User guide
G L O S S A R Y
181
There exist a number of viruses that infect boot sectors, which are thus called boot viruses. The Kaspersky Lab
application allows to scan boot sectors for viruses and disinfect them if an infection is found.
D O M A I N N A M E S E R V I C E ( D N S )
Distributed system for converting the name of a host (a computer or other network device) into IP address. DNS functions
in TCP/IP networks. Particularly, DNS can also store and process reverse requests, by determining the name of a host by
its IP address (PTR record). Resolution of DNS names is usually carried out by network applications, not by users.
D U A L - H O M E D G A T E W A Y
Computer equipped with two network adapters (each of which is connected to different networks) transferring data from
one network to the other.
E V E N T S E V E R I T Y L E V E L
Description of the event, logged during the operation of Kaspersky Lab application. There exist four severity levels:
Critical event.
Functional failure.
Warning.
Informational message.
Events of the same type may have different severity levels, depending on the situation when the event occurred.
E X C L U S I O N
Exclusion is an object excluded from the scan by Kaspersky Lab application. You can exclude files of certain formats
from the scan, use a file mask, or exclude a certain area (for example, a folder or a program), program processes, or
objects by threat type according the Virus Encyclopedia classification. Each task can be assigned a set of exclusions.
F I L E M A S K
Representation of a file name and extension using wildcards. The two standard wildcards used in file masks are * and ?,
where * represents any number of characters and ? stands for any single character. Using these wildcards, you can
represent any file. Note that the name and extension are always separated by a period.
H A R D W A R E P O R T
Socket on a hardware component of a computer in which a cable or a plug can be connected (LPT port, serial port, USB
port).
H E A D E R
The information in the beginning of a file or a message, which is comprised of low-level data on file (or message) status
and processing. In particular, the email message header contains such data as information about the sender and the
recipient, and the date.
H E U R I S T I C A N A L Y Z E R
Threat detection technology for threats that cannot be detected using Anti-Virus databases. It allows detecting objects
suspected of being infected with an unknown virus or a new modification of the known viruses.
The use of heuristic analyzer detects up to 92% of threats. This mechanism is fairly effective and very rarely leads to
false positives.
Files detected by the heuristic analyzer are considered suspicious.
I C H E C K E R T E C H N O L O G Y
iChecker is a technology that increases the speed of anti-virus scans by excluding objects that have remain unchanged
since their last scan, provided that the scan parameters (the anti-virus database and settings) have not changed. The
information for each file is stored in a special database. This technology is used in both real-time protection and on-
demand scan modes.