Kaspersky Anti-Virus® 6.0

Total Page:16

File Type:pdf, Size:1020Kb

Kaspersky Anti-Virus® 6.0 KASPERSKY LAB Kaspersky Anti-Virus® 6.0 MANUEL DE L’UTILISATEUR KASPERSKY ANTI-VIRUS® 6.0 Manuel de l’utilisateur NB : Cette documentation, traduite en français à partir du russe, décrit les fonctionalités et services inclus avec la version russe. Il se peut que certaines fonctionalités ou services décrits, ne soient pas disponibles en France. © Kaspersky Lab http://www.kaspersky.fr/ Date d’édition: avril 2006 Sommaire CHAPITRE 1. MENACES SUR LA SECURITE INFORMATIQUE............................... 8 1.1. Sources des menaces........................................................................................... 8 1.2. Propagation des menaces .................................................................................... 9 1.3. Types de menaces.............................................................................................. 11 1.4. Signes d'une infection ......................................................................................... 15 1.5. Que faire lorsque les symptômes d'une infection sont présents ? .................... 16 1.6. Préventions des infections de votre ordinateur .................................................. 17 CHAPITRE 2. KASPERSKY ANTI-VIRUS 6.0............................................................. 20 2.1. Nouveautés de Kaspersky Anti-Virus 6.0........................................................... 20 2.2. Configuration de la protection offerte par Kaspersky Anti-Virus ........................ 23 2.2.1. Composants de protection ........................................................................... 23 2.2.2. Tâches de recherche de virus...................................................................... 24 2.2.3. Services du programme ............................................................................... 25 2.3. Configurations matérielle et logicielle ................................................................. 27 2.4. Contenu du pack logiciel ..................................................................................... 27 CHAPITRE 3. INSTALLATION DE KASPERSKY ANTI-VIRUS 6.0........................... 29 3.1. Procédure d’installation ....................................................................................... 29 3.2. Assistant de configuration initiale........................................................................ 33 3.2.1. Utilisation des objets sauvegardés de la version 5.0 .................................. 33 3.2.2. Activation du logiciel ..................................................................................... 34 3.2.2.1. Sélection du mode d'activation du programme .................................... 34 3.2.2.2. Saisie du code d'activation .................................................................... 35 3.2.2.3. Principe d’activation de la licence par le code d’activation................... 35 3.2.2.4. Principe d’activation de la licence par le fichier de licence................... 35 3.2.2.5. Fin de l'activation du logiciel .................................................................. 35 3.2.3. Configuration de la mise à jour..................................................................... 36 3.2.4. Programmation de la recherche de virus..................................................... 36 3.2.5. Restriction de l'accès au logiciel................................................................... 37 3.2.6. Sélection du mode de protection.................................................................. 38 3.2.7. Fin de l'Assistant de configuration................................................................ 39 4 Kaspersky Anti-Virus 6.0 CHAPITRE 4. INTERFACE DU LOGICIEL .................................................................. 40 4.1. Icône de la barre des tâches............................................................................... 40 4.2. Menu contextuel .................................................................................................. 41 4.3. Fenêtre principale du logiciel............................................................................... 42 4.4. Fenêtre de configuration du logiciel.................................................................... 45 CHAPITRE 5. PREMIERE UTILISATION .................................................................... 47 5.1. Etat de la protection de l'ordinateur .................................................................... 47 5.1.1. Indices de protection..................................................................................... 48 5.1.2. Etat d'un composant particulier de Kaspersky Anti-Virus ........................... 51 5.1.3. Statistiques.................................................................................................... 52 5.2. Contrôle de l’intégrité de l’application ................................................................. 53 5.3. Recherche d'éventuels virus............................................................................... 53 5.4. Recherche d'éventuels virus dans les secteurs critiques de l'ordinateur .......... 54 5.5. Recherche d'éventuels virus dans les fichiers, les répertoires ou les disques.. 54 5.6. Mise à jour du logiciel .......................................................................................... 55 5.7. Que faire des objets dangereux.......................................................................... 56 5.8. Que faire si la protection ne fonctionne pas ....................................................... 57 CHAPITRE 6. ADMINISTRATION COMPLEXE DE LA PROTECTION .................... 