TABLE OF CONTENTS
INTRODUCTION .................................................................................................. 5
Obtaining information about the application .................................................... 5
Sources of information to research on your own ....................................... 5
Contacting the Sales Department.............................................................. 6
Contacting the Technical Support service ................................................. 6
Discussing Kaspersky Lab applications on the web forum ........................ 8
What's new in Kaspersky Anti-Virus 2009....................................................... 8
Overview of application protection .................................................................. 9
Wizards and tools .................................................................................... 10
Support features ...................................................................................... 11
Heuristic analysis .................................................................................... 12
Hardware and software system requirements ............................................... 13
THREATS TO COMPUTER SECURITY ............................................................ 15
Threat applications ........................................................................................ 15
Malicious programs ................................................................................. 16
Viruses and worms ............................................................................ 16
Trojans ............................................................................................... 20
Malicious utilities ................................................................................ 26
Potentially unwanted programs ............................................................... 29
Adware .............................................................................................. 30
Pornware ........................................................................................... 30
Other Riskware programs .................................................................. 31
Methods of detecting infected, suspicious and potentially dangerous
objects by the application ........................................................................ 35
INSTALLING THE APPLICATION ...................................................................... 36
Step 1. Searching for a newer version of the application .............................. 37
Step 2. Verifying the system satisfies the installation requirements .............. 38
Step 3. Wizard's greeting window ................................................................. 38
Step 4. Viewing the License Agreement ....................................................... 39
Step 5. Selecting the installation type ........................................................... 39
Step 6. Selecting the installation folder ......................................................... 40