Brochure
U S E R G U I D E
78
Q
Q U A R A N T I N E
A dedicated storage to which the application places backup copies of files that have been modified or deleted during
disinfection. Copies of files are stored in a special format, imposing no threat for the computer.
R
R O O T K I T
A program or a set of programs for hiding traces of an intruder or malware in the operating system.
On Windows-based operating systems, a rootkit usually means a program that penetrates into the operating system and
intercepts system functions (Windows APIs). Above all, interception and modification of low-level API functions allow
such a program to make its presence in the operating system quite stealthy. A rootkit can usually also mask the
presence of any processes, folders, and files that are stored on a disk drive, in addition to registry keys, if they are
described in the configuration of the rootkit. Many rootkits install their own drivers and services on the operating system
(these also are "invisible").
S
S C R I P T
A small computer program or an independent part of a program (function) which, as a rule, has been developed to
execute a specific task. It is most often used with programs that are embedded in hypertext. Scripts are run, for example,
when you open specified websites.
If real-time protection is enabled, the application tracks the launching of scripts, intercepts them, and scans them for
viruses. Depending on the results of scanning, you may block or allow the execution of a script.
S E C U R I T Y L E V E L
The security level is defined as a predefined collection of settings for an application component.
S P A M
Unsolicited mass email mailings, most often including advertising messages.
S T A R T U P O B J E C T S
The set of programs needed to start and correctly operate the operating system and software installed on your computer.
These objects are executed every time the operating system is started. There are viruses capable of infecting autorun
objects specifically, which may lead, for example, to blocking of operating system startup.
T
T A S K
Functions performed by Kaspersky Lab's application are implemented as tasks, such as: Real-time file protection, Full
computer scan, Database update.
T A S K S E T T I N G S
Application settings which are specific for each task type.