Tuesday, December 23, 2008

Day 30

23 November 2008
Puan Wan Asiah came to my workplacement/internship today with Puan Amnah to evaluate me. At first she meets Puan Farah which is my industrial supervisor. Maybe there's a secret between them. Hehe. Don’t know. I just said maybe. After half and hour Puan Farah called me. She told that Puan Wan Asiah wanted to interview me. Huhu. Then I came to the meeting room where Puan Asiah waited for me to evaluate me. She asked me how you’re practical here. Then I told her that it is not so busy because all the employees have their own work and I got I own task which is my industrial supervisor gave me. She asked me again about this place. Then I told her the true story of this place. It is a big company that has a big business. This company owned by a bumiputra and the first owner was dead and the company was taken by his son which is Mr.Riza. He's a rich man and very close with his employees. Beside that I also explain about my work here to Puan Wan Asiah. What I do here and everything about my company. Then I go through with by task. I explain about my task which is about Kaspersky antivirus for business. Err! I so nervous because there are three women was hearing what I will present to them. Huh! Feel really² nervous but I try to control my feeling. Slowly I take a deep breath and told them everything. This is what we call a learning process. It is hard when you learn something new and it will be harder when you didn't try to grab and solve the problem. Yeah! Frankly speaking I’m not a best student like others but I still try to follow the flow to be like them. Continue later~

Sunday, December 21, 2008

Day 29

22 December 2008
I was prepared my report for tomorrow because tomorrow my academic supervisor will visit and evaluate me. I have to read all task and understand it before my academic supervisor ask me what am I doing for two months. So, good luck for me tomorrow!

Friday, December 19, 2008

Day 28

19 December 2008
There’s no task for me today because I have settled my task and prepare for my presentation next week. I have called Puan Wan Asiah for confirmation date that she will come to visit my internship place. So, she confirm with me and my industrial supervisor to visit me next week on Tuesday 23rd December 2008. Other than that I studied my proposal and my idea of marketing strategy.

Thursday, December 18, 2008

Day 27

18 December 2008
I have submitted my marketing strategy idea today. Then, Puan Tengku Farah told me to follow her meet the person who wants to present the new product from his company which is printing system that can decrease cost of printing, fax and copy. It is interesting because the system can save the printer and the electric.

Wednesday, December 17, 2008

Day 26

17 December 2008
I have completed my task today which is my own idea to improve kaspersky marketing strategy. Below is my idea of marketing strategy
Idea to improve marketing strategy
Advertising – Advertise the product through newspaper, magazine and etc.

Promotion – Promote latest product at corporation, internet cafe, school, student and worker.

Production – Control the production systematically. Example: Don’t develop new product too fast. Try to control the production because it can cause excessive.

Benefit for customer – Provide customer with more benefits than other competitor and provide the customer at the highest satisfaction which is give customer benefit when they buy the product such as thumb drive or any merchandise.

Join PC Fair – Sell the product at a lower price that can convince customer and promote the new product such as the latest product Kaspersky 2009.

Open Booth – Open booth at any carnival or strategic place to get further customer such as pc fair to promote product.
How we convince user
Kaspersky antivirus has produce two products for business which is Open Space Security (Integrated Security) and Stand alone (Targeted Security). User can choose either of the products to get full protection from the virus. Both of the products have their specific advantages. For Integrated Security, the protection extends beyond the workplace to reach remote users and an increasingly mobile workforce. Furthermore, Integrated Security defends all types and sizes of network with protection for workstations, smart phones, files servers, mail servers and gateways. Open Space Security divided by four securities which is Work Space Security, Business Space Security, Enterprise Space Security and Total Space Security. Altogether security protects network structures of all sizes from basic to complex.
Targeted security protects specific points of the network which is specific for file servers, mail servers, internet gateways and workstations. It is stand alone product because the protections are not extends beyond the workplace. Benefits that user will get when they buy this product is the computer is protected from the viruses and we can guarantee user of this product because we have been experimented this antivirus product and make a comparison against other antivirus product.
Why Buy Antivirus Software
An unprotected computer is a vulnerable computer, plain and simple. Every year there are hundreds of viruses, Trojans, worms and other malware, released into cyberspace designed to harm your computer. Most people don’t realize that malware is everywhere and avoiding the malicious computer invader is very difficult. And usually, you won’t even know you’ve become a victim.
There are many different types of viruses floating through the internet. Consider yourself lucky if you have never been the victim of a virus. If you have ever come back to your computer and found it won’t start and all your files erased and unrecoverable, you know exactly why you need to protect your computer. A typical virus will essentially wipe out the master boot record of your computer and making it completely unusable. In some cases, the only thing left to do is to reformat your hard drive and reinstall your operating system and lost all your important data. Kaspersky antivirus will stop viruses before they ever reach your hard drive and keep your computer safe, usually without you noticing.
More than 80% of home computers have spyware installed on them nd the user don’t even know it. Spyware or sometimes called adware is small, seemingly innocent piece of software that embeds itself in your internet browser. As you surf the internet, signing into email, social networks or bank accounts, the spyware program reports back to home base with all your personal information. Before long, your resources are drained, your computer slows down, and some stranger knows everything about you.
Rootkits are also types of spyware. In this case, a hacker takes control of your computer without you knowing and uses your hard drive and IP address to infect others. This type spyware is difficult to detect on your own, but Kaspersky antivirus will detect a dangerous download and immediately delete the file.

