Kaspersky Lab kaspersky anti-hacker 1.7 User Manual
CHAPTER 3. STARTING WORK
As soon as you install the program and restart your computer the security system
is activated. In fact, from this very moment, Kaspersky Anti-Hacker is monitoring
for attacks against your machine and attempts by your applications to interact via
a local network or the Internet.
is activated. In fact, from this very moment, Kaspersky Anti-Hacker is monitoring
for attacks against your machine and attempts by your applications to interact via
a local network or the Internet.
After you enter the system you begin to work as usual. When no network
connection is established, the security system on your machine is indicated only
by the
connection is established, the security system on your machine is indicated only
by the
icon in the system tray. If you click on it, the program main window will
appear on your screen. In this window, you may review information about the
current security level and change this level if required (for details of the program
main window refer to subchapter 5.3 on page 25). By default the Medium level is
enabled. This level allows you to configure your security system conversationally.
In most cases you will not have to configure the system yourself: the most
frequently used applications are allowed by default to establish network
connections strictly according to their type. However sometimes you will have to
configure your security system manually. Let’s review the corresponding
example:
current security level and change this level if required (for details of the program
main window refer to subchapter 5.3 on page 25). By default the Medium level is
enabled. This level allows you to configure your security system conversationally.
In most cases you will not have to configure the system yourself: the most
frequently used applications are allowed by default to establish network
connections strictly according to their type. However sometimes you will have to
configure your security system manually. Let’s review the corresponding
example:
Task: Suppose your computer is connected to the Internet, and
you start Microsoft Internet Explorer and enter
www.kaspersky.com in the address field. The following message
will appear on your screen: Create a rule for IEXPLORER.EXE
(see fig. 1).
you start Microsoft Internet Explorer and enter
www.kaspersky.com in the address field. The following message
will appear on your screen: Create a rule for IEXPLORER.EXE
(see fig. 1).
In the upper area of this dialog box you will see the icon for the
application concerned, its name (in this case Microsoft Internet
Explorer), the site address
application concerned, its name (in this case Microsoft Internet
Explorer), the site address
www.kaspersky,com
, and the port to be
used to establish the connection. To review more details about
this application, you just have to click on the underlined link (see
fig. 2).
this application, you just have to click on the underlined link (see
fig. 2).
The required network connection will not be established until you
select how to handle this application activity. To do this, you must
respond to the message on your screen.
select how to handle this application activity. To do this, you must
respond to the message on your screen.