Sponsored Links

Minggu, 17 Juni 2018

Sponsored Links

Norton Internet Security 2012 Activation Key 1000% Working | 2017 ...
src: 1.bp.blogspot.com

Norton Internet Security , developed by Symantec Corporation, is a computer program that provides malware prevention and removal during the subscription period and uses signatures and heuristics to identify viruses. Other features included in this product are personal firewalls, email spam filtering, and phishing protection. With the release of the 2015 line in the summer of 2014, Symantec officially retired Norton Internet Security after fourteen years as chief product of Norton. It was replaced by Norton Security, an updated adaptation of the Norton 360 security suite.

Symantec distributes products as downloads, copies of Compact Disc (CD) boxes, and as OEM software. Some retailers also distribute it on USB flash drives. Norton Internet Security had a 61% market share in the United States retail security category in the first half of 2007. In this study, competitors, in terms of market share, included security suites from CA, Inc., Trend Micro, and Kaspersky Laboratories.


Video Norton Internet Security


Edisi Windows

In August 1990, Symantec acquired Peter Norton Computing from Peter Norton Norton and his company developed various applications for DOS, including antivirus. Symantec continues the development of the acquired technology, now marketed under the name "Norton", with the tagline "from Symantec". Norton crossed-arm poses, registered US trademarks, featured on Norton product packaging. However, the pose is then transferred to the packaging spine, and then falls completely.

Users of 2006, and later versions, can upgrade to the latest version of Norton software without purchasing a new subscription. Upgraded products still have the same number of days on user subscriptions.

The release is named by year but has an internal version number as well. The internal version number was forwarded to 15.x in the 2008 edition to match the release of Norton AntiVirus in the same year. In the 2013 release (20.x), the product has lost years from its name, although it is still referenced in some places.

Version 2000 (1.0, 2.0)

Norton Internet Security 2000, released January 10, 2000, is the first launch of Symantec beyond virus protection and content control filters. This release is followed by an alliance between Excite @ Home Internet providers and McAfee.com antivirus vendors to provide Internet customers with McAfee's new firewall software, McAfee Personal Firewall . The firewall version 2000s, based on AtGuard from WRQ, filters traffic at the packet level. It can block ActiveX controls and Java applets. Other functionality includes deletion of cookies, and banner ad blocking. ZDNet found the ad blocker removed a graph that is not an ad, violates the page. Adjusting the settings fixes the problem, but the process is complicated. ZDNet notes the lack of information presented about attacks that are blocked by firewalls. Norton LiveUpdate downloads and installs program updates.

The Family Edition adds parental controls. Parental controls are supported by a quality control team of 10 people looking for inappropriate content on the web. Content found is categorized in subject matter and placed on a blacklist of approximately 36,000 sites. Designated administrators can add blocked sites, but the blacklist provided previously can not be viewed or edited because of hardcode. Administrators can block certain material. Another option is to block all sites, then make a whitelist of allowed sites. Family Edition can also block the transmission of the personal information specified. The information is replaced with the letter "X". However, CNN notes that X-rated sites are taken when personal information is asked by search engines.

Version 2.0 was released June 12, 2000

Version 2001 (2.5, 3.0)

Version 2001 (2.5) released September 18, 2000, adds support for Windows ME in addition to Windows 9x, Windows NT, and Windows 2000 series. After the attack by ILOVEYOU and the script virus Anna Kournikova, this version can block malicious scripts without virus signatures, but with analyze behavior.

Firewalls scan applications that support the Internet and create access rules based on knowledge base maintained by Symantec during installation. In the PC Magazine test, the installation takes 24 minutes to complete on 750Ã, MHz Pentium III with 92 applications that support the Internet. Using a firewall, users can decide whether to accept cookies, Java applets, and ActiveX controls globally or per-site. The new feature, Intrusion Detection with AutoBlock , can detect port scans and block any further intrusion attempts. The program provides notice for intrusion attempts, states the severity and provides access to the details of the threat. Alternatively, the firewall can put the computer in stealth , essentially hiding the system. Users can configure the security level, affect the number of notifications. Tests by PC Magazine using Shields Up and Symantec Security Check found that firewalls managed to hide all ports, hiding computers from view. The leak test is performed to see the firewall's ability to detect outgoing connections. Any detected attempts and suites offer to block attempts.

The Family Edition , like the previous version, includes parental controls and information filtering features. Parental controls come with an unflattering list of sites, broken into 32 categories. This list is updated every two weeks by Norton LiveUpdate. Using the list itself, Norton only blocks sites on the list. As a result, Norton can not block the site until the next update. Parents can customize lists, add or remove sites. List of allowed sites can be created to restrict children to certain sites. This version uses application blocking rather than protocol or port filtering to control Internet access. Children can be restricted in what applications they use to access the Internet. Parental control profiles can be set for each child, and settings can be automatically configured by their age group, whether they become children, adolescents, adults, or administrators. Internet use and offenses are recorded in reports presented to parents. PC Magazine found that enabling parental controls was added one minute to the computer boot time.

