Norton Internet Security logo

Gaming Threats

Jun 29, 2010

0 comments

About podcast:
This Symantec Security Response podcast focuses on information-stealing programs designed to gather account information for online games.

The goal of this podcast is to help you better understand how these programs threaten more than just your online game account and how you can protect yourself from these types of threats.

Change the user name and password

Jun 27, 2010

0 comments

When you change your login ID for a Web page, Identity Safe lets you change the user name in Manage Logins. After you change the login ID or user name, the new user name appears when you revisit the login Web page.

In addition to changing the user name, you can also change the login password.

Managing URL details



0 comments

Manage Logins lets you view the URL of the logins that you saved. You can view the URL of the Web site logins that you save in Manage Logins.

When you save a login, you can do the following:
  • Quickly launch the Web site login page using the URL
  • Change the URL of the login manually

    Ensure that the URL you change belongs to the same domain as the current URL.
  • View the details of the date and time when you last made to the Manage Logins settings

Download free Norton Internet Security 2010 60-day trial



0 comments

If you're seeking a comprehensive security suite from one of the market-leading developers, this might be the solution

Love it or hate it, Norton Internet Security is tried-and-tested software that’s used by millions of users worldwide, often pre-installed on a new PC. It’s a complete suite of security software, consisting of the software-based tools you’ll require to safeguard your computer whilst you browse the Internet. These tools include an anti-virus client, anti-spyware, firewall, anti-spam and more.

Improved Norton Safe Web technology blocks Internet threats before they can infect your PC. So you can browse, buy and bank online with confidence. It even warns you of unsafe web sites right in your search results. Plus, unlike other Internet security suites, it provides easy-to-understand threat and performance information to help you avoid future threats and keep your PC running fast.

This is the latest 2010 edition of Norton Internet Security with various improvements such as professional-level anti-spam filtering and much more.


Donwload details:

file size: 98.8 MB
file name: NIS2010_60dayTMD.exe
download url: mirror 1

10 Most helpful user reviews about NIS 2010



0 comments

Most helpful cnet.com user reviews about Norton Internet Security 2010:

  1. Best security suite for all the AV haters
  2. Norton Internet Security 2010 is fast
  3. Good product, but the whole package expires
  4. Definitely worth upgrade and free if NIS has not expird
  5. Works well on XP, XP PRO & Vista
  6. Not worth the money even if it was free
  7. Its Way better than its predecessors
  8. A very nice, worthy security suite
  9. Average product
  10. Great Product

Save logins



0 comments

Identity Safe lets you save your logins when you log in to a Web page for the first time. You can save multiple logins for the same Web page. You can also save the same login for different Web pages.

When you provide your login credentials on a Web site, Identity Safe displays the Save your Login dialog box. You can use the Organize this Login drop-down list to save your login in a general folder. The folders that you create appear in the Save your Login dialog box. You can choose from the folders that are available in the drop-down list.

After Identity Safe saves a login, it automatically fills the login details next time you visit the Web page.

Manage logins



0 comments

The Manage Logins feature in Identity Safe lets you view all the logins that you want Identity Safe to manage. Login information includes information such as your email login credentials and Internet banking credentials.

Identity Safe provides you the option to save your logins when you enter your login information in a Web site's login page. You can instantly save your login information in Identity Safe.

Configure Identity Safe Settings



0 comments

You can use the various features in Identity Safe to manage your personal sensitive information. Logins, cards, and notes help you store and use your information in a secure way.

Log in to and out of Identity Safe



0 comments

Norton Internet Security provides various ways by which you can log in to or log out of Identity Safe.

You can log in to or log out of Identity Safe from the following areas of Norton Internet Security:
  • The Web Settings section in the Norton Internet Security Settings window
  • The Norton Toolbar
To secure your Identity Safe data when you are away from your computer, log out of Identity Safe to prohibit access by others.

When you have connected your external drives, in certain instances, Identity Safe automatically logs you out of the profile that you are logged in to.

Accessing Identity Safe



0 comments

You can access the Identity Safe from the following sections of Norton Internet Security:

  • From the Web Settings section in the Norton Internet Security Settings window
  • From the Norton Toolbar
You can access Manage Cards and Manage Logins from the Web pane in the Norton Internet Security main window.

Note:

You must be logged on to Identity Safe to access the Identity Safe features.

