THIS SECTION About program bases update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Viewing bases information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Manual updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Scheduled updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Updating while roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Configuring connection settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 ABOUT PROGRAM BASES UPDATE The search for malware programs is performed based on the program bases records which contain description of all currently known malware programs and methods for their treatment as well as description of other unwanted objects. [. . . ] 18, 93 Objects to be scanned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 RECORD ANTI-SPAM BLACK LIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 ANTI-SPAM WHITE LIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Renewing the license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY LAB MOBILE SECURITY 8.0




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY LAB MOBILE SECURITY 8.0 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.