Norton Internet Security logo

Turn on or turn off Silent Mode manually

Apr 30, 2010

0 comments

Norton Internet Security lets you manually turn on Silent Mode for a specified duration. When Silent Mode is turned on, Norton Internet Security suppresses alerts and suspends background activities for the duration that you specify. You can verify the turn-on status of Silent Mode in the notification area, at the far right of the taskbar. The Norton Internet Security icon in the notification area changes to a crescent-shaped icon to display the turn-on status of Silent Mode. Turning on Silent Mode manually before you perform your tasks helps you prevent alerts, notifications, or background activities interrupting you for the specified duration.

You can turn on Silent Mode for a period of one hour, two hours, four hours, or six hours. After the specified duration, Norton Internet Security turns off Silent Mode. You can also manually turn off Silent Mode at any time. Norton Internet Security notifies you after Silent Mode is turned off. The activities that are suspended during Silent Mode run after Silent Mode is turned off.

Silent Mode



0 comments

Norton Internet Security provides many solutions and features to handle viruses and other security threats. Norton Internet Security displays alerts and notifications to inform you how viruses and other security threats are detected and resolved. When you perform important tasks on your computer, you likely prefer not to receive any alert messages. Norton Internet Security suppresses alerts and notifications and temporarily suspends most of the background activities based on the type of Silent Mode that is turned on.

Scanning Office documents

Apr 28, 2010

0 comments

Norton Internet Security scans all Office documents that you receive through email messages, through Internet download, and through inserted floppy disks or other removable media. By automatically scanning all Office files, Norton Internet Security maintains a higher level of security. Norton Internet Security scans the Office document when you open them.

By default, Microsoft Office Automatic Scan option, under Computer Scans, in the Settings window is turned off. Turn on this option to scan Microsoft Office files automatically.

Turn off or turn on SONAR Protection



0 comments

SONAR protects you against malicious code even before virus definitions are available through LiveUpdate. By default, SONAR protection is turned on to proactively detect unknown security risks on your computer.

When you turn off SONAR Protection, you are prompted with a protection alert. This protection alert lets you specify the amount of time for which you want SONAR Protection to be turned off.

Guide to Scary Internet Stuff: Underground Economy

Apr 27, 2010

0 comments

The third in the Symantec Guide to Scary Internet Stuff looks at the Underground Cybercrime Economy and how to protect yourself.

SONAR Protection



0 comments

Symantec Online Network for Advanced Response (SONAR) provides real-time protection against threats and proactively detects unknown security risks on your computer. SONAR identifies emerging threats based on the behavior of applications. SONAR identifies quicker than the traditional signature-based threat detection techniques. SONAR detects and protects you against malicious code even before virus definitions are available through LiveUpdate.

Turn off or turn on Insight Protection



0 comments

Insight Protection option lets Norton Internet Security perform an Insight Network scan on your computer

When the Insight Protection option is turned on, Norton Internet Security performs a traditional scan and an Insight Network scan simultaneously. The traditional scan uses the definitions from the local system, and the Insight Network scan uses the definitions that are hosted in the Cloud. Norton Internet Security performs only a traditional scan if the Insight Protection option is turned off.

Norton Internet Security performs an Insight Network scan only when the Insight Protection option is turned on. By default, the Insight Protection option is turned on.

Insight Network scan



0 comments

The Insight Network scan uses the Cloud technology wherein a remote server on the Web contains the latest virus definitions. Norton Internet Security scans your computer for the latest security threats. When Norton Internet Security performs the Insight Network scan, it uses the virus definitions that are available locally and in the Cloud. Norton Internet Security provides additional protection by using the most recent definitions in the Cloud, apart from the definitions that are available locally on your computer.

Norton Internet Security performs an Insight Network scan only when the Insight Protection option is turned on. By default, the Insight Protection option is turned on. You can see this Insight Protection option under Computer Settings in the Settings window.

