User guide

G L O S S A R Y
183
L I S T O F C H E C K E D W E B A D D R E S S E S
List of masks and addresses of web resources, which are mandatory scanned for malicious objects by Kaspersky Lab
application.
M A I L D A T A B A S E S
Databases containing emails in a special format and saved on your computer. Each incoming/outgoing email is placed in
the mail database after it is received/sent. These databases are scanned during a full computer scan.
Incoming and outgoing emails at the time that they are sent and received are analyzed for viruses in real time if real-time
protection is enabled.
M O V I N G O B J E C T S T O Q U A R A N T I N E
A method of processing a potentially infected object by blocking access to the file and moving it from its original location
to the Quarantine folder, where the object is saved in encrypted form, which rules out the threat of infection.
N E T W O R K P O R T
TCP and UDP parameter that determines the destination of data packets in IP format that are transmitted to a host over a
network and makes it possible for various programs running on a single host to receive data independently of each other.
Each program processes data received via certain port (this is sometimes referred to as the program "listening" to that
port).
For some common network protocols there are usually standard port numbers (for example, web servers usually receive
HTTP requests on TCP port 80); however, generally, a program can use any protocol on any port. Possible values: 1 to
65535.
N O T I F I C A T I O N T E M P L A T E
Template based on which a notification of infected objects detected by the scan, is generated. Notification template
includes a combination of settings regulating the mode of notification, the way of spreading, and the text of messages to
send.
O B J E C T D I S I N F E C T I O N
The method used for processing infected objects that results in complete or partial recovery of data, or the decision that
the objects cannot be disinfected. Disinfection of objects is performed using the database records. Part of the data may
be lost during disinfection.
O L E O B J E C T
An attached object or an object embedded into another file. Kaspersky Lab application allows to scan OLE objects for
viruses. For example, if you insert a Microsoft Office Excel table into a Microsoft Office Word document, the table will be
scanned as an OLE object.
P O T E N T I A L L Y I N F E C T A B L E O B J E C T
An object which, due to its structure or format, can be used by intruders as a "container" to store and distribute a
malicious object. As a rule, they are executable files, for example, files with the .com, .exe, .dll extensions, etc. The risk
of activating any malicious code in such files is fairly high.
P O T E N T I A L L Y I N F E C T E D O B J E C T
An object that contains modified code of a known virus or code that resembles code of a virus, but is not yet known to
Kaspersky Lab. Potentially infected files are detected using heuristic analyzer.
P R O T E C T I O N S T A T U S
The current status of protection, summarizing the degree of security of the computer.
P ROT O C O L
Clearly defined and standardized set of rules governing the interaction between a client and a server. Well-known
protocols and the services associated with them include HTTP (WWW), FTP, and NNTP (news).