Jump to content

Norton Internet Security

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 81.98.195.53 (talk) at 20:40, 22 March 2009. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Norton Internet Security
Developer(s)Symantec Corporation
Stable release
2009 or 16.5.0.135 (Windows Edition), 4.0 (Macintosh Edition)
Operating systemMicrosoft Windows, Mac OS X
TypeAntivirus
LicenseProprietary
Websitehttp://www.symantec.com/norton/internet-security

Norton Internet Security, developed by Symantec Corporation, provides malware prevention and removal during a subscription period. It is distributed as a download, a box copy, or preinstalled on computers as OEM software. Norton Internet Security and its sister product, Norton AntiVirus, combined, held a 61% antivirus market share, as of 2007. Major competitors in terms of market share include CA, Trend Micro, and Kaspersky Lab.[1]

Norton Internet Security's malware protection uses signatures and heuristics to identify viruses. Other features include a software firewall, e-mail spam filtering and phishing protection.[2] Additional functions, such as parental controls, are available as extensions developed also by Symantec.[3]

Norton Internet Security runs on Microsoft Windows and Mac OS X. Version 16.5.0.135 is the latest update available for Norton Internet Security 2009. This update supersedes the 16.5.0.134 update, which failed to install on many computers. The 16.5.0.135 will only be made available for affected users.[4]

Version History (Windows)

Version 2006 (13.0)

Main Graphic User Interface of Norton Internet Security 2006
Main Graphic User Interface of Norton Internet Security 2006

Norton Internet Security 2006 debuted on September 26, 2005.[5] The redesigned main graphical user interface, dubbed the Norton Protection Center aggregates all information in a central location.[6] CNET reports the Norton Protection Center, while useful, attempts to advertise additional products. To help identify new, or zero day viruses, Bloodhound technology disassembles and scans application code for malicious instructions using predefined algorithms[7] Internet Explorer homepage hijacking protection was introduced in this release as well; the user is warned of unauthorized changes made to Internet Explorer's homepage and is given the option to revert any changes. E-mail filtering blocks unwanted e-mail spam automatically and can be configured using a blacklist of blocked senders or a whitelist comprised of allowed senders.[8] Norton Internet Security 2006 can block the transmission of confidential information via instant messenger. Users can create a list of personal information which are not to be communicated or transmitted.[8] Parental controls assigns each user account an account type, each preconfigured with certain restrictions. Users can define exceptions, block specific sites, block certain programs from accessing the Internet, and restrict newsgroup access. However, the option to schedule times when each user is permitted to use the Internet is notably absent.[9] Browser advertisement blocking compares a website's code against a blacklist, and rewrites the HTML to prevent advertisements from being displayed. CNET highlighted Norton Internet Security 2006's noticeable impact on system performance.[6]

Version 2007 (14.0)

The 2007 version was released on September 12, 2006. Symantec revised Norton Internet Security with the goal of reducing high system resource utilization.[10] Despite having about 80% of the code rewritten, CNET reports mixed results in performance testing.[11] New features include a tabbed interface, eliminating the need to have separate windows open for the Norton Protection Center and for configuring the settings.[11] Symantec extended its Veritas VxMS rootkit detection technology, allowing Norton Internet Security 2007 to inspect files within directories to files on the volume level, detecting abnormalities or inconsistencies.[11] Windows Vista compatibility was introduced in this release as well.

Additional features include a exploit scanner which looks at system components commonly hosting vulnerabilities, such as weak user account passwords, Internet Explorer settings, and file sharing settings. When possible, Norton will attempt to fix issues found, otherwise the user is warned of the vulnerability.[12] A startup application manager allows users to prevent applications from launching at login.