Version 3.0 was released March 19, 2001

Version 2002 (4.0, 5.0)

The 2002 version was announced August 28, 2001. The Family Edition was deleted, so parental controls and information filtering were combined with this release. The installation is recorded as fast and simple by both PC Magazine and CNET. The installation requires a reboot, and after that Security Assistant guides the user through the questionnaire to configure the best settings. A problem CNET faces when upgrading from previous releases is the loss of customized settings. PC Magazine finds default settings, which aim to avoid frequent, rather permissive, notifications. Windows 95 support is also dropped.

Running a full scan complies with a list of applications that support the Internet. Users set permissions or accept default Norton settings. Firewall detects and blocks port scans and infiltration attempts logs. This version does not run traces on the attacker, but Symantec plans an online tool to do so. To ensure malware can not be disguised as a trusted application, Norton verifies the program against the digital signature list for known programs, Tracker update warns users if the hacker is trying to gain access to the user's computer. The firewall blocks all access attempts from Shields Up and Port Checker . This version includes a wizard to simplify firewall settings to accommodate multiple computers sharing an Internet connection. With this release, Norton can prevent certain personal information from being sent through compatible instant messenger, email, and website clients. Ad blocking includes Trashcan Ads , where users can place ads that have escaped ad filtering.

A Professional Edition was announced December 11, 2001, with marketing aimed at business owners. This version features Norton Intrusion Detection , which cuts off suspicious connections and attacks, such as Code Red worms. Intrusion Detection focuses only on Windows-based attacks. Management center is also present in this version. The administrator configures firewall and productivity settings for client computers. Productivity settings allow administrators to block newsgroups, websites, and advertisements. This package is integrated with the XP user account; the settings can be personalized for each user.

Version 2003 (6.x)

The 2003 version was announced September 16, 2002, scheduled to be available for purchase later that month. This version adds Norton Spam Alert to reduce. Spam filtering scans all messages and context, rather than searching for keywords to ensure accuracy. The POP3 client must be used. When a message is identified as spam, Norton inserts an identifier, by default is "Spam Alert:", in the subject line. Using an email client, users can create rules to delete or move flagged messages. Users can also create a text string for Spam Alert to search when classifying e-mail. In the PC Magazine test, Spam Alert mistakenly classified 2.8% of legitimate e-mails as spam. 47 percent of spam escapes from filters. Although the false positive numbers are low, they do not work well in finding real spam.

The updated main interface has a green and red indicator to show which features are active and which ones to watch for. The firewall has some features that are updated in this version. The Blocks of Traffic button in the main interface blocks all incoming and outgoing Internet traffic. Another new feature, Visual Tracker , graphically maps backlash to their origin. The firewall blocks all port scans performed by CNET, hiding each port.

Following Nimda and Code Red worms, this version scans all incoming and outgoing traffic for suspicious data exchange against regularly updated databases, the ported feature of Norton Internet Security 2002 Professional Edition . The connection to the offending computer is automatically disconnected if the traffic matches the database item.

Symantec announced Professional Edition on November 19, 2002. This data recovery tool allows users to recover files deleted or corrupted by malware. The inclusion of data removal tools allows users to delete files while minimizing the possibility of recovery. Web Cleanup deleted browser cache files, history, and cookies. To maintain a dial-up connection, Connection Keep Alive will simulate online activity during user's inactivity. Norton Productivity Control allows users to filter Internet content and block newsgroups. When used with User Access Manager , multiple filtering profiles can be created, assigned to different users.

Version 2004 (7.x)

Announced September 8, 2003, the 2004 version adds adware, spyware, and keylogger protection. PC Magazine finds additional protection to be weak. From Norton detected spyware samples, large numbers are not removed completely, requiring manual removal. Norton also does not prevent many spyware infections.

Norton AntiSpam , a renamed spam filtering feature, has a set of spam rules, which can not be viewed or edited. The sender whitelist and blacklist can be created. Users can also create their own spam definitions. AntiSpam integrates with Outlook, Outlook Express, and Eudora, allowing users to mark e-mail as on-the-fly spam. E-mails that are identified as spam are either quarantined by default, but they can be configured to automatically delete them. In the CNET test, AntiSpam identified 94 percent of spam messages correctly.

Product activation is introduced in this release. After installation, users are allowed a 15-day grace period to activate their Norton Internet Security 2004 copies. This program will not work after a 24-character product keyless deadline. The product key used to enable copy of Norton Internet Security's relationship with alphanumeric code based on the computer's hardware configuration. Users can activate their product five times with the same product key, but licensing terms require users to install Norton Internet Security 2004 on only one computer.

Version 2005 (8.x)

Symantec introduced Version 2005 on August 17, 2004. This version is sometimes called the "AntiSpyware Edition" tagline, because spyware detection is integrated with Norton and is by default enabled. Found registered threats, separating those already handled and those requiring user interaction. More detailed information is provided through links to the Symantec website. However, PC Pro and PC Magazine recorded the old scan time. Full scan takes 24 minutes to over half an hour, respectively. In the PC Pro test, Norton detected 61 percent of spyware samples, compared to an average of 68 percent for all products tested. Elimination rates are above average, 72 percent versus an average of 68 percent. Norton blocked reinstallation with a score of 48 percent, compared to a 43 percent group average. Overall, Norton ranked fifth among the products tested. In the PC Magazine test, Norton installs slowly on the infected system and fails to install simultaneously. Contacting Symantec did not solve the problem.

