Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Norton Internet Security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
====2008 (15.x)==== The 2008 version was announced on August 28, 2007, adding support for Windows Vista 64-bit. New features included [[SONAR (Symantec)|SONAR]], Norton Identity Safe, and Browser Defender. SONAR monitored applications for malicious behavior. Identity Safe superseded the information filtering function; instead of blocking personal information from leaving the computer, it stored personal information to fill [[webform]]s. It was password protected and checked a website's authenticity before filling any forms. Browser Defender inspected and blocked suspicious [[API]] calls, intended to stop [[drive-by download]]s. Network Map identified networked computers with Norton Internet Security 2008 installed. Remote monitoring allowed checking the status of other installations on different computers; problems were identified with a red "X" icon. Using the feature, users could control traffic between computers. It warned users if they were using an unencrypted wireless network. The startup application manager and advertisement blocking features were dropped from this release. Information filtering, although superseded by Identity Safe in the suite, was available separately. It could be used in conjunction with Identity Safe.<ref name="PC Mag 08" >{{Cite news|author=Neil J. Rubenking|title=Norton Internet Security 2008|url=https://www.pcmag.com/article2/0,2817,2180639,00.asp|date=September 7, 2007|publisher=PC Magazine|pages=1β6|access-date=6 August 2009}}</ref> Phishing protection now integrated with [[Mozilla Firefox]]. Testing by ''PC Magazine'' found that Norton blocked 94 percent of phishing sites, compared to 83 percent for [[Internet Explorer 7]] and 77 percent for [[Mozilla Firefox 2|Firefox 2]].<ref name="PC Mag 08" /> CNET identified an issue with the feature: when anti-phishing was disabled, Identity Safe still offered to automatically submit personal information to websites, including phishing sites. Symantec declined to call it a "flaw", stating it was recommended to use Identity Safe with anti-phishing enabled. Alternatively, Identity Safe could be used with Firefox and Internet Explorer's built-in anti-phishing capability.<ref>{{cite web|author=Robert Vamosi|title=Norton Internet Security 2008|url=http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2008/4505-3667_7-32588378.html|date=November 28, 2007|publisher=CNET|access-date=6 August 2009}}</ref> ''PC Magazine'' found that the firewall put all ports in stealth mode. The firewall blocked ten of 12 leak tests, used to see if malware could evade the firewall's control of network traffic. Previous versions did not identify the tests because none carried a malicious payload. Another test was conducted using Core Impact, which successfully exploited one vulnerability on the test computer. However, other components of Norton stopped the exploit from causing harm. The other attempts were unsuccessful either because the system was invulnerable or Norton's Intrusion Prevention System stopped it. Attempts to disable the firewall were unsuccessful by ''PC Magazine''.<ref name="PC Mag 08" /> On the contrary, ''PC Pro'' identified 15 open ports on a computer with Norton installed.<ref>{{cite web|author=Darien Graham-Smith|title=Norton Internet Security 2008|url=http://www.pcpro.co.uk/labs/145083/norton-internet-security-2008.html?searchString=norton+internet+security+2008|date=December 7, 2007|publisher=PC Pro|access-date=6 August 2009}}</ref> In ''PC Magazine'' testing, Norton completely detected most malware. For two-thirds of the samples, all traces were removed. Norton found and removed all the commercial keyloggers. A full scan took nearly an hour to complete though, twice as long as the 2007 version. The suite blocked most of the malware from installing and all the commercial keyloggers, regardless of any modifications made to the samples.<ref name="PC Mag 08" /> ''PC World'' noted that Norton removed 80 percent of malware-associated files and [[Windows Registry|Registry]] entries.<ref name="pcworld" >{{cite web|author=Erik Larkin|title=Symantec Norton Internet Security 2008 |url=http://www.pcworld.com/reviews/product/30828/review/norton_internet_security_2008.html|date=November 29, 2007|publisher=PC World|access-date=30 July 2009}}</ref> Spam filtering imported users' address books to compile a whitelist of allowed senders. Addresses to which users send mail and e-mail tagged as valid mail could be automatically added to the whitelist. Using several thousand messages, ''PC Magazine'' found that Norton marked over 40 percent of valid e-mail as spam. Over 80 percent of valid newsletters were marked as spam. Norton did correctly identify 90 percent of spam e-mail.<ref name="PC Mag 08" />
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)