This auction has been won.
Leading
tednaidoo325 1 × R101.00
17 Feb 12:19
Runners-up
Madudumela(Blacklisted) 1 × R101.00
17 Feb 13:44
BARGAIN HUNT ONLINE(Blacklisted) 1 × R1.00
17 Feb 12:09

Similar products

R30 shipping
22% OFF
ESET Internet Security 2 User - 3 Year Subscription
R1,190 R1,520
R30 shipping
Kaspersky Standard Internet Security Software
R383.06
R30 shipping
29% OFF
ESET Internet Security 2 User - 1 Year Subscription
R400 R560

Kaspersky Internet Security 3 User, 1 Year License, 2010 (PC CD)

1 was available / new
Indicative market price: R499.95
R101.00 auction closed
Shipping
Standard courier shipping from R30
R30 Standard shipping using one of our trusted couriers applies to most areas in South Africa. Some areas may attract a R30 surcharge. This will be calculated at checkout if applicable.
Check my rate
Ready to ship in
The seller has indicated that they will usually have this item ready to ship within 3 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days
Buyer Protection How you're covered
Returns
Replacement
Warranty Type: Replacement We Replace all Orders that you may not be satisfied with without hesitation
Money-Back 7 Days
Money-Back Guarantee: 7 Days: 100% 7 - Day Money-Back Guarantee on all our items sold on BidorBuy, Customer Satisfaction guaranteed or their money-back.

Product information

Condition:
New
Location:
South Africa
Customer ratings:
Bob Shop ID:
58643645

 

Product Features

  • Keeps your money and identity safe
  • Cybercriminals won't hi-jack your PC
  • Ensure sage online banking and shopping
  • Family protection from online predators
  • Your files won't be ruined by hackers
  • Keeps your PC running smoothly
  • New: Gaming mode to suspend alerts, updates and scans
  • Improved Virtual Keyboard to enter logins and passwords securely
  • New: Safe Run - Run untrused applications and websites securely
  • Email and Instant Messaging protection
  • User Guide on disc as PDF file

     

 

Manufacturer's Description

Amazon.com Product Description

Internet Threats.
Today, the biggest threat faced by computers is crimeware. This malicious software is written by cybercriminals with the purpose of illegally making money. Crimeware may take the form of viruses, worms, Trojans or other malicious programs. Cyber threats are not just getting more sophisticated, the volume is growing: Kaspersky Lab currently receives around 30,000 unique samples every day.

Crimeware image
Crimeware

Crimeware
 

Be it Trojans, keyloggers or spyware, ‘Crimeware’ represents a new type of threat to our security Crimeware is malicious software that is secretly installed on computers. Most crimeware progams are in fact Trojans. There are many types of Trojans designed to do different things. For example, some are used to log every key you type (keyloggers), some capture screenshots when you are using banking websites, some download other malicious code, and others let a remote hacker access your system. What they each have in common is the ability to ‘steal’ your confidential information – such as passwords and PINs – and send it back to the criminal. Armed with this information, the cybercriminal is then able to steal your money.

Hacker Hackers

Hackers
Just like burglars break into houses, hackers break into computers. The term hacker was once used to describe a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a computer system. You can think of it as electronic burglary. Hackers regularly break into both individual computers and large networks. Once they have access, they may install malicious programs, steal confidential data, or perhaps use compromised computers to distribute spam.

Phishing
Phishing Scams

Phishing
Cybercriminals steal by tricking internet and email users into disclosing their personal details. A phishing attack is a specific form of cyber crime. The criminal creates an almost 100 percent perfect replica of a chosen financial institution’s website, then attempts to trick the user into disclosing their personal details – username, password, PIN etc – via a form on the fake website, allowing the criminal to use the details to obtain money.


Spam
Spamming

Spam
Spam is anonymous, unsolicited bulk email. It is sent out in mass quantities by spammers who make money from the small percentage of recipients that actually respond. Spam is also used for phishing and to spread malicious code. In the coming years, high-speed Internet connections allowed spammers to send out mass mailings inexpensively and quickly, as did the discovery that individual users' modems could be accessed by anyone from anywhere in the world since they had no protection at all. In other words, unsuspecting internet users' connections could be used to send their spam in much higher volume. The result is an ongoing battle between spammers and those working to prevent them, constantly trying to stay one step ahead in the fight to keep spam from clogging the information superhighway.

Child Protect
Protecting Children Online

Online Child Protection
Talk to them about the potential dangers, Keep the computer in a family room, Encourage your children to talk to you about their online experience, Provide them with guidelines for online activity, Use your programs' settings to restrict content that your children can access online, Follow the advice above on how to protect from malicious code and hacker attacks

Minimum System Requirements
 

  • Operating System: Microsoft Windows XP Home Edition, Professional and XP Professional (Service Pack 2 + all hot fixes + x64 Edition), Microsoft Windows Vista Home Basic, Home Premium,Business,Enterprise, Ultimate (All 32/64 bit)
  • Intel Pentium 300 MHz or higher (or equivalent) 256 MB available RAM
  • Intel Pentium 800 MHz 32 bit (x86) / 64 bit (x64) or higher (or equivalent) 512 MB available RAM
  • Please Note: Safe Run Mode doesn’t work with Microsoft Windows XP x64, and works with limitations on Microsoft Windows Vista x64
  • CD-ROM (for installation of the program from CD)
  • User guide on disc as PDF file
  • Computer mouse
  • Internet connection (for product activation)
  • Microsoft Internet Explorer 6 or higher (for downloading updates)
  • Microsoft Windows Installer 2.0 or higher
  • Hard Disk Space:300 MB free space on the hard drive (the exact number depends on antivirus database size)

Customer ratings: 1 ratings

happy with service
23 Mar 2012