10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

U S E R G U I D EFF A L S E A L A R MSituation when <strong>Kaspersky</strong> <strong>Lab</strong>'s application considers a non-infected object as infected due to its code similar to that of avirus.F I L E M A S KRepresentation of a file name and extension using wildcards. The two standard wildcards used in file masks are * and ?,where * represents any number of any characters and ? stands for any single character. Using these wildcards, you canrepresent any file. Note that the name and extension are always separated by a period.HH A R D W A R E P O R TSocket on a hardware component of a computer in which a cable or a plug can be connected (LPT port, serial port, USBport).H E A D E RThe information in the beginning of a file or a message, which is comprised of low-level data on file (or message) statusand processing. In particular, the email message header contains such data as information about the sender and therecipient, and the date.H E U R I S T I C A N A L Y Z E RThreat detection technology for threats that cannot be detected using databases of <strong>Kaspersky</strong> <strong>Lab</strong>'s applications. Itallows detecting objects suspected of being infected with an unknown virus or a new modification of the known viruses.The use of heuristic analyzer detects up to 92% of threats. This mechanism is fairly effective and very rarely leads tofalse positives.Files detected by the heuristic analyzer are considered suspicious.II C H E C K E R T E C H N O L O G YiChecker is a technology that increases the speed of anti-virus scans by excluding objects that have remain unchangedsince their last scan, provided that the scan parameters (the anti-virus database and settings) have not changed. Theinformation for each file is stored in a special database. This technology is used in both real-time protection and ondemandscan modes.For example, you have an archive scanned by <strong>Kaspersky</strong> <strong>Lab</strong> application and assigned the not infected status. The nexttime the application will skip this archive, unless it has been altered or the scan settings have been changed. If youaltered the archive content by adding a new object to it, modified the scan settings or updated the anti-virus database,the archive will be re-scanned.Limitations of iChecker technology:this technology does not work with large-size files since it is faster to scan a file than check whether it was modified sinceit was last scanned;the technology supports a limited number of formats (exe, dll, lnk, ttf, inf, sys, com, chm, zip, rar).I N C O M P A T I B L E A P P L I C A T I O NAn anti-virus application from a third-party vendor or a <strong>Kaspersky</strong> <strong>Lab</strong> application that does not support management via<strong>Kaspersky</strong> <strong>PURE</strong>.262

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!