Brochure

G L O S S A R Y
77
I N C O M P A T I B L E A P P L I C A T I O N
An antivirus application from a third-party developer or a Kaspersky Lab application that does not support management
through Kaspersky Internet Security.
I N F E C T E D O B J E C T
It is the object, which contains a part of code that matches completely a part of code of a well-known harmful application.
Kaspersky Lab does not recommend using such objects.
K
K A S P E R S K Y L AB' S U P D A T E S E R V E R S
Kaspersky Lab HTTP servers to which the updated anti-virus database and the application modules are uploaded.
K A S P E R S K Y S E C U R I T Y N E T W O R K ( K S N )
An infrastructure of online services that provides access to the online Knowledge Base of Kaspersky Lab which contains
information about the reputation of files, web resources, and software. Using data from Kaspersky Security Network
ensures a faster response by Kaspersky Lab's applications to unknown threats, improves the effectiveness of some
protection components, and reduces the risk of false positives.
K E Y L O G G E R
A program designed for hidden logging of information about keys pressed by the user. Keyloggers are also called key
interceptors or key spies.
L
L I C E N S E T E R M
A time period during which you have access to the application features and rights to use additional services.
P
P H I S H I N G
A kind of Internet fraud, when email messages are sent with the purpose of stealing confidential information. As a rule,
this information relates to financial data.
P R O B A B L E S P A M
A message that cannot be unambiguously considered spam, but has several spam attributes (e.g., certain types of
mailings and advertising messages).
P R O B A B L Y I N F E C T E D O B J E C T
An object whose code contains modified code of a known threat or code, which is similar to that of a threat, judging by its
behavior.
P R O T E C T I O N C O M P O N E N T S
Integral parts of Kaspersky Internet Security intended for protection against specific types of threats (for example, Anti-
Spam, Anti-Phishing). Each of the components is relatively independent of other ones so it can be disabled or configured
individually.
P R O T O C O L
A clearly defined and standardized set of rules governing the interaction between a client and a server. Well-known
protocols and the services associated with them include HTTP, FTP, and NNTP.