Other new features include Internet Worm Protection to block worms, which scan IP addresses for open ports. It also blocks incoming ports based on known exploits and is suspected of using signatures and heuristics. The addition of the following features MSBlast in 2003 and Sasser in 2004, a worm that exploits vulnerabilities in Microsoft Windows operating systems. Responding to the emergence of privacy threats - 75 percent of threats in the last 12 months attempt to steal confidential information - this version adds phishing protection. Using firewall components, users can create whitelist sites where confidential information can be sent. Users are alerted when information is sent to sites not on the list. The alert feature warns users of major threats classified by Symantec, and users can press the Fix It Now button to apply a set of changes to close vulnerabilities, such as blocking required ports used by worm propagation. Privacy Browser can hit information websites generally accept about its visitors, like the browser and operating system used. This feature can also block ads.

Privacy Control can alert users when sending confidential information. It can also be configured to block transmission. This allows the user to specify how information can be sent, such as via IM or e-mail. The item-specific exclusion allows the user to control where data can be sent. However, PC Pro found a flaw in the information filtering feature. The way information is formatted on the list of confidential information can affect its effectiveness. For example, entering the last six digits of a credit card number will not stop numbers from leaking if grouped in four digits. PC Magazine also notes the fact anyone who can log in to a computer can view a database of personal information. Therefore, Symantec advises to only include the last part of the sensitive information.

Norton AntiSpam is now scanning e-mail for fake URLs and dealing with offensive e-mails as spam. E-mail can also be blocked by language, but by default the filter allows all languages. AntiSpam can sync a self-allowed sender list with a POP3 address book. Users can train spam filters by showing valid e-mails marked as spam and vice versa. Support for Yahoo! Mail and Hotmail are added in this release.

Version 2006 (9.x)

Norton Internet Security 2006 debuted on September 26, 2005. The new main interface, Norton Protection Center , collects all information in a central location. The security status is indicated by how secure the computer is for tasks such as email and Internet search, not in the context of which features are enabled. The Protection Center can also recognize third-party software that protects the computer. The new interface advertises additional products from Symantec; some protection categories, such as "Data Protection", will read "No Coverage" until the user buys and installs Norton SystemWorks. Additional system tray icons created by Protection Center .

The installation is recorded as lengthy by PC Magazine , especially on malware-infected systems. Spyware detection has been tweaked since the last release. It has been updated to better identify keyloggers. In the PC Magazine test, Norton manages to detect all 11 spyware threats and remove everything except two. PC Magazine gives Norton credit even when manual removal is required. The suite also removes three of the four commercial keyloggers. When trying to install spyware on a clean system, Norton blocks all 11 and two of the four commercial keyloggers. In most cases, it does not block installation, but Norton does do scanning after spyware is installed. In the testing of PC Pro , Norton detected 78 percent of spyware, removed 82 percent, and blocked 65 percent of installations.

Norton AntiSpam discontinued as a separate product from Symantec, now available only in Norton Internet Security. This feature can block all e-mail from unknown senders, and automatically block messages with suspicious elements like invisible text, HTML forms, and phishing URLs. To improve accuracy, Norton analyzes emails and outgo messages whose categorization is corrected by the user by pressing the "This is spam" and "This is not spam" button. In the PC Magazine test, this feature marks one of ten valid e-mails as spam and allows one of every six spam messages in the inbox. 400 messages are used, and the program is allowed to process messages for more than a week. In testing PC Pro , this feature performs better, blocking 96 percent of spam, with a false positive rate of 0.2 percent.

Norton recommends disabling Windows Firewall to avoid redundant warnings. Firewalls stealth all significant ports in PC Magazine testing . Attacking the firewall itself is unsuccessful, and PC Magazine can not stop the service, stop the process, or disable the firewall using mouse click simulation. The firewall also passes PC Pro ' s tests, successfully filtering all ports.

Other features include Bloodhound technology, which seeks viral-like behavior to find better zero day viruses. The Security Inspector looks for common vulnerabilities, including unsafe user account passwords and browser insecurity. Ad blocking rewrites website HTML to prevent ads from being displayed. Parental controls, optional components, can block certain programs from accessing the Internet, such as IM clients, and restrict newsgroup access. Limitations may be granted to different Windows user accounts. Sites are classified in 31 categories, and four profiles can be assigned to each block of different categories of sites. Supervisors set exceptions, add global blocked sites, or block all access to non-user-generated white sites. Both PC Magazine and PC Pro record an exception of time-based restrictions. Filtering information can be controlled on a per-user basis.

Windows 98 compatibility was dropped from this release.

