302
Hidden file
Hidden files are not visible to users. It is possible that a rootkit is
hiding the file from the normal file listings.
Hidden process
Hidden processes are not visible to users. It is possible that a rootkit
is hiding the process from Windows Task Manager.
Host
Any computer on a network that is a repository for services available
to other computers on the network.
HTTP
The Hyper Text Transfer Protocol is the protocol used between a Web
browser and a server to request a document and transfer its contents.
The specification is maintained and developed by the World Wide
Web Consortium.
IDS (Intrusion Detection System)
A component of Internet Shield that scans incoming network traffic for
certain patterns that indicate an ongoing network attack.
IMAP
Internet Mail Application Protocol. Similar to POP, with the difference
that when using IMAP the e-mails are usually handled in the server,
instead of downloading them to the workstation.
IP
Internet Protocol. The address protocol for TCP packets. When
sending data by using TCP, IP is used to label the packet with sender
and recipient addresses.
IP Address
Internet Protocol Address. A unique network address consisting of 4
numeric strings separated by dots. This will change in IPv6.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...