What to Look for Antivirus Software
5 elements to look for antivirus which is

  • Ease of use
  • Effective in identifying viruses and worms
  • Effective at cleaning or isolating infected files
  • Activity reporting

Tuesday, December 16, 2008

Day 25

16 December 2008

Today I still in progress do the marketing strategy and still searching information about Kaspersky antivirus. Beside that, I wrote a summary about my idea and make a correction about my conclusion. I try to find as much information as I can to master the product. There is lots of information in the Internet that I used to widen my knowledge to have an idea to improve the marketing strategy. That's all for today task.

Sunday, December 14, 2008

Day 24

15 December 2008
I am tired today because I can't sleep last night. I feel so sleepy at the office. For today, I elaborated my idea and give some example how to improve the marketing strategy and convince customer to satisfy with our product.

Friday, December 12, 2008

Day 23

12 December 2008
Today I wrote about idea to improve marketing strategy. The idea content about advertising, promotion, production, benefit for customer, join pc fair, and open booth to increase marketing strategy. Other than that I elaborated how user can convince with our product. The content is about comparison targeted security against integrated security. Then I wrote about comparison against Norton, McAfee, Trend Micro and Microsoft antivirus. It shows how powerful Kaspersky antivirus can detected any of viruses within less time compare to other antivirus. I also write a conclusion to prove that Kaspersky antivirus is the best product in world!:)

Thursday, December 11, 2008

Day 22

11 December 2008
I was search about marketing strategy for today because my site supervisor which is Puan Tengku Farah wants to see my creativity about marketing strategy. She told me to create my own marketing strategy about how to promote Kaspersky antivirus. To be continue~ Tara! Haha:D

Tuesday, December 9, 2008

Day 21

10 December 2008

I'm too tired today to go office because I have come back to work after Hari Raya Aidil Adha celebration. Hurm. I came to work and I try to compare what is differentiating against Open Space Security and Targeted Security. And all the problem that I solved for today is Open Space Security protects extends beyond the workplace to reach remote users and increasingly mobile workforce. Open space security included Work Space Security, Business Space Security, Enterprise Space Security and Total Space Security. Every single security has their special protection. Total security has the best protection because it protects the entire security. Types and sizes of network that Open Space Security protects are workstations, smart phones, files servers, mail servers, and gateways. Targeted Security is a stand alone product that protects specific points of the network. Targeted Security protects for file servers, mail servers, Internet gateways and workstations. The different between these two products is their style of protection.

Thursday, December 4, 2008

Day 20

5 December 2008
For today I search about how to convince customer to buy our product and how to improve marketing strategy. There is much information about how to convince customer and how to improve marketing strategy and I have job down some important information that I will be used to promote the kaspersky for business product.

Day 19

4 December 2008
Early in the morning I discuss with Pn. Tengku Farah about my next task. Then she ask me about my strategy how I want to sweeping customer to buy our Kaspersky antivirus product. Then she told me that I have to be creativity to attract the customer. Sources I have to use my creativity to get more information about marketing strategy. So I try to find sources how much I can. It's not a simple task because it takes time to get information about.

Tuesday, December 2, 2008

Day 18

3 December 2008

I was rushed to come to office today because I overslept but thank god I arrived on 8.30a.m. Then I go to the pantry and ate some bread for my breakfast and drink nescafe tarik because I am excessive. After that I go to my desk and switch on my computer and try to find some information for my proposal. Then I check my proposal if there any error that I has to corrected. I add references at my proposal and correct my words and try to improve my language and check with the dictionary using Google portal.

Day 17

2 December 2008
For today I add some information for my proposal such as awards, certificates, how to buy Kaspersky antivirus and the price. That's all for today task.