Version 2007 (10.x)

The 2007 version was announced September 12, 2006. The tabbed interface allows users to access Norton Protection Center and program settings without separate tray icons and open windows. Symantec revised Norton Internet Security and made this version more modulated, which has reduced the use of memory suites to 10-15 megabytes and scans 30-35 percent. Other results are spam filtering and parental controls are separate components to install. When installed, the feature consumes 100 MB of disk space.

Anti-phishing is integrated with Internet Explorer. It analyzes sites, checks website URLs, titles, forms, page layouts, visible text and links, and uses blacklists to detect phishing sites. Users are blocked from accessing suspected phishing sites, but are presented with an option to continue. In the PC Magazine test, this feature blocked 22 of 24 phishing sites, while Internet Explorer 7 identified 17 of 24 sites. In testing PC Pro , the feature successfully blocks access to every phishing site tested against it. Spam filtering no longer includes language features, Symantec claims it is less useful with current spam and creates false positives. Tested against 1,500 messages by PC Magazine , Norton left more than half the spam into the inbox. Five percent of valid letters are marked as spam. This version uses Veritas VxMS Symantec technology to better identify rootkits. VxMS allows Norton to find inconsistencies between files in directories and files at the volume level. The startup app manager allows users to prevent applications from launching when they are logged in. This release lowers support for Windows 2000 and is compatible with Windows Vista after it is released with updates.

Firewalls make all decisions by themselves to reduce the likelihood of being weakened by misinformed decisions. Known apps are safe to allow Internet access, and vice versa for malicious apps. The unknowns are analyzed and blocked if they show bad behavior. In PC Magazine and PC Pro testing, the firewall is not mistakenly blocking secure applications from Internet access. All malware is blocked by a firewall. PC Magazine test reflects the same results. Firewall also hides all ports. Exploitation is blocked by an intrusion prevention system, which prevents threats from exploiting vulnerabilities. The system is updated whenever a vulnerability is identified for a Windows-based computer. The attempt to disable the firewall was unsuccessful; registry changes, process termination, and mouse click simulation all fail. Disabling the Windows service has no effect on the firewall as it works at the kernel-level driver. This version automatically adjusts the configuration for different networks based on the gateway's physical address rather than the IP address.

In the PC Magazine test, Norton detected 15 of 16 spyware samples. 13 of 16 have been deleted. Against eight commercial keyloggers, the suite deleted all samples. On a clean system, Norton blocked 14 of the 16 spyware samples from installing, and stopped seven of the eight keyloggers from installing.

Version 2008 (15.x)

The 2008 version was announced on August 28, 2007, adding support for Windows Vista 64-bit. New features include SONAR, Norton Identity Safe , and Browser Defender . SONAR monitors apps for malicious behavior. The Identity Safe replaces the information filtering function; instead of blocking personal information from leaving the computer, it stores personal information to fill out web forms. It's password protected and checks the authenticity of the website before filling out any forms. Browser Defender checks and blocks suspicious API calls, intended to stop drive-by downloads. The Network Map identifies the computer network with Norton Internet Security 2008 installed. Remote monitoring allows checking the status of other installations on different computers; problem identified with red "X" icon. Using this feature, users can also control network traffic between computers. It also warns users if they are using an unencrypted wireless network. The startup app manager and ad blocking features are dropped from this release. Information filtering, though replaced by Identity Safe in the suite, is available separately. This can be used in conjunction with Identity Safe .

Phishing protection is now integrated with Mozilla Firefox. Testing by PC Magazine found that Norton blocked 94 percent of phishing sites, compared to 83 percent for Internet Explorer 7 and 77 percent for Firefox 2. CNET identified a problem with the feature; when anti-phishing is disabled, Identity Safe still offers users to automatically submit personal information to websites, including phishing sites. Symantec refuses to call it "disabled", stating it is advisable to use Identity Safe with anti-phishing enabled. Alternatively, Identity Safe can be used with built-in Firefox and Internet Explorer anti-phishing capabilities.

PC Magazine found that the firewall put all ports in stealth mode. Firewall blocks ten of the 12 leak tests, which are used to see if malware can circumvent firewall control from network traffic. Earlier versions did not identify testing because no one was carrying a malicious payload. Another test was performed using Core Impact, which successfully exploited one vulnerability on the test computer. However, other components of Norton stop exploit from causing damage. Other attempts did not work either because the system was immune or the Norton Intrusion Prevention System stopped it. The attempt to disable the firewall did not work with PC Magazine . Instead, PC Pro identifies 15 open ports on a computer with Norton installed.

In the PC Magazine test, Norton actually detected most of the malware samples. For two-thirds of samples, all traces are deleted. Norton finds and deletes all the commercial keyloggers. Full scan takes almost an hour to complete, twice as long as the 2007 version. This suite blocks most of the malware from installing and all the commercial keyloggers, regardless of the modifications made to the sample. PC World notes that Norton removes 80 percent of files and Registry entries associated with malware.