Locate your missing profiles

Jun 25, 2010

0 comments

When you create a portable profile, Norton Internet Security creates a folder, Norton Identity Safe Data, in the root directory. It also creates an index file, which is an invisible file that tracks the location of the Norton Identity Safe Data folder. The Missing Profile dialog appears when Norton Internet Security is unable to locate the Norton Identity Safe Data folder.

Switching profiles

Jun 24, 2010

0 comments

When you insert an external drive, after you set up a local profile, Identity Safe automatically detects the presence of the drive. It offers you the option to create a portable profile. In case you have already configured a portable profile in the drive, you have the option to switch to the portable profile.

If you do not want Norton Internet Security to display the Switch Profile window next time, you can check the Don't ask again option.


Note:

Norton Internet Security automatically logs you out of your current profile when you switch to another portable profile.

Restore or reset Identity Safe password

Jun 21, 2010

0 comments

There may be instances when you may need to either restore your Identity Safe data or reset Identity Safe settings.

You may need to restore or reset on the following occasions:
  • You experience a computer failure.

    Your Identity Safe data might have been damaged. If Identity Safe does not recognize your correct password, you can restore your data. If you are sure that your password is correct, first try to restore your Identity Safe data. Some data may be lost, but all critical information such as logins, cards, and notes are retained.
  • You forget your Identity Safe password.

    Norton Internet Security lets you enter an incorrect password twice. If your attempts are unsuccessful, Norton Internet Security provides you the option to restore Identity Safe data or reset your Identity Safe password.

Export Identity Safe data to portable profile

Jun 15, 2010

0 comments

Identity Safe lets you export your current profile to an external drive that you connect to your PC.


Note:

Norton Internet Security does not support external drives such as floppy drives, CD drives, DVD drives, and devices that require Media Transfer Protocol or Picture Transfer Protocol.
If you already have a profile configured in the external drive, this option does not appear in the Identity Safe settings of the current profile.

Rename Identity Safe profile

Jun 12, 2010

0 comments

Identity Safe lets you name the profiles you create using Profile name option present in the Set up Norton Identity Safe dialog box. Later, if you want to rename your profiles, you can use the Rename Profile option present in the Web Settings window. When you log in to Identity Safe next time, the new name is displayed in the Log-in to Identity Safe dialog box.


Note:

The Log-in to Identity Safe dialog box displays only your portable profile's name.

Keeping Your Identity Safe



0 comments

It may sound crazy, but even kids as young as 10 can benefit from being careful with what information they give out. Look at Myspace and Facebook and what information some people post. Real names, where they live, where they will be and at what time. That is a set-up for danger. Cyber stalkers use sites like these to pick out victims. Don’t be one.

Be careful who you accept as a friend online. The other person could be posing as someone you may know or like to know and may be someone with bad intentions. If you let people see everything you post, you could set yourself up for trouble. There are scammers out there who will take over the identity of a friend of yours, post that they were mugged and had all of their money stolen and they will ask you to send or wire money to them. Don’t fall for that.

Import logins



0 comments

Identity Safe lets you import the logins that you have saved in Internet Explorer. Immediately after you create an Identity Safe profile and save a password for it, the Import Logins dialog box appears. You can use this dialog box to import your logins.

The imported logins appear in the Cards & Logins menu on the Norton Toolbar and in the Manage Logins window. You can use the imported logins the same way that you use the logins that you create.

Create a portable profile



0 comments

When you insert an external drive, Identity Safe automatically detects the presence of the drive. It displays the Create A New Profile dialog box and offers you the option to create a portable profile. You can choose an option, and then proceed to set a password and a name for your profile.

You can also use the Identity Safe Setup option to configure a portable profile. The option appears until you configure a local profile and portable profiles in all external drives that are connected to your PC.

By default, the phrase My removable media appears as the profile name. You can rename it as necessary. Symantec recommends that you provide a portable profile name that you can easily identify.


Note:

Ensure that the external drive on which you create a new profile has at least 5 megabytes (MB) of free space.
Norton Internet Security supports the following external drives on which you can create your portable profiles:
  • Universal Serial bus (USB) flash drives
  • Portable USB hard drives
  • Cameras
  • MP3 players
  • Cell phones
  • Zip drives

Create a local profile

Jun 11, 2010

0 comments

Norton Internet Security provides the Identity Safe Setup option to create local profile and portable profile. The option disappears after you successfully create local profile a portable profile.

