20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the application databases, the date the object was last scanned, and<br />

modifications to scan settings.<br />

Figure 78. Advanced scan settings<br />

211<br />

For example, you have an archived file that the program scanned and<br />

assigned the status of not infected. The next time, the program will skip this<br />

archive, unless it has been modified or the scan settings have been<br />

changed. If the structure of the archive has changed because a new object<br />

has been added to it, if the scan settings have changed, or if the application<br />

databases have been updated, the program will scan the archive again.<br />

There are limitations to iChecker: it does not work with large files and only<br />

applies to objects with a structure that <strong>Kaspersky</strong> Internet Security<br />

recognizes (for example, .exe, .dll, .lnk, .ttf, .inf, .sys, .com, .chm, .zip, .rar).<br />

Enable iSwift technology. This technology is a development of iChecker<br />

technology for computers using an NTFS file system. There are limitations to<br />

iSwift: it is bound to a specific location for the file in the file system and can<br />

only be applied to objects in an NTFS file system.<br />

Show detected dangerous objects on the “Detected” report tab – display<br />

a list of threats detected during the scan on the Detected tab of the report<br />

(see 19.3.2 on pg. 244) window. Disabling this function may be appropriate

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!