Kaspersky Anti-Virus for Mac antivirus security software User Guide
Below you will find brief information for antivirus security software Anti-Virus for Mac. Kaspersky Anti-Virus for Mac provides real-time protection against viruses and malware, ensuring your Apple computer stays safe. It includes features like file system protection, scheduled virus scans, automatic updates for databases and modules, quarantining potential infected objects, creating backup copies of infected files, and detailed reports on the application's performance. You can also configure the application's interface, customize appearance, and manage the application's licenses. The user-friendly interface simplifies the process of securing your Mac from various threats.
PDF
Download
Document
Advertisement
Advertisement
Kaspersky Anti-Virus for Mac USER GUIDE PROGRAM VERSION: 8.0 CRITICAL FIX 1 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product. Warning! This document is a property of Kaspersky Lab and all rights to this document are reserved by the copyright laws of the Russian Federation and international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. Any type of reproduction and distribution of any materials, including translation thereof, is allowed only by a written permission of Kaspersky Lab. This document and graphic images related to it can be used exclusively for information, non-commercial or personal purposes. Kaspersky Lab reserves the right to change the document at any time without notice. For the latest version of this document refer to Kaspersky Lab's website at http://www.kaspersky.com/docs. Kaspersky Lab assumes no liability for the content, quality, relevance or accuracy of any materials used in this document for which the rights are held by third parties, or for the potential damages associated with using such documents. This document includes registered and non-registered trademarks. All said trademarks are the property of their corresponding owners. Revision date: 8/21/09 © Kaspersky Lab 1997-2009 http://www.kaspersky.com http://support.kaspersky.com 2 TABLE OF CONTENTS KASPERSKY ANTI-VIRUS ........................................................................................................................................... 6 Hardware and software system requirements .......................................................................................................... 6 Distribution kit .......................................................................................................................................................... 6 License agreement ............................................................................................................................................. 7 Service for registered users ..................................................................................................................................... 7 Obtaining information about the application ............................................................................................................. 7 Sources of information to research on your own ................................................................................................ 8 Contacting Technical Support ............................................................................................................................ 9 Contacting Sales Department .......................................................................................................................... 10 INSTALLING AND REMOVING KASPERSKY ANTI-VIRUS ....................................................................................... 11 APPLICATION INTERFACE ....................................................................................................................................... 13 Main application window ........................................................................................................................................ 13 Application settings window ................................................................................................................................... 14 Kaspersky Anti-Virus icon ...................................................................................................................................... 15 Configuring the Kaspersky Anti-Virus interface...................................................................................................... 15 QUICK START ............................................................................................................................................................ 16 What is the status of computer's protection? ......................................................................................................... 16 How to Scan Your Computer for Viruses ............................................................................................................... 17 How to Perform a Quick Scan of Your Computer .................................................................................................. 18 How to Scan a File, Folder or Disk for Viruses ...................................................................................................... 18 How to Update the Application ............................................................................................................................... 18 MULTI-TASKED PROTECTION MANAGEMENT ....................................................................................................... 19 Disabling computer protection ............................................................................................................................... 19 Restoring the protection on your computer ............................................................................................................ 19 Exporting and importing Kaspersky Anti-Virus settings.......................................................................................... 19 Closing the application ........................................................................................................................................... 20 CREATING A PROTECTION SCOPE......................................................................................................................... 21 Selecting malicious programs to be monitored ...................................................................................................... 21 Trusted zone creation ............................................................................................................................................ 22 ANTI-VIRUS PROTECTION OF COMPUTER'S FILE SYSTEM ................................................................................. 24 Pausing / disabling file protection .......................................................................................................................... 24 Configuring file protection ...................................................................................................................................... 25 Selecting the file security level ......................................................................................................................... 25 Specifying the types of files to scan ................................................................................................................. 26 Creating a protection scope ............................................................................................................................. 27 Configuring additional settings ......................................................................................................................... 28 Selecting actions on objects ............................................................................................................................. 29 Restoring default file protection settings........................................................................................................... 30 File protection statistics.......................................................................................................................................... 30 SCANNING FOR VIRUSES ........................................................................................................................................ 31 Managing virus scan tasks..................................................................................................................................... 31 Creating the list of objects to scan ......................................................................................................................... 32 Creating virus scan tasks ....................................................................................................................................... 33 3 USER GUIDE Configuring virus scan tasks .................................................................................................................................. 34 Selecting a security level .................................................................................................................................. 34 Specifying the types of objects to be scanned ................................................................................................. 35 Selecting actions on objects ............................................................................................................................. 36 Configuring the scan task schedule ................................................................................................................. 37 Assigning uniform scan settings to all tasks ..................................................................................................... 38 Restoring default scan settings ........................................................................................................................ 39 Virus scan statistics ............................................................................................................................................... 39 UPDATING THE APPLICATION ................................................................................................................................. 40 Starting the update ................................................................................................................................................ 41 Rolling back the latest update ................................................................................................................................ 41 Configuring the update........................................................................................................................................... 42 Selecting an update source .............................................................................................................................. 42 Selecting the update mode and objects ........................................................................................................... 43 Configuring the update task schedule .............................................................................................................. 44 Update distribution ........................................................................................................................................... 44 Actions after update ......................................................................................................................................... 45 Configuring proxy server settings .......................................................................................................................... 46 Update statistics .................................................................................................................................................... 47 LICENSE MANAGEMENT .......................................................................................................................................... 48 QUARANTINE ............................................................................................................................................................. 51 Actions on quarantined objects .............................................................................................................................. 51 Configuring Quarantine settings ............................................................................................................................ 52 BACKUP...................................................................................................................................................................... 54 Actions on backup copies ...................................................................................................................................... 54 Configuring the backup settings ............................................................................................................................. 55 REPORTS ................................................................................................................................................................... 56 Configuring the report settings ............................................................................................................................... 56 The Detected tab ................................................................................................................................................... 57 The Events tab ....................................................................................................................................................... 57 The Statistics tab ................................................................................................................................................... 58 The Settings tab ..................................................................................................................................................... 59 NOTIFICATIONS ......................................................................................................................................................... 60 HELP INFORMATION ................................................................................................................................................. 61 List of objects to scan by extension ....................................................................................................................... 61 Allowed file exclusion masks ................................................................................................................................. 63 Allowed exclusion masks according to the Virus Encyclopedia classification ........................................................ 64 USING THIRD-PARTY CODE ..................................................................................................................................... 65 CryptoEx LLC ........................................................................................................................................................ 65 Boost 1.30.0 library ................................................................................................................................................ 65 Libcurl 7.19.3 library............................................................................................................................................... 65 Libpng 1.2.8 library ................................................................................................................................................ 66 Libc library ............................................................................................................................................................. 67 Libstdc++ library .................................................................................................................................................... 76 Expat 1.2 library ..................................................................................................................................................... 85 Growl 1.1.5 ............................................................................................................................................................ 85 4 TABLE OF CONTENTS Info-ZIP 5.51 library ............................................................................................................................................... 85 LZMA SDK 4.43 library .......................................................................................................................................... 86 RFC1321 library-based (RSA-free) MD5 library .................................................................................................... 86 Zlib 1.2 library ........................................................................................................................................................ 87 GCC 4.0.1 library ................................................................................................................................................... 87 Sound effects library .............................................................................................................................................. 96 KASPERSKY LAB ....................................................................................................................................................... 97 LICENSE AGREEMENT ............................................................................................................................................. 98 5 KASPERSKY ANTI-VIRUS Kaspersky Anti-Virus for Mac (hereinafter referred to as Kaspersky Anti-Virus) is the new generation of information protection solutions. It is designed to protect computers managed by Mac OS against viruses and malware. The following functions are implemented in the application: Real-time protection of computer's file system, through: interception and analysis of attempts to access the file system; disinfection, deletion and isolation of potentially infected objects for further analysis. Searching and deactivating malicious code at the user's request, through: search and analysis of infected and potentially infected objects in the designated protection areas; disinfection, deletion, or isolation of objects for further analysis. The most useful virus scan tasks are included in the application package: full computer scan and quick scan of critical areas. Updating the databases and modules of Anti-Virus from Kaspersky Lab's update servers, creating backup copies of all the updated files to allow a future roll back; copying the updates into a local source to allow other networked computers to access them reducing Internet traffic. Quarantining potentially infected objects: saving potentially infected objects in quarantine folder, re-scanning them with updated databases, restoring objects from quarantine at the user's demand. Creating a copy of each infected object to store in the backup area before disinfecting or deleting it, so that it can later be restored, or further analyzed to investigate an incident. Creating a detailed report on performance of each Kaspersky Anti-Virus component. Notifying the user about certain events which occur during the application's operation. You can select the notification type for each event type, whether audio message or pop-up message. Kaspersky Anti-Virus features an easy-to-use interface, which ensures convenient access to any application's option. You can change the appearance of the application by using various graphic elements and selected color solutions. When working with the application, you will be provided with complete information support: Kaspersky Anti-Virus returns messages on the protection status and offers detailed guidance. Security Assistant (see section "What is the status of computer's protection?" on page 16) included in the application package allows to present a broad picture of current status of computer's protection, and proceed to an immediate troubleshooting. HARDWARE AND SOFTWARE SYSTEM REQUIREMENTS Computer should meet the following minimum requirements for a proper functioning of Kaspersky Anti-Virus: Intel-based Macintosh computer (PowerPC processor not supported); 512 MB free RAM; 100 MB free hard drive space; Mac OS X 4/10/11 operating system, or higher. DISTRIBUTION KIT You may purchase Kaspersky Anti-Virus (box edition) form our distributors or in an online store (such as www.kaspersky.com, eStore section). 6 KASPERSKY ANTI-VIRUS If you are purchasing the product in a box, then you will get the following included in the software product distribution kit: sealed envelope with the Installation CD that stores product files and documentation in PDF format; printed User Guide (if this position has been included in the order), or Product Guide; license agreement. Before unsealing the envelope with the CD, please read through the License Agreement thoroughly. When purchasing Kaspersky Anti-Virus online, you download the product from Kaspersky Lab website, which includes this documentation. You will be sent a key file by email once payment has been made. LICENSE AGREEMENT License agreement is a legal agreement concluded by yourself and Kaspersky Lab, which specifies the conditions of using the software product you have purchased. Please, read this License Agreement carefully! If you cannot accept the provisions of the License Agreement, you may return the box with the product to the distributor you have purchased it from, and refund the sum you have paid for the product. At that, the envelope with the installation CD should remain sealed. Unsealing the envelope with the installation CD is accepting all the provisions of the License Agreement. SERVICE FOR REGISTERED USERS Kaspersky Lab offers a broad range of services, which allow the legal users to increase the efficiency of application. After purchasing the license you become a registered application user, so you can be provided the following services until the license key expiration date: hourly update of application databases and provision of new versions of the software product; consulting related to installation, configuration and use of the software product provided by phone and email; notification of new software products release by Kaspersky Lab and of new viruses emerging all around the world. This service is provided to the users that have subscribed to the news mail delivery by Kaspersky Lab at the Technical Support Service website. Support on issues related to the performance and the use of operating systems, the third-party software is not provided. OBTAINING INFORMATION ABOUT THE APPLICATION If you have a question on how to choose, purchase, or use Kaspersky Anti-Virus, answers are readily available. Kaspersky Lab provides a variety of information sources about the application. Depending on the importance and urgency of the question, you may select the source, which will suit you the best. 7 USER GUIDE SOURCES OF INFORMATION TO RESEARCH ON YOUR OWN You can refer to the following sources of information about the application: application page at the Kaspersky Lab website; application page at the Technical Support Service website (Knowledge Base); Kaspersky Lab's products users forum; help system; documentation. Anti-Virus page at the Kaspersky Lab website This page contains general information about Kaspersky Anti-Virus, its options and features. You can purchase Kaspersky Anti-Virus or extend your license in our eStore. Application page at the Technical Support Service website (Knowledge Base) Knowledge Base is a separate section of Technical Support Service website (http://support.kaspersky.com/support/rules), which provides recommendations for working with Kaspersky Lab's products. This page contains articles published by Technical Support service specialists. These articles provide useful information, recommendations and answers to frequently asked questions related to the purchase, installation and use of Kaspersky Anti-Virus. These answers are grouped by topics, for example, "Working with key files", "Updating the databases", or "Troubleshooting". The articles may answer questions, which are related not only to Kaspersky Anti-Virus but also to other Kaspersky Lab products; they also may contain Technical Support service news. To switch to Knowledge Base, click the Service button. button in the main application window and use the Technical Support Users forum If your question does not require an urgent answer, you can discuss it with Kaspersky Lab's specialists and other users in our forum (http://forum.kaspersky.com). It is also made into a separate section at the Technical Support service website and contains users' questions, feedback, and requests. In this forum you can view existing topics, leave your comments, create new topics, and