User guide
G L O S S A R Y
251
R
R E A L - T I M E P R O T E C T I O N
The application's operating mode under which objects are scanned for the presence of malicious code in real time.
The application intercepts all attempts to open any object (read, write, or execute) and scans the object for threats.
Uninfected objects are passed on to the user; objects containing threats or suspected of containing them are processed
pursuant to the task settings (they are disinfected, deleted or quarantined).
R E C O M M E N D E D L E V E L
Level of security based on application settings recommended by Kaspersky Lab experts to provide the optimal level of
protection for your computer. This level is set to be used by default.
R E S T O R A T I O N
Moving an original object from Quarantine or Backup to the folder where it was originally found before being moved to
Quarantine, disinfected, or deleted, or to a different folder specified by the user.
S
S E L E C T THE
S O C K S
Proxy server protocol that allows establishing a point-to-point connection between computers in the internal and external
networks.
S C R I P T
A small computer program or an independent part of a program (function) which, as a rule, has been developed to
execute a small specific task. It is most often used with programs embedded into hypertext. Scripts are run, for example,
when you open a certain website.
If real-time protection is enabled, the application tracks the scripts launching, intercepts and scans them for viruses.
Depending on the results of the scan, you may block or allow the execution of a script.
S E C U R I T Y L E V E L
The security level is defined as a pre-set component configuration.
S P A M
Unsolicited mass email mailings, most often including advertising messages.
S T A R T U P O B J E C T S
The set of programs needed to start and correctly operate the operating system and software installed on your computer.
These objects are executed every time the operating system is started. There are viruses capable of infecting such
objects specifically, which may lead to, for example, blocking your access to the operating system.
S U B N E T M A S K
Subnet mask (also known as netmask) and network address determine the addresses of computers on a network.
S U S P I C I O U S M E S S A G E
Message that cannot be unambiguously considered spam, but it seems suspicious when scanned (e.g., certain types of
mailings and advertising messages).
S U S P I C I O U S O B J E C T
An object that contains modified code of a known virus or code that resembles code of a virus, but is not yet known to
Kaspersky Lab. Suspicious objects are detected using the heuristic analyzer.