10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

U S E R G U I D ERR E A L - T I M E P R O T E C T I O NThe application's operating mode under which objects are scanned for the presence of malicious code in real time.The application intercepts all attempts to open any object (read, write, or execute) and scans the object for threats.Uninfected objects are passed on to the user; objects containing threats or suspected of containing them are processedpursuant to the task settings (they are disinfected, deleted or quarantined).R E C O M M E N D E D L E V E LLevel of security based on application settings recommended by <strong>Kaspersky</strong> <strong>Lab</strong> experts to provide the optimal level ofprotection for your computer. This level is set to be used by default.R E S T O R I N G O B J E C T SMoving an original object from Quarantine or Backup to the folder where it was originally found before being moved toQuarantine, disinfected, or deleted, or to a different folder specified by the user.SS O C K SProxy server protocol that allows to establish a point-to-point connection between computers in the internal and externalnetworks.S C R I P TA small computer program or an independent part of a program (function) which, as a rule, has been developed toexecute a small specific task. It is most often used with programs embedded into hypertext. Scripts are run, for example,when you open a certain website.If real-time protection is enabled, the application will track the scripts launching, intercept them, and scan for viruses.Depending on the results of the scan you can block or allow the execution of a script.S E C U R I T Y L E V E LThe security level is defined as a pre-set component configuration.S P A MUnsolicited mass email mailings, most often including advertising messages.S T A R T U P O B J E C T SThe set of programs needed to start and correctly operate the operating system and software installed on your computer.These objects are executed every time the operating system is started. There are viruses capable of infecting suchobjects specifically, which could lead to, for example, blocking your access to the operating system.S U B N E T M A S KSubnet mask (also known as netmask) and network address determine the addresses of computers on a network.S U S P I C I O U S M E S S A G EMessage that cannot be unambiguously considered spam, but it seems suspicious when scanned (e.g., certain types ofmailings and advertising messages).S U S P I C I O U S O B J E C TAn object that contains modified code of a known virus or code that resembles code of a virus, but is not yet known to<strong>Kaspersky</strong> <strong>Lab</strong>. Suspicious objects are detected using the heuristic analyzer.266

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!