/>
X

Norton Internet Security 2009: Photos

Norton Internet Security 2009 hits all the right security notes and its superior protection technologies might even win back some jaded anti-Symantec folks. We take you on a tour.
zd-defaultauthor-renai-lemay.jpg
By Renai LeMay on
norton-internet-security-2009-photos1.jpg
1 of 17 Renai LeMay/ZDNet.com.au

The initial installation screen for Norton Internet Security 2009.

norton-internet-security-2009-photos2.jpg
2 of 17 Renai LeMay/ZDNet.com.au

The installation was quite quick, in contrast with previous editions of Norton.

norton-internet-security-2009-photos3.jpg
3 of 17 Renai LeMay/ZDNet.com.au

Unlike a lot of software we've tried, the status bar was even quite accurate.

norton-internet-security-2009-photos4.jpg
4 of 17 Renai LeMay/ZDNet.com.au

Symantec provided us with a product key to trial Norton 2009.

norton-internet-security-2009-photos5.jpg
5 of 17 Renai LeMay/ZDNet.com.au

Norton 2009 forces you to create a Norton account to be able to use the software.

norton-internet-security-2009-photos6.jpg
6 of 17 Renai LeMay/ZDNet.com.au

This screen provides details of your licensing agreement.

norton-internet-security-2009-photos7.jpg
7 of 17 Renai LeMay/ZDNet.com.au

Norton 2009's home screen.

norton-internet-security-2009-photos8.jpg
8 of 17 Renai LeMay/ZDNet.com.au

Conducting a scan.

norton-internet-security-2009-photos9.jpg
9 of 17 Renai LeMay/ZDNet.com.au

Oops! We've found some cookies. They're probably harmless. We tested Norton Internet Security 2009 on a clean install of Windows Vista, so we didn't expect to find much.

norton-internet-security-2009-photos10.jpg
10 of 17 Renai LeMay/ZDNet.com.au

Norton's web site, where you can log in to your Norton account and make some configuration changes.

norton-internet-security-2009-photos11.jpg
11 of 17 Renai LeMay/ZDNet.com.au

The network security map page drills down to network details.

norton-internet-security-2009-photos12.jpg
12 of 17 Renai LeMay/ZDNet.com.au

Norton's Identity Safe feature allows users to securely store web login credentials, as well as other information such as credit cards and addresses.

norton-internet-security-2009-photos13.jpg
13 of 17 Renai LeMay/ZDNet.com.au

The CPU usage screen shows how much system resources Norton is taking up.

norton-internet-security-2009-photos14.jpg
14 of 17 Renai LeMay/ZDNet.com.au

Norton Insight identifies trusted files that do not require scanning, allowing the security process to take less time.

norton-internet-security-2009-photos15.jpg
15 of 17 Renai LeMay/ZDNet.com.au

Norton 2009 installs itself into Windows Vista's sidebar.

norton-internet-security-2009-photos16.jpg
16 of 17 Renai LeMay/ZDNet.com.au

The software provides a history of actions taken.

norton-internet-security-2009-photos17.jpg
17 of 17 Renai LeMay/ZDNet.com.au

There are more settings than you can poke a stick at.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup
Person seated at a booth in a cafe looks at their phone and laptop.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup

10 Photos
Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup
remote-working-from-home-man-employee-small-desk.jpg

Related Galleries

Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup

8 Photos
Yubikey Security Key C NFC
Security Key C NFC

Related Galleries

Yubikey Security Key C NFC

8 Photos
First look at the YubiKey Bio
YubiKey Bio

Related Galleries

First look at the YubiKey Bio

10 Photos
iVerify (version 17)
iVerify for iOS and iPadOS

Related Galleries

iVerify (version 17)

5 Photos
OnlyKey hardware security key
OnlyKey

Related Galleries

OnlyKey hardware security key

19 Photos
SoloKeys Solo V2
Solo V2

Related Galleries

SoloKeys Solo V2

10 Photos