Spam filtering imports the user's address book to compile an allowed whitelist sender list. The address where users send emails and emails marked as valid mail can be automatically added to the whitelist. Using several thousand messages, PC Magazine found that Norton marked more than 40 percent of valid emails as spam. More than 80 percent of valid bulletins are marked as spam. Norton correctly identifies 90 percent of spam e-mail.

Version 2009 (16.x)

The 2009 version was released for sale on September 9, 2008. Symantec set several destinations for the 2009 version while under development: complete installations under minutes and 100 MB impressions. Average installation times range from eight to ten minutes, and previous versions of 2008 have 400 MB impressions. Other goals include reducing the load time after the computer starts, from 20-30 seconds to 10 seconds, and scan times files with technologies that allow Norton to miss certain files that are trusted. This technology works on the basis that if the software runs on most computers, then it's safe.

A public beta released July 14. The decrease in memory consumption is made, driven by the fact that 40% of people who contact Symantec support have 512 MB of RAM. The beta uses about 6 MB of memory, compared to 11 MB by the previous version. To reduce scan time, Norton Insight uses data from the participant Norton Community to avoid scanning files found on a number of statistically significant computers. Citing a NPD Group study found that 39 percent of consumers who replace antivirus blame performance, the CPU usage meter will be available in the final product to allow users to find the cause of high CPU usage, whether it is Norton or other programs. This version has a more frequent update, a change called Norton Pulse Updates . Instead of sending out updates every eight hours, as the 2008 version did, Credit Updates were sent five to fifteen minutes. The Silent Mode automatically suspends warnings and updates when a program enters full screen mode and can be manually enabled. The suite activity takes place when the computer is idle, and ends after the user activity is registered. The final release (16.5) combines spam filtering, which was once a free download from Symantec. This release also bundles Norton Safe Web, which identifies malicious websites, compatible with Internet Explorer and Firefox. Norton Safe Web color code search results from famous search engines like from Google and Yahoo for security. The Norton Safe Web Toolbar also includes the Ask.com search box. The search box does not share the code with the Ask toolbar; not the box directs the question to the Ask search engine. Norton Safe Web is compatible with Internet Explorer and Firefox. Norton Safe Web.

Benchmarking done by PassMark Software highlights installation time of 52 seconds version 2009, 32 second scan time, and 7 MB memory usage. Symantec funds benchmark tests and provides scripts that are used to measure any participating antivirus software. Testing is done in Windows Vista running on dual core processors. PC Magazine found the suite added 15 seconds to boot time, with a 60 second baseline. Norton adds less than 5 percent to the time it takes to complete file operations. 25 percent more time is taken to unzip and zip a set of files.

In the PC Magazine test, Norton erased most of the 40 percent footprint of malware. In a similar test, specifically using commercial keyloggers, Norton was able to remove most keyloggers, beating out other tested products. Norton blocked all attempts to install malware on a clean system. Modifications made to the sample do not deceive Norton. Norton can not block installation of all commercial keyloggers.

Phishing protection blocks 90 percent of verified phishing websites in the PC Magazine test. Internet Explorer 7 captures 75 percent, and Firefox captures 60 percent.

Norton stealth all ports, according to PC Magazine . Port scanning did not work. Firewall blocks all exploit attempts by Core Impact.

Malware blocking and deletion collects good results in the PC Magazine test. All but one sample of malware in the folder is deleted after the folder is opened. The latter is deleted when executed. Modifications made to the sample do not affect detection. On a similar test, specifically using commercial keyloggers, Norton did not manage to detect all. In removing threats, Norton almost completely removes 40 percent of malware samples and related executables. Norton can also remove more commercial keyloggers from other products.

Version 2010 (17.x)

The 2010 version was officially released on September 8, 2009. This version has a technology code called, Project Quorum , which introduces reputation-based threat detection to compete against 200 million attacks each month, many of which Symantec Claim Avoids Detection-Based signature. The new approach depends on Norton Community Watch , where the participants send information about the applications running on their computers. Safe apps show common attributes, such as known origin with known publishers. Instead, new malware may have an unknown publisher, among other attributes. Using data, "reputation score" is calculated and can be used to infer the possibility of unknown apps safe, or harmful.

Another aspect of the Quorum is parental control and spam filtering. Norton Internet Security 2010 bundles free subscriptions OnlineFamily.Norton, which PC Magazine found as an improvement over parental controls bundled with previous releases. Spam filtering uses Symantec's technology from Brightmail. Two filters are used to locate spam: locally installed and an examination of the Symantec server to see if the message is known as spam. In the PC Magazine test, no valid e-mail was marked as spam. However, 11 percent of spam still goes to the inbox. This is a significant improvement over previous releases. Another improvement for this product is an enhanced heuristic feature called SONAR 2. It utilizes reputation data to assess whether a program is harmful or clean. Norton Insight has also been expanded, showing users the number of Norton Community participants who have certain programs installed, their impact on system resources, and how long it has been released. Information on the origin of the program and its resource usage graph is also provided. New features with the code name "Autospy" help users understand what Norton does when malware is discovered. Norton malware and resolution actions are presented to users. The previous release removes visible threats and silently warns users, potentially confusing when users are deceived in downloading fake security software.

