Kaspersky Lab Internet Security 2011, RNWL, 1U, 2Y, ENG KL1837UCADR Benutzerhandbuch
Produktcode
KL1837UCADR
U
S E R
G
U I D E
236
S
S O C K S
Proxy server protocol that allows establishing a point-to-point connection between computers in the internal and external
networks.
networks.
S
C R I P T
A small computer program or an independent part of a program (function) which, as a rule, has been developed to
execute a small specific task. It is most often used with programs embedded into hypertext. Scripts are run, for example,
when you open a certain website.
execute a small specific task. It is most often used with programs embedded into hypertext. Scripts are run, for example,
when you open a certain website.
If real-time protection is enabled, the application tracks the scripts launching, intercepts and scans them for viruses.
Depending on the results of the scan, you may block or allow the execution of a script.
Depending on the results of the scan, you may block or allow the execution of a script.
S
E C U R I T Y L E V E L
The security level is defined as a pre-set component configuration.
S
P A M
Unsolicited mass email mailings, most often including advertising messages.
S
T A R T U P O B J E C T S
The set of programs needed to start and correctly operate the operating system and software installed on your computer.
These objects are executed every time the operating system is started. There are viruses capable of infecting such
objects specifically, which may lead to, for example, blocking your access to the operating system.
These objects are executed every time the operating system is started. There are viruses capable of infecting such
objects specifically, which may lead to, for example, blocking your access to the operating system.
S
U B N E T M A S K
Subnet mask (also known as netmask) and network address determine the addresses of computers on a network.
S
U S P I C I O U S M E S S A G E
Message that cannot be unambiguously considered spam, but it seems suspicious when scanned (e.g., certain types of
mailings and advertising messages).
mailings and advertising messages).
S
U S P I C I O U S O B J E C T
An object that contains modified code of a known virus or code that resembles code of a virus, but is not yet known to
Kaspersky Lab. Suspicious objects are detected using the heuristic analyzer.
Kaspersky Lab. Suspicious objects are detected using the heuristic analyzer.
T
T
A S K
Functions performed by Kaspersky Lab's application are implemented as tasks, such as: Real-time file protection, Full
computer scan, Database update.
computer scan, Database update.
T
A S K S E T T I N G S
Application settings which are specific for each task type.
T
H R E A T R A T I N G
Rate of how dangerous an application is for the operating system. The rating is calculated using the heuristic analysis
based on two types of criteria:
based on two types of criteria:
static (such as information about the executable file of an application: size, creation date, etc.);
dynamic, which are used while simulating the application's operation in a virtual environment (analysis of the
application's calls to system functions).
application's calls to system functions).