E-mail spam filtering, parental controls, and the advertisement blocking features were dropped from this release. The ability to prevent personal information from being transmistted via instant messenger was removed as well. However, the features are available in 2007 add-on package.[13]

Version 2008 (15.0)

Norton Internet Security 2008 was released on August 28, 2007. Emphasizing malware prevention, new features include SONAR, which looks for suspicious application behavior. This release adds exploit protection, preventing attackers from leveraging common browser and application vulnerabilities.[14]. A new feature, dubbed the Norton Identity Safe, stores personal information, such as phone numbers and fills online forms as needed. This feature replaces the information filtering feature found in the 2006 and 2007 release.[15] Norton Internet Security 2008's add-on package drops the advertisement and pop-up blocking features found in the 2007 add-on package.

Operating system requirements call for 32-bit editions of Windows XP with Service Pack 2 or 32 and 64-bit versions of Windows Vista. 350 MB of hard disk space is required. A 300 MHz processor is required under XP and a 800 MHz processor under Vista.

Version 2009 (16.0)

Norton Internet Security 2009 was released on September 8, 2008. Addressing software bloat, this version was designed with a “zero-impact” goal.[16] Benchmarking conducted by PassMark Software highlights this release's 52 second install time, 32 second scan time, and 7 MB memory utilization. It should be noted Symantec funded the benchmark test and provided some scripts used to benchmark each participating antivirus software.[17]

The security status and settings are now displayed in a single main interface. Newly introduced features include a CPU usage monitor, which displays the total CPU utilization and Norton's CPU usage in the main interface. Other features include Norton Insight which cuts scanning time by whitelisting files based on reputation.[18] Updates are now delivered updates every 5 to 15 minutes. However, such updates are not tested by Symantec, and may cause false positives, or incorrectly identify files as malicious. The exploit scanner found in the 2007 and 2008 versions was dropped from this release.

When Norton Internet Security 2009 is installed in 32-bit editions of Windows XP, a 300 MHz processor, 256 MB of RAM and 200 MB of free space are needed. 32-bit and 64-bit compatibility is now available for Windows Vista. A 800 MHz processor, 512 MB of RAM, and 200 MB of free space required is called for.

Existing users of Norton Internet Security 2006 through 2008 can upgrade to the 2009 version without having to buy a new subscription.[19]

Macintosh Edition

Norton Internet Security 4.0 for Mac includes the features found in Norton AntiVirus 11 for Mac. Additional features include a software firewall, which blocks access malicious or attacking IP addresses using a blacklist. The phishing filter blocks access to fraudulent websites attempting to steal confidential information. A feature similar to Privacy Control, found in Norton Personal Firewall and Norton Internet Security 2006, prevents confidential information from being transmitted via instant messenger programs. Operating system requirements call for Mac OS X v10.4.11. Hardware requirements call for a PowerPC or an Intel Core processor, 150 MB of free hard disk space, and at least 256 MB of RAM, with 512 MB recommended.[20] Norton Internet Security Dual Protection for Mac incorporates Norton Internet Security 2009 and Norton Internet Security 4.0 for Mac.[21]

Reception

FBI Cooperation

The FBI confirmed the active development of Magic Lantern, a keylogger intended to obtain passwords to encrypted e-mail and other documents as part of a criminal investigation. Magic Lantern was first reported in the media by Bob Sullivan of MSNBC on 20 November 2001 and by Ted Bridis of the Associated Press.[22][23] The FBI intends to deploy Magic Lantern in the form of an e-mail attachment. When the attachment is opened, it installs a trojan horse on the suspect's computer. The trojan horse is activated when the suspect uses PGP encryption, often used to increase the security of sent e-mail messages. When activated, the trojan horse will log the PGP password, which allows the FBI to decrypt user communications.[24][25] Symantec and other major antivirus vendors have whitelisted Magic Lantern, rendering their antivirus products, including Norton Internet Security, incapable of detecting Magic Lantern. Concerns include uncertainties about Magic Lantern's full potential and whether hackers could subvert it for purposes outside the jurisdiction of the law.[26][27]

