{"id":14914,"date":"2013-12-19T16:57:41","date_gmt":"2013-12-19T16:57:41","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1277"},"modified":"2019-11-15T07:24:04","modified_gmt":"2019-11-15T12:24:04","slug":"kaspersky-small-office-security-administrative-tools-for-all","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/kaspersky-small-office-security-administrative-tools-for-all\/14914\/","title":{"rendered":"Kaspersky Small Office Security: administrative tools for all"},"content":{"rendered":"<p>There is a joke about a note in a letter saying \u201cBurn after reading.\u201d It\u2019s not the highest degree of secrecy. The best form of secrecy would be \u201cEat before reading,\u201d then no one would learn what was in the message. All joking aside, there are real life situations in which important data must be completely removed from a computer to ensure its safety. That means you need to back up, perhaps, encrypt it and then delete the data so that the standard Windows procedure of recovering deleted data would give no result.<\/p>\n<div class=\"pullquote\">There are real life situations in which important data must be completely removed from a computer to ensure its safety.<\/div>\n<p>Kaspersky Small Office Security has a feature that allows deleted data to become irretrievable by using different algorithms. For example, in \u201cquick deletion\u201d the contents of the deleted file (or files) are replaced with zeros and pseudorandom numbers. Any standard recovery utilities will not be able to help. A method by Bruce Schneier is also available; the contents of a file are deleted in seven passes: first, the logical ones are written, zeros follow them, then five passes of pseudorandom numbers are written. However, this method is not recommended for removing data from SSD, USB-devices and network drives.<\/p>\n<p>File Shredder is just one of the functions in the Administrative Tools. Most of them are auxiliary tools designed not necessarily to protect the data but to support the computer\u2019s normal functioning and restore the system.<\/p>\n<p>Firstly, there are Kaspersky\u2019s Rescue Disk and Post-Infection Microsoft Windows Troubleshooting features. The first is easy to understand from its title. It involves creating a boot disk with additional antivirus means implemented. That is, if your computer is infected and disabled with malware, and the usual antivirus programs or disinfecting tools do not help anymore, you can try to restore the system using the \u201crescue disk.\u201d Kaspersky Rescue Disk makes an ISO file, which you can burn to a CD, DVD or store on a USB drive.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015855\/2eng2.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1279\" alt=\"2eng\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015855\/2eng2.png\" width=\"762\" height=\"576\"><\/a><\/p>\n<p>Post-Infection, Microsoft Windows Troubleshooting diagnoses your computer for changes and failures in the system that may be potentially associated with malware activity. Amongst other things \u2018Restore System after Infection\u2019 offers actions to eliminate any traces of malware in the system.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015854\/3eng.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1281\" alt=\"3eng\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015854\/3eng.png\" width=\"762\" height=\"574\"><\/a><\/p>\n<p>Two other functions may be helpful as additional measures after the irreversible deletion of data. The first is \u2018Erase Your Activities History\u2019 which purges the browser\u2019s history and cache, memory dumps, task scheduler protocols, etc. You can remove all traces of your own (or the user\u2019s) activity after Kaspersky Small Office Security 3 shuts down. This feature may be very useful, even necessary for \u201cguest\u201d computers, if there are any in the company.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1280\" alt=\"4eng\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015854\/4eng.png\" width=\"760\" height=\"575\"><\/p>\n<p>The above applies to \u2018Browser Configuration\u2019: Kaspersky Small Office Security allows analyzing Internet Explorer\u2019s settings and changing them if necessary to increase the degree of the program\u2019s security.<\/p>\n<p>Last but not the least, the final function is for removing unused data on the computer (Unused Data Cleaner). Every Windows user is aware that trash data piles up in Windows. Disk space can be significantly reduced because of a brimming recycle bin, Temp folder, browser\u2019s cache, Windows logs and other junk, which accumulates in various places. KSOS lets you do the cleaning up automatically without any extra effort. All the junk can be removed in three clicks.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015854\/5eng.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1282\" alt=\"5eng\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015854\/5eng.png\" width=\"759\" height=\"574\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a joke about a note in a letter saying \u201cBurn after reading.\u201d It\u2019s not the highest degree of secrecy. The best form of secrecy would be \u201cEat before<\/p>\n","protected":false},"author":209,"featured_media":16323,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[97,2055,1168],"class_list":{"0":"post-14914","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-security-2","10":"tag-vsb","11":"tag-sensitive-data"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-small-office-security-administrative-tools-for-all\/14914\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-small-office-security-administrative-tools-for-all\/14914\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-small-office-security-administrative-tools-for-all\/14914\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/security-2\/","name":"security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14914"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14914\/revisions"}],"predecessor-version":[{"id":31072,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14914\/revisions\/31072"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16323"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}