$DefExcDlg=Generate list of $ProductName exclusions. Objects from list are not scanned by application for malicious code.
$Component=The
; FILE ANTI-VIRUS SETTINGS
$CheckNewHint=Scan only new files not yet scanned by application for malicious objects or files modified since previous scan. This capability is supported by tracking new file creation and logging modifications to existing files.
$TreatGroupAsk=Prompt to select one of suggested application responses when malicious file is detected.
$TreatGroupDontAsk=Block access to dangerous file.
$TreatGroupTryCure=Attempt to disinfect dangerous file.
$TreatGroupTryDeleteIncurable=Attempt to delete dangerous file.
$CompoundFiles_Group_ScanArchived_true=Scan ZIP, CAB, RAR, ARJ archives including password-protected ones.
$CompoundFiles_Group_ScanArchived_default=
$CompoundFiles_Group_ScanSFXArchived_false=Disable scanning of self-extracting archives and other installation packages.
$CompoundFiles_Group_ScanSFXArchived_true=Scan self-extracting archives and other installation packages.
$CompoundFiles_Group_ScanSFXArchived_default=Scan self-extracting archives and other installation packages.
$CompoundFiles_Group_ScanOLE_false=Disable scanning of embedded objects.
$CompoundFiles_Group_ScanOLE_true=Scan embedded objects. \n\nExcel spreadsheet or macro embedded in Microsoft Word file, email attachment, etc. can serve as examples of OLE objects.
$CompoundFiles_Group_ScanOLE_default=Scan objects embedded in other files, such as email attachments, macros embedded in Microsoft Word files, etc.
$CompoundFiles_Group_UseCompoundPostponeSize_false=Block access to large files until after they are scanned for viruses. These files become accessible to user only if clean.
$CompoundFiles_Group_UseCompoundPostponeSize_true=Scan large files while user is active.
$CompoundFiles_Group_UseCompoundPostponeSize_default=Delay archive scan until after other files are scanned if archive size exceeds specified value.
$CompoundFiles_Group_UseSizeLimit_false=Disable file size limit for files to scan.
$CompoundFiles_Group_UseSizeLimit_true=Set file size limit for files to scan. Files exceeding specified size will not be scanned.
$CompoundFiles_Group_UseSizeLimit_default=Disable archive scanning if archive size exceeds specified value.
; PROTECTION INCLUSIONS
$IncGroupAddObj=Add object to scope of protection.
$IncGroupEdtObj=Modify selected object.
$IncGroupDelObj=Delete selected object from proactive defense scope.\n\nObject does not have to be removed from list. If it is to be disregarded, simply uncheck its name in list.
$ExcGroupAddObj=Add object to be overlooked by proactive defense.
$ExcGroupEdtObj=Edit selected object.
$ExcGroupDelObj=Delete selected exclusion from list.\n\nExclusion does not have to be deleted from list. If it is to be disregarded, simply uncheck its name in list or edit list of components which use exclusion in question.
; MAIL MONITOR
$POP3=POP3
$SMTP=SMTP
$IMAP=IMAP
$NNTP=NNTP
$Outlook=Microsoft Office Outlook
$TheBat=The Bat!
$SupportedProtos=$POP3/$SMTP/$IMAP
$SupportedMailClients=$Outlook and $TheBat
$ConnectivityTraffic=Intercept, analyze, and disinfect mail messages using protocols: $SupportedProtos.
$ConnectivityMailClients=Install special plug-ins into mail clients $SupportedMailClients to fine tune anti-virus scanning and mail processing.
$MailMonAdvSettAddHint=Add new exclusion to list.
$MailMonAdvSettEdtHint=Edit selected exclusion.
$MailMonAdvSettDelHint=Delete selected exclusion from list.\n\nExclusion does not have to be deleted from list. If it is to be disregarded, simply uncheck its name in list or edit list of components which use exclusion in question.
$MailOptions_Group_Archive_false=Scan ZIP, CAB, RAR, ARJ archives attached to mail message including password-protected ones.
$MailOptions_Group_Archive_default=
$MailOptions_Group_SkipCheck_true=Disable file scan timeout.\n\nMail Anti-Virus scans all files disregarding amount of time each file scan may take.
$MailOptions_Group_SkipCheck_false=Disable scanning of files requiring more than $(TimeLimit) seconds to analyze.
