
Glossary
136
quarantine
A directory containing infected and suspicious files in coded form. These files
can later be restored using Kaspersky Anti-Virus Control Centre, if they were
deleted by mistake, or in order to archive and e-mail to Kaspersky Labs where
they can be studied.
rescue disks
A set of diskettes that allows you to boot the system and check it for viruses.
They can be used to restore your system in case it has been completely disabled
as the result of a virus attack. These diskettes contain an operating system, an
anti-virus program and the anti-virus bases. They can be created using
Kaspersky Anti-Virus Rescue Disk.
resident anti-virus monitor
A memory-resident computer program that checks for viruses in the used objects
(documents to be opened, files to be saved, etc.).
scanning
A process that is performed by an anti-virus scanner when it checks for viruses in
a predefined location. A user may set the computer memory, disks, folders, etc.
as locations to be checked for viruses.
script virus
A virus which has been written in a script language. This virus usually embeds
itself in a web page and is started when this page is viewed. A message in HTML
format may also carry such viruses.
settings file
(p
rofile
)
A file that contains the main settings of a program. These settings can be
exported (saved) to a file and imported (loaded) from this file. When started, the
program adopts settings from the default profile.
settings tree
A graphic interface item that presents data in the form of a tree with conventional
controls as joints (buttons, drop-down lists, check boxes, etc.)
service sub-program of a Kaspersky Anti-Virus package component
A sub-program that constantly resides in the computer memory. This sub-
program performs user-defined actions (scanning, monitoring, etc.).
stealth virus
A virus that utilizes various methods to conceal its presence in a system.
Nowadays, any class of virus can utilize stealth features.