137
Kaspersky Anti-Virus for Workstation
suspicious object
An object whose actions or contents appear similar to a virus. A memory
location, file, macro and other objects can be claimed to be suspicious.
system crack (hack)
Unauthorized access that is gained to the system’s data or resources. Systems
are frequently cracked using a malware.
Trojan
Named after the Trojan Horse of mythology, this is a class of malware that looks
as if it is a harmless program but which in fact performs destructive or undesired
actions, such as remote management, data stealing, monitoring, etc.
updating server
A server that stores the most up-to-date anti-virus bases or program modules.
virus
A computer program
(that is, executable code and/or a collection of instructions)
that can replicate itself (though the copy may not necessarily exactly match the
original) and can penetrate files and other resources of computer systems and
networks and make them perform tasks the virus dictates without the user’s
permission. Copies of the program are also capable of replicating themselves
(for more details see Virus Encyclopedia
http://www.viruslist.com/eng/viruslist.asp
).
virus attack
A set of actions that are performed in order to infect a computer.
Windows virus
A virus that while infecting a file utilizes features of the Microsoft Windows
operating system.
worm
A class of malware that spreads using a computer network such as the Internet.
Worms penetrate computers from the computer network by finding computer
network addresses and dispatching their copies to these addresses. Sometimes
these viruses create work files on system disks, but they can avoid using system
resources (with the exception of RAM).