Norton Internet Security
   HOME

TheInfoList



OR:

Norton Internet Security, developed by Symantec Corporation, is a discontinued computer program that provides malware protection and removal during a subscription period. It uses
signatures A signature (; from la, signare, "to sign") is a handwritten (and often stylized) depiction of someone's name, nickname, or even a simple "X" or other mark that a person writes on documents as a proof of identity and intent. The writer of a ...
and
heuristics A heuristic (; ), or heuristic technique, is any approach to problem solving or self-discovery that employs a practical method that is not guaranteed to be optimal, perfect, or rational, but is nevertheless sufficient for reaching an immediate, ...
to identify
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Since Dmitri Ivanovsky's ...
. Other features include a
personal firewall A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall. A personal firewall differs from ...
, email spam filtering, and
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwa ...
protection. With the release of the 2015 line in summer 2014, Symantec officially retired Norton Internet Security after 14 years as the chief Norton product. It was superseded by
Norton Security Norton Security is a cross-platform security suite that provides subscription-based real-time malware prevention and removal in addition to identity theft protection and performance tuning tools. Other features include a personal firewall, emai ...
, a rechristened adaptation of the
Norton 360 Norton 360, developed by Symantec, was an “all-in-one” security suite for the consumer market. It was first released in 2007, but was discontinued in 2014; its features were carried over to its successor, Norton Security. In 2019, Symant ...
security suite. Symantec distributed the product as a download, a boxed CD, and as OEM software. Some retailers distributed it on a
flash drive A flash drive is a portable computer drive that uses flash memory. Flash drives are the larger memory modules consisting of a number of flash chips. A flash chip is used to read the contents of a single cell, but it can write entire block of cell ...
. Norton Internet Security held a 61% market share in the United States retail security suite category in the first half of 2007.


History

In August 1990, Symantec acquired
Peter Norton Computing Peter Norton Computing, Inc., was a software company founded by Peter Norton. The first and best known software package it produced was Norton Utilities. Another successful software package was Norton Commander, especially the DOS version. In 1990 ...
from
Peter Norton Peter Norton (born November 14, 1943) is an American programmer, software publisher, author, and philanthropist. He is best known for the computer programs and books that bear his name and portrait. Norton sold his software business to Syman ...
. Norton and his company developed various applications for
DOS DOS is shorthand for the MS-DOS and IBM PC DOS family of operating systems. DOS may also refer to: Computing * Data over signalling (DoS), multiplexing data onto a signalling channel * Denial-of-service attack (DoS), an attack on a communicat ...
, including an
antivirus Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the nam ...
. Symantec continued the development of the acquired technologies, marketed under the name of "Norton", with the
tagline In entertainment, a tagline (alternatively spelled tag line) is a short text which serves to clarify a thought for, or is designed with a form of, dramatic effect. Many tagline slogans are reiterated phrases associated with an individual, s ...
"from Symantec". Norton's crossed-arm pose, a registered U.S. trademark, was featured on Norton product packaging. However, his pose later moved to the spine of the packaging, and then disappeared. Users of the 2006 and later versions could upgrade to the replacement software without buying a new subscription. The upgraded product retains the earlier product's subscription data. Releases were named by year but have internal version numbers as well. The internal version number was advanced to 15.x in the 2008 edition to match the Norton AntiVirus release of the same year. As of the 2013 (20.x) release the product dropped the year from its name, although it still was referenced in some venues.


2000 (1.0, 2.0)

Norton Internet Security 2000, released January 10, 2000, was Symantec's first foray beyond
virus A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Since Dmitri Ivanovsk ...
protection and content filters. Its release followed an alliance between
Internet provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
Excite@Home @Home Network was a high-speed cable Internet service provider from 1996 to 2002. It was founded by Milo Medin, cable companies Tele-Communications Inc. (TCI), Comcast, and Cox Communications, and William Randolph Hearst III, who was their f ...
and
antivirus Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the nam ...
vendor
McAfee.com McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
to provide Internet subscribers with McAfee's new firewall software, ''McAfee Personal Firewall''. Version 2000s firewall, based on AtGuard from WRQ, filters traffic at the packet level. It could block
ActiveX ActiveX is a deprecated software framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly from the World Wide We ...
controls and
Java applets Java applets were small applications written in the Java programming language, or another programming language that compiles to Java bytecode, and delivered to users in the form of Java bytecode. The user launched the Java applet from a ...
. Other features included cookie removal, and
banner ad A web banner or banner ad is a form of advertising on the World Wide Web delivered by an ad server. This form of online advertising entails embedding an advertisement into a web page. It is intended to attract traffic to a website by linking ...
blocking.
ZDNet ZDNET is a business technology news website owned and operated by Red Ventures. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication. His ...
found the ad blocker to remove graphics that were not ads, breaking pages. Adjusting the settings fixed the problem, however the process was complicated.
ZDNet ZDNET is a business technology news website owned and operated by Red Ventures. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication. His ...
noted the lack of information presented concerning attacks the firewall blocked.
Norton LiveUpdate Norton LiveUpdate is a utility developed by Symantec Corporation that downloads and installs security updates (such as spyware, firewall, or antivirus signature files) and software patches. LiveUpdate can only apply updates for a particular vers ...
downloads and installs program updates. The ''Family Edition'' adds parental controls. Parental controls were backed by a quality control team of 10 people who searched the web for inappropriate content. Found content was categorized in subject matter and placed on a blacklist of about 36,000 sites. A designated administrator could add blocked sites, however the pre-supplied blacklist cannot be viewed or edited since it was
hard code Hard coding (also hard-coding or hardcoding) is the software development practice of embedding data directly into the source code of a program or other executable object, as opposed to obtaining the data from external sources or generating it at ...
d. Administrators could block certain subject matter. Another option was to block all sites, then create a
whitelist A whitelist, allowlist, or passlist is a mechanism which explicitly allows some identified entities to access a particular privilege, service, mobility, or recognition i.e. it is a list of things allowed when everything is denied by default. It is ...
of allowed sites. Family Edition could block transmission of specified personal information. Such information was replaced with the letter "X". However,
CNN CNN (Cable News Network) is a multinational cable news channel headquartered in Atlanta, Georgia, U.S. Founded in 1980 by American media proprietor Ted Turner and Reese Schonfeld as a 24-hour cable news channel, and presently owned by ...
noted
X-rated An X rating is a rating used in various countries to classify films that have content deemed suitable only for adults. It is used when the violent or sexual content of a film is considered to be potentially disturbing to general audiences. Aust ...
sites were retrieved when personal information was queried by a search engine. Version 2.0 was released June 12, 2000


2001 (2.5, 3.0)

