Kaspersky Lab kaspersky anti-hacker 1.7 User Manual
CHAPTER 4. PREVENTING
HACKER ATTACKS WHEN
WORKING IN THE
INTERNET AND LOCAL
AREA NETWORKS
WORKING IN THE
INTERNET AND LOCAL
AREA NETWORKS
4.1. Kaspersky Anti-Hacker
Operating Principles
Kaspersky Anti-Hacker protects your computer from network attacks and
preserves your confidential data. To do this, Kaspersky Anti-Hacker monitors all
network operations on your computer. There are two types of network operation:
preserves your confidential data. To do this, Kaspersky Anti-Hacker monitors all
network operations on your computer. There are two types of network operation:
• Operations on the application level (high-level). At this level, Kaspersky
Anti-Hacker analyses activity of network applications, including web
browsers, mail programs, file transferring programs and others.
browsers, mail programs, file transferring programs and others.
• Operations on the packet level (low-level). At this level, Kaspersky Anti-
Hacker analyses data packet sent/received by your netcard or modem.
You work with Kaspersky Anti-Hacker by creating special filtering rules for
network operations. Some filtering is performed automatically by the Intrusion
Detection System, which can detect port scanning, DoS attacks, etc., and can
then block the assaulter. In addition, you can define your own filtering rules to
reinforce protection of your machine.
network operations. Some filtering is performed automatically by the Intrusion
Detection System, which can detect port scanning, DoS attacks, etc., and can
then block the assaulter. In addition, you can define your own filtering rules to
reinforce protection of your machine.
For every type of network operation there are separate lists of Kaspersky Anti-
Hacker rules.
Hacker rules.
• Application rules. Here you can select the required application and allow
an activity that is compliant with the application type. You can define any
number of rules for every application, as required. If any network activity
not meeting conditions of the rule is detected on your machine, the pro-
number of rules for every application, as required. If any network activity
not meeting conditions of the rule is detected on your machine, the pro-