$MailOptions_Group_SkipCheck_default=Disable file scans requiring more than $(TimeLimit) seconds.
$AttachmentFilter_Group_Skip=Disable special processing of email attachments.
$AttachmentFilter_Group_Rename=Replace last character in attachment name with underscore. File types for renaming may be selected by clicking "File Types" button.
$AttachmentFilter_Group_Delete=Delete attachments of selected types from mail messages. File types for deletion may be selected by clicking "File Types" button.
$AttachmentFilter_Group_FileTypes=View and edit list of attachments to which filter actions are to be applied.
$AttachmentFilter_Group_FileTypes_Body_Add=Add mail attachment mask to filter.
$AttachmentFilter_Group_FileTypes_Body_Del=Delete selected attachment mask from list.\n\nMask does not have to be removed from list. If it is to be disregarded, simply uncheck its name in list.
$Connectivity_Group_Traffic_true=Disable scans of mail transmitted using protocols $SupportedProtos.
$Connectivity_Group_Traffic_false=Scan mails transmitted using protocols $SupportedProtos.
$Connectivity_Group_Traffic_default=Scan mail messages irrespective of mail client installed on host computer.
$Connectivity_Group_Clients_true=Disable plug-in modules in mail clients $SupportedMailClients
$Connectivity_Group_Clients_false=Install Mail Anti-Virus plug-in for mail clients $SupportedMailClients.
$Connectivity_Group_Clients_default=Use special anti-virus module for mail clients $SupportedMailClients to fine tune mail scans.
$WebMonitorURLDel=Delete selected trusted address mask. \n\nMask does not need to be removed from list. If it is to be disregarded, simply uncheck its name in list.
$BehaviorBlockerExcludesBtnHint=View and edit proactive defense exclusion list.
$BehaviorBlockerPDMSettingsHint=View and edit process monitoring settings.
$BehaviorBlockerREGSettingsHint=View and edit system registry change monitoring settings.
$BehaviorBlockerOGSettingsHint=View and configure scanning of VBA macros run on host.
$BehaviorBlockerActionAsk=Display special warning every time suspicious activity is detected on host. \n\nWarning contains information on suspicious action and offers several possible application responses.
$BehaviorBlockerActionDontAsk=Block process attempting to engage in suspicious activity. \nSubsequent application actions are determined by settings below.
$BehaviorBlockerActionTerminate=Force process attempting suspicious activity to terminate.
$BehaviorBlockerActionRollback=Roll back action performed by suspicious process and restore system to state preceding such action.
$BehaviorBlockerActionQuarantine=Place process attempting to perform suspicious action in quarantine.
$PDM_AppRules_AddBtn=Add executable module for rule creation. By default, allow rule is created for selected executable module.
$PDM_AppRulesDeleteBtn=Delete selected application rule from list. \n\nRule does not have to be deleted from list. If it is to be disregarded, simply uncheck rule in list.
$REGSettings_Group_Add=Add system registry key to list of monitored keys.
$REGSettings_Group_Edt=Edit selected registry keys being monitored for changes by Kaspersky Internet Security.
$REGSettings_Group_Del=Delete selected key from monitoring list. \n\nRegistry key does not have to be deleted from list. If it is not to be monitored for change, simply uncheck key in list.
$RegKeySelectForm=Select registry key to be added to list of monitored keys.
$GroupKeys_Page_Add=$RegKeySelectForm \n\nSelected key will be added to current group key list.
$GroupKeys_Page_Edt=$RegKeySelectForm \n\nSelected key will replace current key in current group list.
$GroupKeys_Page_Del=Delete selected key. \n\nKey does not have to be removed from list. If it is to be disregarded, simply uncheck key in list.
$GroupRules_Page_Add=Add registry key monitoring rule. By default, rule allowing read access to key value is created. Key modification or deletion is preceded by prompt to confirm. \n\nSubsequently, rule may be edited by specifying \n1 application for which rule is being created; and\n2 application response to:\n- read; \n- modify; and\n- delete.
$GroupRules_Page_Del=Delete selected key monitoring rule. \n\nRule does not have to be deleted from list. If it is to be disregarded, simply uncheck rule in list.
$GroupRules_Page_U=Move selected rule one line up in rule list. Rule priority is increased.
$GroupRules_Page_D=Move selected rule one line down in list. Rule priority is decreased.
$OGAction_Group_Ask=Display special warning if suspicious macro starts. \n\nWarning provides macro information and offers several options for application response.