Version 2001 (2.5) was released September 18, 2000, adding support for
Windows ME Windows Millennium Edition, or Windows Me (marketed with the pronunciation of the pronoun "me"), is an operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. It is the successor to Windo ...
in addition to the
Windows 9x Windows 9x is a generic term referring to a series of Microsoft Windows computer operating systems produced from 1995 to 2000, which were based on the Windows 95 kernel and its underlying foundation of MS-DOS, both of which were updated in su ...
series,
Windows NT Windows NT is a proprietary graphical operating system produced by Microsoft, the first version of which was released on July 27, 1993. It is a processor-independent, multiprocessing and multi-user operating system. The first version of Win ...
, and
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It was the direct successor to Windows NT 4.0, and was released to manufacturing on December 15, 1999, and was officiall ...
. Following attacks by the
ILOVEYOU ILOVEYOU, sometimes referred to as Love Bug or Love Letter for you, is a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" ...
and
Anna Kournikova Anna Sergeyevna Kournikova ( rus, Анна Сергеевна Курникова, p=ˈanːə sʲɪrˈɡʲejɪvnə ˈkurnʲɪkəvə, a=Anna_kournikova.ogg; born 7 June 1981) is a Russian former professional tennis player and American televisi ...
script Script may refer to: Writing systems * Script, a distinctive writing system, based on a repertoire of specific elements or symbols, or that repertoire * Script (styles of handwriting) ** Script typeface, a typeface with characteristics of handw ...
viruses, this version could block malicious scripts without virus signatures, by analyzing behavior. The firewall scans for Internet-enabled applications and creates access rules during installation based on a knowledge base maintained by Symantec. In '' PC Magazine'' testing, the installation took 24 minutes to complete on a 750 MHz Pentium III with 92 Internet-enabled applications. Using the firewall, users could determine whether to accept cookies, Java
applets In computing, an applet is any small application (computing), application that performs one specific task that runs within the scope of a dedicated widget engine or a larger program (computing), program, often as a plug-in (computing), plug-in. T ...
, and
ActiveX ActiveX is a deprecated software framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly from the World Wide We ...
controls on a global or per-site basis. A new feature, Intrusion Detection with AutoBlock, could detect
port scan A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host an ...
s and block further intrusion attempts. The program provides notifications for intrusion attempts, reporting the severity level and providing access to threat details. Alternatively, the firewall could put the computer in stealth, essentially hiding the system. Users could configure the security level, managing the number of notifications. Testing conducted by ''PC Magazine'' using
Shields Up ShieldsUP is an online port scanning service created by Steve Gibson of Gibson Research Corporation. The purpose of the utility is to alert the users of any ports that have been opened through their firewalls or through their NAT routers, which c ...
and Symantec's Security Check found that the firewall successfully stealthed all ports, hiding the computer from view. A leak test was conducted to see the firewall's ability to detect outbound connections. Each attempt was detected and the suite offered to block the attempts. The ''Family Edition'', like the prior version, included parental controls and the information filtering feature. Parental controls come with a list of objectionable sites, separated into 32 categories. The list was updated every two weeks by
Norton LiveUpdate Norton LiveUpdate is a utility developed by Symantec Corporation that downloads and installs security updates (such as spyware, firewall, or antivirus signature files) and software patches. LiveUpdate can only apply updates for a particular vers ...
. Using the list alone, Norton only blocks listed sites. Consequently, Norton may not block sites until the next update. Parents could customize the list, adding or removing sites. A list of allowed sites could be created to restrict children to those specific sites. This version used application blocking rather than protocol or port filtering to control Internet access. Children could be restricted in the applications they used to access the Internet. A parental control profile could be set up for each child, and settings could be automatically configured based on their age group, whether they be a child, :teenager, adult, or administrator. Internet usage and violations were noted in a report presented to parents. ''PC Magazine'' found that enabling parental controls added a minute to a computer's boot time. Version 3.0 was released March 19, 2001.


2002 (4.0, 5.0)

Version 2002 was announced on August 28, 2001. The ''Family Edition'' was dropped, so parental controls and information filtering were bundled. The installation was noted as quick and simple by both ''PC Magazine'' and CNET. Installation required a reboot, and afterwards the Security Assistant guides users through a questionnaire to best configure the service. CNET encountered a problem when upgrading from the prior release: customized settings were lost. ''PC Magazine'' found the default settings, aimed at avoiding frequent notifications, were somewhat permissive.
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of operating systems. The first operating system in the 9x family, it is the successor to Windows 3.1x, and was released to manufacturi ...
support was dropped. Running a full scan compiled a list of Internet-enabled applications. Users set permissions or accepted Norton's defaults. The firewall detected and blocked port scans and logged intrusion attempts. This version did not trace attackers. To ensure rogue programs could not masquerade as trustworthy applications, Norton verifies programs against a list of digital signatures for known programs. Update Tracker warned users when hackers attempted to gain access. The firewall blocked all access attempts from
Shields Up ShieldsUP is an online port scanning service created by Steve Gibson of Gibson Research Corporation. The purpose of the utility is to alert the users of any ports that have been opened through their firewalls or through their NAT routers, which c ...
and Port Checker. This version included a wizard to simplify firewall setup to accommodate multiple computers sharing an Internet connection. With this release, Norton could prevent specified personal information from access by a compatible
instant messenger Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and tri ...
client, e-mail, and websites. Ad-blocking included the Ad Trashcan, where users could place ads that escaped ad-filtering. A Professional Edition was announced December 11, 2001, aimed towards business owners. This version featured Norton
Intrusion Detection An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
, which intercepted suspicious connections and attacks, such as the Code Red
worm Worms are many different distantly related bilateral animals that typically have a long cylindrical tube-like body, no limbs, and no eyes (though not always). Worms vary in size from microscopic to over in length for marine polychaete wo ...
. Intrusion Detection focused on Windows-based attacks. Central management was available. Administrators configured firewall and productivity settings for client computers. Productivity settings allowed administrators to block
newsgroup A Usenet newsgroup is a repository usually within the Usenet system, for messages posted from users in different locations using the Internet. They are discussion groups and are not devoted to publishing news. Newsgroups are technically distinc ...
s,
website A website (also written as a web site) is a collection of web pages and related content that is identified by a common domain name and published on at least one web server. Examples of notable websites are Google, Facebook, Amazon, and Wi ...
s, and advertisements. The suite integrated with XP user accounts; settings could be personalized.