When the Insight Protection is turned on, Norton Internet Security performs a traditional scan and an Insight Network scan simultaneously. The traditional scan uses the definitions from the local system, and the Insight Network scan uses the definitions that are hosted in the Cloud.

Threat detection based on the Cloud definitions is identical to the threat detection that is based on the local definitions. However, the Cloud definitions are specified with additional data about the threats that it detects which indicates that it has been obtained from the Internet. Definitions in the Cloud provide a generic name for the risk detected, but the local definitions provide the specific name for the risk detected. For example, if a Trojan horse is detected, the scan results of the Insight Protection might display Cloud.Trojan. However, the scan results of the local definition might display Trojan.Foo.

If the traditional scan completes while the Insight Network scan is still running, you can view the Performing Insight Network Scan progress status.

Specify Idle Time Out duration

Apr 26, 2010

0 comments

You can set the duration after which Norton Internet Security should identify your computer as idle. You can select a value (in minutes) between 1 minute and 30 minutes. When you do not use your computer for the duration that you specify, Norton Internet Security checks for other predefined parameters and runs Idle Time Scans.

After you specify the Idle Time Out duration, you can view the Idle Countdown bar in the Norton Tasks window. The Idle Countdown bar displays the idle state of your computer.

Turn off or turn on Idle Time Scans



0 comments

The Idle Time Scans option is automatically turned on when you install Norton Internet Security. When the Idle Time Scans option is turned on, Norton Internet Security detects the time when you do not use your computer. Norton Internet Security then intelligently runs a scan, depending on the scan history of your computer. However, there may be times when you want to turn off Idle Time Scans.

Idle Time Scans



0 comments

Norton Internet Security keeps your computer secure from ongoing threats by automatically running scans on your computer by using the Idle Time Scans feature. Idle Time Scans detect the time when you do not use your computer and intelligently run scans depending on the scan history of your computer.

The Idle Time Scans option is automatically turned on when you install Norton Internet Security. Even though Idle Time Scans automatically run the scans, you can still customize the settings of Idle Time Scans. Norton Internet Security decides when to run Idle Time Scans, depending on your settings and a few other predefined parameters.

Delete a scan schedule



0 comments

You can delete any scan schedule. Deleting the schedule does not delete the scan.

You can delete the schedule of any scheduled custom scan or Full System Scan from the Scans window.

Edit a scheduled scan



0 comments

You can change the schedule of any scheduled custom scan or Full System Scan from the Scans window.

Schedule a Full System Scan

Apr 25, 2010

0 comments

Norton Internet Security uses Idle Time Scans to automatically detect the idle state of your computer. Norton Internet Security runs a weekly Full System Scan when the computer is idle. The Full System Scan protects your computer against infection without compromising the performance of your computer. You can override the Idle Time Scans settings to schedule a Full System Scan on specific dates and times or at periodic intervals. However, before you schedule a Full System Scan, you need to turn off the Idle Time Scans option.

Schedule a custom scan



0 comments

You have complete flexibility in scheduling custom scans. When you select how frequently you want a scan to run (daily, weekly, or monthly), you are presented with additional options. For example, you can request a daily scan, and then schedule it to occur every two days or every three days instead.

You can schedule a custom scan in the Scans window.

Scheduling scans



0 comments

Norton Internet Security uses Idle Time Scans to automatically detect the idle state of your computer and runs a Full System Scan when the computer is idle. However, you can schedule a Full System Scan according to your preferences. Norton Internet Security prompts you that the Idle Time Scans option gets turned off when you schedule a Full System Scan. You can also set up a schedule for custom virus scans.

Delete a custom scan



0 comments

You can delete custom scans if they are no longer needed.

You can delete a custom scan in the Scans window.

Run a custom scan



0 comments

When you run a custom scan, you do not have to redefine what you want to scan.

You can run a custom scan from the Scans window.

