U S E R GU I D E
116
Limitations of iChecker technology:
This technology does not work with large files, since it is faster to scan a file than to check whether the file has
been modified since it was last scanned.
The technology supports a limited number of formats.
IN C O M P A T I B L E A P P L I C A T I O N
An anti-virus application from a third-party developer or a Kaspersky Lab application that does not support management
through Kaspersky Internet Security.
IN F E C T E D O B J E C T
An object of which a portion of its code completely matches part of the code of known malware. Kaspersky Lab does not
recommend accessing such objects.
K
KA S P E R S K Y LA B U P D A T E S E R V E R S
Kaspersky Lab HTTP servers from which updates of databases and software modules are downloaded.
KA S P E R S K Y SE C U R I T Y NE T W O R K ( K S N )
An infrastructure of online services that provides access to the Kaspersky Lab database with constantly updated
information about the reputation of files, web resources, and software. Use of data from Kaspersky Security Network
ensures faster responses by Kaspersky Lab applications to new threats, improves the performance of some protection
components, and reduces the likelihood of false positives.
KE Y L O G G E R
A program designed for hidden logging of information about keys pressed by the user. Keyloggers function as keystroke
interceptors.
L
LI C E N S E T E R M
A time period during which you have access to the application features and rights to use additional services.
P
PH I S H I N G
A type of Internet fraud aimed at obtaining unauthorized access to users' confidential data.
PR O B A B L E S P A M
A message that cannot be unambiguously considered spam, but has several spam attributes (for example, certain types
of mailings and advertising messages).
PR O B A B L Y I N F E C T E D O B J E C T
An object whose code contains portions of modified code from a known threat, or an object whose behavior is similar to
that of a threat.
PR O T E C T E D BR O W S E R
A dedicated operation mode of a standard web browser designed for financial activities and online shopping. Using
Protected Browser ensures safety of confidential data that you enter on the websites of banks and payment systems
(such as banking card numbers or passwords for access to online banking services); it also prevents theft of assets
when making money transfers online. Meanwhile, the standard browser used for accessing the website displays a
message informing you that Protected Browser is being started.
2006-2020 Rsmanuals.com