59 6.1. Désactivation/activation de la protection de votre ordinateur ............................ 59 6.1.1. Suspension de la protection......................................................................... 60 6.1.2. Désactivation complète de la protection de l'ordinateur.............................. 61 6.1.3. Suspension / désactivation du composant de la protection, de la recherche de virus ou de la mise à jour ....................................................... 62 6.1.4. Rétablissement de la protection de l'ordinateur........................................... 63 6.1.5. Fin de l'utilisation du logiciel ......................................................................... 63 6.2. Sélection des programmes malveillants contrôlés............................................. 64 6.3. Constitution de la zone de confiance.................................................................. 65 6.3.1. Règles d'exclusion........................................................................................ 66 6.3.2. Applications de confiance............................................................................. 71 6.4. Lancement d'une tâche de recherche de virus ou de mise à jour avec les privilèges d'un utilisateur.................................................................................... 74 6.5. Programmation du lancement de tâches liées à la recherche de virus et à la mise à jour.......................................................................................................... 75 6.6. Exportation/importation des paramètres de Kaspersky Anti-Virus.................... 77 6.7. Restauration des paramètres par défaut............................................................ 78 Sommaire 5 CHAPITRE 7. PROTECTION ANTIVIRUS DU SYSTEME DE FICHIERS DE L'ORDINATEUR......................................................................................................... 80 7.1. Sélection du niveau de protection des fichiers ................................................... 81 7.2. Configuration de la protection des fichiers.......................................................... 83 7.2.1. Définition du type de fichiers analysés......................................................... 83 7.2.2. Constitution de la zone protégée ................................................................. 86 7.2.3. Restauration des paramètres de protection des fichiers par défaut ........... 88 7.2.4. Sélection de l’action exécutée sur les objets ............................................... 88 7.3. Réparation différée des objets ............................................................................ 90 CHAPITRE 8. PROTECTION ANTIVIRUS DU COURRIER....................................... 92 8.1. Sélection du niveau de protection du courrier .................................................... 93 8.2. Configuration de la protection du courrier........................................................... 95 8.2.1. Sélection du flux de messagerie protégé..................................................... 95 8.2.2. Configuration de l'analyse dans Microsoft Office Outlook........................... 97 8.2.3. Configuration de l'analyse du courrier dans The Bat! ................................. 99 8.2.4. Restauration des paramètres de protection du courrier par défaut .......... 101 8.2.5. Sélection des actions à réaliser sur les objets dangereux des messages101 CHAPITRE 9. PROTECTION INTERNET.................................................................. 104 9.1. Sélection du niveau de sécurité Internet........................................................... 105 9.2. Configuration de la protection Internet.............................................................. 107 9.2.1. Définition de l'algorithme d'analyse............................................................ 107 9.2.2. Constitution de la liste des adresses de confiance.................................... 109 9.2.3. Restauration des paramètres de
Recommended publications
  • Current P SYCHIATRY
    Current p SYCHIATRY Psyber Psychiatry To upgrade or not to upgrade? Should you purchase a new PDA or wait for the next wave of innovations? Here’s help deciding John Luo, MD Assistant clinical professor of psychiatry UCLA Neuropsychiatric Institute and Hospital Los Angeles, CA ersonal digital assistants (PDA) are in a Cons. PDA operating systems are updated fre- P state of flux. Thanks to a flurry of hard- quently, reflecting continuing improvements in ware and operating system improvements over handheld hardware. Microsoft late last year the last 18 months, PDAs that were cutting-edge upgraded its Pocket PC operating system and last year pale in comparison to newer models. changed its name to Windows Mobile. Should you buy a new PDA now, or stick Although frequent users will rejoice in the with your current model and wait for still more opportunity to do more, others might not want to innovations? This article can help you decide. spend $300 or more to get the latest features— only to see their new device become outmoded in WHY UPGRADE? a few months. Pros. Today’s PDAs are more versatile and intu- itive. For example, many combination PDA/ HARDWARE ADVANCES mobile phones have newer operating systems, Processors. The processor, the heart of a PDA, more memory, and greater software compatibility has also seen much change. Newer Palm and than earlier devices. Pocket PC devices are based A frequent PDA user John Luo, MD on the strongARM micro- who craves more speed or Dr. Luo’s column is processor produced by Intel featured monthly on added features might want to CURRENT PSYCHIATRY’s under the Xscale brand.
