10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

G L O S S A R YD A T A B A S E SDatabases created by <strong>Kaspersky</strong> <strong>Lab</strong>'s experts and containing detailed description of all currently existing threats tocomputer security as well as methods used for their detection and disinfection. These databases are constantly updatedby <strong>Kaspersky</strong> <strong>Lab</strong> as new threats appear.D E L E T I N G A N O B J E C TThe method of processing objects which ends in it being physically deleted from its original location (hard drive, folder,network resource). We recommend that this method be applied to dangerous objects which, for any reason, cannot bedisinfected.D I S I N F E C T I N G O B J E C T S O N R E S T A R TA method of processing infected objects that are being used by other applications at the moment of disinfection. Consistsof creating a copy of the infected object, disinfecting the copy created, and replacing the original infected object with thedisinfected copy after the next system restart.D I S K B O O T S E C T O RA boot sector is a particular area on a computer's hard drive, floppy, or other data storage device. It contains informationon the disc's file system and a boot loader program that is responsible for starting the operating system.There exist a number of viruses that infect boot sectors, which are thus called boot viruses. The <strong>Kaspersky</strong> <strong>Lab</strong>application allows to scan boot sectors for viruses and disinfect them if an infection is found.D O M A I N N A M E S E R V I C E ( D N S )Distributed system for converting the name of a host (a computer or other network device) into IP address. DNSfunctions in TCP/IP networks. Particularly, DNS can also store and process reverse requests, by determining the nameof a host by its IP address (PTR record). Resolution of DNS names is usually carried out by network applications, not byusers.D U A L - H O M E D G A T E W A YComputer equipped with two network adapters (each of which is connected to different networks) transferring data fromone network to the other.EE V E N T S E V E R I T Y L E V E LDescription of the event, logged during the operation of <strong>Kaspersky</strong> <strong>Lab</strong> application. There exist four severity levels:Critical event.Functional failure.Warning.Informational message.Events of the same type may have different severity levels, depending on the situation when the event occurred.E X C L U S I O NExclusion is an object excluded from the scan by <strong>Kaspersky</strong> <strong>Lab</strong> application. You can exclude files of certain formatsfrom the scan, use a file mask, or exclude a certain area (for example, a folder or a program), program processes, orobjects by threat type according the Virus Encyclopedia classification. Each task can be assigned a set of exclusions.261

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!