Another addition to this product is the new "Flip Screen". With a compatible graphics card, the main display "flips" to show the opposite side of the main interface, which consists of a CPU usage chart or memory and timeline of security events. Without one, the "Flip Screen" link is replaced with a "back" link, which opens the back of the window as a separate window.

This product also adds search engine labeled "Safe Search". Custom search allows users to filter out unsafe sites, gain insight about them, and track HTTP cookies. Malware removal and blocking is done well, setting up or meeting records in the PC Magazine test. This achieved a detection rate of 98%. Highest exit of 12 antivirus products tested. The exclusion was blocking commercial keyloggers, where Norton made an above average score. File operations take 2 percent longer, and file compression and extraction tests take 4 percent longer. The only area where Norton introduced a significant delay is when the system boots, the beta version of the suite adds 31 percent to the boot time, significantly longer than the previous version. According to Norton's performance comparison site, Norton Internet Security scans 31 percent faster, 70 percent lighter, and installs 76 percent faster than any leading Anti-virus product. According to AV-Comparatives, Norton Internet Security is "Best Product 2009", Bronze award for 98.6% detection rate in 2010 and Norton Internet Security 2010 blocking 99/100 Internet threats from infecting user's computer.

Version 2011 (18.x)

Norton Internet Security 2011 was released for Beta testing on April 21, 2010. The changes include new user interfaces and increased scanning of internet sites for malware. With version 2011, Symantec also released apps that "scan" user's Facebook feeds for any malware links. This app does not require a valid subscription. In a test sponsored by Symantec, Norton Internet Security 2011 is the only security suite that ever achieved a 100 percent protection score in a new third-party test from Dennis Labs. Improved reputation scans provide users with an easy to understand interface on files stored on the user's computer. Mark them as trustworthy, good, poor, or bad. The latest version of Norton Internet Security 2011 was released on August 31, 2010. The new features in the 2011 version also include Norton Rescue Tools. These tools include Norton Bootable Recovery tools and Norton Power Eraser.

On December 9, 2010, Symantec released version 18.5 through Norton LiveUpdate. However, this update was later withdrawn due to numerous reports in the Norton forum that the update caused system instability and freeze during system scanning (both full and fast scans). This issue only affects some customers. Users affected by this update are advised to uninstall the product, run Norton Removal Tool, and reinstall version 18.1 from http://www.norton.com/nis11. Symantec then fixes the bug and re-releases the update.

After the acquisition of VeriSign Security by parent company Norton Symantec, some features of VeriSign are incorporated into the 2011 edition. This new product features a new Norton logo that uses the VeriSign check marks previously seen in the VeriSign logo itself, as well as some new iconic changes to the Norton Safe Web feature and Norton Identity Safe.

Version 2012 (19.x)

Released (19.1.0.28) on September 6, 2011, Norton Internet Security 2012 brings new features. One of the new features included in the new release is Download Insight 2.0, which not only monitors files for security but also file stability. That means that if the file is stable in Windows 7, but unstable in Windows XP, XP users will be notified of the instability of the file.

The enhanced eraser tool is highly integrated for better cleaning of infected systems. Once triggered, Norton Power Eraser a new, more powerful version restarted the system to find and remove fake antivirus software, fake antivirus software, and other embedded threats that are hard to remove. A new tool called Norton Management helps manage various computers and devices equipped with Norton software from a single location.

Other changes in this release include SONAR 4, Google Chrome compatibility for Identity Safe and Safe Web and the ability to store passwords and notes in the cloud. However, the License Agreement does not guarantee that passwords are stored securely and provide no repairs if cloud storage is compromised.

The user interface is also simplified with just three buttons. The third button opens a more sophisticated and complicated menu, where users can manage settings and access product features. The CPU meter removed from Norton 2011, also generates a return (only on the "advanced screen").

Combining netbooks and desktop lines, Norton Internet Security integrates Bandwidth metering, which controls the use of product traffic and brings it to a minimum if required. This is ideal for networks with limited traffic. Also, the user interface window adjusts according to the size of the computer screen.

This version of Norton Internet Security includes some Easter eggs. Pressing Shift 1, 2, 3 or 4 will change the theme to the default background (plain black), ray, animal, and flower respectively. Also holds Control Win Key Alt while pressing "performance button" to activate "Crazy Flip", which will make the window somersault. The effect will continue until the main window is closed and reopened.

Furthermore, scans are no longer scheduled via the Windows Task Scheduler, but through Symantec property rights, which perform computer temporary tasks in idle state (ie when the user is away from the computer).

Version 20.x (2013)

Version 20 (2013) initiated the "Version-less" approach by dropping the 20xx naming convention, and will automatically update itself as new releases become available. Important changes include a new user interface better suited to touch screen devices, "Social Networking Protection," which aims to protect against targeted threats on social networks, and is also the first release to officially support Windows 8.

Version 21.x (2014)

This version, released on October 7, 2013, became the last version to be marketed by Symantec. Norton Internet Security, along with Norton Antivirus and Norton 360, has been replaced with Norton Security.