Monday, December 1, 2008

Day 16

1 December 2008

Puan Tengku Farah told me to check all the CPU and monitor. If the CPU not function, She told me to take out the 4 item which is RAM, hard disk, CD-R and network card because all the item can still be used in case if emergency. After that I rearrange all the CPU and monitor at one suitable place. That's all for today:)

Thursday, November 27, 2008

Day 15

28 November 2008

Today I do the same task like yesterday. I do the checklist for Puan Tengku Farah because she still got fewer. So, this is my task today. Then I have to send an email to her after complete this task.
First Page of the checklist

Second page of the checklist
Third page of the checklist

Detail of checklist


Wednesday, November 26, 2008

Day 14

27 November 2008

Today I have been told by Puan Tengku Farah to check all IP address in the office because she's got fever. For me this is complicated job. Err! Below is my recent checklist.


I have to check Hard disk size, Microsoft Office Edition, Window Edition and RAM. Then I have to list all the details and user name.







Tuesday, November 25, 2008

Day 13

26 November 2008

Today I come out with full proposal and I give to my supervisor to check if I should add some information or there something wrong with my proposal.


Product Title

Kaspersky Anti-Virus Product for Business

Introduction

Kaspersky Lab, Ltd. develops, produces, and distributes information security software solutions to protect information from viruses, spyware, crimeware, phishing, hackers, and spam for home users and enterprises. Its products include Kaspersky Internet Security 2009, which offers protection for the client’s personal computers. Kaspersky Anti-Virus 2009 that offers protection from information technology threats. Kaspersky Mobile Security, which protects smart phones from Internet attacks, malicious programs, and SMS spam and Kaspersky Open Space Security and Targeted Security that are designed to defend various types and sizes of networks with protection for workstations, file servers, mail servers, and Internet gateways. The company also provides hosted security and support services. Kaspersky Lab, Ltd. was founded in 1997 and is based in Moscow, the Russian Federation with regional offices in the United Kingdom, France, Germany, the Netherlands, Poland, Japan, China, Korea, Romania, and the United States.

Company Profile

Kaspersky Lab, Ltd is an information security software vendor, develops, produces, and distributes anti-virus software and secures content management solutions. We offer various home and home office products, such as Kaspersky Internet Security, which protects from viruses, spyware, spam, and privacy threats. Kaspersky Anti-Virus, an antivirus software that protects personal computers from viruses, trojans, spyware, rootkits, and other malicious programs, and Kaspersky Anti-Virus Mobile, which protects smart phones from malicious programs that target mobile platforms. We provide products for businesses, including Kaspersky Work Space Security, which offers centralized protection for workstations. Kaspersky Business Space Security that provides protection for workstations and file servers from various types of contemporary Internet threats. Kaspersky Enterprise Space Security, which protects workstations, file servers, and mail servers from Internet threats, and Kaspersky Total Space Security, which provides integrated protection for all nodes in corporate networks. We also offer Kaspersky Anti-Virus for MIMESweeper; Kaspersky Security for PDAs, mail server, anti-spam, and Internet gateway, and file server protection solutions, including anti-virus for file server. The company has strategic partnerships with Microsoft, Intel, IBM/Lotus, Novell, Check Point, Linux Solutions, SUSE, and Red Hat.

For Business Kaspersky Anti-Virus have two product which is:


(Integrated Security) (Targeted Security)

Kaspersky Anti-Virus Product Details and Product Features

Essential Protection

Protects from viruses, Trojans and worms
  • Blocks spyware and adware
  • Scans files in real time (on access) and on demand
  • Scan email messages (regardless of email client)
  • Scans Internet traffic (regardless of browser)
  • Protects instant messengers (ICQ, MSN)
  • Provides proactive protection from unknown threats
  • Scans Java and Visual Basic scripts

    Preventive Protection
  • Scans operating systems and installed applications for vulnerabilities
  • Analyzes and closes Internet Explorer vulnerabilities
  • Disables links to malware sites
  • Detects viruses based on the packers used to compress code
  • Global threat monitoring (Kaspersky Security Network)

    Advanced Protection and Recovery
  • The program can be installed on infected computers
  • Self-protection from being disabled or stopped
  • Restores correct system settings after removing malicious software
  • Tools for creating a rescue disk

    Data and Identity Theft Protection
  • Disables links to fake (phishing) websites
  • Blocks all types for keyloggers

    Usability
  • Automatic configuration during installation
  • Wizards for common tasks
  • Visual report with charts and diagrams
  • Alerts provides all the information necessary for informed user decisions
  • Automatic or interactive mode
  • Round-the-clock technical support
  • Automatic database updates

    System Requirements


  • Microsoft XP or vista
  • Intel Pentium 300MGz or higher
  • 256MB available RAM
  • 50 MB free space on the hard drive
  • CD-ROM
  • Internet connection
  • Microsoft Windows Installer 2.0

    Main Advantages

    Highly effective antivirus protection.
  • In Kaspersky Anti-Virus 6.0, the latest proactive technologies have been added to signature-based technology that provided top-quality virus detection and treatment in previous versions. The new proactive technologies protect against new viruses by analyzing the processes and behavior of application installed on computers.