2003 (6.x)

Version 2003 was announced September 16, 2002. This version added ''Norton Spam Alert'' to reduce spam. The filter scanned the whole message and its context, rather than looking for keywords. A
POP3 In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use, and along with IMAP the most common ...
client had to be used. When a message was identified as spam, Norton inserted a phrase, by default "Spam Alert:", in the subject line. Users could create a rule to delete or move flagged messages. Users could create strings of text for Spam Alert screen when classifying messages. In '' PC Magazine'' testing, Spam Alert mistakenly classified 2.8 percent of legitimate e-mail as spam. 47 percent of spam slipped past the filter. Although
false positive A false positive is an error in binary classification in which a test result incorrectly indicates the presence of a condition (such as a disease when the disease is not present), while a false negative is the opposite error, where the test resul ...
rate was low, the feature did not fare well at finding actual spam. The updated main interface offered green and red indicators to show which features were active and which needed attention. The firewall updated features. A Block Traffic button in the main interface blocks all incoming and outgoing Internet traffic from an URL. Another new feature, Visual Tracker, graphically mapped attacks to their origin. The firewall blocked all port scans conducted by CNET, stealthing each one. Following the
Nimda The Nimda virus is a malicious file-infecting computer worm. It quickly spread, surpassing the economic damage caused by previous outbreaks such as Code Red. The first released advisory about this thread (worm) was released on September 18, 200 ...
and Code Red worms, this version scanned all incoming and outgoing traffic for suspicious data exchanges against a routinely updated database, a feature ported from Norton Internet Security 2002 Professional Edition. Connection to the offending computer was automatically severed if the traffic matches a database item. Symantec announced a Professional Edition on November 19, 2002. Data recovery tools allow users to recover deleted or malware-damaged files. The inclusion of a
data erasure Data erasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media b ...
tool allowed users to delete files while minimizing the chance of recovery. Web Cleanup removes browser cache files, history, and cookies. To maintain dial-up connections, Connection Keep Alive simulates online activity during periods of user inactivity. Norton Productivity Control enables users to filter Internet content and block newsgroups. When used with User Access Manager, multiple filtering profiles could be created, assigned to different users.


2004 (7.x)

Announced September 8, 2003, version 2004 adds
adware Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
,
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their priva ...
, and
keylogger Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored ...
protection. '' PC Magazine'' found the added protection to be weak. Out of the spyware samples Norton detected, a significant number were not removed completely, requiring manual removal. Norton did little to prevent spyware infections. Norton AntiSpam, the renamed spam filtering feature, has a set of spam rules, which cannot be viewed or edited. Whitelists and blacklists of senders could be created. Users may create their own spam definitions. AntiSpam integrates with
Outlook Outlook or The Outlook may refer to: Computing * Microsoft Outlook, an e-mail and personal information management software product from Microsoft * Outlook.com, a web mail service from Microsoft * Outlook on the web, a suite of web applications ...
,
Outlook Express Outlook Express, formerly known as Microsoft Internet Mail and News, is a discontinued email and news client included with Internet Explorer versions 3.0 through to 6.0. As such, it was bundled with several versions of Microsoft Windows, from ...
, and Eudora, allowing users to tag e-mail as spam on-the-fly. E-mail identified as spam were either
quarantined A quarantine is a restriction on the movement of people, animals and goods which is intended to prevent the spread of disease or pests. It is often used in connection to disease and illness, preventing the movement of those who may have been ...
by default, however the feature could be configured to delete such messages automatically. In CNET testing, AntiSpam correctly identified 94 percent of spam messages.
Product activation Product activation is a license validation procedure required by some proprietary software programs. Product activation prevents unlimited free use of copied or replicated software. Unactivated software refuses to fully function until it ''determin ...
was introduced* ". After installation, users were allowed a 15-day grace period to activate their copy of Norton Internet Security 2004. The program will not work after the deadline without the 24-character product key. The product key used to activate a copy of Norton Internet Security ties in with an
alphanumeric Alphanumericals or alphanumeric characters are a combination of alphabetical and numerical characters. More specifically, they are the collection of Latin letters and Arabic digits. An alphanumeric code is an identifier made of alphanumeric c ...
code based on a computer's hardware configuration. Users may activate their product five times with the same product key, however licensing terms dictate users were allowed only to install Norton Internet Security 2004 on one computer.


2005 (8.x)

Symantec introduced Version 2005 on August 17, 2004. This version was sometimes referred to with the tagline of AntiSpyware Edition, since spyware detection was integrated with Norton and was by default enabled. Found threats were listed, separating the ones already dealt with and the ones requiring user interaction. More detailed information was provided through a link to Symantec's website. However, ''
PC Pro ''PC Pro'' is one of several computer magazines published monthly in the United Kingdom by Future plc. Its headquarters is in London. ''PC Pro'' also licenses individual articles (or even the whole magazine) for republication in various countri ...
'' and ''PC Magazine'' noted lengthy scan times. A full scan took 24 minutes to over half an hour, respectively. In ''PC Pro'' testing, Norton detected 61 percent of the spyware samples, compared to an average of 68 percent for all the tested products. Removal rates were above average, 72 percent versus the average of 68 percent. Norton blocked reinstallation with a score of 48 percent, compared to the group average of 43 percent. Overall, Norton ranked fifth among the tested products. In ''PC Magazine'' testing, Norton installed slowly on infected systems and failed to install on one altogether. Contacting Symantec did not resolve the issue. Internet Worm Protection could block
worms Worms may refer to: *Worm, an invertebrate animal with a tube-like body and no limbs Places *Worms, Germany Worms () is a city in Rhineland-Palatinate, Germany, situated on the Upper Rhine about south-southwest of Frankfurt am Main. It had ...
, which scan IP addresses for open ports. It blocks inbound ports based on known and suspected exploits using
signatures A signature (; from la, signare, "to sign") is a handwritten (and often stylized) depiction of someone's name, nickname, or even a simple "X" or other mark that a person writes on documents as a proof of identity and intent. The writer of a ...
and
heuristics A heuristic (; ), or heuristic technique, is any approach to problem solving or self-discovery that employs a practical method that is not guaranteed to be optimal, perfect, or rational, but is nevertheless sufficient for reaching an immediate, ...
. The addition of the feature follows MSBlast in 2003 and Sasser in 2004, worms that exploited
vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
in Microsoft Windows' operating systems. In response to emerging privacy threats — 75 percent of the threats in the last 12 months attempted to steal confidential information — this version adds
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwa ...
protection. Using the firewall component, users could create a whitelist of sites where confidential information could be transmitted. Users were alerted when information was transmitted to a site not on the list. The ''Outbreak Alert'' feature warns users of major threats as classified by Symantec, and users could press the Fix Now button to applies a set of changes to close vulnerabilities, such as blocking necessary ports used by a propagating worm. Browser Privacy could suppress information website generally receive about its visitors, such as the browser and operating system used. The feature could block advertisements. Privacy Control could warn users when sending confidential information. It could be configured to block the transmission. It allowed users to specify how the information could sent, such as via IM or e-mail. Item-specific exceptions allow users to control where there data could be sent. However, ''PC Pro'' found a flaw in the information filtering feature. The format of information on the list of confidential information could limit its effectiveness. For example, entering the last six digits of a credit card number will not stop the numbers from leaking if they were grouped in four digits. ''PC Magazine'' noted the fact anyone who could login to the computer could view the database of private information. For that reason, Symantec recommends entering only the last portion of sensitive information. Norton AntiSpam now scanned e-mails for
spoofed URL A spoofed URL describes one website that poses as another website. It sometimes applies a mechanism that exploits bugs in web browser technology, allowing a malicious computer attack. Such attacks are most effective against computers that lack rece ...
s and deals with any offending e-mail as spam. E-mails could be blocked based on language, however by default the filter allowed all languages. AntiSpam could sync its own list of allowed senders with POP3 address books. Users could train the spam filter by pointing out valid e-mail marked as spam and vice versa. Support for
Yahoo! Mail Yahoo! Mail is an email service launched on October 8, 1997, by the American company Yahoo, Inc. The service is free for personal use, with an optional monthly fee for additional features. Business email was previously available with the Yahoo! ...
and
Hotmail Outlook.com is a webmail service that is part of the Microsoft 365 product family. It offers mail, Calendaring software, calendaring, Address book, contacts, and Task management, tasks services. Founded in 1996 by Sabeer Bhatia and Jack Smit ...
was added* ".


