User guide
U S E R G U I D E
248
I N F E C T A B L E O B J E C T
An object which, due to its structure or format, can be used by intruders as a "container" to store and distribute a
malicious object. As a rule, they are executable files, for example, files with the .com, .exe, .dll extensions, etc. The risk
of activating malicious code in such files is fairly high.
I N F E C T E D O B J E C T
Object containing a malicious code. It is detected when a section of the object's code completely matches a section of
the code of a known threat. Kaspersky Lab does not recommend using such objects since they may infect your
computer.
I N P U T / O U T P U T P O R T
Serves in processors (such as Intel) for exchanging data with hardware components. The input/output port is associated
with a certain hardware component, and allows applications to address it for data exchange.
I N S T A L L A T I O N W I T H A L O G O N S C R I P T
Method of remote installation of Kaspersky Lab's applications which allows assigning the startup of remote installation
task to an individual user account (or to several user accounts). Registering a user in a domain leads to an attempt to
install the application on the client computer on which the user has been registered. This method is recommended for
installing the applications on computers running under Microsoft Windows 98 / Me operating systems.
I N T E R N E T P R O T O C O L ( I P )
The basic protocol for the Internet, used without change since the time of its development in 1974. It performs basic
operations in transmitting data from one computer to another and serves as the foundation for higher-level protocols like
TCP and UDP. It manages connection and error processing. Technologies such as NAT and masking make it possible to
hide a large number of private networks using a small number of IP addresses (or even one address), which make it
possible to respond to the demands of the constantly growing Internet using the relatively restricted IPv4 address space.
K
K A S P E R S K Y L AB' S U P D A T E S E R V E R S
A list of Kaspersky Lab's HTTP and FTP servers from which the application downloads databases and module updates
to your computer.
K E Y F I L E
File with the .key extension, which is your personal "key", necessary for working with the Kaspersky Lab application. A
key file is included with the product if you purchased it from Kaspersky Lab distributors or is emailed to you if you
purchased the product online.
L
L I C E N S E V A L I D I T Y P E R I OD
Period of time during which you are able to use all features of your Kaspersky Lab application. The license validity period
generally runs for one calendar year from the date of installation. After the license expires, the application has reduced
functionality. You will not be able to update the application databases.
L I S T O F A L L O W E D U R L S
List of masks and addresses of web resources, the accessing of which is not blocked by the Kaspersky Lab application.
The list of addresses is created by the user during application settings configuration.
L I S T O F A L L O W E D S E N D E R S
(as well as "White" list of addresses)
The list of email addresses which send the messages that should not be scanned by Kaspersky Lab application.