Glossary
Customized application
A version of the application that has been prepared (modified and configured) to meet specific needs of the corporate buyer. Customized versions of the application can differ in terms of their graphic design or interface language, for example.
Dump file
Content of the working memory of a process or the entire RAM of the system at a specified moment of time.
Hypervisor
An application supporting the parallel operation of several operating systems on one computer.
Kaspersky Security Network (KSN)
The cloud-based knowledge base of Kaspersky Lab containing information about the reputation of applications and websites. Use of data from Kaspersky Security Network ensures faster responses by Kaspersky Lab applications to threats, improves the performance of some protection components, and reduces the likelihood of false positives.
Keylogger
A program designed for hidden logging of information about keys pressed by the user. Keyloggers function as keystroke interceptors.
Licensed bank
A bank that has a license for use of Kaspersky Fraud Prevention for Endpoints. When performing online banking, a user may download Kaspersky Fraud Prevention for Endpoints from the bank's website and use the application's features, such as Protected Browser, Anti-Phishing, and Secure Data Input.
Phishing
A type of Internet fraud aimed at obtaining unauthorized access to users' confidential data.
Proactive Defense
Kaspersky Fraud Prevention for Endpoints uses Proactive Defense to monitor and analyze the behavior of all applications installed on the user's device. Kaspersky Fraud Prevention for Endpoints decides whether an application is malicious or not judging by its behavior.
Protected Browser
A special browser operating mode designed to protect your data as you access bank or payment system websites. Protected Browser is started in an isolated environment to prevent other applications from injecting their code into the process of Protected Browser.
Proxy server
A computer network service that allows users to make indirect requests to other network services. First, a user connects to a proxy server and requests a resource (for example, a file) located on another server. Then the proxy server either connects to the specified server and obtains the resource from it or returns the resource from its own cache (if the proxy has its own cache). In some cases, a user's request or a server's response can be modified by the proxy server for certain purposes.
Rootkit
A program or a set of programs for hiding traces of an intruder or malware in the operating system.
On Windows-based operating systems, a rootkit usually refers to a program that penetrates the operating system and intercepts system functions (Windows APIs). Interception and modification of low-level API functions are the main methods that allow these programs to make their presence in the operating system quite stealthy. A rootkit can usually also mask the presence of any processes, folders, and files that are stored on a disk drive, in addition to registry keys, if they are described in the configuration of the rootkit. Many rootkits install their own drivers and services on the operating system (these also are "invisible").
Traces
Running the application in debugging mode; after each command is executed, the application is stopped, and the result of this step is displayed.
Virtualization
Running an application in an environment that is isolated from other applications.
Vulnerability
A flaw in an operating system or an application that may be exploited by malware makers to penetrate the operating system or application and corrupt its integrity. Presence of a large number of vulnerabilities in an operating system makes it unreliable, because viruses that penetrate the operating system may cause disruptions in the operating system itself and in installed applications.