Edit a custom scan



0 comments

You can edit a custom scan that you created. You can include additional files or folders to the scan or remove the files and folders that you do not want to scan. You can also change the name of the scan.

Create a custom scan



0 comments

Instead of running the default scans that are listed in the Scans pane, you can create your own scans that meet your specific requirements. This option might be helpful in many cases. For example, you can create a scan that checks a folder in which you store downloaded files.

Custom scans



0 comments

You can create a custom scan if you regularly scan a particular segment of your computer. This custom scan lets you scan the segment frequently without having to specify it every time. You can also schedule the custom scan to run automatically.

You can delete the scan when it is no longer necessary. For example, if you work on a project for which you need to swap files frequently with others. In this case, you might want to create a folder into which you copy and scan those files before using them. When the project is done, you can delete the custom scan for that folder.

Detailed Results tab



0 comments

Norton Internet Security displays the Detailed Results tab when you run a manual scan. The Detailed Results tab provides you more information about the resolved items. The Detailed Results tab provides information such as the severity of the risk, the name of the risk, and the status of the risk.

How to Upgrade Symantec AntiVirus Software



0 comments

Symantec Antivirus Software, better known as Norton, is a popular antivirus program that protects computers from a variety of viruses and malicious programs. While Norton is a useful program, it needs to be constantly updated to ensure that it has a complete library of viruses it can detect and counteract. Updating Norton is a necessary task, and should be done at least once a week to ensure your computer remains as safe as possible.

Attention Required tab

Apr 22, 2010

0 comments

Norton Internet Security displays the Attention Required tab when you run a manual scan. At the end of a scan, the Attention Required tab provides you different ways to resolve any items that were not automatically resolved during the scan.

The Attention Required tab provides the information such as the severity of the risk, the name of the risk, and the status of the risk. It also provides the action that you can take to resolve the item. The Attention Required tab provides you the different options such as Fix, Exclude, Get Help, and Rescan to resolve the item.

Result Summary tab



0 comments

Norton Internet Security displays the Result Summary tab when you run a manual scan. At the end of a scan, the Results Summary tab tells you what was found during the scan.

If your most recent scan was a Quick Scan, this tab shows the results of a fast scan of the areas of your computer. Viruses, spyware, and other risks often target these areas.

Scan selected drives, folders, or files



0 comments

Occasionally, you might want to scan a particular file, removable drives, any of your computer's drives, or any folders or files on your computer. For example, when you work with removable media and suspect a virus, you can scan that particular disk. Also, if you have received a compressed file in an email message and you suspect a virus, you can scan that individual element.

Run a Quick Scan



0 comments

Quick Scan is a fast scan of the areas of your computer that the viruses and other security risks often targets. Because this scan does not scan your entire computer, it takes less time to run than a Full System Scan.

When the Insight Protection option is turned on, Norton Internet Security simultaneously performs a traditional Quick Scan and an Insight Network Quick Scan. By default, the Insight Protection option is turned on.

To run a Quick Scan
  1. In the Norton Internet Security main window, in the Computer pane, click Scan Now.
  2. Click Run Quick Scan.

    You can use the following options to suspend a Quick Scan:
    Pause Suspends a Quick Scan temporarily

    Click Resume to continue the scan.
    Stop Scan Terminates a Quick Scan

    Click Yes to confirm.
  3. On the Results Summary tab, do one of the following:
    • If no items require attention, click Finish.
    • If any items require attention, review the risks on the Attention Required tab.

Run a Full System Scan



0 comments

Full System Scan performs a deep scan of the system to remove viruses and other security threats. It checks all boot records, files, and running processes to which the user has access. Consequently, when you run a Full System Scan with administrator privileges, it scans more files than when you run it without administrator privileges.

Maintaining protection



0 comments

When your product is installed, and you have run LiveUpdate, you have complete protection from viruses and other security risks. However, new risks are created constantly. Security risks can spread when you start your computer from an infected disk or when you run an infected program. You can do several things to avoid security risks.

