G L O S S A R Y
DA T A B A S E O F P H I S H I N G W E B A D D R E S S E S
List of web addresses which have been defined as phishing addresses by Kaspersky Lab specialists. The databases are
regularly updated and are part of the Kaspersky Lab application package.
DI G I T A L S I G N A T U R E
An encrypted block of data embedded in a document or application. A digital signature is used to identify the author of
the document or application. To create a digital signature, the document or application author must have a digital
certificate proving the author's identity.
A digital signature lets you verify the data source and data integrity and protect yourself against counterfeits.
DI S K B O O T S E C T O R
A boot sector is a special area on a computer's hard drive, floppy disk, or other data storage device. It contains
information on the disk's file system and a boot loader program, which is responsible for starting the operating system.
There exist a number of viruses that infect boot sectors, which are thus called boot viruses. The Kaspersky Lab
application allows scanning boot sectors for viruses and disinfecting them if an infection is found.
FA L S E P O S I T I V E
A situation when a Kaspersky Lab application considers a non-infected object to be infected because the object's code is
similar to that of a virus.
FI L E M A S K
Representation of a file name using wildcards. The standard wildcards used in file masks are * and ?, where * represents
any number of any characters and ? stands for any single character.
HE U R I S T I C A N A L Y Z E R
A technology for detecting threats about which information has not yet been added to Kaspersky Lab databases. The
heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects detected
by the heuristic analyzer are considered to be probably infected. For example, an object may be considered probably
infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).
HY P E R V I S O R
An application supporting the parallel operation of several operating systems on one computer.
ICH E C K E R TE C H N O L O G Y
A technology that allows increasing the speed of anti-virus scanning by excluding objects that have remained unchanged
since their last scan, provided that the scan parameters (the databases and the settings) have not been altered. The
information for each file is stored in a special database. This technology is used in both real-time protection and on-
demand scan modes.
For example, you have an archive file that was scanned by a Kaspersky Lab application and assigned not infected
status. Next time, the application will skip this archive unless the archive has been altered or the scan settings have been
changed. If you have changed the archive content by adding a new object to it, modified the scan settings, or updated
the application databases, the archive will be re-scanned.