    Optimized for INTEL CORE 2 DUO.
  • The program offers a numbers of advantages for users of desktops and laptops with new Intel Core 2 Duo processors. These include options for economy mode to conserve battery energy and WIFI (wireless) Internet access to automatically update antivirus databases.

    Simplicity and ease of use.
  • Kaspersky Anti-Virus 6.0 can be installed and set up in a matter of minutes, and the context sensitive help enables users to understand the finer points of the application’s settings. Moreover, the program regularly notifies users of its current protection status and gives recommendations for dealing with difficult situations.

    Kaspersky Anti-Virus means:

    Antivirus protection

    Email protection.
  • The program scans email traffic for viruses according to the protocol via it is sent (POP3, IMAP, and NNTP for incoming mail and SMTP for outgoing mail) on any mail program. We offer plug-ins and treatment for viruses in mail databases for the popular mail programs, Microsoft Outlook and Microsoft Outlook Express.

    Scanning of Internet traffic.
  • The solution scans all the HTTP Internet traffic for viruses in real time, which means that contaminated objects are repelled when saved on the computer’s hard disk.

    Protections for file systems.
  • All individual files, catalogs and disk can be scanned for viruses. Moreover it is possible to designate only critical areas of the operating systems and objects downloaded upon launch of Microsoft Windows for scanning. This saves time, since attention is focused only on areas and objects most likely to become infected.

    Proactive protection

    Control over changes over file system.
  • With Kaspersky Anti-Virus 6.0 it is possible to compile lists of applications, the component structure which will be controlled, thus helping to prevent malicious program from undermining the integrity of the application.

    Monitors processes in the memory.
  • The product monitors the activity of programs and processes that run in the computer’s memory and, at the same time, warns users of any dangerous, suspicious or hidden processes (rootkits), and of unauthorized changes in routine processes.

    Monitors changes in the operating system registry.
  • The application controls the status of the systems registry and notifies users of any suspicious objects or attempts to create hidden keys in the registry.

    Blocks dangerous macros.
  • Proactive protection affords control over the operation of macros based on Visual Basic for Applications in Microsoft Office documents, blocking dangerous macro commands from being executed.

    Systems restore.
  • This application includes new technology for restoring systems after malicious activity from spyware. Kaspersky Anti-Virus 6.0 records all changes in the registry and files systems of the computer, and rolls them back once authorization from the user is received.
    Fast Operating Speeds

    Technology for accelerating antivirus scanning.
  • Kaspersky Anti-Virus 6.0 can be set up to scan only new and changed files, which ensures faster operating speed. Antivirus scanning can be suspended during times of increased user activity to ensure that your computer’s resources are free for your use.

    Reduced update sizes.
  • The size of updates downloaded to user computer has been reduced almost 10 times (now amounting to several tens of kilobytes) in Kaspersky Anti-Virus 6.0, making our updates virtually instant.

    Product Summary

    The Good
  • Kaspersky Anti-Virus 6.0 offers superior antivirus protection has free and paid version supports Windows 98 through Windows VISTA.

    The Bottom Line
  • Kaspersky Anti-Virus 6.0 is light and fast and consistently detections awards against the competition it’s worthy of Cnet Editors Choice designation

    Specifications
  • License qty: 1 user; License type: Subscription license; Min Operating system: Microsoft Windows XP Home Edition SP1 or later, Microsoft Windows NT Workstation 4.0 SP6a, Microsoft Windows Millennium Edition, Microsoft Windows 98 Second Edition, Microsoft Windows 2000 Professional SP3 or later, Microsoft Windows XP Professional

    Target User
  • Company
  • College
  • School
  • Internet Cafe

  • Day 12

    25 November 2008

    Worm or Virus…What’s the difference?


    Everyone has been infected with a virus at one time or another either through the common cold or the flu. A virus attacks the human body by entering through one of the many opening and attaching itself to a host cell. It releases a piece of genetic information into the cell and recruits the cell’s enzymes to propagate the genetic information. Once the genetic code has been adequately replicated, it destroys the cell and attacks cells nearby.

    How does a computer virus simulate a biological virus?

    Just as a biological virus injects its own genetic information into a cell and interferes with the body’s normal operations, a computer virus is a program written to interfere with the proper functioning of a computer. It may damage programs, delete files, reformat hard disk and perform other forms to destructive acts.