Access Norton Internet Security scans

Apr 21, 2010

0 comments

You can use Norton Internet Security scans to secure your computer from all types of viruses and unknown threats.

You can access Full System Scan and Custom Scan from the Norton Internet Security main window. You can access Quick Scan from the Norton Internet Security main window or the Norton Internet Security icon on the taskbar.

You can also scan any particular folder using the context scan feature. The context menu scan is available when you right-click the folder that you want to scan.

Review of Norton Internet Security 2011



0 comments

The new Norton AntiVirus 2011 and Norton Internet Security 2011 beta products include several new and improved features which I'm going to detail here:

Reputation Scan:
In our 2009 products, we introduced Norton Insight which dramatically improved performance by not scanning known good files. In 2010 products, we went one step further by using reputation data to mark files as good, bad or unknown.

With 2011, we are enhancing this even more by providing fine-grained reputation information about files and by allowing users to perform a Reputation Scan of their files. You can choose to do a quick or full scan or a custom scan of a folder or a drive. Once the scan is done, you will see how your files are rated based on their Trust Levels, Age and Prevalence. Reputation Scan will also compare your results against the rest of the Norton Community. It is an excellent tool to give you an idea of your machine’s risk profile.

Podcasting: Search Engine Poisoning



0 comments

About podcast:
Zulfikar Ramzan, Technical Director of the Security, Technology, and Response team at Symantec, provides an overview of a new threat called «search engine poisoning». Ramzan, details the motives behind search engine poisoning and provides information on how consumers and businesses can protect themselves.

Norton Internet Security 2011 Beta Video-tutorial

Apr 19, 2010

0 comments

This is just a quick video I made of the Norton Internet Security 2011 Beta install time and loading times along with a very brief look at the new UI.

Download Norton Internet Security 2011 Beta



0 comments

Crimeware and other threats can take all of the fun out of the Internet. Take it back with Norton Internet Security. It stops viruses, crimeware and protects your identity online so you can work and play safely.

Download the Norton Internet Security 2011 beta today!

  • Provides fast and light protection that won’t slow you down or get in your way.
  • Proactively notifies you when other applications are slowing you down and impacting your PC performance.
  • Protects your online identity so that you can search, shop and browse with the confidence of knowing you won’t be a victim of cybercrime.
What is a Beta?
A "beta" is a pre-release version of a Norton product that is available for public testing before the final version is released. Through public testing, we can evaluate how the product performs in "real world" environments and collect valuable feedback from you.

Norton thanks you for testing our newest products and encourages your comments and feedback. With the support of enthusiastic beta testers, we are able to elevate our products to a higher quality before releasing. As a participant, you can share your ideas, and together, we can create the best products possible.

Fix even the most severely infected PCs with Norton Rescue Tools



0 comments

Sometimes PCs become infected with difficult to remove "scareware" programs or they get so infected by threats that are deeply buried in the PC’s operating system that special tools are required to remove them. That’s where Norton Rescue Tools can help.

Download Norton Bootable Recovery Tool



0 comments

Gets you back up and running if your PC becomes so infected that it won't work properly or even boot up. The Norton Bootable Recovery Tool helps fix your "worst nightmare" PC problems, like when crimeware embeds itself so deeply into your PC’s operating system that it takes a special tool to remove it. Norton Bootable Recovery Tool does two things:

  • it helps you create a Customized Rescue Boot Disc (CD/DVD/USB) before your system becomes infected
  • in the event of an emergency situation where your PC has become so infected that it won’t boot up, it will help restore your PC to normal working order

Download Norton Power Eraser



0 comments

Eliminates deeply embedded and difficult to remove crimeware that traditional virus scanning doesn't always detect. The NEW Norton Power Eraser takes on difficult to detect crimeware known as "scareware" or "rogueware" that cybercriminals use to trick you into unknowingly downloading threats onto your PC.

