303
IPSec
(IETF) The IP Security Protocol is designed to provide interoperable,
high quality, cryptography-based security for IPv4 and IPv6. The set
of security services offered includes access control, connection-less
integrity, data origin authentication, protection against replays,
confidentiality (encryption), and limited traffic flow confidentiality.
These services are provided at the IP layer, offering protection for IP
and/or upper layer protocols.
ISP
Internet Service Provider. An institution that provides access to the
Internet in some form.
JAR
Java ARchive. A file format used for aggregating many files into one.
Kernel Mode
The part of the Windows operating system, through which, among
other things, user-mode applications and services use an API to
interact with the computer's hardware. The Kernel mode also
contains an interface to user-mode, and a facility for synchronizing it's
own services and coordinating all I/O functions. Kernel mode memory
is protected from user mode access.
LAN
(Local Area Network) A computer network limited to the immediate
area, usually the same building or floor of a building. Sometimes
using a simple network protocol.
Malformed header
Malformed e-mail message header. Typically non-standard encoding
of MIME format. Malformation is either caused by a worm, a malicious
person or an error in the sending e-mail client. A rapidly increasing
number of e-mail worms are using malformed e-mails to spread.
Malware
Malware (from "malicious software") is programming or files that are
developed for the purpose of doing harm. This includes computer
viruses, worms and Trojan horses.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...