use the search engine. To go to this resource, click the button in the main application window and use the Forum button. Help system The complete Help system contains information on how to manage computer protection: view protection status, scan various areas of the computer for viruses, and execute other tasks. To open help, select the Help Kaspersky AntiVirus Help command from the Kaspersky Anti-Virus main menu, or click the button in the main application window. If you have any questions regarding a separate window or tab of Kaspersky Anti-Virus, you can refer to the context help. To open the context help, open the window or the tab you want, and press the 8 button. KASPERSKY ANTI-VIRUS Documentation The documentation for Kaspersky Anti-Virus contains detailed information on installing and using the application. If you do not find a solution to your problem in Help, Knowledge Base, Users Forum, help system, or documentation, we recommend that you contact Kaspersky Lab Technical Support service. CONTACTING TECHNICAL SUPPORT If you have already purchased the Kaspersky Anti-Virus, you can obtain information about it from the Technical Support Service, either by phone or via the Internet. Technical Support Service specialists will answer your questions on installing and using the application, and if your computer has been infected, they will help you overcome the effects of malware. To view information on ways of receiving support for Kaspersky Anti-Virus, open the main application window and click the button. Before contacting Technical Support Service, please read the support rules (http://support.kaspersky.com/support/rules). If problems occur when using Kaspersky Anti-Virus, first check if troubleshooting instructions for the problem are provided in this help system or the Knowledge Base at the Kaspersky Lab Technical Support website or on the Users Forum. If you do not find a solution to your problem, we recommend that you contact Kaspersky Lab Technical Support. Please note that you have to be a registered user of Kaspersky Anti-Virus commercial version to obtain technical support. No support is provided to users of trial versions of the application. A new user is registered using the Activation assistant (see section "License management" on page 16), if you are activating the application using the activation code. Under this option, once registration is complete, a customer ID will be assigned to you. Customer ID is a personal user ID, which is required for phone or web form-based technical support. If you are activating the application using a key file, you have to pass the registration procedure at the Technical Support Service website. The customer ID and password received when registering are needed to access your Personal Cabinet, your own section at the Technical Support service website. In the Personal Cabinet you can: send requests to the Technical Support without prior registering; exchange messages with the Technical Support without using email; monitor requests in real time; view the complete history of your requests to the Technical Support service; obtain a backup copy of the key file. Requesting the Technical Support service by email To contact Technical Support Service, open the web form of the customer request processing system Helpdesk (http://support.kaspersky.com/helpdesk.html). On the Technical Support Service page that will open, enter your Personal Cabinet and fill in the request form. You can send your question in Russian, English, German, French, or Spanish. In order to send your question by email, specify the Customer ID obtained when registering at the Technical Support service website, along with your password. A Technical Support service specialist will reply to your request in your Personal Cabinet and at the email address you have specified in your request. 9 USER GUIDE Describe the problem you have encountered in the request web form providing as much detail as possible. Specify the following in the required fields: Request type. Select the subject that best matches the problem you have encountered, such as "Product installation/uninstallation problem" or "Virus scan/removal problem". If you have not found an appropriate topic, select "General question". Application name and version number. Request text. Describe the problem in as much detail as possible. Customer ID and password. Enter the customer ID and the password you have received when registering at the Technical Support service website. Email address. The Technical Support service will send an answer to your question at this email address. Phone technical support If you encounter an urgent problem, you can always call your local Technical Support service. Before contacting specialists of the Russian (http://support.kaspersky.ru/support/support_local) or international (http://support.kaspersky.com/support/international) Technical Support, please, collect information (http://support.kaspersky.com/support/details) about your computer and anti-virus application installed on it. This will help our support specialists solve your problem more quickly. CONTACTING SALES DEPARTMENT If you have questions about selecting or purchasing the application or extending your license, your questions to Sales Department specialists by email at [email protected]. 10 INSTALLING AND REMOVING KASPERSKY ANTI-VIRUS Kaspersky Anti-Virus installation package includes the Application Installation assistant and the Application Uninstallation assistant. To install Kaspersky Anti-Virus on your computer, run the installation file (*.dmg) and select the Anti-Virus Installation assistant. The installation assistant is a sequence of steps. Switching between them is carried out using the Continue (go to the next step of installation) and Go Back (go one step back) buttons. Let us take a closer look at the steps of installation: 1. Reading important information. Please read the information about the application you are installing and make sure that your computer meets the system requirements specified. To print the information, click the Print button. To save the information as a text file, click the Save button. 2. Reading License Agreement. Please read thoroughly through the License Agreement of Anti-Virus use you are concluding with Kaspersky Lab. Text of the agreement is available in several languages. To print the text of the agreement, click the Print button. To save the agreement as a text file, click the Save button. If you accept all terms of the agreement, click the Continue button and confirm that you accept the terms of license agreement in the window that will open. Kaspersky Anti-Virus installation will go on. To return to the text of license agreement, click the Read license button. If the Disagree option is selected, application installation will be interrupted. 3. Change install location. This window contains the information about the disk, which stores the application installation, and the free disk space needed for the installation. If default settings of application installation meet your demands, click the Install button and enter the administrator's password to confirm the installation. You can edit the default installation settings. To do so, click the Change installation folder button and specify another disk. To switch to the custom installation of the application, click the Preferences button. 4. Selecting installation type. This step of the installation assistant will appear if the custom installation option is selected. You will be offered to specify which application components should be installed on your computer. Please note that the Virus scan component will be unconditionally installed. Once the components are selected, please click the Install button and enter the administrator's password to confirm the installation. To restore the default installation settings, click the Standard installation button. 11 USER 5. GUIDE Viewing summary information about installation. The last window of the installation assistant contains the information about the completion of installation process. To exit the installation assistant, click the Close button. When the installation assistant is closed, Kaspersky Anti-Virus runs automatically. The computer needs no reboot. To remove Kaspersky Anti-Virus from your computer, run the installation file (*.dmg) and select the Anti-Virus Uninstallation assistant. The uninstallation assistant is a sequence of steps. Switching between them is carried out using the Continue (go to the next step of installation) and Go Back (go one step back) buttons. Let us take a closer look at the procedure of application uninstallation: 1. Reading important information. Note that removing Kaspersky Anti-Virus may result in a significant risk of infecting your computer. You are recommended to process all objects stored in quarantine and backup, before starting the uninstallation procedure. All stored objects that have not been processed will be deleted without any opportunity to restore them in the future. To start the uninstallation procedure, click the Delete button and enter the administrator's password to confirm. After that, Anti-Virus will be uninstalled. 2. Completing the uninstallation procedure. The last window of the uninstallation assistant displays the information about the successful completion of uninstallation process. To exit the uninstallation assistant, click the Close button. The computer needs no reboot after the uninstallation. 12 APPLICATION INTERFACE Kaspersky Anti-Virus has a simple and easy-to-use interface. In this chapter we will take a closer look at its basic elements: main application window (see section "Main application window" on page 13), application settings window (see section "Application settings window" on page 14) and Kaspersky Anti-Virus icon (see section "Kaspersky Anti-Virus icon" on page 15). You can change the appearance of the application by using various graphic elements and selected color solutions (see section "Configuring the Kaspersky Anti-Virus interface" on page 15). MAIN APPLICATION WINDOW The basic functions of the main window (see figure 1) are: to inform the user of the computer's protection status and of possible problems with protection, to provide information about the operation of Kaspersky Anti-Virus's components (File Anti-Virus, virus scan and update tasks), and to provide access to the main tasks and the application settings window. Figure 1. Kaspersky Anti-Virus main window The color of the main window indicates the current protection status. There are three possible values of the protection status (see section "What is the status of computer's protection?" on page 16), each of which is associated with one of the colors of traffic lights. Green indicates that your computer's protection is at an optimal level, while yellow and red warn of the presence of various problems in the application's configuration or operation. For more detailed information on these problems and their quick elimination, use the Security Assistant (see section "What is the status of computer's protection?" on page 16) that opens when you click on the color indicator. In addition to the color indicator, the left part of the main window contains a block of text which describes the protection status, and lists any security threats logged by the Security Assistant. If you have virus scan or update tasks running at this time, information on their progress (as percentage completion) will also be displayed in the left part of the main window. The lower part of the window displays summary statistics on the operation of File Anti-Virus, and information about the databases being used by the application. From the main window you can start an application update, modify settings for virus scan tasks in specified areas and run them, and manage the application's licenses. To do so, use the next buttons: Run application update. As a result, a report window with detailed information about the task's execution will open. 13 USER GUIDE Open a window with a list of virus scan tasks where you can create a list of objects to scan, modify the scan settings, and run the task. Switch to managing the licenses, needed to enable the application's full functionality. You can view information on the current license key files, delete keys, and install new ones. The navigation bar is located in the upper part of the main window, and contains the following buttons: Open the window which displays the report about the operation of File Anti-Virus and application tasks, and provide access to Quarantine and Backup. Open the application settings window (see section "Application settings window" on page 14). Open the Kaspersky Anti-Virus built-in help. Open a window with information on ways of obtaining technical support. APPLICATION SETTINGS WINDOW Kaspersky Anti-Virus settings window (see figure 2) may be accessed from the main window (see section "Main application window" on page 13), by clicking the button, or by selecting the Preferences item of the application menu, which will open if you click the icon in Dock or Mac OS Menu Bar. The buttons in the upper part of the settings window give you quick access to the settings of File Anti-Virus, of virus scan tasks, of updates, and of application's tools. To fine-tune certain settings, you will need to open the second- and thirdlevel settings windows. To prevent users without administrator's privileges from editing Kaspersky Anti-Virus settings, click on the lock icon in the lower part of the window. You will need to enter the administrator's username and password to access the settings. The button provides you access to Kaspersky Anti-Virus help system with the description of settings for the current application window. Figure 2. Kaspersky Anti-Virus settings window 14 APPLICATION INTERFACE KASPERSKY ANTI-VIRUS ICON Immediately after Kaspersky Anti-Virus is installed, its icon appears in the Mac OS Menu Bar. The icon is some kind of indicator for the application's operation mode. If the icon is active, this means that the computer protection against malware in real-time mode is enabled. The inactive icon indicates that the protection is disabled. Additionally, the icon provides access to the commands in Kaspersky Anti-Virus's main menu. By default, the icon is located on the Mac OS Menu Bar. You can change the icon's location by replacing it onto the Dock. To do so, please do the following: 1. Open the application settings window and select the Appearance tab (see figure 3). 2. Check the Box name box in the Section name section. Figure 3. Configuring application interface settings CONFIGURING THE KASPERSKY ANTI-VIRUS INTERFACE Kaspersky Anti-Virus gives you the option of changing the looks of the program by creating and using various graphic elements and selected color solutions. To configure Kaspersky Anti-Virus open the application settings window and select the Appearance tab (see figure 3). All the colors, fonts, icons and texts used in the Kaspersky Anti-Virus interface can be changed. You can create custom skins for the application or localize it in another language. To activate a skin, specify the path to the folder in the Skin field. To select a folder, use the Select button. Modifications applied to the Kaspersky Anti-Virus interface settings are not saved if you restore default settings or uninstall the application. 15 QUICK START One of the main goals of Kaspersky Lab specialists when designing Kaspersky Anti-Virus was to ensure the application's optimum configuration. This allows users with any level of computer literacy to be confident that their computer is secure immediately the application has been installed. You are advised to perform the following actions after completing the installation and starting the application on your computer: Activate your copy of Kaspersky Anti-Virus (see section "License management" on page 48). Using a licensed version will let you update the application's databases on a regular basis, and access the Technical Support Service. Evaluate the current protection status to make sure that Kaspersky Anti-Virus is ensuring the appropriate level of protection (see section "What is the status of computer's protection?" on page 16). Update the application (see section "How to Update the Application" on page 18). Kaspersky Anti-Virus databases should be kept up to date so that they are always ready to help detect and eliminate viruses or other malware. Scan your entire computer for viruses (see section "How to Scan Your Computer for Viruses" on page 17). If problems or errors occur in the application's operation, please view the report (see section "Reports" on page 56), which may indicate the cause of failure. If you cannot solve the problem on your own, please contact the Kaspersky Lab's Technical Support Service (see section "Contacting Technical Support" on page 9). WHAT IS THE STATUS OF COMPUTER'S PROTECTION? Your computer's protection status gives you a summary of your computer's overall security level. These threats include both malicious programs detected and using outdated application databases, disabling File Anti-Virus, using minimum settings for the application's operation, etc. Protection status is displayed in the main application window and is depicted by the corresponding traffic light color. Depending on the situation, the color scheme of the window will change, and if any security threats are detected the color will be supplemented by informative messages. The main application window's color, acting as a security indicator, can take the following values: Green. This status indicates that your computer is suitably protected. This means that the application databases have been recently updated, File Anti-Virus is enabled, the application is running with the settings recommended by Kaspersky Lab, and either no malicious objects have been discovered by a virus scan, or all detected malicious objects have been disinfected. Yellow. Your computer's protection level is below optimal. This protection status indicates certain problems in the application's performance or settings. Such problems include, for example: slight deviations from the recommended operation settings, or the application databases have not been updated for several days. Red. Your computer is at serious risk of infection. This status indicates that there are problems which may lead to the infection of your computer and the loss of data. Such problems include, for example: a failure in File Anti-Virus's operation; the application's databases have not been updated for a long time; malicious objects have been detected and urgently need to be disinfected, or the application has not been activated. 16 QUICK START If there are problems in the protection system, you are advised to fix them immediately. To do so, use the Security Assistant (see figure 4), which will open if you click on the color indicator in the main window. The Security Assistant lets you review all the current threats and begin to eliminate them. Figure 4. Security Assistant interface To browse the list of existing threats, click the Continue button. A detailed description is provided for each threat, and the following actions are available: Eliminate threat immediately. By using the corresponding links, you can directly eliminate the threat. To obtain detailed information on events related to this threat, you can view the report file. The recommended action is to immediately eliminate the threat. Postpone threat elimination. If for any reason you cannot immediately eliminate the threat, you can postpone this action and return to it later. To do so, use the Postpone button. Note that the second option is not available for serious threats. Such threats include, for example, malicious objects not yet disinfected, File Anti-Virus operation failure, or corrupted application database files. If you still have threats left after you have done with the Security Assistant, a reminder will appear in the top part of the main application window to tell you that you need to return to these threats. If you open the Security Assistant again, the postponed threats will not be on the list of active threats. However, you can still return to view and eliminate postponed threats by clicking the View postponed threats button in the last window of the Activation Assistant. HOW TO SCAN YOUR COMPUTER FOR VIRUSES When the installation is complete, the application will notify you that a full computer scan has not yet been performed, and will advise you to run the Full computer scan task immediately. Kaspersky Anti-Virus includes the Full computer scan task. To open the Full computer scan task, please do the following: 1. Click the button in the main application window. 2. Select the Full scan task in the left part of the window that will open. In the right-hand part of the window you can edit the list of objects to scan, view the settings that will be used for a task (security level, action that will be taken on dangerous objects), review summary statistics of task execution, and open a detailed report on the latest run of the task. 3. To start the Full computer scan task manually, click the Start button. 17 USER GUIDE HOW TO PERFORM A QUICK SCAN OF YOUR COMPUTER Some areas on your computer are critical in the context of security, such as folders containing operating system files and system libraries. These areas are the main targets for malware which aims to damage your computer. It is extremely important to protect these critical areas of your computer to ensure that it keeps running. For your convenience, we have created a dedicated virus scan task for these areas. To open the quick computer scan task, please do the following: 1. Click the button in the main application window. 2. In the window that will open, select the Quick scan task. In the right-hand part of the window you can edit the list of objects to scan, view the settings that will be used for a task (security level, action that will be taken on dangerous objects), review summary statistics of task execution, and open a detailed report on the latest run of the task. 3. To run the scan task manually, click the Start button. HOW TO SCAN A FILE, FOLDER OR DISK FOR VIRUSES It is useful to be able to scan a part of your computer for viruses rather than the entire computer: for example, the hard drive containing applications, games, or email databases which have been transferred from the office. To scan an individual object for viruses, please do the following: 1. Click the button in the main application window. 2. Select the Virus scan task in the left part of the window that will open. In the right-hand part of the window you can edit the list of objects to scan, view the settings that will be used for a task (security level, action that will be taken on dangerous objects), review summary statistics of task execution, and open a detailed report on the latest run of the task. 3. To run the scan task manually, click the Start button. HOW TO UPDATE THE APPLICATION Kaspersky Lab updates Kaspersky Anti-Virus databases and modules using dedicated update servers. Kaspersky Lab's update servers are Kaspersky Lab's Internet sites to which the application updates are uploaded. You will need connection to the Internet to update Kaspersky Anti-Virus from these servers. By default, Kaspersky Anti-Virus automatically checks for updates on Kaspersky Lab's servers. If a server contains a fresh set of updates, Kaspersky Anti-Virus will download and install them in the background. To update Kaspersky Anti-Virus, open the main application window and click the button. As a result, Kaspersky Anti-Virus will start updating. 