KAPERSKY ANTI-VIRUS 5.0 - FOR WINDOWS WORKSTATIONS Administrator's Manual page 204

Hide thumbs Also See for ANTI-VIRUS 5.0 - FOR WINDOWS WORKSTATIONS:
Table of Contents

Advertisement

204
the first action after detection of a suspicious object, the application
creates a backup copy of this file. If some data are lost during
disinfection, you can use the backup to recover this object.
Disinfection of objects at restart – a method of processing infected
objects which are being accessed by other applications while the
application attempts their disinfection. The application creates a copy of
the infected object, disinfects the copy, and substitutes it for the original
infected object during the next restart. In Microsoft Windows 9х
operating systems disinfection of objects with long filenames during
restart forces their replacement with disinfected objects having short
filenames. That may cause incorrect functioning of applications, which
use objects disinfected in this manner.
E
E-mail databases – databases that contain e-mail messages stored on your
computer. Every incoming/outgoing message is saved in the database
after you receive/send it. Such databases are scanned in the on-
demand scanning mode.
Exclusions – user-defined settings that exclude certain objects from the
scan. You can customize the exclusion rules for real-time protection and
on-demand scans. Thus, you can disable scanning of archives during a
full scan or exclude files from scans by using masks.
Extended anti-virus database – standard database plus additional
database that help detect potentially dangerous software on the user's
computer.
F
File mask – is a representation of the name and the extension of a file using
general symbols. Two main symbols used in the file masks are
"*"
and
"?" is any single symbol). You can represent any file using these
symbols. Please note that when providing the name and the extension
of the file a dot notation is always used.
Full scan – a mode of application functioning designed for full computer
scanning for the presence of malicious code upon a request made by a
user with subsequent disinfection and removal of suspicious or infected
objects, if any.
G
Group policy – a collection of parameters for application functionality in an
administration group controlled via Kaspersky Administration Kit 5.0.
H
Hack Tools – software employed by intruders for their own purposes to gain
access to your computer. The category includes various illegal scanners
of vulnerabilities, password cracking tools, other types of software for
breaking into network resources or intrusion into an attacked system.
"?"
(where
"*"
Kaspersky Anti-Virus 5.0 for Windows Workstations
is
any
number
of
symbols
and

Advertisement

Table of Contents
loading

Table of Contents