This growing form of crimeware uses bogus pop-up alerts or security messages that scare you into thinking your PC has been infected and needs to be fixed immediately. It can be so tricky that it automatically downloads onto your PC even if you didn’t actively click on anything!

The Norton Power Eraser is specially designed to aggressively target and eliminate this type of crimeware and restore your PC back to health. You should use Power Eraser only when nothing else will remove the threat and you are willing to accept the risk that the scanner may quarantine a legitimate program.

Ensure that protection settings are turned on



0 comments

Norton Internet Security is configured to provide your computer with complete protection against viruses. In addition, Norton Internet Security protects your computer against spyware, adware, and other security risks.
The default settings provide complete protection for your computer. However, you should ensure that your protection features are turned on for maximum protection.

Norton Internet Security scan



0 comments

Norton Internet Security automatically downloads definition updates regularly and secures your computer from all types of viruses and unknown threats. In addition, Norton Internet Security monitors your Internet activities to protect your computer from the Internet-based threats that exploit software vulnerabilities.

View the Monthly Report



0 comments

The Monthly Report provides you with the statistics that are up to date. At a glance, you can see what Norton Internet Security has done for you in the past 30 days.

Monthly Report



0 comments

Monthly Report lets you view a summary of what Norton Internet Security has done for you in the past 30 days. You can view the Monthly Report using the View Report option that is present in the Miscellaneous Settings
window.

Scan Performance Profiles settings



0 comments

The Scan Performance Profiles settings let you configure how Norton Internet Security should scan your computer based on the digital signature and confidence level of the files. To make Norton Internet Security scans lighter, faster, and more effective, you can exclude from scans the files that have known digital signatures or high confidence levels.

Check the trust level of a file



0 comments

Norton Insight lets you check the details of the Files of Interest that are available on your computer. You can view details such as signature of the file and the date on which the file was installed. You can also view details such as the trust level, community usage, resource usage, and the source of the file. You can use the Locate this file option to find the location of the file on your computer. When you right-click a file that is available on your computer, the shortcut menu displays Norton Internet Security option and then Norton File Insight option.

Use Norton Insight to view files



0 comments

Norton Insight provides information about the Files of Interest that are available on your computer. Norton Internet Security lets you view specific categories of files based on the option that you select in the Norton Insight - Application Ratings window.

Norton Insight



0 comments

Norton Insight allows the smart scanning of files on your computer. It improves the performance of Norton Internet Security scans by letting you scan fewer files without compromising the security of your computer.

Monitoring background jobs of Norton Internet Security

Apr 18, 2010

0 comments

The Norton Tasks window provides the details of the background tasks that Norton Internet Security performs and lets you view and monitor the background tasks. Norton Internet Security runs most of the background tasks when your computer is idle. Performing all background tasks when your computer is idle helps your computer to run at peak efficiency when you use your computer. However, you can manually start or stop a task at any time.

You can also specify the Idle Time Out duration. After the Idle Time Out duration is reached, Norton Internet Security identifies the computer as idle and run the background tasks. You can use the Idle Countdown bar to confirm the idle state of your computer. You can also view the CPU graph and memory graph to obtain the performance data of your computer.

Norton Tasks



0 comments

The Norton Tasks window provides an interface where you can view and monitor all Norton-specific background tasks. Norton Internet Security runs most of the background tasks when your computer is idle. The Norton Tasks window provides the details of the background tasks that Norton Internet Security performs.

Optimizing boot volume



0 comments

The Optimize option lets you optimize your boot volume to improve the boot time of your computer. Optimization of your boot volume maximizes the usable free space by rearranging file fragments into adjacent and contiguous clusters. When the drive head of your hard drive accesses all of the file data in one location, the file is read into the memory faster.

When you use the Optimize option in Windows XP, Norton Internet Security optimizes only the boot volume (for example, C:Windows). Therefore, it requires less time to complete optimization. However, when you use the Optimize option in Windows Vista or Windows 7, Norton Internet Security optimizes the drive that contains the boot volume. Therefore, it requires more time to complete optimization.