    To be classified as a virus, a program must meet two criteria. It must be able to execute itself by placing its own code in the execution path of another program. The program must also be able to replicate itself by replacing existing computer files with copies of the virus-infected files. Similar to the way a biological virus requires a host cell, a computer virus requires an infected host file to propagate itself.

    Viruses have become the villains of the computer world, propagating themselves and destroying everything in their path. However another tool of destruction, known as the worm, has been creeping in the computer industry.

    Most of us have heard of the dreaded Blaster worm that attacks Microsoft websites, but what exactly is a worm and how does it differ from the virus?

    Actually, a worm is a type of virus that attacks a computer in a method differing from the way the typical virus attacks a computer. Unlike the typical virus, the worm does not require a host program to propagate. A worm enters a computer through a weakness in a computer system and propagates itself using network flaws.

    The typical virus requires activations through user intervention, such as double clicking or sending outgoing email. However, a worm releases a document containing the “worm” macro and sends copies of it to other computers through network flaws, therefore bypassing any need of user intervention.

    So, what you can do to protect your computer from virus infection?

    There are a number of preventative measures that you can take. For example, you can purchase and continually update virus scan software. Make sure that this software contains the “real-time” scanning feature which monitors all incoming and outgoing mail. You may also install a firewall which prohibits unauthorized access to your computer. By installing these preventative devices, you can proactively defend against viruses.

    Reference:
    AOL.com: What's the Difference Between Viruses, Worms, and Trojans? (2005).
    Phoenix. CastleCops.biz: What is the Difference Between Viruses, Worms, and Trojans? (2003.)
    Sullivan, Rob. SearchEnginePosition.com: The Difference Between Viruses and Worms. SEP. (2004)
    Symantec.com: What is the Difference Between Viruses, Worms, and Trojans? Symantec Corporation. (2005).
    http://anti-virus-software-review.toptenreviews.com/viruses-and-worms.html

    Monday, November 24, 2008

    Day 11

    24 November 2008

    For today, i study about viruses. What is virus?, Who creates virus?, Where do viruses come from?, What do viruses do?, How does the virus infect your computer?, Is my computer infected?, How can you tell if your computer has a virus?, Is there any hope?, How can you protect your computer from viruses?, What should I do if I have a virus? and What do I do if I have a virus on my computer?. This is my task today.

    Understanding Viruses
    What is a virus?


    A virus is a computer program designed to enter your computer and tamper with your files without your knowledge. Once the program containing the virus is opens, the activated virus can not only infect other programs and documents on your computer, it can duplicate and transmit itself to other computers that are connected to yours, just like a physical virus can move from the human host to another.




    Viruses begin in the late 1980s as personal computers and electronic bulletin boards became more common. Back then, operating systems, word processing programs and other programs were stored on floppy disks. Hidden viruses were programmed onto these disks as the disks were transferred from person to person before the virus spread.

    Who creates virus? Where do viruses come from?

    Every virus is created by an author with a different motive but all virus builders feel their actions are justified. For some, a killer virus is the ultimate technical challenge, like climbing a mountain. For others, creating viruses is a form of self-expression. Some disgruntled employees, consumers and citizens turn to virus building as revenged for perceived injustices. As though it’s a frightening thought, some viruses are built and aimed by legitimate (but disreputable) businesses to weaken competitors. Other virus authors want to make their mark in Internet history. These writers get a thrill out of seeing their virus cause damage enough to attract news headlines both online and on the evening news.

    What do viruses do?

    Today’s viruses are far more potent than the beginner versions we saw several decades ago. Viruses may be sent by opening email attachments, clicking on spam, visiting corrupt websites and links online, opening spreadsheets or even the original method infected disks. But the Internet is now the superhighway for virus transmission.

    Some aggressive viruses such as Melissa virus automatically duplicate copies of itself to the first 50 people in your computer email address book. A frightening prospect opening an email from someone you trust to be greeted by a virus, and that’s exactly what the author is counting out, you trust.
    The damaged cause by these viruses varies from minor delays in computer function to complete destruction on your hard drive. For companies, the price is far higher. A downed website can cost a company millions of dollars a day.

    How does the virus infect your computer?

    Because floppy use is nearly extinct and the majority of Cd's that change hands cannot be altered, you will most likely bump into a virus through online activity.

    Some of viruses attack your boot sector, the start up section of your hard drive. Other viruses infected executable program files, activating each time the program is started. The virus travels into the memory and further copies itself.

    Micro-viruses are the most common type of computer virus. This type of virus attacks data files containing macros. Macros are lists of commands or actions found under key headings. The virus resembles a macro but when the file is opened, the virus is activated.