18 MULTI-TASKED PROTECTION MANAGEMENT By default, Kaspersky Anti-Virus starts when the operating system starts, and protects your computer during the entire session. File-Anti-Virus's activity is indicated by the application icon in the Dock or in the Mac OS Menu Bar. If the icon is active, your computer's protection is enabled, if the icon is inactive, the protection is disabled. Kaspersky Lab specialists strongly recommend that you do not disable real-time protection provided by the Anti-Virus since this could lead to an infection of your computer and loss of data. Note that the icon indicates the status of protection provided by File Anti-Virus. Disabling or pausing File Anti-Virus does not impact the execution of virus scan tasks or application updates. DISABLING COMPUTER PROTECTION Disabling protection means stopping File Anti-Virus. Virus scan and update tasks will continue to run. If protection is fully disabled, it can only be re-enabled manually by the user. In this case, File Anti-Virus will not be automatically enabled after the system or application restarts. Note that if Kaspersky Anti-Virus conflicts with other program(s) installed on your computer, you can pause File Anti-Virus or create an exclusion list (see section "Trusted zone creation" on page 22). There are several ways to disable computer protection: 1. Click the icon in the Dock or in the Mac OS Menu Bar and select the Disable protection command from the menu that will open. 2. Open the application settings window, select the Protection tab and uncheck the Enable File Anti-Virus box. RESTORING THE PROTECTION ON YOUR COMPUTER If you have paused or fully disabled your computer's protection, you can re-enable it in the following ways: From the menu that will open by clicking the Anti-Virus icon in the Mac OS Menu Bar or in the Dock. To do so, select the Enable Protection item. From the Security Assistant interface. You significantly increase the risk of infecting your computer if you pause or stop protection, so this threat is immediately logged by the Security Assistant (see section "What is the status of computer's protection?" on page 16). EXPORTING AND IMPORTING KASPERSKY ANTI-VIRUS SETTINGS Kaspersky Anti-Virus allows to export and import its settings. This is useful if, for example, the application is installed both on your home and office computers. You can configure the application in a convenient mode, save those settings in a special configuration file on a disk, and then import them quickly onto your office workstation. Settings are stored in a special configuration file. 19 USER GUIDE To export current application settings, please do the following 1. Open the application settings window and select the Service tab (see figure 5). 2. In the Configuration manager section, click the Save button. 3. Enter the name of the configuration file and specify a location to save it. To import settings from a configuration file, please do the following: 1. Open the application settings window and select the Service tab (see figure 5). 2. In the Configuration manager section click the Load button and select the file you want to import Kaspersky Anti-Virus settings from. Figure 5. Configuring service settings CLOSING THE APPLICATION If, for any reason, you need to close Kaspersky Anti-Virus, click the application icon in the Mac OS Menu Bar or in the Dock, and select the Quit command in the menu that will open. The application will close, which means that your computer will be running unprotected. If you have closed the application, you can enable the protection of your computer by loading the application manually. Protection can also be started automatically after restarting your operating system. To enable this mode, select the Service section in the application settings window (see figure 5) and check the Launch application at startup box in the Autorun block. 20 CREATING A PROTECTION SCOPE Kaspersky Anti-Virus protection scope is defined on the Threats tab of the application settings window. They include: list of threats (see section "Selecting malicious programs to be monitored" on page 21) against which the application will ensure the protection; list of objects in the trusted area, which will be excluded from the protection scope (see section "Trusted zone creation" on page 22). SELECTING MALICIOUS PROGRAMS TO BE MONITORED Kaspersky Anti-Virus protects against various types of malware. Regardless of your settings, the application always protects your computer against the most dangerous types of malware such as viruses, Trojans, and hack tools. These programs may cause significant damage to your computer. To achieve a greater level of security for your computer, you can expand the list of threats that the application will detect, so that it will monitor additional types of potentially dangerous programs. To select which malware types Kaspersky Anti-Virus will protect from, open the application settings window and select the Threats tab (see figure 6). The Malware categories section lists threat types, grouped by severity of threat: Viruses, worms, Trojans, and hack tools. This group contains the most common and dangerous categories of malware. This is the minimum admissible security level. Per recommendations of Kaspersky Lab experts, Kaspersky Anti-Virus always monitors this category of malware. Spyware and Adware. This group includes potentially dangerous software that could cause inconveniences to a user or cause a significant damage. Auto-dialers. This group includes programs, which set up hidden dial-up connections, such as adult services autodialers. Potentially dangerous software (riskware). This group includes programs that are not malicious or dangerous, but which under certain circumstances could be used to cause harm to your computer. The groups listed above govern the completeness of utilizing the application databases when scanning objects with File Anti-Virus and when scanning for viruses on your computer. If all groups are selected, Kaspersky Anti-Virus provides the maximum possible anti-virus protection for computer. If the first group is selected, the application will disregard riskware and other programs, which could be installed on your computer, and which could cause you data loss or material damage. Kaspersky Lab does not recommend disabling monitoring of Spyware, Adware and Auto-dialers. If Kaspersky Anti-Virus classifies a program as riskware which you do not consider dangerous, you can configure an exclusion for it (see section "Trusted zone creation" on page 22). 21 USER GUIDE Figure 6. Selecting type of threats to be monitored TRUSTED ZONE CREATION Trusted zone is a user-created list of objects which Kaspersky Anti-Virus does not monitor. That is, it is a set of exclusions from the protection scope. The user creates a trusted zone based on the features of the objects he or she uses and the programs installed on his or her computer. You might need to create such an exclusion list if, for example, Kaspersky Anti-Virus blocks access to an object or program which you know is safe. Exclusion rules are sets of conditions under which Kaspersky Anti-Virus does not scan objects. You can exclude files using several criteria: file format, file name using a file mask, location (for example, a folder or a program), program processes, or using the Virus Encyclopedia threat type classification. An exclusion object will not be scanned when the disk or folder where it is located is being scanned. However, if you select this object specifically, the exclusion rule will not be applied. Threat type is the status that Kaspersky Anti-Virus assigns to an object during the scan. The status is based on the classification of malware and riskware listed in Kaspersky Lab's Virus Encyclopedia. Riskware does not have any malicious function but can be used as an auxiliary component by malicious software, since such programs contain holes and errors. This category includes, for example, remote administration programs, IRC clients, FTP servers, various utilities for stopping processes or hiding them, keyloggers, password macros, and autodialers. Such programs are classified in not-a-virus group. They can be divided into several types such as Adware, Joke, and Riskware. (For more information about potentially dangerous programs, see the Virus Encyclopedia at www.viruslist.com.) Based on the scan results, such programs may be blocked. Since several of them are widely used by users, you do have the option of excluding them from the scan. To do so, add the threat name or threat name mask as defined in the Virus Encyclopedia to a trusted zone. To create an exclusion list, please do the following: 1. Open the application settings window and select the Threats section (see figure 6). 2. Click the Trusted Zone button in the Exclusions section. 3. The list of objects excluded from protection by Kaspersky Anti-Virus is displayed in the window that will open (see figure 7). To add a new exclusion rule, click the button and specify the exclusion conditions in the rule creation window (see figure 8). To edit the exclusion rule you are using, select it from the list and click the Edit button. To delete a rule, click the button. 22 CREATING A PROTECTION SCOPE Figure 7. The list of exclusion objects To create a new exclusion rule, specify the following settings: Object / All objects. Specify the exclusion object, which may be a file, a folder, or a file mask (see section "Allowed file exclusion masks" on page 63). You can manually enter the object's name or the name mask in the field, or browse for the object in the window that will open by clicking the Select button. If the All objects option is selected, all objects on your computer which are of the threat type specified in the field below, will be excluded from scan. Threat type / All threats. Exclude objects from scan based on the threat type assigned according to the Virus Encyclopedia classification. To enter the name of the threat, use the values of the dropdown list: start with, contain, end with, and specify the corresponding fragment of the name in the field to the right of the list. For example, if the start with not-a-virus value is selected, then legal but potentially dangerous programs will be excluded from scan. Specifying the name of the threat by mask is also admissible (see section "Allowed exclusion masks according to the Virus Encyclopedia classification" on page 64). If the All threats value is selected, then all objects specified in the field above will be excluded from scan, regardless of the threat type assigned to them. If both the exclusion object and the threat type are selected, the rule will apply as follows: If you specify a certain file as the object and a certain status as the threat type, the specified file will only be excluded if during the scan it is assigned the selected threat status. If you select an area or folder as the object and a status (or a mask) as the threat type, objects with that status will be excluded from the scan only in that area or folder. Component / All components. Specify which Kaspersky Anti-Virus components should use the rule you are creating: File Anti-Virus or Virus scan. If the All components option is selected, then all virus scan tasks and File Anti-Virus will use this rule. Figure 8. Creating an exclusion rule To create an exclusion rule from the report window, please do the following: 1. In the report, select the object that you want to add to the exclusions (see section "Reports" on page 56). 2. Open the context menu and select the Add to trusted zone item. 3. The exclusion settings window will open. Make sure that all exclusion rule settings are appropriate. The fields containing the object name and the assigned threat type will be filled in automatically, based on the information from the notification. To create the rule, click the OK button. 23 USER GUIDE ANTI-VIRUS PROTECTION OF COMPUTER'S FILE SYSTEM The computer's file system may contain viruses and other malicious programs that persist for years, having initially penetrated the computer from a removable disk drive or from the Internet, and never causing any trouble. But once the infected file is opened, the virus will be activated immediately. File Anti-Virus is the component that monitors the computer's file system in real-time mode. By default, it launches at the operating system startup, persists continuously in RAM, and scans all files that are opened, started or saved on your computer and all associated disk drives. The scan process comprises the following steps: 1. Each attempt by a user or a program to access any file is intercepted by the component. 2. The file is analyzed for viruses. Malicious objects are recognized based on the application databases. These databases contain descriptions of all the currently known malicious programs and instructions to neutralize them. 3. Following the analysis, one of the following application operation modes may be applied: a. If a malicious code is detected in a file, File Anti-Virus blocks the file and attempts to disinfect it. After successful disinfection, the file will become accessible. If disinfection fails, the file will be deleted. When disinfecting or deleting a file, a copy of it is placed into the backup storage (see section "Backup" on page 54). b. If a code that is similar to a malicious one is detected in the file but cannot be proved to be definitely malicious, the file will be placed into a special storage area called Quarantine (see section "Quarantine" on page 51). The application will attempt to disinfect it later using updated databases. c. If no malicious code is detected in the file, it will immediately become accessible. PAUSING / DISABLING FILE PROTECTION You can disable File Anti-Virus and file protection on your computer using one of the methods described below. However, before doing so you should determine why you want to disable the component. It may be possible to solve your problem in another way, such as by changing the security level (see section "Selecting the file security level" on page 25) or by disabling the protection only for certain files. For example, if you are working with a database that you know to be free from viruses, just specify the folder containing its files as an exclusion (see section "Trusted zone creation" on page 22). To disable File Anti-Virus, click the icon in the Dock or in the Mac OS Menu Bar and select the Disable protection command. You also can disable file protection from the application settings window. To do so, select the Protection tab and uncheck the Enable File Anti-Virus box (see figure 9). If you disable File Anti-Virus in the application settings window, it will NOT be started automatically when the application restarts. To restore file system protection, you will need to check the Enable File Anti-Virus box. 24 ANTI-VIRUS PROTECTION OF COMPUTER'S FILE SYSTEM CONFIGURING FILE PROTECTION The way of protecting files on your computer is determined by the following settings: Security level. The security level is a set of parameters that define the balance between thoroughness and speed of scanning of objects. There are three preset security levels with settings developed by Kaspersky Lab specialists (see section "Selecting the file security level" on page 25). Action on detected object. An action defines how Kaspersky Anti-Virus will react when an infected or potentially infected object is detected (see section "Selecting actions on objects" on page 29). SELECTING THE FILE SECURITY LEVEL File Anti-Virus uses a security level to determine which objects to scan. There are three preset levels (see figure 9): Maximum protection is the most complete scan of the files you open, save, or start. Recommended. This is the level with the settings recommended by Kaspersky Lab. Maximum Speed - this level enables you to comfortably use other applications that require significant system resources, since the range of files scanned is smaller. The default setting is the Recommended level. You can raise or lower the scan's security level by selecting a new level, or by modifying the settings for the current level. To change the security level, adjust the slider bar. Changing the security level changes the balance between scan speed and the total number of files scanned: the fewer files are scanned for viruses, the higher is the scan speed. If none of the preset security levels meet your needs, customize the scan settings. You are advised to select as a basis the level, which is the closest to your requirements, and edit its settings. This will change the name of the security level to Custom. To modify the settings for the current security level, please do the following: 1. Open the application settings window and select the Protection tab (see figure 9). 2. Click the Preferences button in the Security Level section. 3. Edit the file protection settings in the window that will open, and click the OK button. Figure 9. File Anti-Virus security levels 25 USER GUIDE SPECIFYING THE TYPES OF FILES TO SCAN You can specify which types of files will be scanned by File Anti-Virus, using the criteria of file size, file format, or location, whenever they are opened, executed, or saved. The types of files to be scanned for viruses are determined in the File types section (see figure 10). Select one of the three options: Scan all files. In this case, all file system objects being opened, launched, or saved will be subject to the scan. Scan programs and documents (by content). File Anti-Virus will only scan potentially infected files, i.e. files which can host and activate a virus. Before scanning an file for viruses, its internal header is analyzed for file format (txt, doc, exe, etc.). If the analysis reveals that the file format is uninfectable, the file will not be scanned for viruses and will immediately be accessible. If the file format allows a risk of infection, the file will be scanned for viruses. Scan programs and documents (by extension). File Anti-Virus will only scan potentially infected files, but the file format will be determined based on the filename's extension (see section "List of objects to scan by extension" on page 61). Do not forget that someone could send a virus to your computer with the .txt extension, although in reality it could be an executable file renamed as a .txt file. If you select the Scan programs and documents (by extension) option, such a file will be skipped by the scan. If the Scan programs and documents (by content) option is selected, ignoring extensions, File Anti-Virus will analyze file header, which will uncover that the file is an .exe file. This file will be scanned for viruses. In the Compound files section, specify which compound files should be scanned for viruses: Scan archives - scan archives in ZIP, CAB, RAR, ARJ formats; Scan installation packages - scan self-unpacking archives for viruses; Scan attachments - scan objects embedded in files, such as Excel spreadsheets or a macro embedded in a Microsoft Office Word file, or email attachments. To specify which files should not be scanned for viruses, use the following settings: Extract archives in background if larger than ... MB. If the size of the compound object exceeds this limit, it will be scanned by the application as a single object (header scanned) and become operable for the user. The objects it contains will be scanned later. If the box is not checked, access to files larger than the specified value will be blocked until the object scan is complete. Do not process archives larger than ... MB. Any file larger than the specified value will be skipped without being scanned for viruses. To specify types of objects to be scanned by File Anti-Virus, please do the following: 1. Open the application settings window and select the Protection tab. 2. Click the Preferences button in the Security Level section (see figure 9). 3. Select the General tab in the window that will open (see figure 10). 26 ANTI-VIRUS PROTECTION OF COMPUTER'S FILE SYSTEM Figure 10. Selecting types of files to be scanned for viruses CREATING A PROTECTION SCOPE By default, File Anti-Virus scans all files in the moment they are accessed, regardless of the media they are stored on, whether it is a hard disk drive, a CD/DVD-ROM, or a flash card. To restrict the protection scope, please do the following: 1. Open the application settings window and select the Protection tab (see figure 9). 2. Click the Preferences button in the Security Level section. 3. Select the Protection scope tab in the window that will open. (see figure 11). The tab contains the list of objects which will be scanned by File Anti-Virus. By default, all objects located on hard, removable and network disk drives connected to your computer, are protected. You can fill or edit the list using the buttons located under the list. To limit the number of objects subject to protection, you can: 1. Specify only the folders, disk drives, or files you want to protect. 2. Create as list of objects, which do not need protection. 3. Combine the first and second ways, i.e. create a protection scope and exclude a number of objects from it. Figure 11. Creating a protection scope 27 USER GUIDE CONFIGURING ADDITIONAL SETTINGS As additional File Anti-Virus settings, you can specify the file system scanning mode and configure the conditions for temporarily pausing the component. To configure additional settings of File Anti-Virus, please do the following: 1. Open the application settings window and select the Protection tab (see figure 9). 2. Click the Preferences button in the Security Level section. 3. Select the Additional tab in the window that will open (see figure 12). The object scanning mode determines File Anti-Virus processing conditions. You have the following options: Smart mode. This mode is aimed at speeding up the processing of objects and returning them to the user. When it is selected, a decision to scan is made based on analyzing the operations performed with the file. For example, when using a Microsoft Office file, Kaspersky Anti-Virus scans the file when it is first opened and last closed. All operations in between that overwrite the file are not scanned. Smart mode of scanning the objects is used by default. On access and modification – File Anti-Virus scans files as they are opened or edited. On access – only scans files when an attempt is made to open them. On execution – only scans files when an attempt is made to run them. Note that the files being opened for the execution will be intercepted and scanned by File Anti-Virus, regardless of the mode you have selected. Figure 12. Configuring advanced settings for File Anti-Virus You might need to pause File Anti-Virus when performing tasks that require significant resources from the operating system. To lower the load and ensure that the user obtains access to files quickly, we recommend configuring the component to disable at a certain time. To pause the functioning of the component for a while, check the On schedule box and set the time limits for disabling the component in the window that will open by clicking the Schedule button (see figure 13). To do so, enter a value in the HH:MM format in corresponding fields. 28 ANTI-VIRUS PROTECTION OF COMPUTER'S FILE SYSTEM Figure 13. Pausing File Anti-Virus SELECTING ACTIONS ON OBJECTS If an anti-virus scan shows that a file is infected or suspicious, File Anti-Virus's subsequent actions depend on the object's status and the action selected. File Anti-Virus can assign one of the following statuses to an object: status of a malicious program (for example, virus, Trojan); potentially infected when the scan cannot determine whether the object is infected or not. The application has probably found in the file a sequence of code from an unknown virus, or of modified code from a known virus. By default, all infected files are subject to disinfection, and all potentially infected files are sent to Quarantine. To change the action on an object, open the application settings window and select the Protection tab (see figure 9). In the table below you can find descriptions of all available File Anti-Virus actions on objects. If the action you have selected is… … when an infected or potentially infected object is detected: Prompt for action The application will display a warning message with the information about which malicious code has infected (potentially infected) the file, and offers you the choice from the following actions. These actions may vary depending on the object's status. Block access Application blocks access to the object, but its location will not be changed. Relevant information is logged in the report. To gain access to an object, objects in the report should be processed (see section "The Detected tab" on page 57). Block access Application blocks access to the infected object and attempts to disinfect it. If the object is successfully disinfected, it becomes accessible to the user. If the object cannot be disinfected, its location will not be changed. To gain access to an object, objects in the report should be processed (see section "The Detected tab" on page 57). When a potentially infected object is detected, the application blocks access to this object and quarantines it (see section "Quarantine" on page 51). Disinfect Block access Disinfect Application blocks access to the infected object and attempts to disinfect it. If the object is successfully disinfected, it becomes accessible to the user. If the object cannot be disinfected, it will be deleted. Delete if disinfection fails Block access Application blocks access to the object and deletes it. Delete Before disinfecting the object or deleting it, Kaspersky Anti-Virus creates a backup copy and places it to the backup (see section "Backup" on page 54) in case the object will need to be restored, or it will become possible to disinfect it. 29 USER GUIDE RESTORING DEFAULT FILE PROTECTION SETTINGS When modifying the File Anti-Virus settings, it is always possible to restore the default settings. Kaspersky Lab considers these settings to be optimal and have collected them in the Recommended protection level. To restore default protection settings, please do the following: 1. Open the application settings window and select the Protection tab (see figure 9). 