2006 (9.x)

Norton Internet Security 2006 debuted on September 26, 2005. The new main interface, the ''Norton Protection Center'', aggregates all information in a central location. Security status was shown by how secure the computer was for tasks such as e-mail and Internet browsing, not in the context of which features were enabled. The ''Protection Center'' could recognize third-party software protecting the computer. The new interface advertises additional products from Symantec; some categories of protection, such as "Data Protection", will read "No Coverage" until the user purchases and installs
Norton SystemWorks Norton SystemWorks is a discontinued utility software suite by Symantec Corp. It integrates three of Symantec's most popular products – Norton Utilities, Norton CrashGuard and Norton AntiVirus – into one program designed to simplify solving ...
. An additional system tray icon was created by the ''Protection Center''. The installation was noted as lengthy by ''PC Magazine'', especially on malware-infected systems. Spyware detection has been tweaked since the last release. It has been updated to better identify keyloggers. In ''PC Magazine'' testing, Norton successfully detected all 11 spyware threats and removed all but two. ''PC Magazine'' did give Norton credit even when manual removal was required. The suite removed three of four commercial keyloggers. When attempting to install the spyware on a clean system, Norton blocked all 11 and two of the four commercial keyloggers. In most cases, it did not block the installation, however Norton did call for a scan after the spyware was installed. In ''PC Pro'' testing, Norton detected 78 percent of spyware, removed 82 percent, and blocked 65 percent from installing. Norton AntiSpam was discontinued as a separate product from Symantec, now only available in Norton Internet Security. The feature could block all e-mail from unknown senders, and automatically blocks messages with suspicious elements such as invisible text, HTML forms, and phishing URLs. To improve accuracy, Norton analyzes outgoing e-mails and messages whose categorization was corrected by users by hitting the "This is spam" and "This is not spam" buttons. In ''PC Magazine'' testing, the feature marked one in ten valid e-mail as spam and let one in every six spam messages in the inbox. 400 messages were used, and the program was allowed to process the messages for over a week. In ''PC Pro'' testing, the feature performed better, blocking 96 percent of spam, with a false positive rate of 0.2 percent. Norton recommends disabling the
Windows Firewall Windows Firewall (officially called Microsoft Defender Firewall in Windows 10 version 2004 and later) is a firewall component of Microsoft Windows. It was first included in Windows XP SP2 and Windows Server 2003 SP1. Before the release of Windows ...
to avoid redundant alerts. The firewall stealthed all significant ports in ''PC Magazine'' testing. Attacking the firewall itself was unsuccessful, and ''PC Magazine'' was unable to stop its service, terminate its process, or disable the firewall using simulated mouse clicks. The firewall passed ''PC Pro''s tests, successfully stealthing all ports. Other features included Bloodhound technology, which looks for virus-like behavior to better find
zero day virus A zero-day (also known as a 0-day) is a computer-software vulnerability previously unknown to those who should be interested in its mitigation, like the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it t ...
es. The ''Security Inspector'' looks for common vulnerabilities, including insecure user account passwords and browser insecurities. Advertisement blocking rewrites a website's
HTML The HyperText Markup Language or HTML is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaSc ...
to prevent advertisements from being displayed. Parental controls, an optional component, could block certain programs from accessing the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
, such as IM clients, and restrict
newsgroup A Usenet newsgroup is a repository usually within the Usenet system, for messages posted from users in different locations using the Internet. They are discussion groups and are not devoted to publishing news. Newsgroups are technically distinc ...
access. Restrictions could be assigned to different Windows users accounts. Sites were classified in 31 categories, and the four profiles which could be assigned each block different categories of sites. Supervisors define exceptions, add global blocked sites, or block all access to sites not on a user-created whitelist. Both ''PC Magazine'' and ''PC Pro'' noted the exclusion of time-based restrictions. Information filtering could be controlled on a per-user basis.
Windows 98 Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. The second operating system in the 9x line, it is the successor to Windows 95, and was released to ...
compatibility was dropped from this release.


2007 (10.x)

The 2007 version was announced September 12, 2006. A tabbed interface allowed users to access the Norton Protection Center and the program settings without separate tray icons and
windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for ser ...
open. Symantec revised Norton Internet Security and made this version more modularized, which reduced the suite's memory usage to 10–15 megabytes and scan times by 30–35 percent. Another result was that spam filtering and parental controls became separate components. When installed, the features consumed 100 MB of disk space. Anti-phishing integrated with
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft which was used in the Windows line of operating systems ( ...
. It analyzes sites, examining the website's URL, title, form, page layout, visible text and links, and uses a blacklist to detect phishing sites. Users were blocked access from suspected phishing sites, however were presented an option to continue. In ''PC Magazine'' testing, the feature blocked 22 of 24 phishing sites, while
Internet Explorer 7 Windows Internet Explorer 7 (IE7) (codenamed Rincon) is a web browser for Windows. It was released by Microsoft on October 18, 2006, as the seventh version of Internet Explorer and the successor to Internet Explorer 6. Internet Explorer 7 is pa ...
recognized 17 of the 24 sites. In ''PC Pro'' testing, the feature successfully blocked access to every phishing site it was tested against. Spam filtering no longer included a language feature, Symantec claimed it was less useful with current spam and created false positives. Tested against 1,500 messages by ''PC Magazine'', Norton let over half of the spam into the inbox. Five percent of valid mail were marked as spam. This version utilized Symantec's
Veritas Veritas is the name given to the Roman virtue of truthfulness, which was considered one of the main virtues any good Roman should possess. The Greek goddess of truth is Aletheia (Ancient Greek: ). The German philosopher Martin Heidegger argues ...
VxMS technology to better identify
rootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exis ...
s. VxMS allowed Norton to find inconsistencies among files within directories and files at the volume level. A startup application manager allowed users to prevent applications from launching at login. This release dropped support for Windows 2000 and was compatible with Windows Vista upon its release with an update. The firewall made all decisions by itself to lessen the chance of disruption by a misinformed decision. Applications known to be safe were allowed Internet access, and vice versa for malicious applications. Unknown ones were analyzed and blocked if they exhibited malicious behavior. In both ''PC Magazine'' and ''PC Pro'' testing, the firewall did not incorrectly block any safe applications from Internet access. All malware was blocked by the firewall. ''PC Magazine'' testing reflected the same results. The firewall stealthed all ports. Exploits were blocked by the intrusion prevention system, which prevented threats from leveraging vulnerabilities. The system was updated whenever a vulnerability was identified. Attempts to disable the firewall were unsuccessful; registry changes, process termination, and simulated mouse clicks all failed. Disabling Windows services had no effect on the firewall since it worked at the kernel driver level. This version automatically adjusted configuration for different networks based on the
physical address In computing, a physical address (also real address, or binary address), is a memory address that is represented in the form of a binary number on the address bus circuitry in order to enable the data bus to access a ''particular'' storage cell ...
of the gateway rather than IP addresses. In ''PC Magazine'' testing, Norton detected 15 of 16 spyware samples. 13 of the 16 were removed. Against eight commercial keyloggers, the suite removed all the samples. On a clean system, Norton blocked 14 of the 16 spyware samples from installing, and stopped seven of the eight keyloggers from installing.


