10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

G L O S S A R YI N F E C T E D O B J E C TObject containing a malicious code. It is detected when a section of the object's code completely matches a section ofthe code of a known threat. <strong>Kaspersky</strong> <strong>Lab</strong> does not recommend using such objects since they may cause yourcomputer to be infected.I N P U T / O U T P U T P O R TServes in processors (such as Intel) for exchanging data with hardware components. Input/output port is associated witha certain hardware component, and allows applications to address it for data exchange.I N S T A L L I N G U S I N G L O G I N S C R I P TMethod of remote installation of <strong>Kaspersky</strong> <strong>Lab</strong>'s applications which allows assigning the startup of remote installationtask to an individual user account (or to several user accounts). Registering a user in a domain leads to an attempt toinstall the application on the client computer on which the user has been registered. This method is recommended forinstalling the applications on computers running under the Microsoft Windows 98 / Me operating systems.I N T E R C E P T O RSubcomponent of the application responsible for scanning specific types of email. The set of interceptors specific to yourinstallation depends on what role or what combination of roles the application is being deployed for.I N T E R N E T P R O T O C O L ( I P )The base protocol for the Internet, used without change since the time of its development in 1974. It performs basicoperations in transmitting data from one computer to another and serves as a foundation for higher-level protocols likeTCP and UDP. It manages the connection and error processing. Technologies such as NAT and masking make itpossible to hide a large number of private networks using a small number of IP addresses (or even one address), whichmake it possible to respond to the demands of the constantly growing Internet using the relatively restricted IPv4 addressspace.KK A S P E R S K Y L AB' S U P D A T E S E R V E R SA list of <strong>Kaspersky</strong> <strong>Lab</strong>'s HTTP and FTP servers from which the application downloads databases and module updatesto your computer.K E Y F I L EFile with the *.key extension, which is your personal "key", necessary for working with <strong>Kaspersky</strong> <strong>Lab</strong> application. A keyfile is included with the product package if you purchase it from <strong>Kaspersky</strong> <strong>Lab</strong> distributors; otherwise, it is emailed to youif you purchase the product online.LL I C E N S E V A L I D I T Y P E R I ODPeriod of time during which you are able to use all of the features of your <strong>Kaspersky</strong> <strong>Lab</strong>'s application. License validityperiod generally accounts for one calendar year from the date of its installation. After the license expires, the applicationwill have reduced functionality. You will not be able to update the application databases.L I S T O F A L L O W E D S E N D E RS(also "White" list of addresses)The list of email addresses which send the messages that should not be scanned by <strong>Kaspersky</strong> <strong>Lab</strong> application.L I S T O F A L L O W E D W E B A D D R E S S E SList of masks and addresses of web resources, access to which is not blocked by <strong>Kaspersky</strong> <strong>Lab</strong> application. The list ofaddresses is created by the user during application settings configuration.263

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!