2. Click the Default button in the Security Level section. If you have edited the list of objects included in the protection scope when modifying File Anti-Virus settings, you will be able to save the list to use in future when restoring default settings. To save the list of objects, check the Protection scope box in the Restore settings window that will open. FILE PROTECTION STATISTICS The main application window displays summary statistics related to File Anti-Virus' current performance, including: the number of objects scanned during File Anti-Virus' current session; the number of dangerous objects detected, and the name of the file currently being scanned. To view the detailed report of component's performance, click the button in the main application window and select the File Anti-Virus item from the Running tasks section in the report window that will open. If File Anti-Virus is currently disabled for some reason, you may view the detailed report on its performance during its previous startup in the Completed tasks area of the report window. If File Anti-Virus returns an error when closing, view the report and try to restart the component. If you cannot solve the problem on your own, please contact the Kaspersky Lab's Technical Support Service (see section "Contacting Technical Support" on page 9). General information about the component's performance is grouped on the following tabs: All dangerous objects detected when protecting the file system are listed on the Detected tab (see section "The Detected tab" on page 57). The tab contains the full path to the location of each object and the status assigned to the object by the File Anti-Virus. If the malicious program that has infected the object is revealed, this object is assigned the corresponding status (for example, virus, Trojan etc.). If the type of malicious effect cannot be exactly established, the object is assigned the suspicious status. Next to the status, the action taken on the object is specified (detected, not found, disinfected). If you do not want information about disinfected objects to be displayed on this tab, uncheck the Show disinfected objects box. The Events tab shows the complete list of events that have occurred during File Anti-Virus's operation (see section "The Events tab" on page 57). The events can have the following statuses: information event - for example, object not processed: skipped by type; warning - for example, a virus is detected; note - for example: archive is password-protected. Usually, the informative messages are of a reference nature and are not of great interest. You can disable them: to do so, uncheck the Show all events box. Statistics appear on the corresponding tab (see section "The Statistics" on page 58). Here you will find the total number of scanned objects, and further columns show how many archives, dangerous objects, disinfected objects, Quarantined objects etc have been processed out of the total number of the objects scanned. Settings of File Anti-Virus are displayed on the tab with the same name (see section "The Settings tab" on page 59). To switch to editing the component settings, use the Preferences button. On each of the report tabs, information types may be selected, sorted by columns in ascending or descending order, and searched through the report. To do so, use the context menu items accessible by right-clicking on headers of report columns. 30 SCANNING FOR VIRUSES In addition to the computer protection (see section "Anti-virus protection of computer's file system" on page 24) provided by the File Anti-Virus, it is critical to periodically scan computer for viruses. This is required to stop the spread of malicious programs not detected by File Anti-Virus, because, for instance, of the low level of protection selected. The following tasks are executed by Kaspersky Anti-Virus to perform virus scans: Scanning for viruses Scan individual items for viruses, such as files, folders, disks, plug-and-play devices. Full Scan Search for viruses on your computer with a thorough scan of all disk drives. Quick Scan Scans only critical areas of the computer for viruses, including folders with operating system files (/System) and system libraries (/Library). By default, these tasks are executed using recommended settings. You can edit these settings (see section "Configuring virus scan tasks" on page 34) or create a schedule for running tasks (see section "Configuring the scan task schedule" on page 37). You also have the option of creating users virus scan tasks (see section "Creating virus scan tasks" on page 33). MANAGING VIRUS SCAN TASKS You can run a virus scan task either manually, or automatically using a schedule (see section "Configuring the scan task schedule" on page 37). To start a virus scan task manually, in the main application window click the button. In the window that will open (see figure 14), select the name of the required virus scan task from the dropdown list, and click the Start button. 31 USER GUIDE Figure 14. Full computer scan task Information on currently running tasks is displayed in the left part of the main window, and also in the Running tasks section of the reports window (see section "Reports" on page 56). To pause a virus scan task, in the main application window click the button. In the window that will open (see figure 14), select the name of the required virus scan task from the dropdown list, and click the Pause button. This will pause the scan until you start the task again manually or it starts again automatically according to the schedule. To start the scan manually, click the Resume button. To stop a virus scan task, in the main application window click the button. In the window that will open (see figure 14), select the name of the required virus scan task from the dropdown list, and click the Stop button. This will pause the scan until you start the task again manually or it starts again automatically according to the schedule. Next time you run the task, the application will ask whether you want to continue the task where it stopped, or begin it over. You also can manage virus scan tasks from the report window (see section "Reports" on page 56), where you can start, stop, pause, and resume them. To do so, select a task from the list in the left part of the report window, and use the commands from the menu that will open by clicking the button. CREATING THE LIST OF OBJECTS TO SCAN To view the list of objects queued for scanning when a task is running, click the button in the main application window and select the name of the virus scan task in the window (see figure14 ) that will open (for example, Full Scan). The list of objects will be displayed in the right part of the window. Each of the default tasks created when installing the application has its default list of objects to scan. When creating your own task or when selecting an object for a virus scan task, you can specify the list of objects. 32 SCANNING FOR VIRUSES You can use the buttons under the list of objects to scan to modify the list. To add a new scan object to the list, click the button, and in the window that will open select the object to be scanned. To delete an object, select it from the list (when you do so, the name of the object will be highlighted) and click the button. You can temporarily disable scanning of individual objects for any task without deleting them from the list. To do so, uncheck the box beside the object that you do not want to scan. In addition, when you add a folder that contains embedded objects, to the scan scope, you can also scan subfolders of the selected folder. To do so, select an object from the list of objects to be scanned, open the context menu, and select the Include subfolders command. To run the scan task manually, click the Start button. CREATING VIRUS SCAN TASKS To scan objects on your computer for viruses, you can use the built-in scan tasks which are installed with the application, or create your own tasks. New tasks are created by modifying existing ones. To create a new virus scan task, please do the following: 1. Click the button in the main application window and in the window that will open (see figure 14) select the task with the settings closest to your needs. 2. Click the 3. Enter the name for the new task in the window that will open and click the OK button. A task with the name you have specified will appear in the task list. button located under the virus scan task list and select Copy. There is a maximum number of tasks that the user can create. The maximum number of tasks is four. The new task inherits all the properties of the task from which it was created. You need to carry out an additional configuration by creating a list of objects to scan (see section "Creating the list of objects to scan" on page 32), specifying the preferences, which will define the task execution (see section "Configuring virus scan tasks" on page 34), and configuring a schedule for the task autorun (see section "Configuring the scan task schedule" on page 37), if necessary. To rename a created task, select the task from the list, click the button under the scan task list, and select the Rename item. Enter a new name for the task in the window that will open and click the OK button. The task name will change. To delete a created task, select the task from the list, click the button under the scan task list, and select the Rename item. Confirm the task deletion in the window that will prompt you for confirmation. The task will be deleted from the task list. You can only rename and delete tasks that you have created. 33 USER GUIDE CONFIGURING VIRUS SCAN TASKS The following settings determine how objects are scanned on your computer: Security level. The security level is a set of parameters that define the balance between thoroughness and speed of scanning of objects. There are three preset security levels with settings developed by Kaspersky Lab specialists (see section "Selecting a security level" on page 34). Action on detected object. An action defines how Kaspersky Anti-Virus will react when an infected or potentially infected object is detected (see section "Selecting actions on objects" on page 36). Schedule. Automatically running tasks by a schedule enables you to scan your computer for viruses in due time (see section "Configuring the scan task schedule" on page 37). Additionally, you can specify uniform settings (see section "Assigning uniform scan settings to all tasks" on page 38) for running all tasks. SELECTING A SECURITY LEVEL Virus scan task use a security level to determine which objects to scan (see figure 15). There are three preset levels: Maximum protection - the most complete scan of the entire computer or individual disks, folders, or files. We recommend using this level if you suspect that a virus has infected your computer. Recommended. This is the level with the settings recommended by Kaspersky Lab. Maximum Speed - this level enables you to comfortably use other applications that require significant system resources, since the range of files scanned is smaller. Figure 15. Selecting the security level when scanning objects for viruses 34 SCANNING FOR VIRUSES The default setting is the Recommended level. You can raise or lower the scan's security level by selecting a new level, or by modifying the settings for the current level. To change the security level, adjust the slider bar. Changing the security level changes the balance between scan speed and the total number of files scanned: the fewer files are scanned for viruses, the higher is the scan speed. If none of the preset security levels meet your needs, customize the scan settings. You are advised to select as a basis the level which is the closest to your requirements to use as a basis, and edit its settings. This will change the name of the security level to Custom. To modify the settings for the current security level, please do the following: 1. Open the application settings window and select the Virus scan tab (see figure 15). 2. Click the Preferences button in the Security Level section. 3. Edit the file protection settings in the window that will open, and click the OK button. SPECIFYING THE TYPES OF OBJECTS TO BE SCANNED You can specify which types of objects will be scanned, by specifying which file formats, file sizes, and drives will be scanned for viruses when this task is running. The types of files to be scanned for viruses are determined in the File types section (see figure 16). Select one of the three options: Scan all files. With this option, all files will be scanned. Scan programs and documents (by content). If you select this group, only potentially infected files will be scanned, i.e. files which can host and activate a virus. Before scanning an file for viruses, its internal header is analyzed for file format (txt, doc, exe, etc.). Scan programs and documents (by extension). File Anti-Virus will only scan potentially infected files, but the file format will be determined based on the filename's extension (see section "List of objects to scan by extension" on page 61). Do not forget that someone could send a virus to your computer with the .txt extension, although in reality it could be an executable file renamed as a .txt file. If you select the Scan programs and documents (by extension) option, such a file will be skipped by the scan. If the Scan programs and documents (by content) option is selected, File Anti-Virus will analyze file header, which will reveal that the file is an .exe file. This file will be scanned for viruses. 35 USER GUIDE Figure 16. Configuring scan settings You can set time and file size limits for scanning an object in the Optimization section: Skip if scan takes longer than...sec. Check this box to set a limit on the scan of a single object and enter the maximum scan time for an object in the field to the right. If this value is exceeded, this object will be excluded from the scan. Do not scan archives larger than ... MB. Check this box to set a limit on the scan of a single object by its size, and enter the maximum size for an object in the field to the right. If this value is exceeded, this object will be excluded from the scan. In the Compound files section, specify which compound files should be scanned for viruses: Scan archives – scan .RAR, .ARJ, .ZIP, .CAB, .LHA, .JAR, and .ICE archives. Certain archive files (such as .ha, .uue, .tar) cannot be deleted automatically since Kaspersky Anti-Virus does not support their disinfection, even if you select the option of disinfecting, and deleting if the objects cannot be disinfected. To delete such archives, click the Delete archive link in the dangerous object detection notification window. This notification is displayed after the program has started processing objects detected during the scan. You can also delete infected archives manually. Scan attachments - scan objects embedded in files (for example, Excel spreadsheets or a macro embedded in a Microsoft Word file, email attachments, etc.). Scan email format files - scan email format files and email databases. If this box is checked, Kaspersky Anti-Virus scans each component of the email message (body and any attachments). If this box is not checked, the email file will be scanned as a single object. Scan password-protected archives - enable scanning of password-protected archives. With this feature enabled, a password will be requested before scanning archived objects. If this box is not checked, password-protected archives will be skipped when scanning. SELECTING ACTIONS ON OBJECTS If an anti-virus scan shows that a file is infected or suspected of being infected, the application's subsequent actions depend on the object's status and the action selected. One of the following statuses can be assigned to the object after the scan: status of a malicious program (for example, virus, Trojan). potentially infected when the scan cannot determine whether the object is infected or not. The program has probably found in the file a sequence of code from an unknown virus, or of modified code from a known virus. 36 SCANNING FOR VIRUSES By default, all infected files are subject to disinfection, and all potentially infected files are sent to Quarantine. To change the action on an object, open the application settings window, open the Virus scan tab (see figure 15), and select the name of the required task. In the table below you can find descriptions of all available actions on objects. If the action you have selected is… … when an infected or potentially infected object is detected: Prompt for action when the scan is complete The application postpones the processing of objects to the end of the scan. When the scan is complete, the reports window (see section "Reports" on page 56) will be displayed on screen with a list of infected and potentially infected objects detected, and you will be asked if you want to process the objects. Prompt for action during scan After each dangerous object detection the application will display a warning message with the information about which malicious code has infected (potentially infected) the file, and offers you the choice from the following actions. These actions may vary depending on the object's status. Do not prompt for action The application records information about detected objects in the report without processing them. We do not recommend enabling this application's operation mode since infected and potentially infected objects persist on your computer and it is practically impossible to avoid infection. Do not prompt for action The application attempts to disinfect infected objects without prompting the user for confirmation. If the object is successfully disinfected, it becomes accessible to the user. If the object cannot be disinfected, its location will not be changed. If the object cannot be disinfected, its location will not be changed. Relevant information is logged in the report (see section "Reports" on page 56). To gain access to an object, objects in the report should be processed. When a potentially infected object is detected, the application blocks access to this object and quarantines it (see section "Quarantine" on page 51). Disinfect Do not prompt for action Disinfect The application attempts to disinfect detected objects without prompting the user for confirmation. If the object is successfully disinfected, it becomes accessible to the user. If the object cannot be disinfected, it will be deleted. Delete if disinfection fails Do not prompt for action The application deletes the object. Delete Before disinfecting the object or deleting it, Kaspersky Anti-Virus creates a backup copy and places it to the backup (see section "Backup" on page 54) in case the object will need to be restored, or it will become possible to disinfect it. CONFIGURING THE SCAN TASK SCHEDULE You can run any virus scan task manually (see section "Managing virus scan tasks" on page 31) or automatically using a schedule. Scan tasks created at the application installation will be run automatically according to the specified schedule. To run a scheduled task, check the box with the description of task autorun conditions in the Run Mode section. Task run settings can be edited in the Schedule window accessible using the Edit button. 37 USER GUIDE Figure 17. Creating an task launch schedule The most important step is to determine the startup frequency set for the virus scan task. You can select one of the following options: Minutes. The interval between scan task startups is measured in minutes. Enter the number of minutes between scan startups in the schedule settings - it should not exceed 59 minutes. Hours. The interval between scan startups is measured in hours. Specify the interval in the schedule settings as Every N-th hour and specify the value of N. For example, to run the task every hour, enter Every 1 hour. Days. The time between scan startups is measured in days. In the schedule settings, specify the update start frequency. Also, in the Time field, specify what time of day or night the task will run. Weeks. The task will run on certain days of week. If this option is selected, in the schedule settings check the boxes for the days of the week on which you want the scan task to run. Specify the start time in the Time field. Months. The task will run once per month at the specified time. At a specified time. The task will run once at the date and time that you have specified. At application startup. The task starts every time that Kaspersky Anti-Virus starts. Additionally, you can set an interval between the application startup and the task startup. After every update. The task starts after each update of application databases. If a scan update did not start for any reason (for example, the computer was shut down at that time), you can configure the missed task to start automatically as soon as it becomes possible. To do so, check the Run task if skipped box in the schedule window. ASSIGNING UNIFORM SCAN SETTINGS TO ALL TASKS Each scan task is executed according to its own settings. By default, all tasks created when installing the application on your computer use the settings recommended by Kaspersky Lab. You can specify uniform scan settings for all tasks, by starting with the Virus scan task settings, used to scan an individual object. To assign uniform scan settings for all tasks, please do the following: 1. Open the application settings window and select the Virus scan section (see figure 15). 2. To modify the scan settings, select the security level (see section "Selecting a security level" on page 34), configure advanced level settings, and select an action on objects (see section "Selecting actions on objects" on page 36). 3. To apply these settings to all tasks, click the Apply button in the Common tasks settings section. Confirm the uniform settings that you have modified in the confirmation request window. 38 SCANNING FOR VIRUSES RESTORING DEFAULT SCAN SETTINGS When modifying task settings, it is always possible to return to the default settings. Kaspersky Lab considers these settings to be optimal and have collected them in the Recommended protection level. To restore default scan settings, please do the following: 1. Open the application settings window, select the Virus scan tab, and then select the required task. 2. Click the Default button in the Security Level section (see figure 15). VIRUS SCAN STATISTICS You can view the information on results of virus scan task execution in the Completed tasks section of the report on application operation. If the task is being executed at the present moment, brief information of it is displayed in the main window. To view a detailed report on current task performance, open the report window and select the necessary task from the Running tasks section. Information about the task execution, is displayed in the lower part of the window. If it is executed successfully, the summary statistics of task execution results. Its containing the information on the number of objects scanned, number of malicious objects detected and objects needing to be processed. Scan start time, estimated completion time, and duration are also displayed. If any errors occur during the scan, run the task again. If the attempt returns an error, contact the Technical Support Service (see section "Contacting Technical Support" on page 9). General information on scan result is grouped on the following tabs: All dangerous objects detected during task execution are listed on the Detected tab (see section "The Detected tab" on page 57). The tab contains the full path to the location of each object and the status assigned to the object by the application: if the malicious program that has infected the object is revealed, this object is assigned the corresponding status. For example, virus, Trojan, etc. If the type of malicious effect cannot be exactly established, the object is assigned the suspicious status. Next to the status, the action taken on the object is specified (detected, not found, disinfected). If you do not want information about disinfected objects to be displayed on this tab, uncheck the Show disinfected objects box. The Events tab shows the complete list of events that have occurred during task execution (see section "The Events tab" on page 57). The events can have the following statuses: information event - for example, object not processed: skipped by type; warning - for example, a virus is detected; note - for example: archive is password-protected. Usually, the informative messages are of a reference nature and are not of great interest. You can disable them: to do so, uncheck the Show all events box. Statistics (see section "The Statistics" on page 58) appear on the corresponding tab. Here you will find the total number of scanned objects, and further columns show how many archives, dangerous objects, disinfected objects, Quarantined objects etc have been processed out of the total number of the objects scanned. Settings (see section "The Settings tab" on page 59) of task execution are displayed on the tab with the same name. To switch to task settings quickly, click the Preferences button. 