2008 (15.x)

The 2008 version was announced on August 28, 2007, adding support for Windows Vista 64-bit. New features included
SONAR Sonar (sound navigation and ranging or sonic navigation and ranging) is a technique that uses sound propagation (usually underwater, as in submarine navigation) to navigate, measure distances (ranging), communicate with or detect objects on o ...
, Norton Identity Safe, and Browser Defender. SONAR monitored applications for malicious behavior. Identity Safe superseded the information filtering function; instead of blocking personal information from leaving the computer, it stored personal information to fill
webform A webform, web form or HTML form on a web page allows a user to enter data that is sent to a Server (computing), server for processing. Forms can resemble form (document), paper or database forms because web users fill out the forms using checkboxe ...
s. It was password protected and checked a website's authenticity before filling any forms. Browser Defender inspected and blocked suspicious
API An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software interface, offering a service to other pieces of software. A document or standard that describes how ...
calls, intended to stop
drive-by download Drive-by download is of two types, each concerning the unintended download of computer software from the Internet: # Authorized drive-by downloads are downloads which a person has authorized but without understanding the consequences (e.g. dow ...
s. Network Map identified networked computers with Norton Internet Security 2008 installed. Remote monitoring allowed checking the status of other installations on different computers; problems were identified with a red "X" icon. Using the feature, users could control traffic between computers. It warned users if they were using an unencrypted wireless network. The startup application manager and advertisement blocking features were dropped from this release. Information filtering, although superseded by Identity Safe in the suite, was available separately. It could be used in conjunction with Identity Safe. Phishing protection now integrated with Mozilla Firefox. Testing by ''PC Magazine'' found that Norton blocked 94 percent of phishing sites, compared to 83 percent for
Internet Explorer 7 Windows Internet Explorer 7 (IE7) (codenamed Rincon) is a web browser for Windows. It was released by Microsoft on October 18, 2006, as the seventh version of Internet Explorer and the successor to Internet Explorer 6. Internet Explorer 7 is pa ...
and 77 percent for
Firefox 2 Mozilla Firefox 2 is a version of Firefox, a web browser released on October 24, 2006 by the Mozilla Corporation. Firefox 2 uses version 1.8 of the Gecko layout engine for displaying web pages. The release contained many new features not found ...
. CNET identified an issue with the feature: when anti-phishing was disabled, Identity Safe still offered to automatically submit personal information to websites, including phishing sites. Symantec declined to call it a "flaw", stating it was recommended to use Identity Safe with anti-phishing enabled. Alternatively, Identity Safe could be used with Firefox and Internet Explorer's built-in anti-phishing capability. ''PC Magazine'' found that the firewall put all ports in stealth mode. The firewall blocked ten of 12 leak tests, used to see if malware could evade the firewall's control of network traffic. Previous versions did not identify the tests because none carried a malicious payload. Another test was conducted using Core Impact, which successfully exploited one vulnerability on the test computer. However, other components of Norton stopped the exploit from causing harm. The other attempts were unsuccessful either because the system was invulnerable or Norton's Intrusion Prevention System stopped it. Attempts to disable the firewall were unsuccessful by ''PC Magazine''. On the contrary, ''PC Pro'' identified 15 open ports on a computer with Norton installed. In ''PC Magazine'' testing, Norton completely detected most malware. For two-thirds of the samples, all traces were removed. Norton found and removed all the commercial keyloggers. A full scan took nearly an hour to complete though, twice as long as the 2007 version. The suite blocked most of the malware from installing and all the commercial keyloggers, regardless of any modifications made to the samples. ''PC World'' noted that Norton removed 80 percent of malware-associated files and
Registry Registry may refer to: Computing * Container registry, an operating-system-level virtualization registry * Domain name registry, a database of top-level internet domain names * Local Internet registry * Metadata registry, information system for re ...
entries. Spam filtering imported users' address books to compile a whitelist of allowed senders. Addresses to which users send mail and e-mail tagged as valid mail could be automatically added to the whitelist. Using several thousand messages, ''PC Magazine'' found that Norton marked over 40 percent of valid e-mail as spam. Over 80 percent of valid newsletters were marked as spam. Norton did correctly identify 90 percent of spam e-mail.


2009 (16.x)