    [Show full text]
  • Dolphin Power Tools User's Guide Rev E
    Dolphin® Power Tools For Windows Mobile® 5.0 Windows Mobile® 2003 Second Edition Windows® CE 5.0 (Dolphin 6100, 6500, 7600) User’s Guide Disclaimer Honeywell International Inc. (“HII”) reserves the right to make changes in specifications and other information contained in this document without prior notice, and the reader should in all cases consult HII to determine whether any such changes have been made. The information in this publication does not represent a commitment on the part of HII. HII shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material. This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated into another language without the prior written consent of HII. ©2007–2010 Honeywell International Inc. All rights reserved. Web Address: www.honeywellaidc.com Trademarks Dolphin, Dolphin RF, HomeBase, Mobile Base, and QuadCharger are trademarks or registered trademarks of Hand Held Products, Inc. or Honeywell International Inc. Microsoft, Windows, Windows Mobile, Windows CE, Windows NT, Windows 2000, Windows ME, Windows XP, ActiveSync, Outlook, and the Windows logo are trademarks or registered trademarks of Microsoft Corporation. Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are the property of their respective owners. Patents Please refer to the product packaging for a list of patents. Other Trademarks The Bluetooth trademarks are owned by Bluetooth SIG, Inc. U.S.A.
    [Show full text]
  • Developing Applications for Pocket PC and GPRS/EDGE Devcentral White Paper
    Developing Applications for Pocket PC and GPRS/EDGE devCentral White Paper Document Number 12588 Revision 2.0 Revision Date 10/15/03 AT&T Wireless Developer Program © 2003 AT&T Wireless. All rights reserved. Legal Disclaimer This document and the information contained herein (collectively, the "Information") is provided to you (both the individual receiving this document and any legal entity on behalf of which such individual is acting) ("You" and "Your") by AT&T Wireless Services, Inc. ("AWS") for informational purposes only. AWS is providing the Information to You because AWS believes the Information may be useful to You. The Information is provided to You solely on the basis that You will be responsible for making Your own assessments of the Information and are advised to verify all representations, statements and information before using or relying upon any of the Information. Although AWS has exercised reasonable care in providing the Information to You, AWS does not warrant the accuracy of the Information and is not responsible for any damages arising from Your use of or reliance upon the Information. You further understand and agree that AWS in no way represents, and You in no way rely on a belief, that AWS is providing the Information in accordance with any standard or service (routine, customary or otherwise) related to the consulting, services, hardware or software industries. AWS DOES NOT WARRANT THAT THE INFORMATION IS ERROR-FREE. AWS IS PROVIDING THE INFORMATION TO YOU "AS IS" AND "WITH ALL FAULTS." AWS DOES NOT WARRANT,
    [Show full text]
  • WORKABOUT PRO Hand-Held Computer with Windows Mobile 2003 SE User Manual
    WORKABOUT PRO Hand-Held Computer With Windows Mobile 2003 SE User Manual May 4, 2005 Part No. 8100058.A ISO 9001 Certified Quality Management System © Copyright 2005 by Psion Teklogix Inc., Mississauga, Ontario This document and the information it contains is the property of Psion Teklogix Inc., is issued in strict confidence, and is not to be reproduced or copied, in whole or in part, except for the sole purpose of promoting the sale of Teklogix manufactured goods and services. Furthermore, this document is not to be used as a basis for design, manufacture, or sub-contract, or in any manner detrimental to the interests of Psion Teklogix Inc. All trademarks are the property of their respective holders. Return-To-Factory Warranty Psion Teklogix provides a return to factory warranty on this product for a period of twelve (12) months in accordance with the Statement of Limited Warranty and Limi- tation of Liability provided at www.psionteklogix.com/warranty. (If you are not already a member of Teknet and you attempt to view this warranty, you will be asked to register. As a member of Teknet, you’ll have access to helpful information about your Psion Teklogix products at no charge to you.) In some regions, this warranty may exceed this period. Please contact your local Psion Teklogix office for details. For a list of offices, see Appendix A: Support Services And Worldwide Offices. The warranty on Psion Teklogix manufactured equipment does not extend to any product that has been tampered with, altered, or repaired by any person other than an employee of an authorized Psion Teklogix service organization.
