[. . . ] Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission of Kaspersky Lab. This document and graphic images related to it may be used exclusively for informational, non-commercial, and personal purposes. You can find the latest version of this document at the Kaspersky Lab website, at http://www. kaspersky. com/docs. Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this document for which the rights are held by third parties, or for any potential damages associated with the use of such documents. [. . . ] Port scans can tell a hacker what types of attacks work on that system, and what types do not. In addition, the information obtained by the scan (a model of the system) helps the malefactor to know what operating system the remote computer uses. This, in turn, further restricts the number of potential attacks, and, correspondingly, the time spent perpetrating them. It also aids a hacker in attempting to use vulnerabilities characteristic of the operating system. DoS attacks, or Denial of Service attacks are attacks which cause an unstable performance of a system or its crash. Attacks of this type may affect the operability of information resources under attack (for example, blocking Internet access). There are two basic types of DoS attacks: sending the target computer specially created packets that the computer does not expect, which cause the system either to restart or to stop; sending the target computer many packets within a timeframe that the computer cannot process, which causes system resources to be exhausted. The most flagrant examples for this group of attacks are the following types: The Ping of death attack consists of sending an ICMP packet with a size greater than the maximum of 64 KB. Land attack consists of sending a request to an open port on the target computer to establish a connection with itself. This attack sends the computer into a cycle, which intensifies the load on the processor and can lead to the crashing of some operating systems. The ICMP Flood attack consists of sending a large quantity of ICMP packets to your computer. In the right part of the window, in the Online activity section, click the Network Monitor link to open the Network Monitor window. Select the blocked computer on the Blocked computers tab and unlock it using the Unblock link. 4. ENCRYPTED CONNECTIONS SCAN Connecting using the SSL/TLS protocols protects data exchange channel on the Internet. The SSL/TLS protocols allows identifying the parties exchanging data using electronic certificates, encoding the data being transferred, and ensuring their integrity during the transfer. These features of the protocol are used by hackers to spread malicious programs, since most antivirus applications do not scan SSL/TLS traffic. Kaspersky Small Office Security scans encrypted connections using a Kaspersky Lab's certificate. If an invalid certificate is detected when connecting to the server (for example, if the certificate is replaced by an intruder), a notification will pop up containing a suggestion to either accept or reject the certificate. If you are sure that connection with a website is always secure, in spite of an invalid certificate, you can add the website into the list of trusted URLs. Kaspersky Small Office Security will no longer scan the encrypted connection with this website. In the left part of the window, in the Protection Center section, select the Network subsection. In the right part of the window, check the Scan encrypted connections box and click the Install certificate button. This will start a wizard with instructions to follow for a successful installation of the certificate. 5. The automatic installation of the certificate will only be available in Microsoft Internet Explorer. [. . . ] 204 private data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 quick launch of functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 user name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 R Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]