Kaspersky PURE was designed to ensure comprehensive protection for all computers within your home network.
Kaspersky PURE includes the following functional modules:
- My Computer Protection, which protects your computer against known and unknown threats;
- Backup copy, which quickly restores your data if data loss occurs;
- Data encryption, which protects your confidential information from unauthorized access;
- Parental Control, which protects children and teenagers from threats related to computer and Internet usage;
-
Password Manager, which provides safe storing of passwords and other
account data, and confidentiality while filling various authorization
forms;
- Control Center, which allows to remotely manage the security of networked computers;
-
Additional tools, which are used for optimization of the operating
system settings and help execute specific tasks of providing computer
security.
Here are some key features of "Kaspersky PURE 2":
· Computer Protection
·
Computer Protection protects your computer against known and new
threats. Each type of threat is processed by a separate application
component. This structure of the protection system allows a flexible
configuration of the application, depending on the needs of any
specific, or of an enterprise as a whole.
Computer Protection includes the following protection tools:
Protection components, providing protection of:
· files and personal data;
· system;
· network activity.
· Virus scan tasks used to scan individual files, folders, drives, areas or the entire computer for viruses.
· Update, ensuring the up-to-date status of internal application modules, and databases used to scan for malicious programs.
The following protection components provide defense for your computer in real time:
File Anti-Virus:
·
File Anti-Virus monitors the file system of the computer. It scans all
files that can be opened, executed or saved on your computer, and all
connected disk drives. Computer Protection intercepts each attempt to
access a file and scans such file for known viruses. The file can only
be processed further if the file is not infected or is successfully
treated by the application. If a file cannot be disinfected for any
reason, it will be deleted, with a copy of it saved in the backup, or
moved to the quarantine.
Mail Anti-Virus:
· Mail Anti-Virus
scans all incoming and outgoing email messages on your computer. It
analyzes emails for malicious programs. The email is available to the
addressee only if it does not contain dangerous objects. The component
also analyzes email messages to detect phishing.
Web Anti-Virus:
·
Web Anti-Virus intercepts and blocks scripts on websites if they pose a
threat. All HTTP traffic is also subject to a thorough monitoring. The
component also analyzes web pages to detect phishing.
IM Anti-Virus:
·
IM Anti-Virus ensures the safe use of Internet pagers. The component
protects information that comes to your computer via IM protocols. IM
Anti-Virus ensures safe operation of various applications for instant
messaging.
Firewall:
· Firewall ensures security for your work
in local networks and on the Internet. The component filters all
network activities using rules of two types: rules for applications and
packet rules.
Proactive Defense:
· Proactive Defense allows to
detect a new malicious program before it performs its malicious
activity. The component is designed around monitoring and analyzing the
behavior of all applications installed on your computer. Based on the
actions being performed, Computer Protection makes a decision whether
the application is potentially dangerous, or not. So your computer is
protected not only from known viruses, but from new ones as well that
still have not been discovered.
Anti-Spam:
· Anti-Spam
integrates into the mail client installed on your computer, and monitors
all incoming email messages for spam. All messages containing spam are
marked with a special header. The option of configuring Anti-Spam for
spam processing (deleting automatically, moving to a special folder,
etc.) is also provided. The component also analyzes email messages to
detect phishing.
Network Monitor:
· The component designed to view information about network activity in real-time mode.
Anti-Phishing:
·
The component, integrated into Web Anti-Virus, Anti-Spam and IM
Anti-Virus, which allows to check web addresses if they are included in
the list of phishing and suspicious web addresses.
Anti-Banner:
·
Anti-Banner blocks advertising information located on banners built
into interfaces of various programs installed on your computer, or
displayed online.
· Protection of data and online activity
·
Computer Protection protects data stored on your computer against
malware and unauthorized access, ensuring secure access to the local
network and to the Internet.
Protected objects are divided into three groups:
·
Files, personal data, parameters of access to different resources (user
names and passwords), information about banking cards etc. Protection
of these objects is provided by File Anti-Virus, Application Control and
Proactive Defense.
· Applications installed on your computer and
operating system objects. Protection of these objects is provided by
Mail Anti-Virus, Web Anti-Virus, IM Anti-Virus, Application Control,
Proactive Defense, Network Attack Blocker and Anti-Spam.
· Online
activity: using e-payment systems, email protection against spam and
viruses etc. Protection of these objects is provided by Mail Anti-Virus,
Web Anti-Virus, IM Anti-Virus, Firewall, Network Attack Blocker,
Anti-Spam, Network Monitor, Anti-Banner.
· Protection of data and online activity
·
Computer Protection protects data stored on your computer against
malware and unauthorized access, ensuring secure access to the local
network and to the Internet.
Protected objects are divided into three groups:
·
Files, personal data, parameters of access to different resources (user
names and passwords), information about banking cards etc. Protection
of these objects is provided by File Anti-Virus, Application Control and
Proactive Defense.
· Applications installed on your computer and
operating system objects. Protection of these objects is provided by
Mail Anti-Virus, Web Anti-Virus, IM Anti-Virus, Application Control,
Proactive Defense, Network Attack Blocker and Anti-Spam.
· Online
activity: using e-payment systems, email protection against spam and
viruses etc. Protection of these objects is provided by Mail Anti-Virus,
Web Anti-Virus, IM Anti-Virus, Firewall, Network Attack Blocker,
Anti-Spam, Network Monitor, Anti-Banner.
· Control over applications and data access
Computer
Protection prevents applications from executing actions which can
endanger the system, monitors access to your personal data and provides
the option of running applications in the safe mode. It is performed
with the help of the following tools:
· Application Activity
Control. The component logs the actions performed by applications in the
system, and manages the applications' activities, based on which group
they belong to. A set of rules is defined for each group of
applications. These rules manage applications' access to various
resources.
· Digital Identity Protection. Application Control manages
rights of applications to perform actions on the user's personal data.
They include files, folders and registry keys, which contain the
settings and important data of the most frequently used applications, as
well as user's files (My Documents folder, cookies, information about
the user's activity).
· Safe environment for running the
applications. Computer Protection ensures the maximum security of
operating system objects and the user's personal data by running unknown
applications in the protected virtual environment.
· Network Monitor
·
Network Monitor is a tool used to view information about network
activities in real time. To run Network Monitor, use the Network Monitor
link in the Computer Protection main window.
The window that will open will provide the information grouped on the following tabs:
· The Connections and ports tab lists all the open ports and active network connections currently established on your computer.
· The Firewall: rule processing log tab displays information about the use of packet rules for applications.
·
The Network traffic tab holds information on all inbound and outbound
connections established between your computer and other computers,
including web servers, mail servers, etc.
· The Blocked computers tab lists the blocked computers.
· Virus scan tasks
·
In addition to the constant protection of all the ways that malicious
programs can penetrate, it is extremely important to periodically scan
your computer for viruses. This is necessary in order to rule out the
possibility of spreading malicious programs that have not been
discovered by security components, for example, because the security
level was set to low or for other reasons.
The following virus scan tasks are included in Computer Protection:
· Object Scan. Scan of objects selected by the user. You can scan any object in the computer's file system.
·
Full Scan. A thorough scan of the entire system. The following objects
are scanned by default: system memory, programs loaded on startup,
system backup, email databases, hard drives, removable storage media and
network drives.
· Quick Scan. Virus scan of operating system startup objects.
What's New in This Release:
· 74128 Pswd mngr: UAC window while installing KTS
· 81047 PC:internet usage timer is restart after reset the operating time.
No Password
Download Here :
- Via Jumbofile
- Via Sharebeast