The 2009 version was released for sale September 9, 2008. Symantec set several goals while in development: complete installations in under a minute and a footprint of 100 MB. Average installation times ranged from eight to ten minutes, and the previous 2008 version had a 400 MB footprint. Other goals included reducing load time after the computer starts, from 20 to 30 seconds to 10 seconds, and file scanning times with technology that allowed Norton to skip certain trusted files. The technology works on the basis that if a piece of software runs on a significant proportion of computers, then it was safe. A reduction in memory consumption was made, prompted by the fact 40 percent of people contacting Symantec support had 512 MB of RAM. The beta release used about 6 MB of memory, compared to 11 MB by the prior version. To reduce scan times,
Norton Insight Norton Insight whitelists files based on reputation. Norton-branded antivirus software then leverages the data to skip known files during virus scans. Symantec claims quicker scans and more accurate detection with the use of the technology. De ...
used data from Norton Community participants to avoid scanning files that were found on a statistically significant number of computers. Citing a
NPD Group The NPD Group, Inc. (NPD; formerly National Purchase Diary Panel Inc. and NPD Research Inc.) is an American market research company founded on September 28, 1966, and based in Port Washington, New York. In 2017, NPD ranked as the 8th largest mar ...
study finding that 39 percent of consumers switching antiviruses blamed performance, a CPU usage meter allowed users to find the cause of high CPU usage, whether it be Norton or another program. Updates were more frequent, termed Norton Pulse Updates. Pulse Updates were delivered every five to fifteen minutes (down from every eight hours). Silent Mode automatically suspends alerts and updates when a program enters fullscreen mode and could be manually enabled. Activities took place while the computer was idle, and terminate once user activity was observed. Spam filtering became part of the bundle. This release bundled
Norton Safe Web Norton Safe Web (sometimes abbreviated NSW) is a service developed by Symantec Corporation that is designed to help users identify malicious websites. Safe Web delivers information about websites based on automated analysis and user feedback. T ...
, which identified malicious websites, compatible with Internet Explorer and Firefox.
Norton Safe Web Norton Safe Web (sometimes abbreviated NSW) is a service developed by Symantec Corporation that is designed to help users identify malicious websites. Safe Web delivers information about websites based on automated analysis and user feedback. T ...
color coded search results from search engines such as
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
and
Yahoo Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo Inc., which is 90% owned by investment funds managed by Apollo Global Manage ...
for safety. The
Norton Safe Web Norton Safe Web (sometimes abbreviated NSW) is a service developed by Symantec Corporation that is designed to help users identify malicious websites. Safe Web delivers information about websites based on automated analysis and user feedback. T ...
toolbar included an
Ask.com Ask.com (originally known as Ask Jeeves) is a question answering–focused e-business founded in 1996 by Garrett Gruener and David Warthen in Berkeley, California. The original software was implemented by Gary Chevsky, from his own design. Wa ...
search box. The search box did not share code with the Ask toolbar; instead it redirected queries to the Ask search engine. Benchmarking conducted by PassMark Software highlighted its 52 second install time, 32 second scan time, and 7 MB memory utilization. Symantec funded the benchmark test and provided scripts used to benchmark each participating
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. ...
. Tests were conducted in Windows Vista running on a
dual core A multi-core processor is a microprocessor on a single integrated circuit with two or more separate processing units, called cores, each of which reads and executes program instructions. The instructions are ordinary CPU instructions (such ...
processor. ''PC Magazine'' found the suite added 15 seconds to boot time, with a baseline of 60 seconds. Norton added less than 5 percent to the time it takes to complete file operations. 25 percent more time was taken to unzip and zip a set of files. Norton was able to remove most commercial keyloggers, beating other tested products. Norton blocked all attempts to install malware on a clean system. Modifications made to the samples did not fool Norton. Norton was not able to block the installation of all the commercial keyloggers. Phishing protection blocked 90 percent of verified phishing websites in ''PC Magazine'' testing. Internet Explorer 7 caught 75 percent, and Firefox caught 60 percent. Norton stealthed all ports, according to ''PC Magazine''. Port scans were unsuccessful. The firewall blocked all exploit attempts by Core Impact. Malware blocking and removal garnered good results in ''PC Magazine'' testing. All but one malware sample contained within a folder were removed once the folder was opened. The last one was removed when executed. Modifications made to the samples did not affect detection. On a similar test, specifically using commercial keyloggers, Norton did not successfully detect all. In removing threats, Norton almost completely removed 40 percent of the malware samples and related executables.


2010 (17.x)

Version 2010 was released officially on September 8, 2009. This version featured Project Quorum, which introduced reputation-based threat detection to keep up with the 200 million attacks each month, many of which Symantec claimed evade
signature based detection Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. ...
. The new approach relied on Norton Community Watch, in which participants supply information about the applications running on their computers. Safe applications exhibit common attributes, such as being of a known origin with known publishers. Conversely, malware may have an unknown publisher, among other attributes. Using the data a "reputation score" was used to infer the likelihood of an unknown application being safe, or malicious. Other facets of Quorum were parental controls and spam filtering. Norton Internet Security 2010 bundled a free subscription of
OnlineFamily.Norton Norton Family (previously known as Online Family.Norton and Norton Online Family) is an American cloud-based parental control service.Messmer, Ellen"Norton Online Family gives parents new tools to monitor kids" Network World, February 17, 2009, ...
, which ''PC Magazine'' found to be an improvement over the parental controls bundled with prior releases. Spam filtering used technologies Symantec acquired from
Brightmail Brightmail Inc. was a San Francisco-based technology company focused on Anti-spam techniques, anti-spam Email filtering, filtering. Brightmail's system has a three-pronged approach to stopping spam, the Probe Network is a massive number of e-mail ...
. Two filters were used to find spam: a locally installed one and a check against Symantec's servers to see if the message was known spam. In '' PC Magazine'' testing, no valid e-mail were marked as spam. However, 11 percent of spam still reached the inbox. This was a significant improvement over prior releases. The improved
SONAR 2 SONAR is the abbreviation for Symantec Online Network for Advanced Response. Unlike virus signatures, SONAR examines the behavior of applications to decide whether they are malicious. SONAR is built upon technology Symantec acquired in its late 200 ...
heuristic leveraged reputation data to judge if a program was malicious. Norton Insight was expanded, showing users the number of Norton Community participants who have a certain program installed, its impact on system resources, and how long it had been released. Information about the program's origin and a graph of its resource usage was provided. Autospy helped users understand what Norton did when malware was found. The malware's actions and Norton's resolution were presented to the user. Previous releases removed threats on sight and quietly warned users, potentially confusing when users were deceived in downloading
rogue security software Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on ...
. With a compatible graphics card Flip Screen allowed the main display to "flip over" to show the opposite side of the main interface, consisting of a chart of CPU or memory usage and a timeline of security events. Otherwise the Flip Screen link was replaced by a Back link, which opened the back of the windows in a separate window. Safe Search allowed the user to filter out unsafe sites, get insight on them, and keep track of
HTTP cookies HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's we ...
. Malware removal and blocking performed well, setting or meeting records in ''PC Magazine'' testing. It achieved a detection rate of 98% (highest of 12 antivirus products). The exception was blocking commercial keyloggers, where Norton made an above average score. File operations took 2 percent longer, and the file compression and extraction test took 4 percent longer. The only area where Norton introduced a significant delay was when the system was booting: the beta version added 31 percent to the boot time, significantly longer than prior versions. According to the Norton performance comparison website, Norton Internet Security scanned 31 percent faster, was 70 percent lighter, and installed 76 percent faster than the leading anti-virus product. AV-comparatives awarded Norton Internet Security "Best Product of 2009", Bronze award for 98.6% detection rate in 2010 and Norton Internet Security 2010 blocked 99/100 internet threats.


2011 (18.x)

Norton Internet Security 2011 was released for Beta testing on April 21, 2010. Changes included a new user interface and improved malware scanning. Symantec released an application that "scans" the user's
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin Mosk ...
feed for any malware links. This application does not require a valid subscription. In a test sponsored by Symantec, Norton Internet Security 2011 was the only security suite to achieve a 100 percent protection score in a new third-party test from Dennis Labs. Improved reputation scan provided the user with an easy to understand interface on files stored on the user's computer, marking them as trusted, good, poor, or bad. The production version was released on August 31, 2010. New features included Norton Rescue Tools. These tools included Norton Bootable Recovery tool and Norton Power Eraser. On December 9, 2010, Symantec released the 18.5 version through
Norton LiveUpdate Norton LiveUpdate is a utility developed by Symantec Corporation that downloads and installs security updates (such as spyware, firewall, or antivirus signature files) and software patches. LiveUpdate can only apply updates for a particular vers ...
. However, this update was later pulled due to numerous reports on the Norton forums that the update was causing system instability during system scans (both full and quick scans). This issue only affected some customers. Symantec later fixed the bugs and re-released the update. Following the acquisition of
VeriSign Verisign Inc. is an American company based in Reston, Virginia, United States that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the , , and gene ...
Security by Symantec, several VeriSign features were incorporated. A new Norton logo added the VeriSign checkmark formerly seen in VeriSign's own logo, as well as several new icon changes to the
Norton Safe Web Norton Safe Web (sometimes abbreviated NSW) is a service developed by Symantec Corporation that is designed to help users identify malicious websites. Safe Web delivers information about websites based on automated analysis and user feedback. T ...
and Norton Identity Safe features.