Version 22.x (2015)

The updated version 22.5 was released in June 2015. It includes a refined user interface and Windows 10 Support.

Norton Security

In September 2014 Norton Internet Security folded into Norton Security, as part of the slimline Norton Symantec line.

Maps Norton Internet Security



Netbook Edition

Symantec has released a special edition of Norton Internet Security that is optimized for netbooks. It is available as a download from the Symantec website or in a USB thumb drive. Symantec states that the Netbook edition is optimized for netbooks. The main screen is optimized to provide support for 800 x 480 screen resolutions. In addition, unimportant tasks are pending while netbooks use batteries. In addition, the Netbook edition contains free access to online backup and Norton safe parental controls to protect children as they browse the web.

Norton Internet Security 2017 + Serial Key + Activation Code + ...
src: i.ytimg.com


Macintosh Edition

Version 1.0

Norton Internet Security version 1.0 for Mac was released on November 1, 2000. It can identify and remove Windows and Mac viruses. Other features include firewalls, browser blocking in the browser, parental controls, and the ability to prevent confidential information from being sent out of the computer. The user is prompted before the information can be sent. Merging iClean Aladdin Systems allows users to clear browser cache, cookies, and browsing history within the Norton interface. Operating system requirements for Mac OS 8.1. Hardware requirements call for 24 MB RAM, 12 MB disk space, and PowerPC processor.

Version 2.0

Norton Internet Security version 2.0 for Mac released on (date not known if you know please provide it). Version 2.0 is also linked to the WHOIS database, which allows users to track attacking computers. Users can inform the network administrator of the attacking computer for corrective action. When running under Mac OS 8.1 or 9, PowerPC processor, 24 MB RAM, and 25 MB of free space are required. Under Mac OS X 10.1, PowerPC G3 processor, 128 MB RAM, and 25 MB of free space are required.

Version 3.0

Norton Internet Security version 3.0 for Mac released on (date not known if you know please provide it). The next release, version 3.0, retains the feature set found in version 2.0. Firewalls now allocate the necessary internet access rather than relying on user input using predefined rules. Compatibility with OS 8 is dropped. When running under OS 9.2, PowerPC processor, 24 MB RAM, and 25 MB of free space are required. Under OS X 10.1.5 to 10.3, PowerPC G3, 128 MB RAM, and 150 MB of free space are required. However, version 3.0 is not compatible with Mac OS X 10.4, or "Tiger".

Version 4.0

Version 4.0 was released on December 18, 2008. Symantec also markets the Version 4.0 and 2009 version bundles for Windows, intended for users with Microsoft Windows and Mac OS X installed. iClean is removed from this release. The firewall now blocks access to malicious sites using Symantec's updated blacklist. To prevent an attacker from exploiting insecurity on Mac or installed software, take advantage of the protection introduced in this release. Phishing protection is introduced in this release as well. The operating system requirements call Mac OS X 10.4.11 or higher. A PowerPC or Intel Core processor, 256 MB of RAM and 150 MB of free space is required.

Version 5.0

features

  • Norton Safe Web: Proactively protects you as you browse the Web by alerting you about and blocking unsafe and fake websites right in your search results. (Mac OSÃ,® X 10.7 only)
  • Antiphishing Technology: Block fake phishing sites created to steal your identity and money.
  • Smart Two-Way Firewall: Prevents cyber criminals from hacking into your MacÃ,®, stealing your personal information and tinkering with your stuff.
  • Location Information: Lets you adjust your protection level depending on where you use MacÃ,® (at home, office, local coffee shop, on the street).
  • Vulnerability Protection: Daily updates to stop cybercriminals from using in-app vulnerabilities and other software to smuggle threats to your computer.
  • AntiVirus Protection: Protects images of MacÃ,®, iPhotoÃ,®, iTunesÃ,®, iMovieÃ,®, and all your important stuff from viruses, spyware, and other threats without slowing down your computer.
  • Secret File Keeper: The password protects your belongings to keep it safe from the eye that lurks.
  • Daily Protection Updates: Run in the background to protect your MacÃ,® - and your stuff - from new, broken threats.
  • Instant Messaging and Monitoring: Scans MobileMeÃ,®, iChatÃ,®, and other IMs for suspicious attachments and other tricks used to steal your identity and your hard earned money.
  • 24x7 FREE support: Symantec provides free 24-hour email, chat and phone support for the initial product installation. *
  • Protection options for Mac OS X 10.4 to 10.7: Includes Norton (TM) Internet Security 5 for MacÃ,® (for Mac OSÃ,® X v10.7)

norton internet security 2018 serial key free - YouTube
src: i.ytimg.com


Norton vs. more

Norton Internet Security underwent a major change in performance after Symantec rewrote their code for release 2009. Norton products now only have two running processes, using around 15 MB of RAM. According to PassMark Security Benchmark 2012, Norton AntiVirus and Norton Internet Security are the lightest suites available. AV-Comparatives.org also tested these products and delivered similar results. PC Magazine recognizes the 2011 and 2012 lines as the fastest and strongest in protection. PCWorld testing of security software puts Norton Internet Security 2009 in the first place. In the 2011 tests conducted by PC World , Norton Internet Security was the winner. Dennis Technology Labs (in a test sponsored by Symantec) confirmed the performance and effectiveness of Norton 2011 and the 2012 line.

