{"id":635,"date":"2011-10-19T15:12:29","date_gmt":"2011-10-19T13:12:29","guid":{"rendered":"http:\/\/it-news-blog.com\/?p=635"},"modified":"2022-03-08T10:44:01","modified_gmt":"2022-03-08T08:44:01","slug":"norton-internet-security-2012","status":"publish","type":"post","link":"https:\/\/it-news-blog.com\/?p=635","title":{"rendered":"Norton Internet Security 2012"},"content":{"rendered":"<div>\n<p>Norton Internet Security bietet einen umfassenden Schutz vor den neuesten Bedrohungen aus dem Internet. Das Programm ist nach der Installation sofort im Hintergrund aktiv, optimiert die Sicherheitseinstellungen und sch\u00fctzt automatisch vor einer Vielzahl von Spionageprogrammen, Viren, W\u00fcrmern und Crimeware.<\/p>\n<p>Auch die neuesten Online-Bedrohungen werden erkannt &#8211; so werden beispielsweise mittels erweitertem Phishing-Schutz betr\u00fcgerische Webseiten identifiziert und blockiert. Auch ein Rootkit-Schutz ist integriert. Dar\u00fcber hinaus sch\u00fctzt die im Funktionsumfang enthaltene intelligente Firewall vor Hackern und verhindert, dass Spionageprogramme Informationen unbefugt \u00fcbertragen.<\/p>\n<\/div>\n<div>\n<p><strong>Wesentliche Features:<\/strong><\/p>\n<ul>\n<li>Insight-Schutz<\/li>\n<li>Antivirus<\/li>\n<li>Antispyware<\/li>\n<li>SONAR-Schutz (verhaltensbasierte proaktive Echtzeiterkennung)<\/li>\n<li>Intelligente Firewall<\/li>\n<li>Intrusion Prevention<\/li>\n<li>E-Mail-Schutz<\/li>\n<li>Identity Safe<\/li>\n<li>Browser-Schutz<\/li>\n<li>Sicheres Surfen<\/li>\n<li>Downloadinfo<\/li>\n<\/ul>\n<p>Laut Tests des Magdeburger Sicherheitsspezialisten AVTest.org konnte die Vorg\u00e4ngerversion vor allem beim Bereinigen von infizierten Dateien \u00fcberueugen.\u00a0 Anders als in fr\u00fcheren Zeiten geht die Security-L\u00f6sung auch schonend mit den Systemressourcen um. Als Symantec-Partner beraten wir Sie gerne zu diesem und anderen Produkten.<\/p>\n<\/div>\n<div>\n<p><strong>Matthias A. Walter,<\/strong> <a href=\"http:\/\/www.tec4net.com\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.tec4net.com<\/a><br \/>\nEDV-Sachverst\u00e4ndiger und Datenschutzauditor<\/p>\n<\/div>\n<p>\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014-<strong><br \/>\nQuellen und Links:<\/strong><\/p>\n<p>Testbericht AVTest.org<br \/>\n<a href=\"http:\/\/community.norton.com\/norton\/attachments\/norton\/forum_feedback\/3371\/2\/Remediation_Testing_Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/community.norton.com\/norton\/attachments\/norton\/forum_feedback\/3371\/2\/Remediation_Testing_Report.pdf<\/a><\/p>\n<p>Ausf\u00fchrlicher Artikel von ZDNet<br \/>\n<a href=\"http:\/\/www.zdnet.de\/magazin\/41556572\/mehr-als-bloss-virenschutz-norton-internet-security-2012.htm\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.zdnet.de\/magazin\/41556572\/mehr-als-bloss-virenschutz-norton-internet-security-2012.htm<\/a><\/p>\n<p>tec4net bietet zum Thma Sicherheit einen Forensik-Kurs unter:<br \/>\n<a href=\"http:\/\/forensik-seminar.de\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-619 alignleft\" src=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/10\/logo_fk_728x90_google.jpg\" alt=\"\" width=\"728\" height=\"90\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Norton Internet Security bietet einen umfassenden Schutz vor den neuesten Bedrohungen aus dem Internet. <\/p>\n","protected":false},"author":2,"featured_media":1333,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Norton Internet Security 2012 - IT-NEWS-BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/it-news-blog.com\/?p=635\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Norton Internet Security 2012 - IT-NEWS-BLOG\" \/>\n<meta property=\"og:description\" content=\"Norton Internet Security bietet einen umfassenden Schutz vor den neuesten Bedrohungen aus dem Internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/it-news-blog.com\/?p=635\" \/>\n<meta property=\"og:site_name\" content=\"IT-NEWS-BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2011-10-19T13:12:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-08T08:44:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2010\/10\/tec4net_sicherheit.