Showing posts with label History. Show all posts
Showing posts with label History. Show all posts
 

History of Norton Internet Security

Jun 12, 2011

We all know that the world (especially in the tech world) is changing so fast that we do not even have time to see how these changes occur. And all that yesterday seemed to be an innovation tomorrow will be history — the history that is the basis for progress and future technologies. And probably, the software is one of the most rapidly growing areas where almost every day you can see „new changes”.

In this post, I want to write a brief history of the Norton Internet Security, more precisely, the key features of this security suite, which were designed from its inception to the present day. In addition, I add a brief description of the product, the product box image and information about the press release, with which you can find more detailed use information.

I hope this article will help you notice how Norton Internet Security has progressed and changed with each version, and also see the whole history of the Norton Internet Security, which comprises more than one decade — starting with Norton Internet Security 2000 until latest version.

How to Login to Norton Account

Feb 18, 2011

If you are not familiar with the Norton Account, first of all I want to note that My Norton Account is a free online „service”, through which everyone can get the latest product updates, access online features and services, protect additional computers, view Norton Product Keys and benefit from various special offers for Norton customers only.

Norton Account includes the following features:

  • Products — View all of your registered Norton products and services;
  • Order History — View details of your online orders, including order status, payment status, amount paid, and the Norton products and services purchased.
  • Profile — Keep your personal and billing information up-to-date by editing your Profile.
  • Change Password — Maintain your Norton Account security by periodically changing your password.
  • Special Offers — Take advantage of promotions, discounts, and special offers that are provided to Norton Account holders.
To access Norton Account features and services, you must sign in using your Norton Account login and password. If you have not registered yet, you need to create your Norton Account, which takes only a few minutes.

Black Hat

Aug 14, 2010

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. The environment is strictly vendor-neutral and focused on the sharing of practical insights and timely, actionable knowledge. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape.

In addition to the large number of short, topical presentations in the Briefings, Black Hat also provides hands-on, high-intensity, multi-day Trainings. The Training sessions are provided by some of the most respected experts in the world and many also provide formal certifications to qualifying attendees. Arrangements can also be made to bring Black Hat’s trainers to your location for private and customized training.

Turn off or turn on Intrusion Prevention notifications

May 25, 2010

You can choose whether you want to receive notifications when Intrusion Prevention blocks suspected attacks. Whether or not you receive notifications, Intrusion Prevention activities are recorded in Security History. The Security History entries include information about the attacking computer and information about the attack.

You can choose whether you want to receive notifications when Intrusion Prevention blocks suspected attacks based on a particular signature.

Add Rule Wizard

May 16, 2010

The Add Rule Wizard leads you through the steps that are necessary to create firewall rules.

Review Auto-Protect notifications

May 3, 2010

Auto-Protect scans files for viruses, worms, and Trojan horses when you perform an action with them, such as moving them, copying them, or opening them.

It also scans for spyware, adware, and other security risks.

If Auto-Protect detects suspicious activity, it logs a notification in Security History that tells you that a risk was found and resolved.

User-Specified Programs

May 1, 2010

Norton Internet Security automatically turns on Quiet Mode when it detects a TV program recording session or a disk-burning session. In addition, you can manually add the programs for which you want Norton Internet Security to turn on Quiet Mode to the Quiet Mode Programs list. When Norton Internet Security detects a running instance of a program that you added in the list, it automatically turns on Quiet Mode. When Quiet Mode is turned on, Norton Internet Security suspends the background activities but does not suppress alerts and notifications.

You can also add a running program to the Quiet Mode Programs list. However when you add a running program, Norton Internet Security does not detect the current running instance of the program to turn on Quiet Mode. Norton Internet Security turns on Quiet Mode the next time when you execute the program.

Silent Mode

Apr 30, 2010

Norton Internet Security provides many solutions and features to handle viruses and other security threats. Norton Internet Security displays alerts and notifications to inform you how viruses and other security threats are detected and resolved. When you perform important tasks on your computer, you likely prefer not to receive any alert messages. Norton Internet Security suppresses alerts and notifications and temporarily suspends most of the background activities based on the type of Silent Mode that is turned on.

Viewing details of system activities

Apr 18, 2010

System Insight lets you view details of the system activities that you performed or that occurred over the last three months in the Performance window. The activities include application installations, application downloads, disk optimizations, threat detections, or Quick Scans. You can use the tabs at the top of the Events graph to obtain details for the current month and for the last two months. The Events graph at the top of the Performance window displays each activity as icon or stripe. The description for each icon or stripe appears at the bottom of the graph. The pop-up that appears when you move the pointer over an icon provides you the details about the activity.

 
Subscribe to: Comments (Atom)
 

AltStyle によって変換されたページ (->オリジナル) /