39 UPDATING THE APPLICATION Keeping protection up-to-date is a keystone of reliable protection of your computer. As new viruses, Trojans, and malicious software emerge daily, it is highly important to update the application regularly to keep your data permanently protected. Application update implies that the following components will be downloaded and installed on your computer: Anti-Virus databases Protection of information stored on computer is ensured thanks to application databases. File Anti-Virus and virus scan tasks use databases when they scan for dangerous objects on your computer and they disinfect those objects. The databases are hourly renewed with records of new threats and methods of fighting them. Therefore, it is recommended to update them on a regular basis. Application modules In addition to the application databases, you can update internal modules of Kaspersky Anti-Virus. Update packages are regularly released by Kaspersky Lab. Special Kaspersky Lab update servers are the primary update source for Kaspersky Anti-Virus. Your computer should be connected to the Internet for a successful download of updates from servers. If the Internet connection is ensured via a proxy server, you will need to configure connection settings (see section "Configuring proxy server settings" on page 46). If you do not have access to Kaspersky Lab update servers (for example, your computer is not connected to the Internet) contact the Kaspersky Lab's Technical Support Service (see section "Contacting Technical Support" on page 9) to retrieve application updates on CDs in .zip format. Updates can be downloaded in one of the following modes: Automatically. Kaspersky Anti-Virus checks for an update package in the update source at time intervals you have set. During virus outbreaks, the check frequency may increase, and decrease when they are gone. If the application detects new updates, it downloads and installs them on the computer. This is the default mode. By schedule. Application is updated according to a specified schedule. Manually. You launch the updating procedure manually. When the update is in progress, the application modules and databases on your computer are compared against those at the update source. If your computer has the most recent version of databases and application modules installed, you will see a message confirming that the protection of your computer is up-to-date. If databases and modules on your computer and those on the update server differ, the application downloads only the missing part of the updates. Databases and modules are not downloaded in their entirety, which significantly increases the speed of updating and saves Internet traffic. Before updating the application databases, Kaspersky Anti-Virus creates backup copies of them; those backup copies can be used if you want to use them again for any reason. You might need the rollback (see section "Rolling back the latest update" on page 41) option, for example, if you have updated the databases and they have been corrupted during the operation. You can easily roll back to the previous version of databases and try to update them again. You can distribute downloaded updates to a local source while updating the application (see section "Update distribution" on page 44). This feature enables you to update databases and modules used by the application on networked computers to save Internet traffic. 40 UPDATING THE APPLICATION STARTING THE UPDATE Application updates keep your computer's protection up-to-date. If you have not installed updates for some time, the protection of your data becomes less reliable as the time passes. The main application window displays summary information on the application update. Here you can see database release date and the number of records in the databases installed on your computer. The number of records is the number of threats from which your computer is now protected. In addition, you will see a status that informs you if database being used are up-to-date. You can start application updates at any time. To do so, click the globe icon in the main window. The report window that will open displays detailed information on the update process. Updates will also be distributed to the local source during the update process, provided that this service is enabled (see section "Update distribution" on page 44). ROLLING BACK THE LATEST UPDATE Every time you run the application update, Kaspersky Anti-Virus first creates a backup copy of the databases and application modules being in use, and only after that starts updating them. This allows you to roll back to the previous version of databases if the update fails. To roll back to the previous database version, please do the following: 1. Open the application main window and select the Update tab (see figure 18). 2. Click the Rollback button. Figure 18. Configuring update settings 41 USER GUIDE CONFIGURING THE UPDATE Application will only be updated based on the following settings: Update source. Update source is a resource that contains the latest database and module files for Kaspersky Anti-Virus. Update sources can be HTTP and FTP servers, local or network folders (see section "Selecting an update source" on page 42). Update objects. Update objects are the components that will be updated: applications databases, application modules. Application databases are always updated, and the application modules are only updated if the corresponding mode is enabled (see section "Selecting the update mode and objects" on page 43). Update mode. Updating mode determines whether the update will be launched automatically (recommended by Kaspersky Lab specialists), manually, or by schedule. If you select the latter, you will have to assign schedule settings for the launch (see section "Selecting the update mode and objects" on page 43). Update distribution. The update distribution option allows you to save the updates you have downloaded from the Internet in a local folder and grant access to them to other computers on your network to save Internet traffic (see section "Update distribution" on page 44). SELECTING AN UPDATE SOURCE Update source is a resource that contains the updates for databases and internal modules of Kaspersky Anti-Virus. Update sources can be HTTP and FTP servers, local or network folders. The main update source are Kaspersky Lab update servers. These are special websites where updates for databases and internal modules of all Kaspersky Lab products are stored. If you do not have access to Kaspersky Lab update servers (for example, your computer is not connected to the Internet) contact the Technical Support Service (see section "Contacting Technical Support" on page 9) to retrieve application updates on CDs in .zip format. You can copy the updates from a removable disk and upload them to an FTP or HTTP site, or save them in a local or network folder. When ordering updates on removable media, please specify if you want to have the updates for internal modules as well. Figure 19. Selecting an update source 42 UPDATING THE APPLICATION To assign an update source, please do the following: 1. Open the application settings window and select the Update tab (see figure 18). 2. Click the Preferences button in the Update settings section. 3. Go to the Update source tab in the window that will open. By default, the list contains only Kaspersky Lab update servers. When the update is in progress, Kaspersky Anti-Virus accesses this list, selects the address of the first server, and tries to download updates from this server. If updates cannot be downloaded from the selected server, the application tries to connect and retrieve the updates from the next server. You can edit the source list using the button to add a new source and the button to remove a source from the list. When adding a new source, it is admissible to specify the path to a folder that contains the set of updates, or the address of an FTP/HTTP site. Kaspersky Anti-Virus adds a new update source to the top of the list and automatically marks this source as enabled by checking the box next to it. Click the Edit button to edit a source that you have selected from the list. The only type of sources you cannot edit or delete are Kaspersky Lab update servers. If you select a resource outside the LAN as an update source, you should have an Internet connection established to perform an update. SELECTING THE UPDATE MODE AND OBJECTS When configuring application update settings, it is important to define update objects and mode. Update objects are the components that will be updated: applications databases, application modules. Application databases are always updated, and the application modules are only updated if the corresponding mode is enabled. If you want to download and install updates for application modules on your computer when the update is in progress, open the application settings window, select the Update tab (see figure 18), and check the Update application modules box in the Update settings section. If there are currently application module updates on the update source, the application will download the required updates and apply them after the computer restarts. The downloaded module updates will not be installed until the computer restarts. If the next application update occurs before the computer restarts and the program module updates downloaded earlier are installed, only the application databases will be updated. Application update mode (see figure 18) determines in which way the update is launched. One of the following modes can be selected in the Run mode section: Automatically. Kaspersky Anti-Virus checks for an update package in the update source at time intervals you have set (see section "Selecting an update source" on page 42). If the application detects new updates, it downloads and installs them on the computer. This update mode is used by default. Next updating attempt will be performed by Kaspersky Anti-Virus after the interval specified in the previous update package has elapsed. This option allows to regulate the update frequency in case of virus outbreaks and other potentially dangerous situations. The application will timely receive the latest updates for the databases and software modules, thus excluding the possibility for malware to penetrate your computer. By schedule. Application is updated according to a specified schedule. If you would like to switch to this update mode, you will be offered to run the update on a daily basis by default. To create a custom schedule, click the Edit button next to the mode title and make the required changes in the window that will open (see section "Configuring the update task schedule" on page 44). Manually. You launch the updating procedure manually. Kaspersky Anti-Virus notifies you when updating is required. 43 USER GUIDE CONFIGURING THE UPDATE TASK SCHEDULE The application is automatically updated by default. If this schedule does not suit you, set the update start settings manually. Figure 20. Creating an task launch schedule The most important step is to determine the frequency of running the update task. You can select one of the following options: Minutes. The application is updated every few minutes. Enter the number of minutes between scan startups in the schedule settings - it should not exceed 59 minutes. Hours. The updating frequency is calculated in hours. Specify the interval in the schedule settings as Every N-th hour and specify the value of N. For example, to download updates every hour, select Every 1 hour. Days. The time between scan startups is measured in days. In the schedule settings, specify the update start frequency. Also, in the Time field, specify what time of day or night the task will run. Weeks. The application is updated on certain days of week. If this option is selected, in the schedule settings check the boxes for the days of the week on which you want the scan task to run. Specify the time in the Time field. Months. The task will run once per month at the specified time. At a specified time. The task will run once at the date and time that you have specified. At application startup. The task starts every time that Kaspersky Anti-Virus starts. Additionally, you can set an interval between the application startup and the task startup. If a scan update did not start for any reason (for example, the computer was shut down at that time), you can configure the missed task to start automatically as soon as it becomes possible. To do so, check the Run task if skipped box in the schedule window. UPDATE DISTRIBUTION If your computers are linked in a LAN, updates do not need to be downloaded and installed on each of them individually since this will increase network traffic. Use the update distribution service to save Internet traffic. To do so, set up update distribution as follows: 1. One of the computers on the network retrieves an application update package from the Kaspersky Lab web servers or from another web resource hosting the current set of updates. The updates retrieved are placed in a shared folder. 2. Other networked computers access the shared folder to retrieve application updates. 44 UPDATING THE APPLICATION To connect to the update distribution service, please do the following: 1. Open the application settings window and select the Update tab (see figure 18). 2 . Click the Preferences button in the Update settings section. 3. Select the Additional tab in the window that will open (see figure 21). Check the Update distribution folder box, and specify the shared folder where retrieved updates will be placed, in the field below. You can enter the path manually or select it in the window that will open by clicking the Select button. If the box is checked, updates will automatically be copied to this folder when they are retrieved. Kaspersky Anti-Virus only retrieves its own update package from Kaspersky Lab's servers. If you want other computers on the network to update from the folder containing updates copied from the Internet, you should do the following: 1. Grant public access to this folder. 2. Specify the shared folder as the update source on the networked computers in the update service settings. Figure 21. Configuring settings for update distribution service ACTIONS AFTER UPDATE Every application database update contains new records that protect your computer from the most recent threats. Kaspersky Lab experts recommend that you scan the quarantined objects each time after the database is updated. Why should these objects be scanned? The quarantine contains objects for which the malware that had caused infection has not been identified. It is possible that after the database update Kaspersky Anti-Virus may be able to identify the threat and eliminate it. The application scans quarantined objects after each update by default. If an object still has the potentially infected status, it will remain in the storage. If the status changes to infected, the object will be processed according to the action selected; at that it will be removed from the quarantine, and a copy of it will be placed into the backup storage. If the scan proves an object not infected and the databases have been updated within three last days, the object will be restored from the storage to its current location. If more than three days have passed since the most recent database update, the object will remain in the storage. To cancel the scan of objects in Quarantine, please do the following: 1 . Open the application settings window and select the Update tab (see figure 18). 2. Uncheck the Rescan Quarantine box in the Actions after update section. 45 USER GUIDE CONFIGURING PROXY SERVER SETTINGS If you use a proxy server to establish the Internet connection, you will need to configure connection settings. Kaspersky Anti-Virus uses these settings to update the application databases and modules. To configure the proxy server settings, please do the following: 1. Open the application settings window and select the Network tab (see figure 22). Figure 22. Configuring proxy server settings 2. Check the Use proxy server box and specify which proxy server settings you need to use: Use system proxy server settings. If this option is selected, Kaspersky Anti-Virus uses proxy server settings specified in the MAC OS settings. Use specified proxy server settings - use a proxy server different from that specified in the Mac OS settings. In the Address field, enter either the IP address or the character name of a proxy server, and specify the proxy server port in the Port field. To exclude the use of a proxy server when updating from a local or network folder, check the Bypass proxy server for local addresses box. 3. Specify if the authentication is required on the proxy server. Authentication is the procedure of verifying user registration data for access control purposes. If the authentication is required to connect to the proxy server, check the Use authentication box and specify the username and password in the fields below. If the proxy server requires authentication and you did not enter the username and password or the data specified were not accepted by the proxy server for some reason, a window will open, asking for a username and password for authentication. If the authentication has been successful, the specified username and password will be remembered for subsequent use. Otherwise, the authentication settings will be requested again. When you click the Cancel button, current update source in the window with authentication settings request will be replaced with the following one on the list. Authentication settings specified in the current window or mentioned in the application interface will be ignored. If you are downloading the update from an FTP server, the server is connected to in passive mode by default. If this connection fails, it will attempt to connect in active mode. By default, the time assigned to connect to an update server is equal to one minute. If the connection fails, once this time has elapsed, the application will attempt to connect to the next update server. This continues until a connection is successfully established, or until all the available update servers are attempted. 46 UPDATING THE APPLICATION UPDATE STATISTICS Some statistics of current performance of the update service (release date for the databases used by the application, number of records in the databases, update status) are displayed in the main application window. If you have never updated the application, there will be no information about the most recent update. You can view the information on results of previous updates in the Completed tasks section of the report on application operation. If an update is being executed at the present moment, brief information of it is displayed in the main window. To view a detailed report on current task performance, open the report window and select the Update task from the Running tasks section. The lower part of the update task report window contains the information on whether the procedure has been completed successfully or not. If the update is completed successfully, the window will display brief statistics informing of the size of updates distributed and installed, the speed of update execution, the length of procedure, and other information. If the operation fails, make sure that the settings for Updater are correct and that the update source is available. Restart the update. If the attempt returns an error, contact the Technical Support Service. The description of all operations performed during updating is displayed in the main part of the report on the Events tab (see section "The Events tab" on page 57). There you can view which files have been distributed and which ones replaced. The settings used to manage the update are listed on the tab with the same name (see section "The Settings tab" on page 59). To switch to editing the component settings, use the Preferences button. 47 LICENSE MANAGEMENT Ability of using Kaspersky Anti-Virus is determined by a license obtained by purchasing the product and granting you the right to use the application as soon as you install your license. Without a license, unless a trial version of the application has been activated, Kaspersky Anti-Virus will run in one-update mode. The application will not download any new updates. If a trial version of the program has been activated, after the trial period expires, Kaspersky Anti-Virus will not run. When the license expires, the program will continue working, except that you will not be able to update application databases. As before, you will be able to scan your computer for viruses and use File Anti-Virus but using only the databases that you had when the license expired. We cannot guarantee that you will be protected from viruses that surface after your program license expires. To protect your computer from infection with new viruses, we recommend that you renew your application license. Kaspersky Anti-Virus will notify you in advance of impending expiration date of your license. The corresponding message will be displayed every time the application starts. To view information on the license being in use, open the main window of Kaspersky Anti-Virus and click on the key icon. License number and type (commercial or trial), maximum number of hosts, expiration date and time, and days remaining until the expiration are all displayed in the window that will open (see figure 23). Figure 23. License management To purchase a new license, click the Purchase button. The web page that will open contains all the information on purchasing a key through Kaspersky Lab eStore or corporate partners. Kaspersky Lab regularly organizes special pricing offers on license renewals for our products. Check for special offers at Kaspersky Lab website, in the Products → Sales and special offers section. If you purchase online, a key file or an activation code will be mailed to you at the address specified in the purchase order once payment has been made. To activate the application using the activation code you have obtained or a key file, click the Activate button. Before activating the application, make sure that the computer's time and date settings are correct. Activating the application requires you to install a key file, which is used to verify the license to use the application. The key contains service information which is required for the application to be fully functional, and some additional data: support information (who provides the support, where it can be obtained); key name and number, and its expiration date. The application is activated using the Activation assistant. Let us take a closer look at its steps. 