The option disappears in the following cases:
  • If you have not connected an external drive, the option disappears after you create the local profile.
  • If you have connected one or more external drives after you created local profile, the option disappears after you create portable profile on all the external drives.
You can use the Set up Norton Identity Safe window to set a password for the profile that you create and also provide a name for the profile. By default, the Windows User Account name appears as the profile name. You can rename it if necessary.

Create Identity Safe profiles



0 comments

Identity Safe lets you create one local profile per Windows User Account and one portable profile per external drive. You can create and save data in a portable profile in the same way you create and save data in a local profile. You can also provide a name to the profile so that you can easily identify the profile you are logged on to.

When you insert an external drive, after you set up a local profile, Identity Safe automatically detects the presence of the drive. It offers you the option to create a portable profile. In case you have already configured a portable profile in the drive, you have the option to switch to the portable profile. You can use multiple external drives at a time. However, you can create only one portable profile per external drive.

Identity Safe profiles



0 comments

You can create a local profile for each Windows User Account on your computer. The data that you save and the Identity Safe settings that you make are specific to that local profile. You cannot access the data that you save in one Windows User Account from another Windows User Account. This way Identity Safe protects your sensitive data from the misuse of multiple users of your computer.


Note:

Symantec recommends that you create separate password-protected Windows User Accounts if you want to share your PC across multiple users.
In addition to the profile that you create on a Windows User Account, you can also save your Identity Safe data on an external drive. The profile that you create on a removable drive is called portable profile.

Identity Safe



0 comments

Identity Safe secures your personal information and protects your online identity. You can store your web login credentials in Identity Safe and create one login for Identity Safe to manage the saved login credentials. It provides additional security by providing a secure storage for username, passwords and other personal information such as addresses and credit cards for online transactions.

Identity Safe helps you manage your identities and provide additional security while you perform online transactions.

The following features in Identity Safe provide secure storage of your sensitive information:

Manage Logins Stores login information, such as your online bank account, email user ID, or password
Manage Cards Stores your personal information, such as addresses, date of birth, and credit card information
Manage Notes Stores the details, such as passport numbers and social security numbers

Securing your sensitive data



0 comments

The Internet provides the fastest and the easiest way to exchange information. In spite of the many advantages that the Internet provides, you are vulnerable to information theft and identity theft. Information can be stolen and misused in several ways.

Following are a few of the most common methods of information theft:

  • Online financial transactions
  • Unsafe online storage of sensitive information
  • Misuse of your identity while you communicate online

Safe Surfing



0 comments

When you install Norton Internet Security, it adds the Norton Toolbar to Internet Explorer and Firefox. Norton Internet Security protects your Internet Explorer browser and Firefox browser when you turn on the Safe Surfing option.

When Safe Surfing is turned on, Norton Internet Security enables the Antiphishing feature and the Norton Safe Web feature. Antiphishing analyzes the security levels of the Web sites you visit and displays the results in the Norton Site Safety pop-up. The Norton Safe Web feature provides you a safe Web search environment by displaying the site-rating icons next to every search result.

Search the Web using Norton Safe Search



0 comments

Norton Safe Search enhances your Web search experience. When you search the Internet using Norton Safe Search, it uses Ask.com to generate search results. Norton Safe Search provides site safety status and Norton rating for each of the search results generated.

By default, the Norton Safe Search box is disabled. After you install Norton Internet Security and open Internet Explorer or Firefox for the first time, an alert message is displayed. The alert message prompts you to enable Norton Safe Search. You can choose to enable or disable Norton Safe Search.

As you type a few letters in the search box, Norton Safe Search displays the search suggestions in the search box pop-up. You can see the search suggestions after you type three or more characters in the search box. It also provides you the intelligent search-as-you-type feature that displays search suggestions when you type a few letters of the search phrase.

Norton Safe Web



0 comments

Norton Safe Web protects your computer while you browse the Internet using Internet Explorer or Firefox. It analyses the security levels of the Web sites you visit and indicates if the Web sites are free from threats. For online shopping Web sites, Norton Safe Web also indicates whether the Web site offers safe online shopping experience. The Enhance Search Engine Results feature of Norton Safe Web lets you know that a Web site is malicious even before you visit it. It provides you a safe Web search environment by displaying the site rating icons next to every search result.