Optimization



0 comments

The data storage space on a disk is divided into discrete units. These units are called clusters. When files are written to the disk, they are broken up into cluster-sized pieces. When all of the pieces of a file are located in adjacent or contiguous clusters, the file can be accessed quickly.

Your computer's hard disk stores all of your files, applications, and the Windows operating system. The bits of information that make up your files gradually spread over the disk. This process is known as fragmentation. The more that you use your computer, the more fragmented the hard disk gets.

Hide / display the CPU usage indicator



0 comments

Norton Internet Security displays the CPU usage indicator in the main window so that you can monitor the overall system CPU usage and the Norton-specific CPU usage. At any time, if you do not want Norton Internet Security to display the CPU usage indicator in the main window, you can hide it.

You can use the Performance Monitoring option in the Settings window to enable or disable Norton Internet Security to monitor your system's performance. When you turn off the option, Norton Internet Security continues to display the CPU usage indicator in the main window but does not monitor the CPU usage.

Identify resource-consuming processes



0 comments

You can click at any point on the CPU graph to obtain a list of the processes that consume maximum resources of your computer at that point. You can click a process that is available in the list to get more information about the process in the File Insight window.

Obtaining historical data of CPU and memory usage



0 comments

The Zoom in options also provide you the historical data of the CPU graph and memory graph. For example, if you select the 1d option, Norton Internet Security displays the data of CPU graph or memory graph for the last one day.

View CPU graph and memory graph



0 comments

Norton Internet Security monitors the overall system CPU usage and memory usage and the Norton-specific CPU usage and memory usage. The CPU tab and the Memory tab at the top of the Performance graph display the CPU graph and the memory graph respectively.

The Zoom in options provide you the magnified view of the CPU graph and memory graph. For example, if you select the 10min option, Norton Internet Security displays the magnified view of CPU graph or memory graph for the last 10 minutes. If you select the 30min option, Norton Internet Security displays a magnified view of the CPU graph and memory graph for the last 30 minutes.

CPU graph and memory graph



0 comments

Norton Internet Security monitors the overall system CPU usage and memory usage and the Norton-specific CPU usage and memory usage. Norton Internet Security displays the details in the CPU graph and the memory graph. The CPU graph and memory graph are real-time graphs of CPU utilization and memory utilization.

Viewing details of system activities



0 comments

System Insight lets you view details of the system activities that you performed or that occurred over the last three months in the Performance window. The activities include application installations, application downloads, disk optimizations, threat detections, or Quick Scans. You can use the tabs at the top of the Events graph to obtain details for the current month and for the last two months. The Events graph at the top of the Performance window displays each activity as icon or stripe. The description for each icon or stripe appears at the bottom of the graph. The pop-up that appears when you move the pointer over an icon provides you the details about the activity.

Monitoring system activities



0 comments

System Insight provides information about the important system activities that you performed or that occurred over a period of the last three months. System Insight displays the information in the Performance window. The Events graph at the top of the Performance window displays each activity as icon or stripe. The description for each icon or stripe appears at the bottom of the graph. You can use the tabs at the top of the graph to obtain details for the current month and for the last two months.

Performance window



0 comments

System Insight provides you a centralized location where you can view and monitor your system activities. System Insight displays such information in the Performance window. You can access the Performance window to view details about the important system activities, CPU usage and memory usage, and Norton-specific background jobs.

System Insight



0 comments

Norton Internet Security continuously monitors your computer to keep it free of any problems and run at peak efficiency. Norton Internet Security constantly scans the vital areas of your computer including memory, registry keys, and running processes. It monitors the important activities such as general file operation, network traffic, and Internet browsing. In addition, Norton Internet Security ensures that the activities that it performs on your computer do not degrade the overall performance of your computer.