48 LICENSE MANAGEMENT SELECTING APPLICATION ACTIVATION TYPE There are several options for activating the application, depending on whether you have a key for Kaspersky Anti-Virus or need to obtain one from a Kaspersky Lab server: Activate, using activation code. Select this activation option if you purchased the full commercial version of the application and the activation code has been sent to you. Using this activation code, you will obtain a key file which provides access to the application's full functionality throughout the effective term of the license agreement. Use existing key file. Activate the application using the Kaspersky Anti-Virus key file obtained earlier. Activate trial version. Select this activation option if you want to install the application's trial version before deciding whether you will purchase the commercial version. You will be given a free license key, which will expire as stated in the license agreement for the application's trial version. An Internet connection will be required if you try to activate the application with an activation code, or activate a trial version. If at the time of installation the Internet connection is unavailable, you can perform the activation later, or connect to the Internet from a different computer and obtain a key using an activation code by registering on the Kaspersky Lab Technical Support Service website. You may postpone the product activation. To do so, click the Cancel button. In this case, activation will be skipped. Kaspersky Anti-Virus will be installed on your computer, and all its functions will be accessible to you, except for the update (you will be able to update the application once, after installation). ENTERING THE ACTIVATION CODE To activate the application, you should enter the activation code. If the application was purchased through the Internet, the activation code will be sent to you via email. If you purchase a retail, boxed version of the application, the activation code will be printed on the envelope containing the installation disk. The activation code is a sequence of numbers and letters delimited with hyphens in four groups of five symbols without spaces, for example: 11AA1-11AAA-1AA11-1A111. Please note that the activation code should only be entered in Latin characters. USER REGISTRATION At this step, the Activation assistant will require you to enter your contact information: email address, country, and city. This information is required by the Kaspersky Lab's Technical Support service to identify you as a registered user. After you have entered this information, the Activation assistant will forward it to the activation server after which you will be assigned a client number and a password to the Personal Cabinet at the Technical Support service website. RECEIVING KEY FILE The Activation assistant connects to Kaspersky Lab's servers and sends them your registration data (activation code and contact information), to be verified by the server. If the activation code is verified, the Assistant will receive a key from the server. If you are installing a trial version of the application, the Activation assistant will receive a trial key file without needing an activation code. The file will be automatically installed to ensure the application's operability, and the activation completion window will open, showing detailed information about the key. When this activation method is selected, the application does not download a physical key file (with .key extension) from the server, but receives the relevant data to write into the operating system registry and the file system. To obtain a real key file, you must complete the user registration at Kaspersky Lab's website. If the activation code is not verified, the Assistant will display this information on the screen. In this case, contact the software vendor you purchased the application from, for information. 49 USER GUIDE SELECTING THE KEY FILE If you have a key file for Kaspersky Anti-Virus, the Assistant window will ask if you want to install it. To do so, use the Select button and select the path for the file (with the .key extension) in the standard file selection window. Information about the current key will be displayed in the bottom part of the window, including the owner's name, the key number, the key type (commercial, trial, etc.), and the license key expiration date. COMPLETING THE APPLICATION ACTIVATION The Activation assistant will inform you that the application has been successfully activated. In addition, information about the installed key is displayed, including the owner's name, key number, key type (for instance, commercial or trial), and the license key's expiration date. 50 QUARANTINE Quarantine is a special repository containing the objects that could have been infected with viruses. Potentially infected objects are objects that are suspected of being infected with viruses or modifications of them. Why the objects are detected as potentially infected? It is not always possible to exactly determine whether an object is infected or not. This could be for the following reasons: The code of the object being analyzed resembles a known threat but is partially altered. Application databases contain threats that have been studied by Kaspersky Lab specialists to date. If a malicious program is modified and these changes is not entered into the databases yet, Kaspersky Anti-Virus classifies the object infected with the modified malicious program as a potentially infected object and will indicate without fail what threat this infection resembles. The code of the object detected resembles a malicious program by its structure; however, nothing similar is recorded in the application databases. It is quite possible that this is a new type of threats so Kaspersky Anti-Virus classifies that object as a potentially infected object. A potentially infected object can be detected and quarantined in the course of Virus scan, or by File Anti-Virus. You can quarantine an object by yourself by clicking the Quarantine button in the special notification window that pops up when a potentially infected object is detected. When you move an object to Quarantine, it is moved, not copied: the object is deleted from its original location on a disk or in an email message and saved in the Quarantine folder. Files in Quarantine are stored in a special format and are not dangerous. ACTIONS ON QUARANTINED OBJECTS The total number of quarantined objects is displayed in the Quarantine section of the main report window. To view the storage areas, please do the following: 1. Press the button in the main application window. 2. In the left part of the window that will open, select the Quarantine item. Content of the storage will be displayed in the right-hand part of the window (see figure 24). You can do the following actions on objects in Quarantine: Quarantine files that you suspect of being infected but skipped by the application. To do so, click the Add button and select the required file in the standard selection window. It will be added to the list with the added by user status. A file moved to the quarantine manually may change its status if it had been scanned using the updated databases not earlier than three days before it has been scanned for the first time in the quarantine. Later, the file will be restored if it is assigned the false positive status, or removed with a copy placed in the backup - in case if it is considered infected. 51 USER GUIDE Figure 24. List of Quarantined objects Scan and disinfect all potentially infected objects in the quarantine using the current application databases. To do so, click the Scan all button. After scanning and disinfecting any quarantined object, its status can change to infected, potentially infected, false operation, OK, etc. Quarantined objects' status only can change if they are scanned using the databases released not more than three days after the file has been quarantined. The infected status means that the object had been identified as infected but the application did not manage to treat it. The application will remove such an object from the quarantine, saving a copy of it in the backup storage (see section "Backup" on page 54). All the objects with the false positive status will be restored to their original locations. Restore files in the folder specified by the user, or in the folders from which the files were moved to quarantine (default option). To restore an object, select it from the list and click the Restore button. When restoring objects quarantined from archives, mail databases, and mail format files, you should also specify the directory in which they will be restored. We recommend that you only restore objects with the false operation, OK, and disinfected statuses since restoring other objects can lead to infecting your computer. Delete any quarantined object or group of selected objects. Only delete objects that cannot be disinfected. In order to delete objects, select them in the list and click the Delete button. To clear the Quarantine storage completely, click the Clear all button. CONFIGURING QUARANTINE SETTINGS You can configure the settings for the composition and operation of Quarantine, specifically: Set the automatic scan mode for quarantined objects after each application database update (see section "Actions after update" on page 45). The application will not be able to scan quarantined objects immediately after updating the databases if you are working with quarantine. Set the maximum duration for storing objects in the quarantine. 52 QUARANTINE By default, the term for storing objects in quarantine is 30 days; at the end of which the objects will be deleted. You can change the maximum period for storing potentially infected objects or cancel this restriction. To configure Quarantine settings, please do the following: 1. Open the application settings window and select the Reports tab (see figure 25). 2. In the Quarantine and Backup section, set the term for keeping objects in the storage after which objects in the storage will be automatically deleted. Figure 25. Configuring settings for object storage term in the quarantine 53 BACKUP Sometimes, when disinfecting the objects, their integrity cannot be saved. If the disinfected file contained important information, and after disinfection it became partly or completely inaccessible, you can attempt to restore the original object from its backup copy. Backup copy is a copy of the original dangerous object that is created when first disinfecting or deleting the object, and saved in backup. Backup is a special repository that contains backup copies of dangerous objects subject to processing or deletion. The main function of backup is the ability to restore an original object at any time. Files in backup are saved in a special format and are not dangerous. ACTIONS ON BACKUP COPIES The list of backup copies of stored objects is displayed in the Backup section of the report window. To view the backup areas, please do the following: 1. Press the button in the main application window. 2. In the left part of the window that will open, select the Backup item (see figure 26). Content of the storage will be displayed in the right-hand part of the window. A list of backup copies is displayed in the storage. The following information is provided for each copy: the full name of the object with the path to its original location, the status of the object assigned after the scan, and its size. You can restore selected copies using the Restore button. An object is restored from the backup with the same name that it had prior to disinfection. If there is an object with the same name in the original location (this situation is possible when restoring an object with a copy created prior to disinfection), a corresponding warning will pop up on screen. You can change the location of the object being restored, or rename it. We recommend that you scan the object for viruses immediately after restoring it. It is possible that you will manage to disinfect it without losing its integrity using the updated databases. We do not recommend that you restore backup copies of objects unless absolutely necessary. This could lead to an infection on your computer. We recommend that you periodically view the repository content and clear it using the Delete button. To clear the backup storage completely, click the Clear all button. You can also set up the application so that it independently deletes the oldest copies from backup (see section "Configuring the backup settings" on page 55). 54 BACKUP Figure 26. Backup copies of deleted or disinfected objects CONFIGURING THE BACKUP SETTINGS You can determine the maximum period for storing copies in backup. By default, the term for storing copies of dangerous objects in quarantine is 30 days. At the end of which the copies will be deleted. You can change the maximum term for storing copies, or remove this restriction. To do so, please do the following: 1. Open the application settings window and select the Reports tab (see figure 25). 2. Set up the term for storing backup copies in the repository in the Quarantine and Backup section. 55 REPORTS Kaspersky Anti-Virus allows you to view detailed statistics for the results of your performance as well as for any events occurred in the application's operation. A detailed report will also be created for each application component: File AntiVirus (see section "Anti-virus protection of computer's file system" on page 24), virus scan (see section "Scanning for viruses" on page 31) and update (see section "Updating the application" on page 40). To view reports, open the main application window and click the button. Report window contains the following sections: Detected. The list of all dangerous and suspicious objects detected by File Anti-Virus or virus scan tasks. To disinfect the dangerous objects immediately, click the Disinfect all button. Check the Show disinfected objects box for the information about disinfected objects to be displayed on the list. To remove records about detected objects from the report, click Clear button. Note that all dangerous objects you have detected will persist on your computer. Events. List of all events logged within the operation of Kaspersky Anti-Virus. To delete information from the list, click the Clear button. Quarantine. List of objects placed to Quarantine (see section "Quarantine" on page 51). Backup. List of objects placed to the Backup storage (see section "Backup" on page 54). Running tasks. List of tasks being executed at the moment. If no task is active and File Anti-Virus is disabled, the list will be empty. Completed tasks. List of completed tasks. You may view all completed tasks or the last twenty ones. To clear the list, click the command. button in the lower-left corner of the report window and select the Delete all completed tasks From the report window you can manage the operation of File Anti-Virus and virus scan and update tasks: start, stop, pause, and resume them. To do so, use the menu commands that will open by clicking the button. CONFIGURING THE REPORT SETTINGS To configure the settings for creating and saving reports, please do the following: 1. Open the application settings window and select the Reports tab (see figure 25). 2. Carry out the necessary configuration in the Reports section as follows: Allow or block logging informative events. As a rule, these events are not important for security. To detect these events in the report, check Log non-critical events box. Allow storing in the report only for the important events that occurred since the last time the task had been run. This saves disk space by reducing the report size. If the Keep only recent events box is checked, the information in the report will be updated every time you restart the task: in this case important information (such as records about detected malicious objects) will be saved, and non-critical information will be overwritten. Set the storage term for reports. By default, the term for storing reports is 30 days, at the end of which the copies will be deleted. You can change the maximum term for storing copies, or remove this restriction. 56 REPORTS THE DETECTED TAB This tab (see figure 27) contains the list of dangerous objects detected by File Anti-Virus or virus scan task. The full name is indicated for each object, and also the status assigned to it by the application when it was scanned or processed. In order to show both dangerous objects and those that were successfully disinfected, check the box Show disinfected objects box. The dangerous objects can be processed by clicking the Disinfect all buttons. After each object is processed, a notification will appear on screen, which allows to decide how to proceed. If you check the Apply to all box in the notification window, the selected action will be applied to all objects with the same status in the list before processing starts. Click the Clear button to remove a record about detected object from the report. Note that dangerous objects will persist on your computer. Figure 27. List of dangerous object detected THE EVENTS TAB The Events tab logs all important events which occur during File Anti-Virus's operation, including virus scan tasks (see figure 28). There are three main types of events: Critical events are events of a critical importance that indicate the problems in application performance or gaps in protection of your computer, for example, virus detected,operation failure. Important events are events that should be paid attention to, since they reflect important situations in application's operation, for example, processing error. Information notifications are reference-type messages, which as a rule do not contain important information: for example, ok, not processed. These events are recorded in the event log only if the Show all events box is checked. 57 USER GUIDE Figure 28. Events occurred in component's operation The format for displaying events in the Event Log varies with the component or task. THE STATISTICS TAB Detailed statistics of File Anti-Virus operation or virus scan task execution are logged on this tab (see figure 29). Here you can learn: how many objects were scanned for viruses in this session by File Anti-Virus, or by the scan task (the number of scanned archives, compressed files, and password-protected and corrupted objects is also shown); how many dangerous objects were detected, and how many of them were deleted, quarantined, or not disinfected. Figure 29. Component statistics 58 REPORTS THE SETTINGS TAB The Settings tab gives a complete overview of the settings for File Anti-Virus's operation, including virus scan tasks and application updates (see figure 30). The tab also shows File Anti-Virus's general security level, which level virus scans are running at, and what actions are being taken on dangerous objects. To modify the settings, click the Preferences button. Figure 30. Component settings 59 NOTIFICATIONS During Kaspersky Anti-Virus operation, various types of events occur. They may be of an informative nature or contain important information. For example, an event can inform you on the successful completion of an application update or can detect an error in the operation of File Anti-Virus that should be eliminated immediately. During Kaspersky Anti-Virus operation, the following types of events occur: Critical notifications are events of a critical importance, notifications about which are highly recommended to receive, since they indicate problems in application's operation or vulnerabilities in protection of your computer: for example, application databases corrupted or license expired. Failure – events that make the application non-operable: for example, no license key and no application databases. Important events are events that should be paid attention to, since they reflect important situations in application's operation: for example, protection disabled or computer has not been scanned for viruses for a long time. Information notifications are reference-type messages, which as a rule do not contain important information: for example, all dangerous objects disinfected. In order to keep up with the events in Kaspersky Anti-Virus operation, you can use the notification service. Notices can be delivered in one of the following ways: pop-up messages on screen; audio message. To use this service, please do the following: 1. Open the application settings window and select the Appearance tab (see figure 3). 2. Check the Enable notifications in the Events notification section and switch to advanced settings by clicking the Additional button. In the window that will open (see figure 31) you may configure the following types of notices about events listed above: Pop-up message on screen, which contains an information about an event that has occurred. To use this notification type, check the box in the Balloon field next to the event you want to be notified of. Audio message. If you want this notice to be accompanied by a sound file, check the box in the Sound field next to the event name. Figure 31. Events in application operation and ways of notifying of them 60 HELP INFORMATION HELP INFORMATION This application contains the help information about the formats of files being scanned and allowed masks being used when configuring Kaspersky Anti-Virus settings. LIST OF OBJECTS TO SCAN BY EXTENSION If you have selected the Scan programs and documents (by extension) option as the range of anti-virus scan objects, then File Anti-Virus or scan tasks will make anti-virus scans of files with these extensions: com - Microsoft Windows executable file of size not larger than 64 KB. exe - executable file, Microsoft Windows self-unpacking archive. sys - Microsoft Windows system file. prg - dBase, Clipper or Microsoft Visual FoxPro text, WAVmaker package program. bin - Microsoft Windows binary file. bat - Microsoft Windows batch file. cmd - Microsoft Windows NT command file (as bat file for DOS), OS/2. dpl - Borland Delphi packed library. dll - Microsoft Windows dynamic-link library. scr - Microsoft Windows screen-saver file. cpl - Microsoft Windows control panel module. ocx - Microsoft OLE (Object Linking and Embedding) object. tsp - Microsoft Windows program that works in time-share mode. drv - driver for a Microsoft Windows device. vxd - driver for a Microsoft Windows virtual device. pif - Microsoft Windows file with information about a program. lnk - Microsoft Windows link file. reg - Microsoft Windows system registry key file. ini - Microsoft Windows initialization file. cla – Java class. vbs - Visual Basic script. vbe – BIOS video extension. js, jse - JavaScript source text. 61 USER GUIDE htm – hypertext document. htt - Microsoft Windows hypertext template. hta - hypertext program for Microsoft Internet Explorer. asp - Active Server Pages script. chm - compiled HTML file. pht - HTML file with embedded PHP scripts. php - script embedded in HTML files. wsh - Microsoft Windows Script Host file. wsf - Microsoft Windows script. the - Microsoft Windows 95 desktop theme file. hlp - help file in Win Help format. eml - Microsoft Outlook Express email message. nws - new Microsoft Outlook Express email message. msg - Microsoft Mail email message. plg – email message. mbx - extension for saved Microsoft Office Outlook message. doc* – Microsoft Office Word document, including: doc – Microsoft Office Word document, docx – Microsoft Office Word 2007 document supporting XML language, docm – Microsoft Office Word 2007 document supporting macros. dot* – Microsoft Office Word document template, including: dot – Microsoft Office Word document template, dotx – Microsoft Office Word 2007 document template, dotm – Microsoft Office Word 2007 document template supporting macros. fpm - database program, Microsoft Visual FoxPro start file. rtf - document in Rich Text Format. shs - Shell Scrap Object Handler object. dwg - AutoCAD drawing database. msi - Microsoft Windows Installer package. otm - VBA project for Microsoft Office Outlook. pdf - Adobe Acrobat document. swf - Shockwave Flash package object. jpg, jpeg, png - file in graphic format for storing compressed images. emf - file in Enhanced Metafile format. Next generation of Microsoft Windows metafile. 16-bit Microsoft Windows does not support EMF files. ico - object icon file. ov? - MS DOS executable files. 62 HELP INFORMATION xl* – Microsoft Office Excel documents and files, including: xla – Microsoft Office Excel extension, xlc – chart, xlt – document template, xlsx – Microsoft Office Excel 2007 workbook, xltm – Microsoft Office Excel 2007 workbook supporting macros, xlsb – Microsoft Office Excel 2007 workbook in binary (not XML) format, xltx – Microsoft Office Excel 2007 template, xlsm – Microsoft Office Excel 2007 template supporting macros, xlam – Microsoft Office Excel 2007 add-in supporting macros. pp* – Microsoft Office PowerPoint documents and files, including: pps – Microsoft Office PowerPoint slide, ppt – presentation, pptx – Microsoft Office PowerPoint 2007 presentation, pptm – Microsoft Office PowerPoint 2007 presentation supporting macros, potx – Microsoft Office PowerPoint 2007 presentation template, potm – Microsoft Office PowerPoint 2007 presentation template supporting macros, ppsx – Microsoft Office PowerPoint 2007 slide show, ppsm – Microsoft Office PowerPoint 2007 slide show supporting macros, ppam – Microsoft Office PowerPoint 2007 add-in supporting macros. md* - Microsoft Office Access documents and files, including: mda - Microsoft Office Access workgroup, mdb database, etc. sldx – Microsoft Office PowerPoint 2007 slide. sldm – Microsoft Office PowerPoint 2007 slide supporting macros. thmx – Microsoft Office 2007 theme. The actual file format may differ from that indicated in the file extension. ALLOWED FILE EXCLUSION MASKS There are several ways to create file masks when creating file exclusion lists: 1. 2. 3. Masks without file paths: *.zip - all files with the .zip extension *.zi? - all files with the zi? extension where ? can represent any single character test - all files named test Masks with absolute file paths: /dir/* or /dir/ - all files in the /dir/ folder /dir/*.zip - all files with the .zip extension in /dir/ folder /dir/*.zi? - all files with the zi? extension in the / D I R / /dir/test - only the single file /dir/test F older where ? can represent any single character Masks with relative file paths: dir/* or dir/ - all files in all folders called dir/ dir/test - all test files in dir/ folders dir/*.zip – all files with the zip extension in all dir/ folders dir/*.zi? - all files with the zi? extension in all dir/ folders where ? can represent any single character The * exclusion mask can only be used if you also assign a threat type to exclude, using the nomenclature of the Virus Encyclopedia. The result is that the application will not look for the specified threat in any objects. Using this mask without selecting a threat type essentially disables monitoring. 