$OGAction_Group_Terminate=Block macro execution.
$BBExcludes_Group_Add=Add mask of object or threat to be overlooked by protection.
$BBExcludes_Group_Edt=Change exclusion selected from the list.
$BBExcludes_Group_Del=Delete selected exclusion from list. \n\nExclusion does not have to be deleted from list. If it is to be disregarded, simply uncheck exclusion in list.
$OG_Group_OG_Enable_true=Disable scanning of Microsoft Office macros.
$OG_Group_OG_Enable_false=Analyze all Microsoft Office macros for viruses.
$OG_Group_OG_Enable_default=Scan Microsoft Office macros for suspicious activity.
$PG_Group_PDM_Enable_default=Monitor changes to application components installed on host.
$PDM_Group_PDM_Enable_true=Disable process activity monitoring.
$PDM_Group_PDM_Enable_false=Monitor process startup on your computer.
$PDM_Group_PDM_Enable_default=Monitor sequence of actions performed by installed applications for malicious activity.
$REG_Group_REG_Enable_true=Disable system registry monitoring for changes.
$REG_Group_REG_Enable_false=Monitor system registry for changes.
$REG_Group_REG_Enable_default=Monitor selected keys in system registry which may damage system if used.
; ANTI-SPY
$AdvertisingBlock_Group_Trusted=View and edit list of trusted addresses. Information on trusted addresses is not monitored by Anti-Spy.
$AntiDialers_Group_Trusted=View and edit list of trusted phone numbers. Network connections made to numbers from list are not monitored.
$AntiDialers_Group_Trusted_Body_Add=Add new trusted number to list.
$AntiDialers_Group_Trusted_Body_Del=Delete selected trusted number from trusted number list. Number does not have to be removed from list. If it is to be disregarded, simply uncheck number in list.
$AntiPhishing_Group_Enable_true=Disable URL scanning for phishing attacks.
$AntiPhishing_Group_Enable_false=Verify if URLs are listed in phishing database.
$AntiPhishing_Group_Enable_default=Verify if URLs are listed in phishing database.
$PopupBlock_Group_Enable_true=Disable pop-up blocking on your computer.
$PopupBlock_Group_Enable_false=Block pop-ups on your computer.
$PopupBlock_Group_Enable_default=Block pop-ups on your computer.
$AdBlock_Group_Enable_true=Disable banner ad blocking.
$AdBlock_Group_Enable_false=Block banner ads.
$AdBlock_Group_Enable_default=Block banner ads.
$AntiDialers_Group_Enable_true=Disable monitoring for hidden dialup connections.\n\nThis will enable malware to establish dialup connection with any phone number.
$AntiDialers_Group_Enable_false=Monitor dialup connections.\n\nIf attempt is made to establish hidden dialup connection, $Anti_Spy will request confirmation that dialup connection is to be established.
$AntiDialers_Group_Enable_default=Monitor hidden dialup connections to premium internet resources.
$PrivacyControl_Group_Enable_true=Disable monitoring of attempts to transmit confidential information.
$PrivacyControl_Group_Enable_false=Monitor attempts to transmit confidential information.
$PrivacyControl_Group_Enable_default=Monitor attempts to transmit confidential information.
$IETrusted=IETrusted
$IEIntranet=IEIntranet
; SCRIPT MONITOR
$Trusted_Body_Add=Add trusted URL or address mask data from which is not scanned for malicious code.
$Trusted_Body_Edt=Modify selected trusted URL or address mask.
$Trusted_Body_Del=Delete trusted URL or mask from list. \n\nAddress does not have to be deleted from list. If it is to be disregarded, simply uncheck address in list.
$WTreat_Group_Ask=Display special warning that infected object has been detected and prompt for action to be applied to object.
$WTreat_Group_DontAsk=Block access to infected object.
$WTreat_Group_Allow=Allow access to infected object without prior notification to user.
$Restrictions_Group_SkipCheck_false=Disable object fragment caching timeout.\n\nYou will have to wait until object fragment is fully scanned.
$Restrictions_Group_SkipCheck_true=Limit caching time for file fragments transmitted using $HTTP to $(httpscan.HTTPSettings.TimeLimit) sec.\n\nAfter this delay, object will become available before it is fully scanned.
$Restrictions_Group_SkipCheck_default=Limit hard drive storage time for file fragments transmitted using $HTTP.