2012 (19.x)

Norton Internet Security 2012 was released on September 6, 2011. Download Insight 2.0 monitored files for safety and the stability of a given file. I.e. if a file was stable on Windows 7, but unstable on Windows XP, XP users would be notified of the file's instability. Enhanced removal tools were tightly integrated for better cleanup of infected systems. Once triggered, the new, more powerful version of Norton Power Eraser restarted the system to locate and remove
fake antivirus Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on t ...
software and other deeply embedded threats that were otherwise hard to remove. A new tool called Norton Management helped manage different computers and devices from a single location. Other changes included SONAR 4, Google Chrome compatibility for Identity Safe and Safe Web and the ability to store passwords and notes in the cloud. However, the
License Agreement A license (or licence) is an official permission or permit to do, use, or own something (as well as the document of that permission or permit). A license is granted by a party (licensor) to another party (licensee) as an element of an agreeme ...
did not guarantee passwords were stored securely and provided no remedy if the cloud vault was compromised. The user interface was simplified to use only three buttons. The third button opened a more advanced and complicated menu, where the user was able to manage settings and access different product features. The CPU meter that was removed from Norton 2011, returned (only on the "advanced screen"). Combining the netbook and desktop line, Norton Internet Security integrated Bandwidth metering, which controlled the product's traffic usage and reduces it to minimum if necessary. This was ideal for networks with limited traffic., the user interface window adjusted according to the size of the computer screen. This version of Norton Internet Security included several Easter eggs. Pressing Shift+1, 2, 3 or 4 would change the theme to default background (plain black), ray, animals, and floral respectively. holding Control + Win Key + Alt while pressing " performance button" to activate "Crazy Flip", which made the window flip head over heels. The effect would continue until the main window was closed and reopened. Scans were scheduled through Symantec's proprietary scheduler, which performed tasks while the computer was idle.


20.x (2013)

Version 20 (2013) began a "Version-less" approach by dropping the 20xx naming convention, and automatically updated itself as new releases become available. Notable changes included a new user interface better suited for touchscreen devices, Social Networking Protection, to protect against threats targeted at social networks, and was the first release to officially support Windows 8.


Version 21.x (2014)

This version, released on October 7, 2013, became the last version to be marketed by Symantec. Norton Internet Security, along with
Norton Antivirus Norton AntiVirus is an anti-virus or anti-malware software product founded by Peter Norton, developed and distributed by Gen Digital since 1990 as part of its Norton family of computer security products. It uses signatures and heuristics to i ...
and
Norton 360 Norton 360, developed by Symantec, was an “all-in-one” security suite for the consumer market. It was first released in 2007, but was discontinued in 2014; its features were carried over to its successor, Norton Security. In 2019, Symant ...
, were replaced with
Norton Security Norton Security is a cross-platform security suite that provides subscription-based real-time malware prevention and removal in addition to identity theft protection and performance tuning tools. Other features include a personal firewall, emai ...
.


Version 22.x (2015)

A version 22.5 update was released in June 2015. It included a restyled user interface and Windows 10 Support.


Norton Security

In September 2014 Norton Internet Security was folded into
Norton Security Norton Security is a cross-platform security suite that provides subscription-based real-time malware prevention and removal in addition to identity theft protection and performance tuning tools. Other features include a personal firewall, emai ...
, as part of Symantec's streamlined Norton line.


Netbook edition

Symantec released a special edition of Norton Internet Security optimized for
netbooks Netbook was a commonly used term that identified a product class of small and inexpensive laptops which were sold from 2007 to around 2013. These machines were designed primarily as cost-effective tools for consumers to access the Inte ...
. This was available as download from the Symantec website or in a
USB Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply (interfacing) between computers, peripherals and other computers. A broad ...
thumb drive A USB flash drive (also called a thumb drive) is a data storage device that includes flash memory with an integrated USB interface. It is typically removable, rewritable and much smaller than an optical disc. Most weigh less than . Since first ...
. Symantec stated that the Netbook edition was optimized for
netbooks Netbook was a commonly used term that identified a product class of small and inexpensive laptops which were sold from 2007 to around 2013. These machines were designed primarily as cost-effective tools for consumers to access the Inte ...
. The main display was optimized to provide support for the 800 x 480 screen resolution. In addition, non-critical tasks were delayed while the netbook was on battery. Furthermore, the Netbook edition offered complimentary access to Norton's secure online backup and parental control to protect children.


Macintosh edition


Version 1.0

Norton Internet Security version 1.0 for Mac was released November 1, 2000. It could identify and remove both Windows and Mac
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Since Dmitri Ivanovsky's ...
. Other features included a firewall, advertisement blocking in the browser, parental controls, and the ability to prevent confidential information from being transmitted outside the computer. Users were prompted before such information was transmitted. The incorporation of Aladdin Systems' iClean allowed users to purge the browser cache,
cookies A cookie is a baked or cooked snack or dessert that is typically small, flat and sweet. It usually contains flour, sugar, egg, and some type of oil, fat, or butter. It may include other ingredients such as raisins, oats, chocolate chi ...
, and browsing history within Norton's interface. Is supported Mac OS 8.1. Hardware requirements called for 24 MB of RAM, 12 MB of disk space, and a PowerPC processor.


Version 2.0

Norton Internet Security version 2.0 for Mac was released on May 10, 2002. Version 2.0 tied in with the
WHOIS WHOIS (pronounced as the phrase "who is") is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomou ...
database, allowing users to trace attacking computers. Users could inform network administrators of the attacking computers for corrective actions. When running under
Mac OS 8.1 Mac OS 8 is an operating system that was released by Apple Computer on July 26, 1997. It includes the largest overhaul of the classic Mac OS experience since the release of System 7, approximately six years before. It places a greater emphasis on ...
or 9, a PowerPC processor, 24 MB of RAM, and 25 MB of free space was required. Under Mac OS X 10.1, a
PowerPC G3 The PowerPC 7xx is a family of third generation 32-bit PowerPC microprocessors designed and manufactured by IBM and Motorola (spun off as Freescale Semiconductor bought by NXP Semiconductors). This family is called the PowerPC G3 by its well-kn ...
processor, 128 MB of RAM, and 25 MB of free space was required.


Version 3.0

Norton Internet Security version 3.0 for Mac was released on May 17, 2003. The subsequent release, version 3.0, maintained the feature set found in version 2.0. The firewall now allocated internet access as needed rather than relying on user input using predefined rules. Compatibility with OS 8 was dropped. When running under OS 9.2, a PowerPC processor, 24 MB of RAM, and 25 MB of free space was required. Under OS X 10.1.5 through 10.3, a PowerPC G3, 128 MB of RAM, and 150 MB of free space was required. However, version 3.0 was not compatible with
Mac OS X 10.4 Mac OS X Tiger (version 10.4) is the 5th major release of macOS, Apple's desktop and server operating system for Mac computers. Tiger was released to the public on April 29, 2005 for US$129.95 as the successor to Mac OS X 10.3 Panther. Som ...
, or "Tiger".