    [Show full text]
  • Closed Systems January 1St, 2021
    1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 Enhanced DR-DOS 7.01.07 2005 2006 2007 2008 2009 2010 2011 Enhanced DR-DOS 7.01.08 2012 2013 2014 2015 2016 2017 2018 2019 2020 FreeDOS alpha 0.05 DR-DOS/OpenDOS 7.01.01 march 6, 2005 july 21, 2011 FreeDOS FreeDOS alpha 0.1 FreeDOS alpha 0.2 FreeDOS beta 0.3 FreeDOS beta 0.4 FreeDOS beta 0.5 FreeDOS beta 0.6 FreeDOS beta 0.7 FreeDOS beta 0.8 july 2002 FreeDOS beta 0.9 FreeDOS 1.0 FreeDOS 1.1 january 12, 1998 april 21, 1999 FreeDOS 1.2 DR-DOS 3.41 june 29, 1994 march 25, 1998 october 28, 1998 april 9, 2000 august 10, 2000 march 18, 2001 september 7, 2001 april 7, 2002 september 28, 2004 september 3, 2006 january 2, 2012 december 25, 2016 DOS Plus 1.0 DOS Plus 2.01 DR-DOS 3.31 DR-DOS 5.0 DR-DOS 6.0 Novell DOS 7.0 OpenDOS 7.01 Caldera DR-OpenDOS 7.02 DR-DOS 7.04 DR-DOS 7.05 DR-DOS 8.0 DR-DOS 8.1 1985 may 28, 1988 june 1989 may 1990 december 1993 february 1997 december 1997 Caldera DR-DOS 7.02 DR-DOS 7.03 november 30, 1999 october 2005 september 1991 march 1998 january 6, 1999 august 19, 1999 march 30, 2004 Xbox Xbox Xbox Xbox 360 (announced) Xbox Xbox 360 Xbox One (beta) (announced) november 15, 2001 (announced) march 9, 2000 may 12, 2005 november 22, 2005 november 22, 2013 october 1999 january 6, 2001 Windows Embedded for Point of Service Windows Server 2008 Foundation april 1, 2009 MS-DOS 1.24 MS-DOS 1.25 MS-DOS 2.01 MS-DOS 2.11 MS-DOS 3.05 MS-DOS 3.3 MS-DOS 3.3 MS-DOS 3.31 MS-DOS 4.01 MS-DOS 5.0 MS-DOS 5.0a MS-DOS
    [Show full text]
  • Owner of the Content Within This Article Is Written by Marc Grote –
    Owner of the content within this article is www.searchexchange.com Written by Marc Grote – www.it-training-grote.de Exchange 2003 – Mobile enhancements in Exchange 2003 SP2 Written by Marc Grote - mailto:[email protected] Abstract In this article I will show you the mobile enhancements in Exchange Server 2003 SP2 to give you more flexibility to manage your mobile devices in your Exchange environment. Mobile enhancements in Exchange Server 2003 SP2 There are several mobile messaging enhancements in Exchange Server 2003 SP2. One of the important changes is the Exchange Direct Push Technology which changes the way how mobile clients communicate with your Exchange Servers. Exchange Direct Push Technology Exchange Direct Push uses a HTTP connection to transfer messages and system notifications. Before Exchange Server 2003 SP2 you can configure your ActiveSync enabled mobile devices to synchronize with your Exchange server mailbox at intervals from every five minutes. Because you cannot synchronize items at intervals less than five minutes, your device might not always contain the latest information. It takes also some network traffic for synchronization sessions even when no data is transferred. You can configure the mobile clients (Windows Mobile 2003 and Smartphones) to use AUTD (Always Up-To-Date). AUTD enables you to configure your mobile devices to stay up-to-date with the Exchange server. AUTD uses an SMS message to notify the mobile device about new messages. Because SMS notification is an expensive solution, Microsoft has changed the AUTD function in Exchange 2003 SP2: • A standard data plan is the only subscription you need to synchronize with Exchange • No need to deploy additional infrastructure in your Exchange environment • No need for SMS notification or any other “out-of-band” schemes • No special configuration on the device As a result Microsoft has developed the Exchange Direct Push Technology.