; ANTI-HACKER
$Firewall_Group_Rules=Create and modify rules which define Firewall response to programs being run, sent/received data packets, and networks to which your computer is connected.
$IDSSettings_Group_IDSSettings=Configure Firewall response to attack attempts against your computer.
$SettingsWindow_Anti_Hacker_IDSSettings_Notify=Display special warning of attempt to attack your computer and network exploit description.\n\nWarning offers several possible Firewall responses.
$SettingsWindow_Anti_Hacker_IDSSettings_BanCheck=Block incoming network connections from attacking computer for specified period of time.
$Anti_Hacker_AppRules_Group_Add=Select executable module and create rule.
$Anti_Hacker_AppRules_Group_Edt=View and edit rules for selected executable module.
$Anti_Hacker_AppRules_Group_Del=Delete selected executable module and all its existing rules from list.
$Anti_Hacker_AppRules_Branch_Add=Add new rule for executable module. Rule being created will be added to top of application rules and will have highest priority.
$Anti_Hacker_AppRules_Branch_Edt=Edit selected rule for executable module.
$Anti_Hacker_AppRules_Branch_Del=Delete selected executable rule. \n\nRule does not have to be deleted from the list. If it is to be disregarded, simply uncheck rule in the list.
$Anti_Hacker_AppRules_Branch_U=Move selected rule up one line.\n\nRule so moved acquires higher priority.
$Anti_Hacker_AppRules_Branch_D=Move selected rule down one line.\n\nRule so moved becomes lower in priority.
$Anti_Hacker_PacketRules_Add=Add new rule for data packet. \n\nRule being created will be added to top of packet rule list and will have highest execution priority.
$Anti_Hacker_PacketRules_Del=Delete selected packet rule. \n\nRule does not have to be removed from list. If it is to be disregarded, simply uncheck rule in list.
$Firewall_Group_EnableFW_true=Disable your network protection. All network activity on your computer will be allowed.
$Firewall_Group_EnableFW_false=Protect your network activity. Network activity on your computer will be monitored based on selected security level.
$Firewall_Group_EnableFW_default=Protect your network activity based on selected security level.
$IDSSettings_Group_EnableIDS_true=Disable Attack Detector. This makes your computer susceptible to network exploits.
$IDSSettings_Group_EnableIDS_false=Monitor network activity for attempts to attack your computer.
$IDSSettings_Group_EnableIDS_default=Monitor network activity for attempts to attack your computer.
$STM_Group_EnableSTM_true=Disable stealth mode.
$STM_Group_EnableSTM_false=Activate stealth mode.\n\nIncoming connections cannot be initiated in this mode.\nThis provides for comfortable browsing and helps remain impervious to port scanning and network exploits.
$Trusted_Senders_Del=Delete selected address/regular expression from "white" list. \n\nAddress does not have to be deleted. If it is to be disregarded as trusted address, simply uncheck address in list.
$Trusted_Senders_Import=Import trusted sender list from file.
$Trusted_Words_Add=Add new phrase/class of phrase to trusted string list. If this string is contained in message, it is always regarded as useful mail.
$Trusted_Words_Del=Delete selected phrase/regular expression from trusted string list. \n\nString does not have to be removed from list. If it is not to be used as trusted string, simply uncheck string in list.
$Blocked_Senders_Add=Add new address/class of addresses to list of senders whose email is always regarded as spam.
$Blocked_Senders_Edt=$Trusted_Senders_Edt
$Blocked_Senders_Del=Delete address/class of addresses from ôblackö list. \n\nAddress does not have to be deleted. If it is not to be used, simply uncheck address in list.
$Blocked_Words_Add=Add new phrase/regular expression to ôblackö list. If this string is found in message, it is always regarded as spam.
$Blocked_Words_Edt=$Trusted_Words_Edt
$Blocked_Words_Del=Delete selected phrase/regular expression from ôblackö list. \n\nString does not have to be deleted from list. If it is not to be used, simply uncheck phrase in list.
$Bayes_General_EnableBayes=Use modified adaptive Bayesian algorithm to detect spam.
$Retrain_Group_KeepExisting=Enhance pre-installed spam database with data obtained by processing email messages through Training Wizard.
$Retrain_Group_Retrain=Replace pre-installed spam database with new one created by Training Wizard.