Graham Cluley, a technology consultant from Sophos, said "We have no way of knowing if it was written by the FBI, and even if we did, we wouldn’t know whether it was being used by the FBI or if it had been commandeered by a third party".[28] Another reaction from this came from Marc Maiffret, chief technology officer and cofounder of eEye Digital Security who states: "Our customers are paying us for a service, to protect them from all forms of malicious code. It is not up to us to do law enforcement's job for them so we do not, and will not, make any exceptions for law enforcement malware or other tools."[29]

FBI spokesman Paul Bresson, in response if Magic Lantern needed a court order to deploy, "Like all technology projects or tools deployed by the FBI it would be used pursuant to the appropriate legal process."[30][31] Proponents of Magic Lantern argue the technology would allow law enforcement to efficiently and quickly decrypt messages protected by encryption schemes. Implementing Magic Lantern does not require physical access to a suspect's computer, unlike Carnivore, a predecessor to Magic Lantern, since physical access to a computer would require a court order.[32]

Performance Impact

In 2006, Oli Warner published two articles comparing the system performance impact of various Windows applications, including Norton Interent Security 2006. Warner later decided to rerun the benchmarks, revising his methodology. Before the second report was published, Warner claimed to have received an e-mail from Symantec, asking him to benchmark the 2007 version, providing him with a free license. Warner benchmarked the processor and the disk performance with and without each application, compiling two scripts in C++, a programming language. One calculated all prime numbers between 100,000 and 200,000 and the other tested file read/write time. BootVis was used to measure boot time. All testing was conducted inside a virtualized environment created by VMware. Despite the 2007 version's improvements, Warner noted its significant boot delay.[33]

Uninstallation

Norton Internet Security has been criticized for refusing to uninstall completely, leaving unnecessary files behind.[34][35] Another issue is versions prior to 2009 installed LiveUpdate, which updates Norton-branded software, separately. The user must uninstall both Norton Internet Security and the LiveUpdate component manually. The LiveUpdate component is purposely left behind to update other Norton-branded products, if present.[36] In response, Symantec developed the Norton Removal Tool to remove leftover registry keys and values along with files and folders.[37] However, neither route of uninstallation will remove subscription data, preserved to prevent users from installing multiple trial copies.

Windows XP Service Pack 3 and Vista Service Pack 1

When Norton Internet Security 2008 is installed, users encountered incompatibilities upgrading to Windows XP Service Pack 3 or Windows Vista Service Pack 1. Users report numerous invalid registry keys being added, resulting in an empty Device Manager and missing devices such as wireless network adapters.[38][39] Symantec initially blamed Microsoft for the incompatibilities but has since accepted partial responsibility.[40] Symantec has issued a fix intended for users before upgrading, available via LiveUpdate. Before upgrading to Service Pack 3, Symantec recommends disabling the tamper protection component in the 2008 release.[38]

Windows Vista

Sarah Hicks, Symantec's vice president of consumer product management, voiced concern over Windows Vista 64-bit's PatchGuard. PatchGuard was designed by Microsoft to ensure the integrity of the kernel, a part of a operating system which interacts with the hardware. Rootkits often hide in a operating system's kernel, complicating removal.[41] Mike Dalton, European president of McAfee said, "The decision to build a wall around the kernel with the assumption it can't be breached is ridiculous", claiming Microsoft was preventing security vendors from effectively protecting the kernel while promoting its own security product, Windows Live OneCare.[42] Hicks said Symantec did not mind the competition from OneCare.[43] Symantec later published a white paper detailing PatchGuard with a instructions to obtain a PatchGuard exploit.[44][45][46] After negotiations and investigations from antitrust regulators, Microsoft decided to allow security vendors access to the kernel by creating special API instructions.[47]