    Multi-partite viruses are a combination of the boot sector and file virus. These begin in the boot sector and affect both your boot records and program files.

    Is my computer infected? How can you tell if your computer has a virus?

    There are warning signs that your computer may be infected with a virus. For minor viruses, you may encounter strange messages, images, noises or music on your computer. An infected computer may have less memory available, or you may notice name changes. A computer infected with a virus may be missing programs, or files may malfunction. If you encounter any of these characteristics on your computer, you are most likely experiencing an attack from a virus.

    Is there any hope? How can you protect your computer from viruses?

    If you do not have any virus software on your computer now, consider installing some soon. Be sure to update your anti-virus software regularly. You will be protected from new viruses that crop up.

    Use your software to scan for viruses weekly. Don’t open emails from unknown sources, and be cautious when opening attachments even attachments from people you trust. Hyper vigilance requires you to contact the sender and confirm the attachment before you open it, this is too much. Just be aware. It Aunt Gertrude typically includes a newsly, well-written letter with the jokes she sends, and this attachment email from her comes with “Open this now, baby!” alarm bells should go off. Don’t open it.

    Constantly back up your data in case a virus attacks your hard drive and you need to reformat. Better yet, set your computer to automatically back up your data weekly so that you don’t have to worry about this chore.

    What should I do if I have a virus? What do I do if I have a virus on my computer?

    Know that’s not the end of the world. As a courtesy, contact anyone (by phone, preferably) you have been connected by email to warn then possible exposure to the virus right away.

    Clean your computer with anti-virus software. If your computer is still not functioning and you have data you are concerned about recovering, consider hiring a trusted expert. Often data can be successfully extracted from an injured hard drive, but the process is complex and will involve another computer, special software and a technician with a lot of experience in data recovery.

    As a last resort, reformat your hard drive, even if it means destroying all of the information located there. Reinstall the software and data using your back up files.

    Reference:
    Brain, Marshall. HowStuffWorks.com: How Computer Viruses Work. (2001).
    Hetherington, Sally. Bizland.co.za: Understanding Viruses. (2005).
    VHSoftware: Computer Viruses, Protecting Your System. NARTS. (2002).
    http://anti-virus-software-review.toptenreviews.com/understanding-viruses.html


    Day 10

    21 November 2008

    Todays task is:

    Company Overview from Business Week

    Kaspersky Lab, Ltd. develops, produces, and distributes information security software solutions to protect information from viruses, spy ware, crime ware, phishing, hackers, and spam for home users and enterprises. Its products include Kaspersky Internet Security 2009, which offers protection for the client’s personal computers; Kaspersky Anti-Virus 2009 that offers protection from information technology threats; Kaspersky Mobile Security, which protects smart phones from Internet attacks, malicious programs, and SMS spam; and Kaspersky Open Space Security and Targeted Security that are designed to defend various types and sizes of networks with protection for workstations, file servers, mail servers, and Internet gateways. The company also provides hosted security and support services. Kaspersky Lab, Ltd. was founded in 1997 and is based in Moscow, the Russian Federation with regional offices in the United Kingdom, France, Germany, the Netherlands, Poland, Japan, China, Korea, Romania, and the United States.

    Reference: http://www.linkedin.com/companies/kaspersky-lab

    Thursday, November 20, 2008

    Day 9


    20 November 2008
    today i research about:

    Kaspersky Anti-Virus Product Details

    Product Features








    Essential Protection



    • Protects from viruses, Trojans and worms

    • Blocks spyware and adware

    • Scans files in real time (on access) and on demand

    • Scan email messages (regardless of email client)

    • Scans Internet traffic (regardless of browser)

    • Protects instant messengers (ICQ, MSN)

    • Provides proactive protection from unknown threats

    • Scans Java and Visual Basic scriptsPreventive Protection

    Preventive Protection


  • Scans operating systems and installed applications for vulnerabilities

  • Analyzes and closes Internet Explorer vulnerabilities

  • Disables links to malware sites

  • Detects viruses based on the packers used to compress code

  • Global threat monitoring (Kaspersky Security Network)

    Advanced Protection and Recovery

  • The program can be installed on infected computers

  • Self-protection from being disabled or stopped

  • Restores correct system settings after removing malicious software

  • Tools for creating a rescue disk

    Data and Identity Theft Protection

  • Disables links to fake (phishing) websites

  • Blocks all types for keyloggers

    Usability

  • Automatic configuration during installation

  • Wizards for common tasks

  • Visual report with charts and diagrams

  • Alerts provides all the information necessary for informed user decisions

  • Automatic or interactive mode

  • Round-the-clock technical support

  • Automatic database updates

    System Requirements

  • Microsoft XP or vista

  • Intel Pentium 300MGz or higher

  • 256MB available RAM

  • 50 MB free space on the hard drive

  • CD-ROM

  • Internet connection

  • Microsoft Windows Installer 2.0

    Reference: http://anti-virus-software-review.toptenreviews.com/kaspersky-software.html


  • Wednesday, November 19, 2008

    Day 8



    Product Summary
    The Good
    Kaspersky Anti-Virus 6.0 offers superior antivirus protection has free and paid version supports Windows 98 through Windows VISTA.

