20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ADVANCED OPTIONS 235<br />

The program also provides detailed reports (see 19.3 on pg. 240) on the<br />

operation of all protection components, virus scan tasks, and updates.<br />

Monitored ports can regulate which <strong>Kaspersky</strong> Internet Security modules control<br />

data transferred on select ports (see 19.5 on pg. 262). Configuration of proxy<br />

server settings (see 19.7 on pg. 266) provides the application access to the<br />

Internet which is critical for certain real-time protection components and updates.<br />

The Rescue Disk can help restore your computer’s functionality after an infection<br />

(see 19.4 on pg. 259). This is particularly helpful when you cannot boot your<br />

computer’s operating system after malicious code has damaged system files.<br />

You can also change the appearance of <strong>Kaspersky</strong> Internet Security and can<br />

customize the program interface (see 19.7 on pg. 266).<br />

The following sections discuss these features in more detail.<br />

19.1. Quarantine for potentially<br />

infected objects<br />

Quarantine is a special storage area that holds potentially infected objects.<br />

Potentially infected objects are objects that are suspected of being infected<br />

with viruses or modifications of them.<br />

Why potentially infected? This are several reasons why it is not always possible<br />

to determine whether an object is infected:<br />

• The code of the object scanned resembles a known threat but is partially<br />

modified.<br />

Application databases contain threats that have already been studied by<br />

<strong>Kaspersky</strong> <strong>Lab</strong>. If a malicious program is modified by a hacker but these<br />

changes have not yet been entered into the databases, <strong>Kaspersky</strong><br />

Internet Security classifies the object infected with this changed malicious<br />

program as being potentially infected, and indicates what threat this<br />

infection resembles.<br />

• The code of the object detected is reminiscent in structure of a malicious<br />

program, although nothing similar is recorded in the application<br />

databases.<br />

It is quite possible that this is a new type of threat, so <strong>Kaspersky</strong> Internet<br />

Security classifies the object as a potentially infected object.<br />

The heuristic code analyzer detects potential viruses. This mechanism is fairly<br />

effective and very rarely produces false positives.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!