References

  1. ^ "Channel Best-Sellers: Winning Security Players". CRN Staff. United Business Media LLC. November 23, 2007. Retrieved 2009-03-09.
  2. ^ "Norton Internet Security 2009 16.2.0.7". Softpedia. February 3rd, 2009. Retrieved 2009-03-14. {{cite web}}: Check date values in: |date= (help)
  3. ^ "Norton Add-on Pack 2.1". Softpedia. July 14th, 2008. Retrieved 2009-03-14. {{cite web}}: Check date values in: |date= (help)
  4. ^ "NAV/NIS 2009.5 Patch Update [ Edited ]". Tim Lopez. Symantec Corporation. March 19, 2009. Retrieved 2009-03-13.
  5. ^ by bottod on December 7, 2005. "Norton Internet Security 2006 Internet security and firewall reviews – CNET Reviews". CBS Interactive, Inc. Retrieved 2009-02-23.{{cite web}}: CS1 maint: numeric names: authors list (link)
  6. ^ a b by sralls on October 3, 2005. "Norton AntiVirus 2006 Internet security and firewall reviews – CNET Reviews". CBS Interactive, Inc. Retrieved 2009-02-23.{{cite web}}: CS1 maint: numeric names: authors list (link)
  7. ^ "About Heuristics" (PDF). Stephen M. Sladaritz Sr. SANS Institute. March 23, 2002. Retrieved 2009-03-16.
  8. ^ a b "Security: A Suite Gift – Norton Internet Security 2006 - Full Review – Reviews by PC Magazine". Pcmag.com. Retrieved 2009-02-23.
  9. ^ "Security: A Suite Gift – Norton Internet Security 2006 – Full Review – Reviews by PC Magazine". Pcmag.com. Retrieved 2009-02-23.
  10. ^ Reviewed by: Robert Vamosi. "Norton AntiVirus 2007 Internet security and firewall reviews – CNET Reviews". CBS Interactive, Inc. Retrieved 2009-02-23.
  11. ^ a b c Reviewed by: Robert Vamosi. "Norton AntiVirus 2007 Internet security and firewall reviews – CNET Reviews". CBS Interactive, Inc. Retrieved 2009-02-23.
  12. ^ "Rad Tech Gifts for Grads – Norton Internet Security 2007 - Fresh Phish and Stale Settings – Reviews by PC Magazine". Pcmag.com. Retrieved 2009-02-23.
  13. ^ "Norton Internet Security 2007". Symantecstore.com. Retrieved 2009-02-23.
  14. ^ http://pcworld.co.nz/pcworld/pcw.nsf/feature/D797C6B246A7ECA5CC25734600732321
  15. ^ "11 Critical Security Apps – Norton Internet Security 2008 - Keep Your Identity Safe – Reviews by PC Magazine". Pcmag.com. Retrieved 2009-02-23.
  16. ^ "Symantec Launches Fastest Security Products in the World". Marketwire, Incorporated. September 9, 2008. Retrieved 2009-03-04.
  17. ^ http://www.passmark.com/ftp/antivirus_09-performance-testing-ed3.pdf
  18. ^ "Filtering Viruses Through The Cloud". Andy Greenberg. Forbes.com LLC. September 22, 2008. Retrieved 2009-03-11.
  19. ^ "Norton Update Center". Retrieved 2009-03-18. {{cite web}}: Unknown parameter |Publisher= ignored (|publisher= suggested) (help)
  20. ^ "System requirements for Norton Internet Security 4.0 for Mac". Symantec Corporation. Retrieved 2009-03-01.
  21. ^ "Worm Removal – Anti Phishing Filter – Identity Theft Protection: Norton Internet Security for Mac Dual Protection". Symantec Corporation. 2007-08-15. Retrieved 2009-02-23.
  22. ^ Sullivan, Bob (2001-11-20). "FBI software cracks encryption wall". MSNBC. Retrieved 2007-11-20. {{cite news}}: Check date values in: |date= (help)
  23. ^ Ted Bridis. "FBI Develops Eavesdropping Tools," Washington Post, November 22, 2001.
