User manual KASPERSKY ANTI-HACKER 1.8

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual KASPERSKY ANTI-HACKER 1.8. We hope that this KASPERSKY ANTI-HACKER 1.8 user guide will be useful to you.


KASPERSKY ANTI-HACKER 1.8 : Download the complete user guide (1680 Ko)

You may also download the following manuals related to this product:

   KASPERSKY ANTI-HACKER 1.8 (1968 ko)
   KASPERSKY ANTI-HACKER 1.8 (1620 ko)
   KASPERSKY ANTI-HACKER 1.8 (1578 ko)
   KASPERSKY ANTI-HACKER 1.8 (1722 ko)
   KASPERSKY ANTI-HACKER 1.8 (1840 ko)
   KASPERSKY ANTI-HACKER 1.8 (1243 ko)

Manual abstract: user guide KASPERSKY ANTI-HACKER 1.8

Detailed instructions for use are in the User's Guide.

[. . . ] KASPERSKY LAB Kaspersky Anti-Hacker 1. 8 USER GUIDE KASPERSKY ANTI-HACKER 1. 8 User Guide © Kaspersky Lab http://www. kaspersky. com Revision date: July, 2005 Contents CHAPTER 1. KASPERSKY ANTI-HACKER. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Distribution Kit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] For example, as you can see in figure 14, the third application rule blocks MS Internet Explorer from accessing the Internet, but the second rule allows this program to communicate via the Internet by using the HTTP protocol. Since the second rule is higher priority than the third one, MS Internet Explorer is allowed to communicate with remote HTTP servers (but only these). For example, in figure 14 the fourth and the fifth rule boxes are disabled. To enable/disable an application rule, check/uncheck the corresponding checkbox in the list of application rules. To the right of the rule list you can see the following buttons: · · New. . . If you press this button, the application rule wizard box will appear on your screen. If you press this button, the application rule wizard box will appear on your screen. Enabling the Security System and Defining its Settings 45 · · · Remove ­ removes the selected rule from the list. reduces the rule priority. To modify a rule selected from the list, you can also press the <ENTER> key or double-click on it; to remove the selected rule from the list - the <DEL> key; and to add a new rule to the list - the <INS> key. You can also modify the list from the context menu, which includes the following commands: · · · Modify. . . The created copy will be placed right below the selected rule. Below the list, you can see the Rule description section displaying details of the rule selected from the upper frame list. The same section is located in the rule wizard boxes so we shall describe this frame in detail. The rule description includes black text that cannot be modified, and blue text that must be substituted with appropriate values. If a setting is written in a bold font it means that its value is critical for this rule. Click on the appropriate underlined link in the Rule description frame. Select the required value in the dialog box on your screen (for details see the subchapters below). 2. At the bottom of the Application rules dialog box you will see the following buttons: · ­ closes the dialog box and saves the changes you made. 46 Kaspersky Anti-Hacker · Cancel ­ closes the dialog box without saving the changes. All the changes you made to the list will be applied immediately after these are saved. 6. 3. 2. Adding a New Application Rule To launch the application rule wizard: Press the New. . . Customizing the Rule When you start the wizard, a dialog box similar to that in fig. The first dialog box of the application rule wizard Enabling the Security System and Defining its Settings 47 The Action options list allows you to select one of the following three options: Action · Allow activity of the application according to its type. Rule description · · If you select Customize the rule, the next wizard box may prompt you to define additional settings. · Internet-application type (client or server) · Protocol · Remote address · Remote port · Local port To create a rule allowing activity of the application according to its type: 1. Select Allow activity of the application according to its type from the list of options in the Action section. [. . . ] You may terminate this Agreement at any point by destroying all copies of the Software and the Documentation. (i) Kaspersky Lab will provide you with the support services ("Support Services") as defined below for a period of one year following: (a) Payment of its then current support charge, and: (b) Successful completion of the Support Services Subscription Form as provided to you with this Agreement or as available on the Kaspersky Lab website, which will require you to produce the Key Identification File which will have been provided to you by Kaspersky Lab with this Agreement. It shall be at the absolute discretion of Kaspersky Lab whether or not you have satisfied this condition for the provision of Support Services. (ii) Support Services will terminate unless renewed annually by payment of the then-current annual support charge and by successful completion of the Support Services Subscription Form again. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY ANTI-HACKER 1.8




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY ANTI-HACKER 1.8 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.