    The Bottom Line
    Kaspersky Anti-Virus 6.0 is light and fast and consistently detections awards against the competition it’s worthy of Cnet Editors Choice designation

    Specifications
    License qty: 1 user; License type: Subscription license; Min Operating system: Microsoft Windows XP Home Edition SP1 or later, Microsoft Windows NT Workstation 4.0 SP6a, Microsoft Windows Millennium Edition, Microsoft Windows 98 Second Edition, Microsoft Windows 2000 Professional SP3 or later, Microsoft Windows XP Professional


    Reference:http://reviews.cnet.com/antivirus-and-filtering/kaspersky-anti-virus-6/4505-3681_7-32004282.html

    Tuesday, November 18, 2008

    Day 7

    18 November 2008

    Early in the morning Pn. Azila Ruslan who is Sales Manager at Kaspersky Anti Virus was send an email to me. Pn. Marina was told her that i was preparing a proposal for Kaspersky Antivirus. She told that she will proveide related materials to me. However, she told me to start with visit http://www.kaspersky.com/business_products. I study all the content in this websites. Products for business divided by two products which is Integrated Security (Kaspersky Open Space Security) and Targeted Security.



    Open Space Security
    • Work Space Security - Protection for Workstations and smartphones
    • Business Space Security - Protection for Workstations/smartphones/file servers
    • Enterprise Space Security - Protection for Workstations/smartphones/file servers/mail servers
    • Total Space Security - Protection for Workstations/smartphones/file servers/mail servers/internet gateways
    Targeted Security
    • for File Server
    • for Windows Server EE
    • for Mail Server
    • for MIMEsweeper
    • Anti-Spam
    • for Internet Gateway
    • SOS (Second Opinion Solution)

    Monday, November 17, 2008

    Day 6

    17 November 2008
    Today was introduced by Pn.Marina to Pn. Tengku Farah who works as a computer network. She was coming back from pregnant mc. He teaches me about network that this company provided. There is much information that she explained to me such as how to use the microsoft office outlook that was used only in LAN's. Then she teaches me how to update the kaspersky anti-virus. She also teaches me how to set the new network connection. Today they suggest to me that they wanted to give me task to do the proposal how to attracted company that was used other anti-virus to change to the kaspersky anti-virus. So, I have to search information about kaspersky nti-virus to do the proposal. They will give a sample of proposal and the brochure of the kaspersky anti-virus. So, today I search internet how to do the good proposal to propose the kaspersky anti-virus.

    Thursday, November 13, 2008

    Day 5


    14 November 2008
    Today I have seen the server room of Niagasoft Company. One of the employees shows me the server room and how it is operated. This company does not develop the system and maintenance the system. If anything was happen with the system, the vendor will come to maintain the system. It have five server which is Consolidating Accounting system (COM SHARE) control the balance sheet, journal and etc, JD Edwards - control all accounting system, Secretarial System (VIEW POINT) that handle all the security system, Executive Document System (DOCUFLOW) that center the information, and the last is Internet, Mail and Antivirus Server that control the Internet, mail, and security for this organization. The entire server is to maintain the Network, Hardware and Software in this organization. The employee does not have much time to explain everything to me because he has to develop the system, so I have to get more information via Internet. I have to show my own effort.

    8.50a.m - Learn how to use fax machine
    12.00p.m - Learn how to use photostat machine
    3.30p.m - Learn how to scanner
    I learn how to scan a picture via scanner though the Personal Computer's


    Day 4

    13 November 2008
    Early in the morning I came to the office and then I have to check the CPU whether it is in good condition or worst. Many of the CPU is not in good condition because the power supply was not successful function. The entire monitor is still in good condition even though it is old computer.

    Tuesday, November 11, 2008

    Day 3

    12 November 2008

    Just like yesterday. I was teaches by Wan Nazan which is senior programmer in Niagasoft Company. I operate the computer. Try to switch on the old CPU if it is still function or not. If function we can get use the CPU. If the CPU cannot switch on, we have to put it to the store. The old CPU that cannot switch on, we will try to identify the problem and solve the problem. If the CPU still cannot switch on we will take the CD-Rom and take out and used as a second hand gadget.