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/it-news-blog.com\/?p=635\",\"url\":\"https:\/\/it-news-blog.com\/?p=635\",\"name\":\"Norton Internet Security 2012 - IT-NEWS-BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/it-news-blog.com\/#website\"},\"datePublished\":\"2011-10-19T13:12:29+00:00\",\"dateModified\":\"2022-03-08T08:44:01+00:00\",\"author\":{\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\"},\"breadcrumb\":{\"@id\":\"https:\/\/it-news-blog.com\/?p=635#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/it-news-blog.com\/?p=635\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/it-news-blog.com\/?p=635#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/it-news-blog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Norton Internet Security 2012\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/it-news-blog.com\/#website\",\"url\":\"https:\/\/it-news-blog.com\/\",\"name\":\"IT-NEWS-BLOG\",\"description\":\"Ein Service der tec4net GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/it-news-blog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\",\"name\":\"Matthias Walter\",\"sameAs\":[\"https:\/\/tec4net.com\"],\"url\":\"https:\/\/it-news-blog.com\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Norton Internet Security 2012 - IT-NEWS-BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/it-news-blog.com\/?p=635","og_locale":"de_DE","og_type":"article","og_title":"Norton Internet Security 2012 - IT-NEWS-BLOG","og_description":"Norton Internet Security bietet einen umfassenden Schutz vor den neuesten Bedrohungen aus dem Internet.","og_url":"https:\/\/it-news-blog.com\/?p=635","og_site_name":"IT-NEWS-BLOG","article_published_time":"2011-10-19T13:12:29+00:00","article_modified_time":"2022-03-08T08:44:01+00:00","og_image":[{"width":960,"height":400,"url":"https:\/\/it-news-blog.com\/wp-content\/uploads\/2010\/10\/tec4net_sicherheit.jpg","type":"image\/jpeg"}],"author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/it-news-blog.com\/?p=635","url":"https:\/\/it-news-blog.com\/?p=635","name":"Norton Internet Security 2012 - IT-NEWS-BLOG","isPartOf":{"@id":"https:\/\/it-news-blog.com\/#website"},"datePublished":"2011-10-19T13:12:29+00:00","dateModified":"2022-03-08T08:44:01+00:00","author":{"@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc"},"breadcrumb":{"@id":"https:\/\/it-news-blog.com\/?p=635#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/it-news-blog.com\/?p=635"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/it-news-blog.com\/?p=635#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/it-news-blog.com\/"},{"@type":"ListItem","position":2,"name":"Norton Internet Security 2012"}]},{"@type":"WebSite","@id":"https:\/\/it-news-blog.com\/#website","url":"https:\/\/it-news-blog.com\/","name":"IT-NEWS-BLOG","description":"Ein Service der tec4net GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/it-news-blog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc","name":"Matthias Walter","sameAs":["https:\/\/tec4net.com"],"url":"https:\/\/it-news-blog.com\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/635"}],"collection":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=635"}],"version-history":[{"count":9,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/635\/revisions"}],"predecessor-version":[{"id":2042,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/635\/revisions\/2042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/media\/1333"}],"wp:attachment":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}