Glossary
124
A memory-resident computer program that checks for viruses in the used objects
(documents to be opened, files to be saved, etc.).
scanning
A process that is performed by an anti-virus scanner when it checks for viruses in
a predefined location. A user may set the computer memory, disks, folders, etc.
as locations to be checked for viruses.
script virus
A virus which has been written in a script language. This virus usually embeds
itself in a web page and is started when this page is viewed. A message in HTML
format may also carry such viruses.
settings file
(p
rofile
)
A file that contains the main settings of a program. These settings can be
exported (saved) to a file and imported (loaded) from this file. When started, the
program adopts settings from the default profile.
settings tree
A graphic interface item that presents data in the form of a tree with conventional
controls as joints (buttons, drop-down lists, check boxes, etc.)
service sub-program of a Kaspersky Anti-Virus package component
A sub-program that constantly resides in the computer memory. This sub-
program performs user-defined actions (scanning, monitoring, etc.).
stealth virus
A virus that utilizes various methods to conceal its presence in a system.
Nowadays, any class of virus can utilize stealth features.
suspicious object
An object whose actions or contents appear similar to a virus. A memory
location, file, macro and other objects can be claimed to be suspicious.
system crack (hack)
Unauthorized access that is gained to the system’s data or resources. Systems
are frequently cracked using a malware.
Trojan
Named after the Trojan Horse of mythology, this is a class of malware that looks
as if it is a harmless program but which in fact performs destructive or undesired
actions, such as remote management, data stealing, monitoring, etc.
updating server
A server that stores the most up-to-date anti-virus bases or program modules.