Overview of Kaspersky Anti-Virus software

Overview of Kaspersky Anti-Virus software - Post Thumbnail

The most popular and skillful of domestic antiviruses is superior computer protection against viruses, Trojans and spyware, as well as from any other malware. Updates to the program are released every hour! And can be automatically downloaded from the Internet.

System Requirements and Performance

One license of Kaspersky Anti-Virus 7.0 can be installed on one computer, after which the antivirus will work and be updated for free for one year from the date of installation. Antivirus will require:

Operating system Windows XP Home / XP Pro, Windows Vista Home Basic / Home Premium / Business / Ultimate;

300 MHz or faster processor;

From 128 MB to 512 MB of RAM (depending on the installed operating system);

50 MB of free hard disk space.

To activate the program, the user must have an Internet connection. The seventh version of Kaspersky Anti-Virus, to the delight of fans, got rid of the excessive heaviness and turtle slowness inherent in the latest versions of the program: today’s Kaspersky works much faster than its predecessors. Also, this version is ideal for mobile platforms – notebooks based on Intel Centrino.

Three degrees of protection

The main difference between Kaspersky Anti-Virus 7.0 and previous Kaspersky Lab products is an integrated approach to protecting information on a computer. The main thing in the program is to unite and noticeably improve the capabilities of all the company’s products into one comprehensive protection solution. The program provides not only anti-virus protection but also protection against unknown threats. So Kaspersky Anti-Virus 7.0 has three degrees of computer protection against known and new Internet threats. The first degree is the recognition of malware by signatures, that is, by samples in regularly updated databases – this is guaranteed protection against all types of malware known at the time of the threat signatures updated. If the example is correct the program was not found in the databases, the second degree of protection is activated – the heuristic analyzer (in previous versions of the antivirus it was not used). The heuristic analyzer simulates the launch of the program being tested in an isolated virtual environment, which allows concluding that the program is potentially dangerous in real conditions. Well, the third degree of protection is a behavioral blocker. Monitoring the behavior of programs on your computer and recording changes in critical system areas allow you to detect malware and alert the user about the danger timely.

Program interface Kaspersky Antivirus

If some two or three years ago software developers didn?t really bother about the accessibility and friendliness of the interface of their products (and so they will understand), then the new time dictates its laws. Users are becoming more and more, and the vast majority of beginners choose the program with which it is easier to deal with, and ideally – with which it is not necessary to understand at all.

The new interface of Kaspersky Anti-Virus implements easy and convenient access to any function of the program. Everything is beautifully drawn; the main elements are highlighted with large pictures – beauty, and only. Also, the user can change the appearance of the program himself, using his graphics and color palette.

In addition to beauty when working with antivirus, the user receives full support: the program displays information messages about the status of protection and includes detailed help. A security wizard, included in the program, allows you to get a complete picture of the current state of computer protection and proceed to immediate troubleshooting.

New in protection

We liked the fact that in the latest version the serial number was not just changed. There are so many innovations and improvements that you can write a considerable essay for the department “Information Security.” Let us dwell on only a few of the most exciting changes in our view. The computer file protection technology has changed: the user can now reduce the load on the processor and increase the speed of file scanning. This is achieved through the use of technology iChecker and iSwift. This mode of operation of the application eliminates the re-check files. Also, the system scan for viruses now adapts to the user’s work.

To do this, it is enough to put a check in the column ?Give up resources to other applications? in the program settings. If the execution of a user operation requires all system resources, the virus scan will be suspended until the operation is completed. Then the check will continue from the place where it stopped.

The talk of the town: ?Kaspersky slows down the system? is in the past, in the same place where the sixth and other versions of the program remain. Increased the number of settings that advanced users can do. Scanning critical areas of the computer, startup objects, the infection of which may lead to severe consequences, as well as the detection of rootkits that hide malicious programs in the system, are represented by separate tasks.

A beneficial technology of self-defense of the application, protection against remote control of the Anti-Virus service by attackers, as well as security of access to program settings with a password has been added. This avoids disabling computer protection by malware, intruders, or from … umm … let’s call them unqualified users who consider themselves to be brilliant computer scientists.

If, however, a malicious program or a malicious person succeeded in harming the system, the ability to create a rescue disk was added to the program. Using this disk, you can perform an initial boot of the operating system after a virus attack and scan the computer for malicious objects. Well, so that you, the reader, do not relax and be aware of all the news of the world of computer viruses, the News Agent is added to the program – a module designed for the prompt delivery of report from Kaspersky Lab.


Protection of the seventh version of Kaspersky Anti-Virus is based on the sources of threats, instead of carpet bombing point punches are used. Each source has a separate program module that provides its control and necessary actions to prevent harmful effects on user data. Such a construction of the protection system allows the flexibility to customize the application to the needs of a particular user.

Related posts