    Monday, November 10, 2008

    Day 2

    11 November 2008
    Niag@soft Sdn. Bhd Company Profile

    Address:
    Suite 4.1 Level 4 Block C
    Plaza Damansara
    No. 45 Jalan Medan Setia 1
    Bukit Damansara
    50490 Kuala Lumpur

    Tel: 603-20921211
    Fax: 603-20925754

    Introduction
    Niagasoft Sdn Bhd was incorporated in 2005 as a spin-off from Niagasoft Technology Sdn Bhd (incorporated in year 2000).

    Niagasoft Sdn Bhd is an associate company of Kumpulan Fima Berhad. It is a wholly owned Bumiputera company and registered with the Ministry of Finance (MOF).

    The company is a technology provider of total business solutions with the ability to design, develop, integrate and implement IT solutions.

    The company involves in the supply, installation and maintenance of IT related services from small to large enterprise.

    Besides this, the company is an authorized reseller of applications from local & international vendors.

    Mission
    To offer a high quality solutions and services with the latest technology to achieve customer satisfaction.

    We encourage flexibility to change and progress.

    We strive to put ideas, skills, products, people and clients together to form a successful association.

    With the sophisticated technologies and experiences that we posses we are capable to assist your business to achieve greater success.

    Business Categories

    Outsourcing

    · We provide complete outsourcing capabilities with high quality. We take full responsibility to deliver comprehensive support for our clients.

    Software Development
    · We have ready made application software developed in-house. We provide turnkey development services that map business requirements and its definition. We also specialize in mission critical application development and eGovernance solutions.

    Enterprise Product Reseller
    · We are the authorized reseller for a range of Enterprise products which include Financial Systems Solutions, Human Resource Management System, Asset Tagging & Tracking Solutions, Security Solutions and IP Communications Solutions.

    System Integration
    · We provide the expertise in terms of solutions and infrastructures for systems integration.

    Software Development

    Ready Made Solution

    NiagaTrade -Sales Automation System
    NiagaBill -Prepaid Billing System
    E-Leave -Online Leave Application System
    Meeting Room System -Online Corporate Booking System

    Turnkey Solution Development
    Niagasoft Sdn Bhd provides turnkey development services in which we develop and deliver software solutions that are tailored to the client’s requirements and definitions.



    Mission Critical Application Development
    Niagasoft Sdn Bhd has strongly embarked into Mission Critical Application Development e.g. Prepaid Billing application etc. This application is robust and stable to service the customers operations on day-to-day basis.

    Enterprise Product Reseller

    Business Application Reseller

    · RAMCO System Pte Ltd (www.ramco.com)
    Ramco is a global provider of Enterprise Solutions and Services in key areas such as Manufacturing, Aviation, Asset Management, Trading & Logistics, Healthcare, eGovernance, Banking & Financial Services, Corporate Performance Management and Human Resources Management.

    · Beacon IT (M) Sdn Bhd (www.beaconit.com.au)
    Financial Consolidation Solution.

    · Spartan System Solutions Sdn Bhd (www.spartan.com.my)
    Spartan specializes in the asset tracking, inventory management and point of sales solutions.

    · IQ Dynamics (M) Sdn. Bhd. (www.iqdynamics.com)
    Human Resource Management System.
    · DVM Innovate Sdn Bhd is a full Network and Systems Integrator (NSI) providing end to end enterprise solutions for Telecommunications, VAS Service Provider, Financial and Government Industry.

    Security Software Systems

    · AVP (SEA) Sdn Bhd
    (www.kaspersky.com)
    KASPERSKY Security Solutions rapidly became a world leader in information security software. They leverage their expertise to provide cutting-edge protection against all major cyber threats: viruses, hackers and spam. Kaspersky Lab is also one of the key supports for IMPACT (Institut Kerjasama Pelbagai Hala Antarabangsa Memerangi Keganasan Siber.

    Recovery Revenue Software
    · Application Service Provider (ASP) Model
    · Revenue Sharing Model

    Sunday, November 9, 2008

    Day 1


    10 November 2008

    8.30 a.m - I have to report myself to the I.T department supervisor to fulfill the registration form. After that, I was interviewed by the IT department manager of Niagasoft Sdn. Bhd. I am nervous at the first time but I try to be cool. I was introduced by the supervisor to all the staff in the organization. They all support me and I told them to help me if I have a problem because this is the first time I work at the office. They all are friendly and nice. Then, the I.T supervisor explains to me about how the company was operated and gives me the soft copy of the company profile.