63 USER GUIDE ALLOWED EXCLUSION MASKS ACCORDING TO THE VIRUS ENCYCLOPEDIA CLASSIFICATION When adding a new threat exclusion using the Virus Encyclopedia classification, you can specify: Full name of the threat as stated in the Virus Encyclopedia at www.viruslist.com (e.g., not-avirus:RiskWare.RemoteAdmin.RA.311 or Flooder.Win32.Fuxx). The threat name by mask. For example: not-a-virus* - exclude legal but potentially dangerous programs from the scan, as well as joke programs. *Riskware.* - exclude riskware from the scan. *RemoteAdmin.* - exclude all remote administration programs from the scan. Examples of threat names may be viewed in the report window, on the Detected tab (see section "The Detected tab" on page 57), in the quarantine (see section "Quarantine" on page 51) and in the backup (see section "Backup" on page 54), and in the windows of notification (see section "Notifications" on page 60) of dangerous objects detection. 64 USING THIRD-PARTY CODE Third-party code was used during Kaspersky Anti-Virus development. CRYPTOEX LLC To create and verify digital signatures, Kaspersky Anti-Virus uses Crypto Ex LLC's data security software library, Crypto C. CryptoEx LLC holds a license from the Federal Agency for Government Communications and Information (a branch of the Federal Security Service) and the Crypto C data security software library certificate. CryptoEx LLC corporate website: http://www.cryptoex.ru Exclusive rights for data security software library are reserved by CryptoEx LLC. BOOST 1.30.0 LIBRARY The boost 1.30.0 copyright © 2003-2004, Beman Dawes, Daniel Frey, David Abrahams, copyright © 2004-2005, Rene Rivera. Boost Software License - Version 1.0 - August 17th, 2003 library was used during application development. Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation covered by this license (the «Software») to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following: The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machine-executable object code generated by a source language processor. THE SOFTWARE IS PROVIDED «AS IS», WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. LIBCURL 7.19.3 LIBRARY The libcurl 7.19.3 copyright © 1996-2009, Daniel Stenberg, [email protected] library was used during application development. All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED «AS IS», WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. 65 USER GUIDE LIBPNG 1.2.8 LIBRARY The libpng 1.2.8 copyright © 2004, 2006-2008 Glenn Randers-Pehrson library was used during application development. All rights reserved, under zlib/libpng license. This copy of the libpng notices is provided for your convenience. In case of any discrepancy between this copy and the notices in the file png.h that is included in the libpng distribution, the latter shall prevail. COPYRIGHT NOTICE, DISCLAIMER, and LICENSE: If you modify libpng you may insert additional notices immediately following this sentence. libpng version 1.2.6, December 3, 2004, is Copyright © 2004 Glenn Randers-Pehrson, and is distributed according to the same disclaimer and license as libpng-1.2.5 with the following individual added to the list of Contributing Authors: Cosmin Truta libpng versions 1.0.7, July 1, 2000, through 1.2.5 - October 3, 2002, are Copyright © 2000-2002 Glenn Randers-Pehrson, and are distributed according to the same disclaimer and license as libpng-1.0.6 with the following individuals added to the list of Contributing Authors: Simon-Pierre Cadieux, Eric S. Raymond, Gilles Vollant and with the following additions to the disclaimer: There is no warranty against interference with your enjoyment of the library or against infringement. There is no warranty that our efforts or the library will fulfill any of your particular purposes or needs. This library is provided with all faults, and the entire risk of satisfactory quality, performance, accuracy, and effort is with the user. libpng versions 0.97, January 1998, through 1.0.6, March 20, 2000, are Copyright © 1998, 1999 Glenn Randers-Pehrson, and are distributed according to the same disclaimer and license as libpng-0.96, with the following individuals added to the list of Contributing Authors: Tom Lane, Glenn Randers-Pehrson, Willem van Schaik. libpng versions 0.89, June 1996, through 0.96, May 1997, are Copyright © 1996, 1997 Andreas Dilger Distributed according to the same disclaimer and license as libpng-0.88, with the following individuals added to the list of Contributing Authors: John Bowler, Kevin Bracey, Sam Bushell, Magnus Holmgren, Greg Roelofs, Tom Tanner. libpng versions 0.5, May 1995, through 0.88, January 1996, are Copyright © 1995, 1996 Guy Eric Schalnat, Group 42, Inc. For the purposes of this copyright and license, «Contributing Authors» is defined as the following set of individuals: Andreas Dilger, Dave Martindale, Guy Eric Schalnat, Paul Schmidt, Tim Wegner. The PNG Reference Library is supplied «AS IS». The Contributing Authors and Group 42, Inc. disclaim all warranties, expressed or implied, including, without limitation, the warranties of merchantability and of fitness for any purpose. The Contributing Authors and Group 42, Inc. assume no liability for direct, indirect, incidental, special, exemplary, or consequential damages, which may result from the use of the PNG Reference Library, even if advised of the possibility of such damage. Permission is hereby granted to use, copy, modify, and distribute this source code, or portions hereof, for any purpose, without fee, subject to the following restrictions: 1. The origin of this source code must not be misrepresented. 2. Altered versions must be plainlymarked as such and must not be misrepresented as being the original source. 3. This Copyright notice may not be removed or altered from any source or altered source distribution. The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the use of this source code as a component to supporting the PNG file format in commercial products. If you use this source code in a product, acknowledgment is not required but would be appreciated. A «png_get_copyright» function is available, for convenient use in «about» boxes and the like: printf(«%s»,png_get_copyright(NULL)); Also, the PNG logo (in PNG format, of course) is supplied in the files «pngbar.png» and «pngbar.jpg (88x31) and “pngnow.png” (98x31). Libpng is OSI Certified Open Source Software. OSI Certified Open Source is a certification mark of the Open Source Initiative. Glenn Randers-Pehrson, glennrp at users.sourceforge.net December 3, 2004 66 USING THIRD-PARTY CODE LIBC LIBRARY The libс copyright © 2009 Free Software Foundation, Inc library was used during application development. GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright © 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The “Program”, below, refers to any such program or work, and a “work based on the Program” means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term “modification”.) Each licensee is addressed as “you”. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its 67 USER GUIDE contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, andyou may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a. You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b. You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a. Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b. Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c. Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. 68 USING THIRD-PARTY CODE If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 69 USER GUIDE 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found. <one line to give the program's name and a brief idea of what it does.> Copyright © <year> <name of author> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright © year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouseclicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a “copyright disclaimer” for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice 70 USING THIRD-PARTY CODE This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright © 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below. When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license. Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. 71 USER GUIDE We call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run. GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”. A “library” means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The “Library”, below, refers to any such software library or work which has been distributed under these terms. A “work based on the Library” means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term “modification”.) “Source code” for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a. The modified work must itself be a software library. b. You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c. You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. 72 USING d. THIRD-PARTY CODE If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a “work that uses the Library” with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a “work that uses the library”. The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 73 USER 6. GUIDE As an exception to the Sections above, you may also combine or link a “work that uses the Library” with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a. Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b. Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c. Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d. If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e. Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a. Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b. Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. 74 USING THIRD-PARTY CODE 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 75 USER GUIDE END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found. <one line to give the library's name and a brief idea of what it does.> Copyright © <year> <name of author> This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. You should also get your employer (if you work as a programmer) or your school, if any, to sign a “copyright disclaimer” for the library, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker. <signature of Ty Coon>, 1 April 1990 Ty Coon, President of Vice That's all there is to it! LIBSTDC++ LIBRARY The libstdt++ copyright © 2009 Free Software Foundation, Inc. library was used during application development GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too. 76 USING THIRD-PARTY CODE When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things. To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it. For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions. Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations. To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work. A “covered work” means either the unmodified Program or a work based on the Program. To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well. To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying. An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion. 77 USER 1. GUIDE Source Code. The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work. A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language. The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it. The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law. You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you. Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 3. Protecting Users' Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures. When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program. 78 USING THIRD-PARTY CODE You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 5. Conveying Modified Source Versions. You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: a. The work must carry prominent notices stating that you modified it, and giving a relevant date. b. The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”. c. You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it. d. If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate. 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a. Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange. b. Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. c. Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d. Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements. e. Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d. A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a 79 USER GUIDE particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product. “Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made. If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM). The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network. Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying. 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions. When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a. Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or b. Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or c. Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or d. Limiting the use for publicity purposes of names of licensors or authors of the material; or e. Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or f. Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors. All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying. 80 USING THIRD-PARTY CODE If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms. Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way. 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10. 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so. 10. Automatic Licensing of Downstream Recipients. Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License. An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”. A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License. Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. 81 USER GUIDE In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party. If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid. If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it. A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007. Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law. 12. No Surrender of Others' Freedom. If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program. 13. Use with the GNU Affero General Public License. Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. 82 USING THIRD-PARTY CODE Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. Limitation of Liability. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found. <one line to give the program's name and a brief idea of what it does.> Copyright © <year> <name of author> This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. Also add information on how to contact you by electronic and paper mail. If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode: <program> Copyright © <year> <name of author> This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 83 USER GUIDE This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, your program's commands might be different; for a GUI interface, you would use an “about box”. You should also get your employer (if you work as a programmer) or school, if any, to sign a “copyright disclaimer” for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see <http://www.gnu.org/licenses/>. The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www.gnu.org/philosophy/why-not-lgpl.html>. GCC RUNTIME LIBRARY EXCEPTION Version 3.1, 31 March 2009, Copyright © 2009 Free Software Foundation, Inc. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. This GCC Runtime Library Exception (“Exception”) is an additional permission under section 7 of the GNU General Public License, version 3 (“GPLv3”). It applies to a given file (the “Runtime Library”) that bears a notice placed by the copyright holder of the file stating that the file is governed by GPLv3 along with this Exception. When you use GCC to compile a program, GCC may combine portions of certain GCC header files and runtime libraries with the compiled program. The purpose of this Exception is to allow compilation of non-GPL (including proprietary) programs to use, in this way, the header files and runtime libraries covered by this Exception. 0. Definitions. A file is an “Independent Module” if it either requires the Runtime Library for execution after a Compilation Process, or makes use of an interface provided by the Runtime Library, but is not otherwise based on the Runtime Library. “GCC” means a version of the GNU Compiler Collection, with or without modifications, governed by version 3 (or a specified later version) of the GNU General Public License (GPL) with the option of using any subsequent versions published by the FSF. “GPL-compatible Software” is software whose conditions of propagation, modification and use would permit combination with GCC in accord with the license of GCC. “Target Code” refers to output from any compiler for a real or virtual target processor architecture, in executable form or suitable for input to an assembler, loader, linker and/or execution phase. Notwithstanding that, Target Code does not include data in any format that is used as a compiler intermediate representation, or used for producing a compiler intermediate representation. The “Compilation Process” transforms code entirely represented in non-intermediate languages designed for humanwritten code, and/or in Java Virtual Machine byte code, into Target Code. Thus, for example, use of source code generators and preprocessors need not be considered part of the Compilation Process, since the Compilation Process can be understood as starting with the output of the generators or preprocessors. A Compilation Process is “Eligible” if it is done using GCC, alone or with other GPL-compatible software, or if it is done without using any work based on GCC. For example, using non-GPL-compatible Software to optimize any GCC intermediate representations would not qualify as an Eligible Compilation Process. 1. Grant of Additional Permission. You have permission to propagate a work of Target Code formed by combining the Runtime Library with Independent Modules, even if such propagation would otherwise violate the terms of GPLv3, provided that all Target Code was generated by Eligible Compilation Processes. You may then convey such a combination under terms of your choice, consistent with the licensing of the Independent Modules. 2. No Weakening of GCC Copyleft. The availability of this Exception does not imply any general presumption that third-party software is unaffected by the copyleft requirements of the license of GCC. Hopefully that text is self-explanatory. If it isn't, you need to speak to your lawyer, or the Free Software Foundation. 84 USING THIRD-PARTY CODE EXPAT 1.2 LIBRARY The Еxpat 1.2 Copyright © 1998, 1999, 2000 Thai Open Source Software Center Ltd library was used during application development. All rights reserved, used under the following conditions: Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. GROWL 1.1.5 The Growl 1.1.5 Copyright © 2004, The Growl Project library was used during application development. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of Growl nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. INFO-ZIP 5.51 LIBRARY This is version 2007-Mar-4 of the Info-ZIP license. The definitive version of this document should be available at ftp://ftp.info-zip.org/pub/infozip/license.html indefinitely and a copy at http://www.info-zip.org/pub/infozip/license.html. The Info-ZIP Copyright © 1990-2007, Info-ZIP 5.51 library was used during application development. All rights reserved, under the Info-ZIP license. For the purposes of this copyright and license, “Info-ZIP” is defined as the following set of individuals: Mark Adler, John Bush, Karl Davis, Harald Denker, Jean-Michel Dubois, Jean-loup Gailly, Hunter Goatley, Ed Gordon, Ian Gorman, Chris Herborth, Dirk Haase, Greg Hartwig, Robert Heath, Jonathan Hudson, Paul Kienitz, David Kirschbaum, Johnny Lee, Onno van der Linden, Igor Mandrichenko, Steve P. Miller, Sergio Monesi, Keith Owens, George Petrov, Greg Roelofs, Kai Uwe Rommel, Steve Salisbury, Dave Smith, Steven M. Schweda, Christian Spieler, Cosmin Truta, Antoine Verheijen, Paul von Behren, Rich Wales, Mike White. 85 USER GUIDE This software is provided “as is,” without warranty of any kind, express or implied. In no event shall Info-ZIP or its contributors be held liable for any direct, indirect, incidental, special or consequential damages arising out of the use of or inability to use this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the above disclaimer and the following restrictions: 1. Redistributions of source code (in whole or in part) must retain the above copyright notice, definition, disclaimer, and this list of conditions. 2. Redistributions in binary form (compiled executables and libraries) must reproduce the above copyright notice, definition, disclaimer, and this list of conditions in documentation and/or other materials provided with the distribution. The sole exception to this condition is redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a self-extracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled. 3. Altered versions--including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, versions with modified or added functionality, and dynamic, shared, or static library versions not from Info-ZIP--must be plainly marked as such and must not be misrepresented as being the original source or, if binaries, compiled from the original source. Such altered versions also must not be misrepresented as being Info-ZIP releases--including, but not limited to, labeling of the altered versions with the names “Info-ZIP” (or any variation thereof, including, but not limited to, different capitalizations), “Pocket UnZip,” “WiZ” or “MacZip” without the explicit permission of Info-ZIP. Such altered versions are further prohibited from misrepresentative use of the Zip-Bugs or Info-ZIP e-mail addresses or the Info-ZIP URL(s), such as to imply Info-ZIP will provide support for the altered versions. 4. Info-ZIP retains the right to use the names “Info-ZIP,” “Zip,” “UnZip, “UnZipSFX,” “WiZ,” “Pocket UnZip,” “Pocket Zip,” and “MacZip” for its own source and binary releases. LZMA SDK 4.43 LIBRARY Copyright © 1999-2006, Igor Pavlov. RFC1321 LIBRARY-BASED (RSA-FREE) MD5 LIBRARY The RFC1321-based (RSA-free) MD5 library Copyright © 1999, 2002 Aladdin Enterprises library was used during application development. All rights reserved. All right reserved, under zlib/libpng license. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. L. Peter Deutsch 86 USING THIRD-PARTY CODE ZLIB 1.2 LIBRARY The zlib 1.2 copyright © 1995-2005 Jean-loup Gailly and Mark Adler library was used during application development. All rights reserved under zlib/libpng license. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. GCC 4.0.1 LIBRARY The GCC 4.0.1 copyright © 1987, 1989, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc library was used during application development GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright © 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. 87 USER GUIDE Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The “Program”, below, refers to any such program or work, and a “work based on the Program” means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term “modification”.) Each licensee is addressed as “you”. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a. You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b. You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: 88 USING THIRD-PARTY CODE a. Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b. Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c. Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 89 USER 9. GUIDE The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found. <one line to give the program's name and a brief idea of what it does.> Copyright © <year> <name of author> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright © year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. 90 USING THIRD-PARTY CODE The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouseclicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a “copyright disclaimer” for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright © 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below. When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. 91 USER GUIDE Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license. Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. We call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run. GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”. A “library” means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The “Library”, below, refers to any such software library or work which has been distributed under these terms. A “work based on the Library” means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term “modification”.) “Source code” for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and 92 USING THIRD-PARTY CODE disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a. The modified work must itself be a software library. b. You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c. You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d. If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. 93 USER GUIDE However, linking a “work that uses the Library” with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a “work that uses the library”. The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 6. As an exception to the Sections above, you may also combine or link a “work that uses the Library” with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a. Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b. Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c. Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d. If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e. Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: 94 USING THIRD-PARTY CODE a. Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b. Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. 95 USER GUIDE NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found. <one line to give the library's name and a brief idea of what it does.> Copyright © <year> <name of author> This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. You should also get your employer (if you work as a programmer) or your school, if any, to sign a “copyright disclaimer” for the library, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker. <signature of Ty Coon>, 1 April 1990 Ty Coon, President of Vice That's all there is to it! The described above libraries are distributed with our product and licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. If such licenses require that for any software, which is distributed to someone in an executable binary format, that the source code also be made available to those users, then the source code should be made available by sending the request to [email protected]. SOUND EFFECTS LIBRARY Sound effects are provide by www.sound-effects-library.com. 96 KASPERSKY LAB Kaspersky Lab was founded in 1997. Today it is the leading Russian developer of a wide range of high-performance information security software products, including anti-virus, anti-spam and anti-hacking systems. Kaspersky Lab is an international company. Headquartered in the Russian Federation, the company has offices in the United Kingdom, France, Germany, Japan, the Benelux countries, China, Poland, Romania and the USA (California). A new company office, the European Anti-Virus Research Centre, has recently been established in France. Kaspersky Lab's partner network includes over 500 companies worldwide. Today, Kaspersky Lab employs over a thousand highly qualified specialists, including 10 MBA degree holders and 16 PhD degree holders. All Kaspersky Lab's senior anti-virus experts are members of the Computer Anti-Virus Researchers Organization (CARO). Our company's most valuable assets are the unique knowledge and collective expertise accumulated during fourteen years of continuous battle against computer viruses. Thorough analysis of computer virus activities enables the company's specialists to anticipate trends in the development of malware, and to provide our users with timely protection against new types of attacks. This advantage is the basis of Kaspersky Lab's products and services. The company's products remain one step ahead of other vendors in delivering comprehensive anti-virus coverage to our clients. Years of hard work have made the company one of the top anti-virus software developers. Kaspersky Lab was the first to develop many of the modern standards for anti-virus software. The company's flagship product, Kaspersky Anti-Virus®, reliably protects all types of computer systems against virus attacks, including workstations, file servers, mail systems, firewalls, Internet gateways and hand-held computers. Its easy-to-use management tools maximize the automation of anti-virus protection for computers and corporate networks. A large number of developers worldwide use the Kaspersky Anti-Virus kernel in their products, including Nokia ICG (USA), Aladdin (Israel), Sybari (USA), G Data (Germany), Deerfield (USA), Alt-N (USA), Microworld (India), and BorderWare (Canada). Kaspersky Lab's customers enjoy a wide range of additional services that ensure both stable operation of the company's products, and full compliance with the customer‟s specific business requirements. We design, implement and support corporate anti-virus systems. Kaspersky Lab's anti-virus database is updated every hour. The company provides its customers with 24-hour technical support service in several languages. If you have any questions, comments, or suggestions, you can contact us through our dealers, or at Kaspersky Lab directly. We will be glad to assist you, via phone or email, in any matters related to our products. You will receive full and comprehensive answers to all your questions. Kaspersky Lab official site: http://www.kaspersky.com Virus Encyclopedia: http://www.viruslist.com Anti-virus laboratory: [email protected] (only for sending archives of suspicious objects) http://support.kaspersky.ru/virlab/helpdesk.html?LANG=en (for queries to virus analysts) Kaspersky Lab forum http://forum.kaspersky.com 97 LICENSE AGREEMENT IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE YOU START USING THE SOFTWARE. BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, CANCEL THE INSTALLATION OF THE SOFTWARE AND DO NOT INSTALL THE SOFTWARE. AFTER CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW YOU HAVE THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THIS AGREEMENT. 1. Definitions 1.1. Software means software, user manual, related explanatory or other materials, including any Updates. 1.2. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means Kaspersky Lab ZAO, a company incorporated according to the laws of the Russian Federation. 1.3. Computer(s) means hardware(s), including personal computers, laptops, workstations, personal digital assistants, „smart phones‟, hand-held devices, or other electronic devices for which the Software was designed where the Software will be installed. 1.4. End User (You/Your) means individual(s) installing or using the Software on his or her own behalf or who is legally using a copy of the Software; or, if the Software is being downloaded or installed on behalf of an organization, such as an employer, “You” further means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. For purposes hereof the term “organization” without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority. 1.5. Partner(s) means organizations or individual(s), who distributes the Software based on an agreement and license with the Rightholder. 1.6. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions or maintenance packs etc. 2. Grant of License 2.1. The Rightholder hereby grants You a non-exclusive license to store, load, install, execute, and display (to “use”) the Software on a specified number of Computers in order to assist in protecting Your Computer on which the Software is installed, from threats described in the user manual according to the terms and conditions of this Agreement (the “License”) and you accept this License: Trial Version. If you have received, downloaded and/or installed a trial version of the Software and are hereby granted an evaluation license for the Software, you may use the Software only for evaluation purposes and only during the single applicable evaluation period, unless otherwise indicated, from the date of the initial installation. Any use of the Software for other purposes or beyond the applicable evaluation period is strictly prohibited. Multiple Environment Software; Multiple Language Software; Dual Media Software; Multiple Copies; Bundles. If you use different versions of the Software or different language editions of the Software, if you receive the Software on multiple media, if you otherwise receive multiple copies of the Software, or if you received the Software bundled with other software, the total permitted number of your Computers on which all versions of the Software are installed shall correspond to the number of licenses you have obtained from the Rightholder provided that unless the licensing terms provide otherwise, each purchased license entitles you to install and use the Software on such a number of Computer(s) as is specified in Clauses 2.2 and 2.3. 98 LICENSE AGREEMENT 2.2. If the Software was purchased on a physical medium You have the right to use the Software for protection of such a number of Computer(s) as is specified on the Software package. 2.3. If the Software was purchased via the Internet You have the right to use the Software for protection of such a number of Computers that was specified when You purchased the License to the Software. 2.4. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for other purposes and must be destroyed when you lose the right to use the Software or when Your license expires or is terminated for any other reason according to the legislation in force in the country of your principal residence or in the country where You are using of the Software. You can transfer the non-exclusive license to use the Software to other individuals or legal entities within the scope of the license granted from the Rightholder to You provided that the recipient agrees to be bound by all the terms and conditions of this Agreement and substitute you in full in the license granted from the Rightholder. In case You fully transfer the rights granted from the Rightholder to use the Software You must destroy all copies of the Software including the back-up copy. If You are a recipient of a transferred license You must agree to abide by all the terms and conditions of this Agreement. If You do not agree to be bound by all the terms and conditions of this Agreement, You may not install and/or use the Software. You also agree as the recipient of a transferred license that You do not have any additional or better rights than what the original End User who purchased the Software from the Rightholder. 2.5. From the time of the Software activation (with the exception of a trial version of the Software) You have the right to receive the following services for the defined period specified on the Software package (if the Software was purchased on a physical medium) or specified during purchase (if the Software was purchased via the Internet): - Updates of the Software via the Internet when and as the Rightholder publishes them on its website or through other online services. Any Updates that you may receive become part of the Software and the terms and conditions of this Agreement apply to them; - Technical Support via the Internet and Technical Support telephone hotline. 3. Activation and Term 3.1. If You modify Your Computer or make changes to other vendors‟ software installed on it, You may be required by the Rightholder to repeat activation of the Software. The Rightholder reserves the right to use any means and verification procedures to verify the validity of the License and/or legality of a copy of the Software installed and/or used on Your Computer. 3.2. If the Software was purchased on a physical medium, the Software can be used, upon your acceptance of this Agreement, for the period that is specified on the package commencing upon acceptance of this Agreement. 3.3. If the Software was purchased via the Internet, the Software can be used, upon your acceptance of this Agreement, for the period that was specified during purchase. 3.4. You have the right to use a trial version of the Software as provided in Clause 2.1 without any charge for the single applicable evaluation period from the time of the Software activation according to this Agreement provided that the trial version does no entitle You Updates and Technical support via the Internet and Technical support telephone hotline. 3.5. Your License to Use the Software is limited to the period of time as specified in Clauses 3.2 or 3.3 (as applicable) and the remaining period can be viewed using the Software's graphical user interface. 3.6. Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event of any breach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time without notice to You be entitled to terminate this License to use the Software without refunding the purchase price or any part thereof. 3.7. You agree that in using the Software and in using any report or information derived as a result of using this Software, you will comply with all applicable international, national, state, regional and local laws and regulations, including, without limitation, privacy, copyright, export control and obscenity law. 3.8. Except as otherwise specifically provided herein, you may not transfer or assign any of the rights granted to you under this Agreement or any of your obligations pursuant hereto. 99 USER 4. GUIDE Technical Support The Technical Support described in Clause 2.5 of this Agreement is provided to You when the latest Update of the Software is installed (except for a trial version of the Software). 5. Information Collection 5.1. Having agreed with the terms and conditions of this Agreement You consent to provide information to the Rightholder about executable files and their checksums to improve Your security protection level. 5.2. In order to improve security awareness about new threats and their sources and in order to improve Your security protection level the Rightholder, with your consent, that has been explicitly confirmed in the Kaspersky Security Network Data Collection Statement, is expressly entitled to receives such information. You can deactivate the Kaspersky Security Network service during installation. Also, You can activate and deactivate the Kaspersky Security Network service at any time in the Software options page. You further acknowledge and agree that any information gathered by Rightholder can be used to track and publish reports on security risk trends in the Rightholder‟s sole and exclusive discretion. 5.3. The Software does not process any personally identifiable data and does not combine the processing data with any personal information. 5.4. If you do not wish for the information collected by the Software to be sent to the Rightholder, You should not activate and/or de-activate the Kaspersky Security Network service. 6. Limitations 6.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any party of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law. Neither Software‟s binary code nor source may be used or reverse engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the License granted hereunder and may result in criminal and/or civil prosecution against You. 6.2. You shall not transfer the rights to use the Software to any third party except as set forth in Clause 2.4 of this Agreement. 6.3. You shall not provide the activation code and/or license key file to third parties or allow third parties access to the activation code and/or license key which are deemed confidential data of Rightholder and you shall exercise reasonable care in protecting the activation code and/or license key in confidence provided that you can transfer the activation code and/or license key to third parties as set forth in Clause 2.4 of this Agreement. 6.4. You shall not rent, lease or lend the Software to any third party. 6.5. You shall not use the Software in the creation of data or software used for detection, blocking or treating threats described in the user manual. 6.6. The Rightholder has the right to block the key file or to terminate Your License to use the Software in the event You breach any of the terms and conditions of this Agreement and without any refund to You. 6.7. If You are using the trial version of the Software You do not have the right to receive the Technical Support specified in Clause 4 of this Agreement and You don‟t have the right to transfer the license or the rights to use the Software to any third party. 7. Limited Warranty and Disclaimer 7.1. The Rightholder guarantees that the Software will substantially perform according to the specifications and descriptions set forth in the user manual provided however that such limited warranty shall not apply to the following: (w) Your Computer‟s deficiencies and related infringement for which Rightholder‟s expressly disclaims any warranty responsibility; (x) malfunctions, defects, or failures resulting from misuse; abuse; accident; neglect; improper installation, operation or maintenance; theft; vandalism; acts of God; acts of terrorism; power failures 100 LICENSE AGREEMENT or surges; casualty; alteration, non-permitted modification, or repairs by any party other than Rightholder; or any other third parties‟ or Your actions or causes beyond Rightholder‟s reasonable control; (y) any defect not made known by You to Rightholder as soon as practical after the defect first appears; and (z) incompatibility caused by hardware and/or software components installed on Your Computer. 7.2. You acknowledge, accept and agree that no software is error free and You are advised to back-up the Computer, with frequency and reliability suitable for You. 7.3. The Rightholder does not provide any guarantee that the Software will work correctly in case of violations of the terms described in the user manual or in this Agreement. 7.4. The Rightholder does not guarantee that the Software will work correctly if You do not regularly download Updates specified in Clause 2.5 of this Agreement. 7.5. The Rightholder does not guarantee protection from the threats described in the user manual after the expiration of the period specified in Clauses 3.2 or 3.3 this Agreement or after the License to use the Software is terminated for any reason. 7.6. THE SOFTWARE IS PROVIDED "AS IS" AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESS OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DICLOSED TO THE RIGHTHOLDER. 8. Exclusion and Limitation of Liability TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATON, SOFTWARE, AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOU AGREE THAT IN THE EVENT THE RIGHTHOLDER AND/OR ITS PARTNERS ARE FOUND LIABILE, THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS SHALL BE LIMITED BY THE COSTS OF THE SOFTWARE. IN NO CASE SHALL THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS EXCEED THE FEES PAID FOR THE SOFTWARE TO THE RIGHTHOLDER OR THE PARTNER (AS MAY BE APPLICABLE). NOTHING IN THIS AGREEMENT EXCLUDES OR LIMITS ANY CLAIM FOR DEATH AND PERSONAL INJURY. FURTHER IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE EXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS. 101 USER 9. GUIDE GNU and Other Third Party Licenses The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code (“Open Source Software”). If such licenses require that for any software, which is distributed to someone in an executable binary format, that the source code also be made available to those users, then the source code should be made available by sending the request to [email protected]. If any Open Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein. 10. Intellectual Property Ownership 10.1 You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States, as well as other countries and international treaties. This Agreement does not grant to You any rights to the intellectual property including any the Trademarks or Service Marks of the Rightholder and/or its partners (“Trademarks”). You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner‟s name. Such use of any Trademark does not give you any rights of ownership in that Trademark. The Rightholder and/or its partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software. Except as stated herein, this Agreement does not grant you any intellectual property rights in the Software and you acknowledge that the License, as further defined herein, granted under this Agreement only provides you with a right of limited use under the terms and conditions of this Agreement. Rightholder reserves all rights not expressly granted to you in this Agreement. 10.2 You acknowledge that the source code, activation code and/or license key file for the Software are proprietary to the Rightholder and constitutes trade secrets of the Rightholder. You agree not to modify, adapt, translate, reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Software in any way. 10.3 You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software. 11. Governing Law; Arbitration This Agreement will be governed by and construed in accordance with the laws of the Russian Federation without reference to conflicts of law rules and principles. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded. Any dispute arising out of the interpretation or application of the terms of this Agreement or any breach thereof shall, unless it is settled by direct negotiation, be settled by in the Tribunal of International Commercial Arbitration at the Russian Federation Chamber of Commerce and Industry in Moscow, the Russian Federation. Any award rendered by the arbitrator shall be final and binding on the parties and any judgment on such arbitration award may be enforced in any court of competent jurisdiction. Nothing in this Section 11 shall prevent a Party from seeking or obtaining equitable relief from a court of competent jurisdiction, whether before, during or after arbitration proceedings. 12. Period for Bringing Actions. No action, regardless of form, arising out of the transactions under this Agreement, may be brought by either party hereto more than one (1) year after the cause of action has occurred, or was discovered to have occurred, except that an action for infringement of intellectual property rights may be brought within the maximum applicable statutory period. 13. Entire Agreement; Severability; No Waiver. This Agreement is the entire agreement between you and Rightholder and supersedes any other prior agreements, proposals, communications or advertising, oral or written, with respect to the Software or to subject matter of this Agreement. You acknowledge that you have read this Agreement, understand it and agree to be bound by its terms. If any provision of this Agreement is found by a court of competent jurisdiction to be invalid, void, or unenforceable for any 102 LICENSE AGREEMENT reason, in whole or in part, such provision will be more narrowly construed so that it becomes legal and enforceable, and the entire Agreement will not fail on account thereof and the balance of the Agreement will continue in full force and effect to the maximum extent permitted by law or equity while preserving, to the fullest extent possible, its original intent. No waiver of any provision or condition herein shall be valid unless in writing and signed by you and an authorized representative of Rightholder provided that no waiver of any breach of any provisions of this Agreement will constitute a waiver of any prior, concurrent or subsequent breach. Rightholder‟s failure to insist upon or enforce strict performance of any provision of this Agreement or any right shall not be construed as a waiver of any such provision or right. 14. Contact Information. Should you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason, please contact our Customer Service Department at: Kaspersky Lab, 10/1 1st Volokolamsky Proezd Moscow, 123060 Russian Federation Tel: +7-495-797-8700 Fax: +7-495-645-7939 Email: [email protected] Website: www.kaspersky.com © 2009 Kaspersky Lab ZAO. All Rights Reserved. The Software and any accompanying documentation are copyrighted and protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. 103 ">
Advertisement
Key features
- Real-time file system protection
- Scheduled virus scans
- Automatic updates
- Quarantine for infected files
- Backup creation
- Detailed reports
- User-friendly interface
Frequently asked questions
The minimum system requirements for Kaspersky Anti-Virus for Mac are: Intel-based Macintosh computer, 512 MB free RAM, 100 MB free hard drive space, Mac OS X 4/10/11 operating system, or higher.
You can scan your computer for viruses by opening the main application window and clicking the ''Run a virus scan'' button.
To update the antivirus databases, click the ''Run application update'' button in the main application window.