$Training_Group_TrainOutgoing_descr=\n\nRecipients of outgoing messages are automatically entered into ôwhiteö list. Training with outgoing emails continues until fifty outgoing messages are recorded in Anti-Spam database. Once that happens, training with outgoing emails stops.
$Training_Group_TrainOutgoing_true=Use outgoing messages to augment ôwhiteö list.$Training_Group_TrainOutgoing_descr
$Training_Group_TrainOutgoing_false=Disable using outgoing messages to add to ôwhiteö list.$Training_Group_TrainOutgoing_descr
$Training_Group_TrainOutgoing_default=Use outgoing emails to add to ôwhiteö list.
$ASConnectivity_Group_Clients_descr=This allows control of mail scans directly out of specified email clients using special buttons or settings.
$ASConnectivity_Group_Clients_true=Disable plug-ins of component $ProfileDescription in mail clients $SupportedMailClients
$ASConnectivity_Group_Clients_false=Install special plug-in modules for component $ProfileDescription in $SupportedMailClients to fine tune mail scanning.$ASConnectivity_Group_Clients_descr
$ASConnectivity_Group_Clients_default=Use special plug-in module in mail clients to fine tune spam detection and processing.
$ASConnectivity_Group_Traffic_descr=If intercepts of traffic transmitted using specified protocols are enabled, $ProfileDescription runs irrespective of email client installed on your computer.
$ASConnectivity_Group_Traffic_true=Disable scanning email traffic transmitted using $SupportedProtos for spam. $ASConnectivity_Group_Traffic_descr \n\nIf your email client is not supported by Anti-Spam, check this option to enable spam protection.
$ASConnectivity_Group_Traffic_false=Intercept and analyze email messages transmitted using protocols $SupportedProtos for spam. $ASConnectivity_Group_Traffic_descr
$ASConnectivity_Group_Traffic_default=Scan email messages for spam whatever email client is installed on computer.
$ASConnectivity_Group_MailWasher_descr=Use Mail Dispatcher to delete spam directly from mail server without downloading to your computer. This saves you time and reduces network traffic.
$ASConnectivity_Group_MailWasher_true=Disable Mail Dispatcher for new incoming messages. $ASConnectivity_Group_MailWasher_descr
$ASConnectivity_Group_MailWasher_false=Use Mail Dispatcher every time emails come in. $ASConnectivity_Group_MailWasher_descr
$SettingsWindow_Protection_Exceptions_Dlg_Del=Delete selected exclusion. \n\nExclusion does not have to be deleted from list. If it is to be disregarded, simply uncheck exclusion in list.
; SERVICE
$Notifications_Group_EnableNotifications_false=Disable notifications of application $ProductName runtime events.
$Notifications_Group_EnableNotifications_true=Notify of application $ProductName runtime events.
$Notifications_Group_EnableNotifications_default=
$Notifications_Group_ConfigureNotifications=Configure user notification of $ProductName runtime events.
$FileTypes_Group_Infectable=Scan all files whatever their binary type.
$FileTypes_Group_All=Scan files susceptible to infection. \n\nFile binary format is analyzed to determine whether file can be infected.
$FileTypes_Group_Predefined=Scan all potentially infected files. \n\nFile extension is scanned in this case to determine whether file can be infected. Binary format is not considered.
$ActivateTreatWindow=Display special warning every time dangerous object is detected on host. \n\nWarning shows object information and offers several possible application responses.
$TreatTryDisinfect=Attempt to disinfect infected object.\nIf disinfection is possible, application places copy of object in backup storage.
$ScanTreat_Group_AskFinish=Display list of infected objects once scan is complete. For each object, object status and possible application response are shown.
$ScanTreat_Group_AskDetect=Display special warning every time infected object is detected.
$ScanTreat_Group_DontAsk=Isolate infected object without notifying user.
$ScanTreat_Group_TryDisinfect=$TreatTryDisinfect
$ScanTreat_Group_TryDelete=Attempt to delete infected object after saving copy in backup storage.
$Apply_Group_ApplyScanSettings=Apply selected security level and selected action to all virus scan tasks.
$ScanAdvSettAdd_Add=Add object not to be scanned for viruses.
$ScanAdvSettAdd_Edt=Edit selected exclusion.
$ScanAdvSettAdd_Del=Delete selected exclusion. \n\nExclusion does not have to be deleted from list. If it is to be disregarded, simply uncheck exclusion in list.