D E F I N I N G S E T T I N G S
•
Com
—the file seems to be infected by a virus that infects .COM
files;
•
Exe
—the file seems to be infected by a virus that infects .EXE
files;
•
ComExe
—the file seems to be infected by a virus that infects
both .COM and .EXE files;
•
ComTSR
,
ExeTSR
,
SysTSR
,
ComExeTSR
—the file seems to
be infected by a virus that infects .COM, .EXE and .SYS files;
•
Boot
—the file/sector seems to be infected by a boot virus or a
boot virus installer;
The sector check function under your operating system may be not
available.
•
Trojan
—the file looks like a Trojan;
•
Trivial
—the file seems to be infected by an unknown virus
replacing executable files in a current directory by its own codes
(usually the virus size doesn’t exceed 300 bytes);
•
Win32
—the file seems to be infected by an unknown Windows
virus;
•
Formula
—the Excel file contains suspicious instructions.
Of course, just like any other of the type the heuristic algorithm may
occasionally produce false alarms, however Code Analyzer has been
tested many times and checked a large number of files, and has not so far
been actually deceived. If you do encounter a false alarm while checking
files using Code Analyzer, please let us know and send us copies of the
virus-free files that were identified as infected so that we could study them
at Kaspersky Lab.
When scanning the code the heuristic detecting tool examines the structure
of a program down to several sublevels slowing down the general scanning
rate of
Kaspersky Anti-Virus for Sun Solaris Mail Server
approximately by 20%. This device detects92 % of the viruses (including
many encrypted ones) in Kaspersky Lab’s database, and we believe that
new-found viruses that aren’t yet in the database will be detected with the
same degree of probability.
48