Version 4.0

Version 4.0 was released on December 18, 2008. Symantec marketed a bundle of Version 4.0 and the 2009 version for Windows, intended for users with both Microsoft Windows and Mac OS X installed. iClean was dropped from this release. The firewall now blocked access to malicious sites using a blacklist updated by Symantec. To prevent attackers from leveraging insecurities in the Mac or installed software, exploit protection was introduced* ". Phishing protection was introduced* " as well. Mac OS X 10.4.11 or higher was supported. A PowerPC or
Intel Core Intel Core is a line of streamlined midrange consumer, workstation and enthusiast computer central processing units (CPUs) marketed by Intel Corporation. These processors displaced the existing mid- to high-end Pentium processors at the time o ...
processor, 256 MB of RAM and 150 MB of free space were required.


Criticism of versions before 2009


FBI cooperation

Symantec, in compliance with the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
(FBI), whitelisted
Magic Lantern The magic lantern, also known by its Latin name , is an early type of image projector that used pictures—paintings, prints, or photographs—on transparent plates (usually made of glass), one or more lenses, and a light source. Because a si ...
, an FBI
keylogger Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored ...
. The purpose of Magic Lantern was to obtain passwords to encrypted e-mail as part of a criminal investigation. Magic Lantern was first reported on November 20, 2001. Magic Lantern was deployed as an
e-mail attachment An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images. ...
. When the attachment was opened, a
trojan horse The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
was installed on the suspect's computer. The Trojan horse was activated when the suspect used PGP encryption, often used to increase the security of sent e-mail messages. When activated, the trojan horse will log the PGP password, which allowed the FBI to decrypt user communications. Symantec and other major antivirus vendors whitelisted Magic Lantern. Concerns included uncertainties about Magic Lantern's full potential and whether hackers could subvert it for purposes outside the law. Graham Cluley, a technology consultant from Sophos, said, "We have no way of knowing if it was written by the FBI, and even if we did, we wouldn’t know whether it was being used by the FBI or if it had been commandeered by a third party". Another reaction came from Marc Maiffret, chief technical officer and cofounder of eEye Digital Security, "Our customers are paying us for a service, to protect them from all forms of malicious code. It is not up to us to do law enforcement's job for them so we do not, and will not, make any exceptions for law enforcement malware or other tools." FBI spokesman Paul Bresson, in response to the question of whether Magic Lantern needed a court order to be deployed, said, "Like all technology projects or tools deployed by the FBI it would be used pursuant to the appropriate legal process." Proponents of Magic Lantern argue the technology would allow law enforcement to efficiently and quickly decrypt messages protected by encryption schemes. Unlike a predecessor,
Carnivore A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant whose food and energy requirements derive from animal tissues (mainly muscle, fat and other s ...
, implementing Magic Lantern does not require physical access to a suspect's computer, which would necessitate a court order.


Uninstallation

Older versions of Norton were defective. In the 2009 versions, Symantec added Norton Removal Tool, which removed their products, usually in less than a minute. The tool could be downloaded from Symantec's website.


Windows Service Packs

When Norton Internet Security 2008 was installed, users encountered incompatibilities upgrading to Windows XP Service Pack 3 or
Windows Vista Service Pack 1 Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
. Users reported invalid
registry Registry may refer to: Computing * Container registry, an operating-system-level virtualization registry * Domain name registry, a database of top-level internet domain names * Local Internet registry * Metadata registry, information system for re ...
keys added by a tool named fixcss.exe, resulting in an empty Device Manager and missing devices such as wireless network adapters. Symantec initially blamed Microsoft for the incompatibilities but accepted partial responsibility. Dave Cole, Symantec's Vice President & General Manager, acknowledged that users running Norton products were experiencing problems, but said the numbers were small. Cole said that Symantec had done "extensive testing" of its products with Windows XP SP3, but this issue was not encountered. Cole blamed Microsoft "This is related to XP SP3." Microsoft recommended that users contact Windows customer support. To resolve the problem, Symantec issued a fix intended for users before upgrading. Symantec recommended disabling the tamper protection component in the 2008 release, dubbed SymProtect. A tool to remove the added registry entries was available from Symantec.


Windows Vista

Sarah Hicks, Symantec's vice president of consumer product management, voiced concern over Windows Vista 64-bit's PatchGuard feature. PatchGuard was designed by Microsoft to ensure the integrity of the
kernel Kernel may refer to: Computing * Kernel (operating system), the central component of most operating systems * Kernel (image processing), a matrix used for image convolution * Compute kernel, in GPGPU programming * Kernel method, in machine learn ...
, a part of an
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also i ...
which interacts with the hardware.
Rootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exis ...
s often hide in an operating system's kernel, complicating removal. Mike Dalton, European president of
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
said, "The decision to build a wall around the kernel with the assumption it can't be breached is ridiculous", claiming Microsoft was preventing security vendors from effectively protecting the kernel while promoting its own security product,
Windows Live OneCare Windows Live OneCare (previously Windows OneCare Live, codenamed A1) was a computer security and performance enhancement service developed by Microsoft for Windows. A core technology of OneCare was the multi-platform RAV (Reliable Anti-virus), wh ...
. Hicks said Symantec did not mind the competition from OneCare. Symantec later published a white paper detailing PatchGuard with instructions to obtain a PatchGuard exploit. After negotiations and investigations from antitrust regulators, Microsoft decided to allow security vendors access to the kernel by creating special
API An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software interface, offering a service to other pieces of software. A document or standard that describes how ...
instructions.


See also

*
Internet security Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
*
Comparison of antivirus software This article compares notable antivirus products and services. It is Wikipedia list article rather than a deep analysis of the strengths and weaknesses of each. Legend The term "on-demand scan" refers to the possibility of performing a manual ...
*
Comparison of firewalls Comparison or comparing is the act of evaluating two or more things by determining the relevant, comparable characteristics of each thing, and then determining which characteristics of each are similar to the other, which are different, and t ...
*
Peter Norton Peter Norton (born November 14, 1943) is an American programmer, software publisher, author, and philanthropist. He is best known for the computer programs and books that bear his name and portrait. Norton sold his software business to Syman ...
*
Norton Antivirus Norton AntiVirus is an anti-virus or anti-malware software product founded by Peter Norton, developed and distributed by Gen Digital since 1990 as part of its Norton family of computer security products. It uses signatures and heuristics to i ...
*
Norton 360 Norton 360, developed by Symantec, was an “all-in-one” security suite for the consumer market. It was first released in 2007, but was discontinued in 2014; its features were carried over to its successor, Norton Security. In 2019, Symant ...


References


External links

*Official website
Norton Internet Security For Windows

Norton Internet Security For Mac

Norton Partner Portal
{{Symantec
Internet Security Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
Gen Digital software Antivirus software Proprietary software pt:Norton AntiVírus