Network Proxy Settings configuration



0 comments

When you use a proxy server to connect to the Internet, you must specify the proxy server details. The Network Proxy Settings window lets you enter automatic configuration settings, proxy settings, and proxy server authentication settings. The Network Proxy settings let you connect to the Internet while you perform tasks such as activating the product or accessing the support options.

Network Proxy settings



0 comments

A proxy server regulates access to the Internet, and prevents external computers from accessing your network. If you are on a network that uses a proxy server to connect to the Internet, you can provide proxy server details to Norton Internet Security. You can use the Network Proxy Settings window to specify the automatic configuration URL, the proxy settings, and the authentication details. Norton Internet Security uses the proxy settings and authentication details to connect to the Internet automatically, whenever required. For example, LiveUpdate uses the specified proxy server settings to retrieve updates. You must ensure that you specify the proxy server details for LiveUpdate to run successfully.

In some cases, your network uses an automatic configuration URL or script for managing Internet access. In this case, you must provide the URL of the required PAC (Proxy Automatic Configuration) file. A PAC file contains the code that lets your browser know about the proxy settings for different Web sites over the Internet. It also contains the words which you want to filter and block while you access the Internet. You can also choose the option that lets your browser to automatically detect the proxy settings.

Using Pulse Updates to obtain definition updates



0 comments

Pulse Updates provide frequent, lightweight updates every few minutes in between the full updates. Always ensure that the Pulse Updates option is turned on. It protects you from the latest threats without compromising your system performance or disrupting your online experience.

Pulse Updates



0 comments

In addition to the definition updates that Automatic LiveUpdate downloads, Norton Internet Security uses streaming technology to download the latest virus definitions. These downloads are called Pulse Updates. The Pulse Updates are lighter and faster than Automatic LiveUpdate. They keep your computer secure from the ongoing threats that exist on the Internet. Pulse Updates protect you against the rapidly-changing environment of security threats without compromising your computer's performance. Pulse Updates should always be turned on to get the latest updates every few minutes.

Turn off / turn on Automatic LiveUpdate

Apr 17, 2010

0 comments

You can have LiveUpdate check for definition updates and product updates automatically on a set schedule, by turning on the Automatic LiveUpdate option. You can also run LiveUpdate manually when the Automatic LiveUpdate option is turned on. However, you must run LiveUpdate manually to obtain updates if you have turned off the Automatic LiveUpdate option.


Note:

If you are connected to the Internet, Automatic LiveUpdate downloads product updates and definition updates every hour. If you have an ISDN router that is set to automatically connect to your Internet service provider (ISP), it may incur charges each time. If this type of setup is a problem, you can set your ISDN router not to automatically connect to the ISP. Alternatively, you can turn off Automatic LiveUpdate.

Keeping protection up to date



0 comments

Definition updates are available to you as long as you maintain an active product status. The ways in which you can acquire the product and maintain your status are as follows:

Obtaining updates using LiveUpdate



0 comments

LiveUpdate checks for updates to the product that is installed on your computer.
These updates protect your computer from newly discovered threats. LiveUpdate uses the Internet connection to connect to the Symantec server, checks for updates, and then downloads and installs them automatically.
You should have Automatic LiveUpdate turned on to ensure that you have the latest definition updates and program updates. Definition updates contain the information that allows the product to recognize and alert you to the presence of a specific virus or security threat. Symantec issues program updates periodically, which are enhancements to the product. Program updates usually contain changes to the inner workings of the program. After you install program updates, you might not necessarily see a difference in the way that the product works.

Running LiveUpdate



0 comments

Symantec products download the latest definition updates and program updates regularly from Symantec. The definition updates protect your computer from the latest viruses and unknown security threats. Symantec products help you to obtain and install these updates by using the LiveUpdate technology.

LiveUpdate takes little time to check for the definition updates and program updates. You can cancel the LiveUpdate session at any time.

