10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

G L O S S A R YN O T I F I C A T I O N T E M P L A T ETemplate based on which a notification of infected objects detected by the scan, is generated. Notification templateincludes a combination of settings regulating the mode of notification, the way of spreading, and the text of messages tosend.OO L E O B J E C TAn attached object or an object embedded into another file. <strong>Kaspersky</strong> <strong>Lab</strong> application allows to scan OLE objects forviruses. For example, if you insert a Microsoft Office Excel table into a Microsoft Office Word document, the table will bescanned as an OLE object.O B J E C T D I S I N F E C T I O NThe method used for processing infected objects that results in complete or partial recovery of data, or the decision thatthe objects cannot be disinfected. Disinfection of objects is performed using the database records. Part of the data maybe lost during disinfection.O B S C E N E M E S S A G EEmail message containing offensive language.PP O T E N T I A L L Y I N F E C T A B L E O B J E C TAn object which, due to its structure or format, can be used by intruders as a "container" to store and distribute amalicious object. As a rule, they are executable files, for example, files with the .com, .exe, .dll extensions, etc. The riskof activating malicious code in such files is fairly high.P O T E N T I A L L Y I N F E C T E D O B J E C TAn object that contains modified code of a known virus or code that resembles code of a virus, but is not yet known to<strong>Kaspersky</strong> <strong>Lab</strong>. Potentially infected files are detected using heuristic analyzer.P R O T E C T I O N S T A T U SThe current status of protection, summarizing the degree of security of the computer.P R O T O C O LClearly defined and standardized set of rules governing the interaction between a client and a server. Well-knownprotocols and the services associated with them include HTTP (WWW), FTP, and NNTP (news).P R O X Y S E R V E RComputer network service which allows users to make indirect requests to other network services. First, a user connectsto a proxy server and requests a resource (e.g., a file) located on another server. Then, the proxy server either connectsto the specified server and obtains the resource from it, or returns the resource from its own cache (in case if the proxyhas its own cache). In some cases, a user's request or a server's response can be modified by the proxy server in certainreasons.QQ U A R A N T I N EA certain folder into which all possibly infected objects are placed, which were detected during scans or by real-timeprotection.265

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!