You can view the site safety status of any Web site using the Full Report option on the Norton Site Safety pop-up. You can also use the Community Buzz option on Norton menu to view the safety status.

Report an incorrect evaluation of a suspicious/safe Web page



0 comments

On rare occasions, Antiphishing may report an evaluation of a Web page that you suspect to be in error. For example, you might visit a site that you shop with regularly and Antiphishing says that the page is fraudulent. On the contrary, you might visit a Web page that you suspect is a phishing page, but Antiphishing reports that no fraud was detected. In either case, you can report the page to Symantec for further evaluation.

Antiphishing



0 comments

Antiphishing protects you from visiting unsafe Web sites. When Antiphishing is turned on, the Antiphishing component analyzes the security level of the Web sites that you visit. It then displays the results in the Norton Site Safety pop-up.

Antiphishing provides you the following information about the Web pages:

  • If it is safe to enter confidential information
  • If the Web page is known to be fraudulent
  • If the Web page is authentic and Symantec approved
  • If the Web page is known to belong to a suspicious site
  • If the Web page is known to give annoying results
The Site Safety bar in Internet Explorer and Firefox lets you view more details about the status of the Web page.

Instilling Internet Confidence for Parents and their Children



0 comments

About podcast:
Online activity is part of everyday life for children. However, the wonders and power of the Internet are not without their challenges and dangers. In fact, today's parents rate Internet dangers higher than drugs on their list of concerns. Symantec's Internet safety advocate advises parents to take a multi-pronged approach to protect their children.

View the device details



0 comments

The Network Security Map lets you view the details of the computers that you remotely monitor. You can view the following details:

  • The configuration status of your protection features, such as Auto-Protect, Intrusion Prevention, and Email Scanning
  • The configuration status of your definition updates, such as Automatic LiveUpdate and Pulse Updates
  • The version number of your Norton product
  • The subscription status of your Norton product
  • The configuration status of your transaction security, such as Identity Safe and Antiphishing

View the status of your wireless network



0 comments

You can view the status of your wireless network in the Network Security Map window. The Network Security Map displays the status of your wireless network as secure or not secure. A secure network requires a strong wireless encryption. If your wireless network is not secure, you can turn on encryption on your wireless router.

Remove devices from the Network Security Map



0 comments

The Network Security Map window lists the devices that are connected to your network. You can remove a device or a computer from the Network Security Map. You can purge all devices from the Network Map and create a new list of devices.

For example, you can purge all the devices that were present in your previous network before you connect to a new network. Ensure that you disable Remote Monitoring before you purge the Network Map. Norton Internet Security cannot purge the Network Map when the Remote Monitoring is turned on. Also, ensure that you close the Network Security Map window before you purge the Network Map. You cannot purge the Network Map when the Network Security Map window is open.

Change the trust level for your network and devices

Jun 10, 2010

0 comments

The trust level determines the default level of access that devices on your network have to your computer. Any device on your network that is not explicitly Trusted or Restricted uses the trust level of your network. The initial network trust level is set based on the configuration of your computer.


Note:

Ensure that you change the trust level of a device to Full Trust, if it is a known device, and is connected to your network.
The following conditions are necessary for the trust level of a device to be Shared:
  • The computer should not have a public IP address.

    Your computer does not have a public IP address if it is not directly connected to the Internet.
  • The computer should be connected to a LAN through a secure connection.
  • The network category should be private in Windows Vista.
In addition, the trust level of a device is Shared in any of the following cases:
  • When the computer on the network has one or more folders or printers that are shared
  • When the computer is Media Center compatible (for example, if you have Windows XP Media Center Edition, Windows Vista Home Premium, Windows Vista Ultimate, or Windows 7)

Note:

If you use a wireless network that is not secure, the default trust level of all the devices that are on the network is Protected.
The trust level of a device also depends on the trust level of its network. When you change the trust level of a network, Norton Internet Security assigns the same trust level to all the devices that are connected to that network. However, Norton Internet Security does not change the trust level of the devices that you individually trust or restrict.

June State of Spam & Phishing Podcast



0 comments

About podcast:
Eric Park and Deaddin Edris from Symantec discuss the June State of Spam & Phishing report in this monthly podcast series. Topics include the volume of spam seen by Symantec in the previous month, the latest spam trends and techniques, and tips on how to avoid spam messages. The State of Spam & Phishing report leverages security data from the Symantec Global Intelligence Network to keep organizations and consumers informed of the latest threats to their messaging infrastructure.