LiveUpdate obtains these updates for your computer by using your Internet connection. If your network uses proxy servers to connect to Internet, LiveUpdate uses the proxy settings in your product to download the latest updates.

Program and Definition Updates



0 comments

LiveUpdate obtains program updates and definition updates for your computer by using your Internet connection.
Program updates are minor improvements to your installed product. These differ from product upgrades, which are newer versions of the entire product. Program updates are usually created to extend the operating system or hardware compatibility, adjust a performance issue, or fix program errors. Program updates are released on an as-needed basis.


Note:

Some program updates may require that you restart your computer after you install them.
LiveUpdate automates the process of downloading and installing program updates. It locates and obtains files from an Internet site, installs them, and then deletes the leftover files from your computer.
Definition updates are the files that keep your Symantec products up to date with the latest antithreat technology. The definition updates that you receive depend on which product you use.

Norton Internet Security shortcut menu



0 comments

Norton Internet Security performs background activities to keep your computer secure. The icon in the notification area reassures you that your protection is up to date. The icon changes its color if any change in status occurs.
The messages that appear in the notification area might require a response from you, such as opening a window, and taking an action. More often, messages inform you about current activities, and they disappear after a few seconds. You can check the Security History window for any further details.
You can right-click the Norton Internet Security icon to access specific Norton Internet Security activities.

Norton Internet Security icon



0 comments

After you install Norton Internet Security, it displays an icon in the notification area at the far right of the Windows taskbar. This icon indicates the current status of your computer.
Norton Internet Security displays alerts and notifications to inform you how viruses and other security threats are detected and resolved. These alerts and notifications appear over the notification area of your computer. In most cases, you can click the link available in the alert to view the details and fix the problems.
The Norton Internet Security icon represents the current state of your computer. Norton Internet Security displays an animated icon when it actively fixes any issues or wants to inform you about any warning or urgent issues.

Security status indicators



0 comments

When your system encounters a threat or a risk, the product displays the security status in the Norton Internet Security main window. When a status indicator displays a status, you can take appropriate action to improve your protection status. Your protection is based on the programs that are installed on your computer. To improve your protection status, ensure that your installed programs are up to date.

Protection status of computer



0 comments

The Norton Internet Security main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window.
As you use your computer, the product monitors how well your computer and activities are protected from threats, risks, and damage.


Note:

The product displays the protection status for selected items only.

Norton Internet Security main window



0 comments

The Norton Internet Security main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window.

Starting Norton Internet Security from the command prompt

Apr 16, 2010

0 comments

If you work from the command line (for example, writing a script or code), you can start Norton Internet Security while you are still in DOS.

Community Watch



0 comments

Norton Community Watch helps in identifying new security risks by submitting selected security and application data to Symantec for analysis. Symantec assesses the data to determine the new threats and their sources. The collective efforts from all Norton security product users help in quick identification of solutions for these threats and risks. It also improves user security and product functionality.

Accessing Norton Account



0 comments

The Product Key for each Norton product is conveniently stored in your Norton Account. After you have created your Norton Account successfully, you can access your account from anywhere in the world.

Creating your Norton Account for free



0 comments

Your Norton Account stores the Product Key and the billing information of your product. You can also register your product with the Norton Account.

In addition, Norton Account helps you to do the following:
  • Access the Product Key and other product information when you need it.
  • Buy additional Product Keys for your home or office.
  • Download the latest version of the product.
  • Save online orders and update billing information.

Norton Account



0 comments

When you create a Norton Account, you can manage all of your Norton products in one place. You can store your Product Keys in your Norton Account and also buy additional Product Keys. You can also register your product with the Norton Account. It takes only a few moments to create your Norton Account. You must be connected to the Internet to create a Norton Account.

After you create a Norton Account, you can access and manage your account information and product information from anywhere. It helps to reinstall your products and download the latest version of the products. If you install your product on more than one PC, you can use the same Norton Account.