Norton Security Premium 2016 License KEY (NEW December 2016) - YouTube
src: i.ytimg.com


Criticism of older versions before 2009

FBI Cooperation

Symantec, in accordance with the Federal Bureau of Investigation (FBI), Whitelist Magic Lantern, a keylogger actively developed by the FBI. The purpose of Magic Lantern is to obtain a password for encrypted e-mail as part of a criminal investigation. Magic Lantern was first reported in the media by Bob Sullivan of MSNBC on November 20, 2001 and by Ted Bridis of the Associated Press. Magic Lantern is used as an email attachment. When the attachment is opened, the trojan horse is installed on the suspect's computer. Trojan horses are activated when suspects use PGP encryption, often used to improve the security of sent email messages. When enabled, the trojan horse will record the PGP password, which allows the FBI to decrypt the user's communication. Symantec and other major antivirus vendors have used Magic Lantern Whitelist, making their antivirus products, including Norton Internet Security, unable to detect. Concerns include uncertainty about the full potential of the Magic Lantern and whether hackers can subvert it for purposes outside the jurisdiction of the law.

Graham Cluley, a technology consultant from Sophos, said, "We have no way of knowing if it was written by the FBI, and even if we did, we would not know if it was used by the FBI or if it had been confiscated by a third party." Another reaction came from Marc Maiffret, chief technical officer and co-founder of eEye Digital Security, "Our customers pay us for services, to protect them from any malicious code, not our duty to enforce the law for them, so we do not, and will not, make exceptions to malware or other tools. "

FBI spokesman Paul Bresson, in response to the question of whether the Magic Lantern needed a court order to deploy, said, "Like all technology projects or tools deployed by the FBI, it will be used in accordance with appropriate legal processes."

Advocates of Magic Lantern argue this technology will allow law enforcement to efficiently and quickly decrypt messages protected by the encryption scheme. Unlike its predecessor, Carnivore, implementing Magic Lantern does not require physical access to a suspect computer, which would necessitate a court order.

Uninstall

Older versions of Norton are very difficult and slow to remove, leaving many traces and sometimes with errors. However, in the 2009 version, Symantec displays their own uninstaller, which eliminates their product better and faster, usually in less than a minute. Norton Removal Tool is a well known instrument that removes Norton products completely, without a trace. This tool can be downloaded from the Symantec website].

Symantec reports that the Norton 2010 product suite has a cleaner removal and installation feature is the recommended route update for 2011. Link

Windows Service Package

When Norton Internet Security 2008 is installed, the user may experience an incompatible upgrade to Windows XP Service Pack 3 or Windows Vista Service Pack 1. The user reported many invalid registry keys that were added by a tool named fixcss.exe, resulting in a blank Device Manager and missing device such as wireless network adapter. Symantec initially blamed Microsoft for its incompatibility but has since accepted some responsibility.

Dave Cole, Vice President of Symantec & amp; General Manager, acknowledged that users who run Norton products encountered problems, but said the numbers are small. Cole also said that Symantec has done an "extensive testing" of its products with Windows XP SP3, but the problem is not found. Cole blames Microsoft "It's related to XP SP3." Microsoft recommends that users contact Windows customer support. To resolve the issue, Symantec has issued fixes intended for users before upgrading. Symantec also recommends to disable the tamper protection component in the 2008 release, called SymProtect. Tools to remove the added registry entries are also available from Symantec.

Windows Vista

Sarah Hicks, Symantec's vice president for consumer product management, voiced concern over the 64-bit PatchGuard feature of Windows Vista. PatchGuard is designed by Microsoft to ensure the integrity of the kernel, part of the operating system that interacts with the hardware. Rootkits often hide in the operating system kernel, complicated deletion. Mike Dalton, European President of McAfee said, "The decision to build a wall around the kernel assuming it can not be broken is ridiculous," claiming Microsoft prevented security vendors from effectively protecting the kernel while promoting its own security product, Windows Live OneCare. Hicks said Symantec did not mind the competition from OneCare. Symantec then published a white paper detailing PatchGuard with instructions for obtaining PatchGuard exploits. After negotiations and investigations from antitrust regulators, Microsoft decided to allow security vendors to access the kernel by creating API-specific instructions.

How To Activate Norton Internet Security 2012 - YouTube
src: i.ytimg.com


See also

  • Internet Security
  • Comparison of antivirus software
  • Firewall comparison
  • Peter Norton
  • Norton Antivirus
  • Norton 360

download and install norton internet security 2017 - YouTube
src: i.ytimg.com


References




External links

  • Official website
    • Norton Internet Security For Windows
    • Norton Internet Security For Mac
    • The Norton Partner Portal

Source of the article : Wikipedia

Comments
0 Comments