Kaspersky Internet Security 2019
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 日本語(日本)
- 简体中文
- 繁體中文
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 日本語(日本)
- 简体中文
- 繁體中文
- About Kaspersky Internet Security
- How to install the application
- Checking for a newer version of the application
- Starting installation of the application
- Reviewing the End User License Agreement
- Kaspersky Security Network Statement
- Installing the application
- Recommended settings
- Completing installation
- Activating the application
- Registering a user
- Completing activation
- Installing the application from the command prompt
- Getting started
- How to upgrade the application
- Installing over other Kaspersky Lab applications
- Switching from Kaspersky Internet Security to other Kaspersky Lab applications
- How to uninstall the application
- Application licensing
- Data provision
- Data provision under the End User License Agreement outside the territory of the European Union
- Data provision under the End User License Agreement on the territory of the European Union
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- About using the application in the European Union
- Managing application notifications
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- Troubleshooting the operating system after infection
- Protecting email
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to configure encrypted connections settings
- About secure connection to Wi-Fi networks
- How to run Kaspersky Secure Connection
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Protecting financial transactions and online purchases
- About protection of financial transactions and online purchases
- How to configure Safe Money
- How to configure Safe Money for a specific website
- How to quickly open a website in Protected Browser
- How to send feedback on Safe Money
- How to enable automatic activation of the Kaspersky Protection extension
- About protection using hardware virtualization
- How to enable protection using hardware virtualization
- Starting Kaspersky Password Manager
- Web tracking protection
- Anti-Banner protection during website browsing
- Webcam Protection
- Controlling users' activity on the computer and on the Internet
- Remote management of computer protection
- How to reserve operating system resources for computer games
- Handling unknown applications
- Checking application reputation
- Controlling application activity on the computer and on the network
- How to configure Application Control
- About protecting an audio stream coming from sound recording devices
- How to configure audio stream protection settings
- How to configure Application Manager settings
- Updating installed applications
- PC Cleaner
- About PC Cleaner
- How to manually start an analysis of objects
- How to configure a scheduled analysis
- How to select categories of objects for analysis
- Categories of objects detected
- Viewing the list of detected objects
- Viewing the list of exclusions
- How to send data about application or browser window to Kaspersky Lab
- Trusted Applications mode
- How to password-protect access to Kaspersky Internet Security management functions
- How to remove traces of activity on the computer
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- How to create a My Kaspersky account
- Using the application from the command prompt
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Lab update servers
- Kaspersky Security Network (KSN)
- Keylogger
- License term
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Using Parental Control
Parental Control allows monitoring actions performed by users on the local computer and online. You can use Parental Control to restrict access to Internet resources and applications, as well as view reports on users' activities.
More and more children and teenagers are obtaining access to computers and web resources. The use of computers and the Internet presents a number of challenges and threats for children:
- Loss of time and / or money when visiting chat rooms, gaming resources, online stores, and auctions
- Access to websites targeted at an adult audience, such as those featuring pornography, extremism, firearms, drug abuse, and explicit violence
- Downloading of files infected with malware
- Health damage inflicted by excessive computer use
- Contacts with strangers who may pretend to be peers to obtain information from underage users, such as real name, physical address, or time of day when nobody is home
Parental Control allows you to reduce the risks posed by computer and Internet use. To do this, the following functions are available:
- Limiting the time for computer and Internet use
- Creating lists of allowed and blocked games and applications, as well as temporarily restricting use of allowed applications
- Creating lists of allowed and blocked websites and selectively blocking categories of websites with inappropriate content
- Enabling safe search mode on search engines (links to websites with questionable content are not displayed in search results)
- Restricting file downloads from the Internet
- Blocking sending of certain personal data
You can configure features of Parental Control for each user account on a computer individually. If a user uses two accounts, for example, a local account of the operating system and a Microsoft user account, Parental Control settings should be configured for the Microsoft user account.
You can also view Parental Control reports on the activities of monitored users.
When the time zone changes, or when switching to and from daylight savings time, the following rules apply for using the computer and Internet, as well as for starting games and applications:
- If the date is not changed when the time zone changes, the current countdown until blocking continues without changes. The same rule applies when switching to or from daylight savings time.
- If the date is increased or decreased when the time zone changes, the time spent by the user is zeroed out and the countdown until blocking begins again.