299
Authorization
The right to perform an action on an object. Also the act of proving
this right.
Backdoor
A malicious application or plug-in that opens up a possibility for a
remote user to access the compromised computer. This is very often
an application that opens up one or more listening ports and waits for
connections from the outside, but there are variations of this. Many
Viruses, Trojans and Worms install backdoors as part of their attack.
Bit
The smallest unit of memory size, sets of which make up bytes,
arranged in a sequential pattern to express text, numbers, or other
detailed information, recognizable by the computer’s processing
system.
Broadcast traffic
Broadcast traffic comes from one specific computer and is sent to a
whole network or subnetwork. Usually done by using the
broadcasting mechanisms of the LAN (e.g. Ethernet), and not
forwarded between networks.
Browser hijacking
An application which attempts to take control of your web start page,
or other web sites you are likely to visit, is known as browser hijacker.
Browser hijacker tries to force you to visit a web site to inflate the
traffic for higher advertising revenues.
Byte
A set of bits that represent a single character. There are 8 bits in a
byte.
Certificate
See Public Key.
Client
A program that is used to contact and obtain data from a Server
program on another computer.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...