Edit network details



0 comments

You can view the details and change the name of your network in the Edit Network Details window.


Note:

You cannot edit the Trust Control network details.

Edit device details



0 comments

You can change the name and category of a device that is available on the Network Security Map. You can select the categories such as Generic Device, Laptop, Media Device, or Game Console.

You cannot change the category of the device that you added manually. By default, Norton Internet Security displays the category of the manually added device as USER DEFINED.

The Network Security Map window displays different icons, depending on the category that you select. Icons help you to identify the devices that are listed in the Network Map.

Find IP address



0 comments

You can find a computer's IP address in various ways. On Windows 2000/XP, Windows Vista, and Windows 7 computers, you can use Ipconfig to find the IP address of a computer.

Ipconfig reports the IP address of its local computer only. You must run this program on the computer that you want to identify.

Add a device to the Network Security Map

Jun 8, 2010

0 comments

You can manually add a computer or device to the Network Security Map.

You can add the following details when you add a device:
  • The name or description
  • The IP address or physical address
The Network Security Map finds any computers that are connected to your network. However, you can add the computers and the devices that are currently not connected.

Norton Internet Security adds to the Trust Control network all the devices that you manually add to Network Security Map. You can select the Trust Control network in the Network Details drop-down list to view the devices that you added. You can also edit the name of the device.

Note:

You cannot edit the Trust Control network details.

Turn off Remote Monitoring

Jun 5, 2010

0 comments

When you turn off Remote Monitoring, you stop remote monitoring of the computers that are connected to your network.

You can turn off Remote Monitoring for the following:

  • All of the computers that you remotely monitor
  • An individual computer that you remotely monitor

Note:

You can turn off Remote Monitoring only after you complete the Remote Monitoring Setup process.

Set up Remote Monitoring



0 comments

You can set up Remote Monitoring by allowing computers on your network to communicate with your computer.


Note:

Ensure that the computers that you want to remotely monitor have a version of a Norton product that supports Remote Monitoring.
Norton Internet Security requires a Passkey to set up Remote Monitoring. You must type the same Passkey for all the computers that you want to remotely monitor.

View devices on the Network Security Map

Jun 3, 2010

0 comments

The Network Security Map window provides a pictorial representation of the devices on the network to which your computer is connected. You can view the details of each device before you set up Remote Monitoring.

The Network Security Map window also provides the security status of the following computers:

  • The computer on which you view the remote monitoring status (MY PC)
  • The computers that are remotely monitored

Network Security Map



0 comments

A home network typically consists of the computers and other devices that share your Internet connection. The Network Security Map helps you view and manage your network.

After installation, Norton Internet Security automatically detects the devices that are connected to your network and lists them in the Network Security Map. You can view devices and customize the Network Security Map to remotely monitor the computers on which a Norton product is installed.


Note:

Ensure that the computers that you want to remotely monitor have a version of a Norton product that supports Remote Monitoring.

Turn on or turn off the Web Query

Jun 1, 2010

0 comments

Norton AntiSpam uses local filters to identify spam email messages. The email messages that the local filters do not identify as spam are then scanned additionally through the Web Query filter. Web Query filter analyzes the signature and URL hashes of the email messages to classify them as legitimate email or spam email.

If the email message is identified as spam, then Norton AntiSpam alters the subject of the email message. Norton AntiSpam then sends the email message to your email program. Based on predefined email rules, the email program then moves the email message to the Junk folder or the Norton AntiSpam folder.

Web Query



0 comments

With the increase in usage of email, many users receive a number of unwanted and unsolicited commercial email messages that are known as spam. Not only does spam make it difficult to identify valid email messages, but some spam contains offensive messages and images. The Web Query is a feature of Norton AntiSpam that Norton Internet Security uses to classify the email messages more effectively.

An effective spam filtration is possible when each email message that you receive is scanned through different filters. With only one or two levels of email filters, a high percentage of legitimate emails is misclassified as spam or spam is misclassified as legitimate. To avoid such misclassification, Norton AntiSpam employs different filters. Each email filter uses a unique approach to filter spam email messages from legitimate email messages.