User guide
G L O S S ARY
249
L I S T O F B L O C K E D U R L S
List of masks and addresses of web resources, access to which is blocked by the Kaspersky Lab application. The list of
addresses is created by the user during application settings configuration.
L I S T O F B L O C K E D S E N D E RS
(also "Black" list of addresses)
The list of email addresses which send messages that should be blocked by the Kaspersky Lab application, regardless
of their content.
L I S T O F C H E C K E D W E B A D D R E S S E S
List of masks and addresses of web resources, which are mandatorily scanned for malicious objects by the Kaspersky
Lab application.
L I S T O F T R U S T E D U R L S
List of masks and addresses of web resources whose content the user trusts. Kaspersky Lab application does not scan
web pages, corresponding to a list item, for the presence of malicious objects.
M
M A I L D A T A B A S E S
Databases containing emails in a special format and saved on your computer. Each incoming/outgoing email is placed in
the mail database after it is received/sent. These databases are scanned during a full computer scan.
Incoming and outgoing emails at the time that they are sent and received are analyzed for viruses in real time if real-time
protection is enabled.
M E S S A G E D E L E T I O N
Method of processing an email message, at which the message is physically removed. This method is recommended to
apply to messages that definitely contain spam or malware. Before deleting a message, a copy of it is saved in the
backup (unless this option is disabled).
M O N I T O R E D O B J E C T
A file transferred via HTTP, FTP, or SMTP protocols across the firewall and sent to a Kaspersky Lab application to be
scanned.
M O V I N G O B J E C T S T O Q U A R A N T I N E
A method of processing a potentially infected object by blocking access to the file and moving it from its original location
to the Quarantine folder, where the object is saved in encrypted form, which rules out the threat of infection.
N
N E T W O R K P O R T
TCP and UDP parameter that determines the destination of data packets in IP format that are transmitted to a host over
a network and makes it possible for various programs running on a single host to receive data independently of each
other. Each program processes data received via a certain port (this is sometimes referred to as the program "listening"
to that port).
For some common network protocols there are usually standard port numbers (for example, web servers usually receive
HTTP requests on TCP port 80); however, generally, a program can use any protocol on any port. Possible values: 1 to
65535.