    [Show full text]
  • Porting Unicon to Windows Mobile 2003
    Porting Unicon to Windows Mobile 2003 David Price November 4, 2005 Abstract This report summarizes the port of Unicon to an operating system intended for mobile computing, Windows Mobile 2003. It describes the features available, unavailable and possible on Windows Mobile 2003 for the Unicon programming language. It also covers building Unicon for use on Windows Mobile 2003 and running Unicon on Windows Mobile 2003. 1 1.0 Introduction Handheld computing devices on the market range in capability from simple calculators to processors whose power exceeds desktop computers from recent memory. Handheld processing devices are usually coupled with other familiar devices, such as: cell phones, drawing tablets, input scanners, cameras and Global Positioning Systems. Mid to higher end devices feature operating systems, processors capable of several hundred megahertz, storage on the order of 32 to 64 megabytes, graphics displays with resolutions of 240x320 to 640x480 pixels at 16 bit color (some may even feature 3D graphics) and have networking allowing them to communicate with the internet, desktop computers and other handheld devices. Typically, these devices include software for web browsing, emailing, mp3 and other multimedia playback, simplified word processors, spreadsheets and instant messagers of various types. Two of the largest operating systems makers, in terms of devices and users, for handheld computing devices are from Microsoft, with its Windows CE derived operating systems, and Palm, with several versions of PalmOS. Many different versions of these operating systems are available on a wide variety of devices from both companies. Currently, Microsoft provides OSes including: Windows Mobile 2003, Windows Mobile 2003 Second Edition, Windows Mobile 2003 Phone Edition and Second Edition Phone and Smart Phone 2003, all based off of Windows CE.net 4.20.
    [Show full text]
  • Archived: Note to Microsoft Mobile Developers
    Note to Microsoft Mobile Developers Resource Kit Users IMPORTANT! The LabVIEW 7.1 PDA Module for Pocket PC supports the Microsoft Pocket PC 2003 OS, which is the operating system on all new Pocket PC devices built since September 2003. Microsoft has discontinued the support and distribution of previous versions of Pocket PC, including Pocket PC 2002, and eMbedded Visual Tools. Therefore, the LabVIEW 7.1 PDA Module does not support any previous Pocket PC OS. The Microsoft eMbedded Visual C++ 4.0 tools included with the PDA Module support only Pocket PC 2003. If you have a PDA device with an earlier version of the Pocket PC OS, refer to the PDA device manufacturer Web site for information about upgrading your PDA OS to the current version of Pocket PC 2003. In addition, Microsoft distributes the Microsoft Mobile Developers Resource Kit included in this package only in DVD format. If you do not have access to a DVD-ROM player, you can download the necessary software from www.pocketpc.com. Select Downloads»Developer and download the following required components: • eMbedded Visual C++ 4.0 • eMbedded Visual C++ 4.0 SP 3.0 or later • SDK for Windows Mobile 2003-based Pocket PCs LabVIEW™, National Instruments™, NI™, and ni.com™ are trademarks of National Instruments Corporation. Product and company names mentioned herein are trademarks or trade names of their respective companies. For patents covering National Instruments products, refer to the appropriate location: Help»Patents in your software, the patents.txt file on your CD, or ni.com/patents. © 2004 National Instruments Corp.
    [Show full text]
  • Exchange Activesync Guide
    IceWarp Unified Communications Exchange ActiveSync Guide Version 10.3 Printed on 30 March, 2011 Contents Exchange ActiveSync Guide 1 About ................................................................................................................................................................. 1 On-server Setup ............................................................................................................................................................. 8 Security Policies ............................................................................................................................................................ 11 Local and Remote Device Wipe ....................................................................................................................... 12 Local Device Wipe ............................................................................................................................... 12 Remote Device Wipe ........................................................................................................................... 13 E-mail Confirmation ............................................................................................................................ 13 Defining the Policies ........................................................................................................................................ 13 Global Level Policies ...........................................................................................................................
    [Show full text]
  • Draft Fix Instructions
    DRAFT FIX INSTRUCTIONS Greenlee Records Manager and Windows 10 Background Several years ago, Microsoft informed the world that they would stop support for Windows Mobile Device Center in 2018. Normally, “stopping support” means simply providing no new updates. However, in this case they have, in some of the most recent updates to Windows 10, actively disabled or even removed key components required for communication with portable devices that use Windows CE or Windows Mobile as their operating system. As the later versions of Windows CE, such as used in Sidekick Plus and TV220 are still actively sold by Microsoft, this policy is almost unbelievable. What is presented here are potential solutions to this trouble. It is presented in two main options as there are differences between versions of Windows 10 and between machines that have been upgraded from earlier editions of Windows and fresh installations. We are still investigating this and will simplify these instructions if we can. As you can imagine, it is not just Greenlee Communication’s products that are affected. There are many professional devices in use around the world that utilize Windows CE and will continue to do so for years to come. This has been stated to Microsoft by us and these other companies; we are still to receive a reply. Notes All fixes and the installation of Greenlee Records Manager (GRM) require administrator rights to be enabled. Some may find that they need to run GRM with admin rights too (depends on system policies). If any of these instructions seem daunting, please refer to your IT team.
