KAPERSKY ANTI-VIRUS 5.0 - FOR WINDOWS WORKSTATIONS Administrator's Manual page 207

Hide thumbs Also See for ANTI-VIRUS 5.0 - FOR WINDOWS WORKSTATIONS:
Table of Contents

Advertisement

Appendix B
Rootkit – utilities used to conceal the malicious actions. They "hide"
malware so that it is not detected by anti-virus programs. Rootkits can
also modify the operating system altering its main functions to conceal
their presence and actions performed by the malefactor on the infected
computer.
S
Scan infectable files, by extension – when scanning, the application takes
into account file extension.
Scan infectable files, by format – when scanning, the application analyzes
internal file contents, namely the format identifier in the file header.
Security administrator –person who controls the operation of the
application.
Administration Console or using a local interface.
Settings file – a file containing basic program settings. Software settings
can be exported (saved) to such files or imported (loaded) from file.
SpyWare – software designed for unauthorized access to user data,
tracking of actions performed on a computer, collection of information
about hard drive contents. Such tools allow an intruder to gather data or
even control a computer from outside. Spyware is usually distributed
with free software and deploy on a computer imperceptibly for its user.
Spyware category includes software tracking keyboard input, password
cracking tools, programs for collection of confidential data (e. g., credit
card numbers).
Standard anti-virus database – anti-virus database that helps detect all
malware existing at the moment and disinfect objects and data infected
such malware.
Startup objects – a set of programs that are necessary for launching and
correct operation of the operating system and other programs installed
on your computer. Your operating system launches these objects during
each startup. Some viruses attempt to infect the startup objects and can
cause a startup failure.
Suspicious object – an object that contains either a modified code of a
well-known virus or a code reminiscent of a virus, but not yet known to
Kaspersky Lab.
T
Task – a specific action performed by an application of Kaspersky Lab.
Trusted processes – a list of software processes, whose file activity is not
monitored by Kaspersky Anti-Virus in real time. It means that all objects
launched, opened or saved by a trusted process are not scanned.
U
Unknown virus – a new virus that is not recorded in the anti-virus database.
As a rule, Kaspersky Anti-Virus detects unknown viruses using an
The
administrator
may
either
act
207
remotely
using

Advertisement

Table of Contents
loading

Table of Contents