User guide

K A S P E R S K Y A N T I - V I R U S 2 0 1 0
182
For example, you have an archive scanned by Kaspersky Lab application and assigned the not infected status. The next
time the application will skip this archive, unless it has been altered or the scan settings have been changed. If you
altered the archive content by adding a new object to it, modified the scan settings or updated the anti-virus database, the
archive will be re-scanned.
Limitations of iChecker technology:
this technology does not work with large-size files since it is faster to scan a file than check whether it was
modified since it was last scanned;
the technology supports a limited number of formats (exe, dll, lnk, ttf, inf, sys, com, chm, zip, rar).
I N C O M P A T I B L E A P P L I C A T I O N
An antivirus application from a third party developer or a Kaspersky Lab application that does not support management
through Kaspersky Administration Kit.
I N F E C T E D O B J E C T
Object containing a malicious code. It is detected when a section of the object's code completely matches a section of the
code of a known threat. Kaspersky Lab does not recommend using such objects since they may cause your computer to
be infected.
I N P U T / O U T P U T P O R T
Serves in processors (such as Intel) for exchanging data with hardware components. Input/output port is associated with
a certain hardware component, and allows applications to address it for data exchange.
I N S T A L L A T I O N W I T H A S T A R T U P S C E N A R I O
Method of remote installation of Kaspersky Lab's applications which allows assigning the startup of remote installation
task to an individual user account (or to several user accounts). Registering a user in a domain leads to an attempt to
install the application on the client computer on which the user has been registered. This method is recommended for
installing the applications on computers running under Microsoft Windows 98 / Me operating systems.
I N T E R C E P T O R
Subcomponent of the application responsible for scanning specific types of email. The set of interceptors specific to your
installation depends on what role or what combination of roles the application is being deployed for.
I N T E R N E T P R O T O C O L ( I P )
The base protocol for the Internet, used without change since the time of its development in 1974. It performs basic
operations in transmitting data from one computer to another and serves as a foundation for higher-level protocols like
TCP and UDP. It manages the connection and error processing. Technologies such as NAT and masking make it
possible to hide a large number of private networks using a small number of IP addresses (or even one address), which
make it possible to respond to the demands of the constantly growing Internet using the relatively restricted IPv4 address
space.
K A S P E R S K Y L AB' S U P D A T E S E R V E R S
A list of Kaspersky Lab's HTTP and FTP servers from which the application downloads databases and module updates to
your computer.
K E Y F I L E
File with the .key extension, which is your personal "key", necessary for working with Kaspersky Lab application. A key
file is included with the product if you purchased it from Kaspersky Lab distributors or is emailed to you if you purchased
the product online.
L I C E N S E V A L I D I T Y P E R I OD
Period of time during which you are able to use all of the features of your Kaspersky Lab application. License validity
period generally accounts for one calendar year from the date of its installation. After the license expires, the application
will have reduced functionality. You will not be able to update the application databases.