  24. ^ "FBI Has a Magic Lantern". Usgovinfo.about.com. Retrieved 2009-02-23.
  25. ^ "The FBI's Magic Lantern". Worldnetdaily.com. 2001-11-28. Retrieved 2009-02-23.
  26. ^ "Invasive Software: Who's Inside Your Computer?" (PDF). George Lawton. July 2002. Retrieved 2009-03-12.
  27. ^ http://www.kaspersky.com (2001-12-11). "The FBI's "Magic Lantern" Shines Bright". Kaspersky.com. Retrieved 2009-02-23. {{cite web}}: External link in |author= (help)
  28. ^ Jackson, William (2001-12-06). "Antivirus vendors are wary of FBI's Magic Lantern – Government Computer News". Gcn.com. Retrieved 2009-02-23.
  29. ^ McCullagh, Declan (2007-07-17). "Will security firms detect police spyware? – CNET News". CBS Interactive, Inc. Retrieved 2009-02-23.
  30. ^ "FBI Confirms 'Magic Lantern' Project Exists" (PDF). Elinor Mills Abreu. At Home Corporation. December 31, 2001. Retrieved 2009-03-12.
  31. ^ "THE CASE FOR MAGIC LANTERN: SEPTEMBER 11 HIGHLIGHTS THE NEED FOR INCREASED SURVEILLANCE" (PDF). Christopher Woo & Miranda So. Harvard Journal of Law & Technology. 2002. Retrieved 2009-03-12.
  32. ^ "IMPLICATIONS OF SELECT NEW TECHNOLOGIES FOR INDIVIDUAL RIGHTS AND PUBLIC SAFETY". Amitai Etzioni. Harvard Journal of Law & Technology. 2002. Retrieved 2009-03-12.
  33. ^ "What Really Slows Windows Down". Oli Warner. Oli Warner. September 22, 2006. Retrieved 2009-03-10.
  34. ^ "Symantec uninstaller may not finish the job". Scott Dunn. WindowsSecrets.com. February 7, 2008. Retrieved 2009-03-05.
  35. ^ "How can I fully remove Norton Antivirus from my system?". Dave Taylor. Retrieved 2009-02-23.
  36. ^ "PCWorld". PCWorld. Retrieved 2009-02-23.
  37. ^ "Download and run the Norton Removal Tool". Symantec Corporation. Retrieved 2009-02-23.
  38. ^ a b Patch Watch, May 29, 2008 (2008-05-29). "Norton software conflicts with Windows XP SP3". Windowssecrets.com. Retrieved 2009-02-23.{{cite web}}: CS1 maint: multiple names: authors list (link) CS1 maint: numeric names: authors list (link)
  39. ^ "FAQ: Upgrading to Windows XP Service Pack 3 or Windows Vista Service Pack 1 with your Norton 2008 product installed". Symantec Corporation. Retrieved 2009-02-23.
  40. ^ Gregg Keizer (2008-05-23). "Symantec pins blame for XP SP3 registry corruption on Microsoft". computerworld.com. Retrieved 2008-06-19.
  41. ^ "Battle with the Unseen–Understanding Rootkits on Windows" (PDF). Eric Uday Kumar. Association of Anti-Virus Asia Researchers. 2006. Retrieved 2009-03-15.
  42. ^ "Vista PatchGuard Hacked". Marius Oiaga. Softpedia. October 16, 2006. Retrieved 2009-03-11.
  43. ^ "Symantec Snaps At Microsoft". Lisa Lerer. Forbes.com LLC. October 10, 2006. Retrieved 2009-03-11.
  44. ^ "Security Implications of Windows Vista" (PDF). Symantec Corporation. Retrieved 2009-03-11.
  45. ^ "Symantec Vista White Paper Links to PatchGuard Crack". Scott M. Fulton, III. Betanews, Inc. February 28, 2007. Retrieved 2009-03-11.
  46. ^ "Kaspersky Reveals the Fundamental Vulnerability of Vista PatchGuard". Marius Oiaga. Softpedia. February 9, 2007. Retrieved 2009-03-11.
  47. ^ "Microsoft to offer free security software". Gabriel Madway. Thomson Reuters. November 18, 2008. Retrieved 2009-03-14.