    [Show full text]
  • Windows 10 Fix Summary for Windows Mobile Device Center Issues (Win10fix)
    Portal > Knowledgebase > FAQs > Windows 10 Fix Summary for Windows Mobile Device Center issues (win10fix) Windows 10 Fix Summary for Windows Mobile Device Center issues (win10fix) Scott Kircher - 2019-05-22 - in FAQs Links to full articles regarding these fixes are below in Related Pages. Problem: Device Manager only shows the mobile device as Microsoft Windows Mobile Remote Adapter (or Microsoft USB Sync) but not as a Portable Device, so Windows Mobile Device Center will not show the device as connected. Media Feature Pack: Download all of these, and install any that will, in this order: 1. (v1503) https://www.microsoft.com/en-us/download/details.aspx?id=48231 2. (v1511) https://www.microsoft.com/en-us/download/details.aspx?id=49919 3. (v1607) https://www.microsoft.com/en-us/download/details.aspx?id=53356 4. (v1703) https://support.microsoft.com/en-us/help/4016817/media-feature-pack-for-n-edition-of-wind ows-10-version-1703-april-2017 5. & 6. (v1709 & v1803) https://www.microsoft.com/en-us/software-download/mediafeaturepack Uninstall and reinstall WMDC. For Windows 10 v1709, use the workaround in the DLL article linked below. Note: Microsoft may have fixed the problem that article addresses. Set this to run (for all users) in Compatibility mode for Vista: C:\Windows\WindowsMobile\wmdc.exe Download WMDC-Helper.exe from Juniper Systems via page: https://www.junipersys.com/support/article/12162 After downloading, right-click WMDC-Helper and Run As Administrator. Reboot the PC. Hardware resets, including Warm Boot and Clean Boot may be necessary at this point. Problem: WMDC will not run on Windows 10 Creators Update (v1703) or later: Run Command Prompt as an administrator, then run these commands: REG ADD HKLM\SYSTEM\CurrentControlSet\Services\RapiMgr /v SvcHostSplitDisable /t REG_DWORD /d 1 /f REG ADD HKLM\SYSTEM\CurrentControlSet\Services\WcesComm /v SvcHostSplitDisable /t REG_DWORD /d 1 /f Services.msc: Stop Windows Mobile-2003-based device connectivity.
    [Show full text]
  • UNIT 7 BASICS of WINDOWS MOBILE Windows Mobile
    Mobile Operating Basics of UNIT 7 BASICS OF WINDOWS MOBILE Windows Mobile Structure 7.0 Introduction 7.1 Objectives 7.2 Development 7.2.1 Evolution of Windows Phone 7.3 Features of Windows Phone 7.3.1 Virtual Private Networking 7.4 Releases 7.4.1 Windows Phone 7 7.4.2 Windows Phone 8 7.4.3 Windows 10 Mobile 7.5 Summary 7.6 Further Readings 7.0 INTRODUCTION Microsoft developed Windows Mobile Operating System for Smart phones and Pocket PCs so that those windows users can access the windows features on their handheld devices. It was originally developed as Windows CE in 1996. However, Windows Mobile first appeared in 2000 as Pocket PC 2000. ‘Pocket PC’ came to be known as Windows Mobile in 2003 after which it started coming in different versions as that of Windows and was mostly used by business and enterprise consumers. It became the most popular smart phone in U.S. until 2007.But afterwards; it started losing its popularity. After the launch of other operating systems like iOS and Android, in February 2010, Microsoft announced Windows Phone to supplant Windows Mobile. After that, Windows Mobile has been deplored. The last version of Windows Mobile was released after the announcement of Windows Phone. That last version is 6.5.5. But, this version was not able to run in newly developed Windows Phone because Windows Phone was not compatible with Windows Mobile devices and software. Microsoft finally stopped developing the Windows Mobile and started developing Windows Phone only. Windows Phone basically aimed at the consumer market instead of enterprise market.
    [Show full text]