Glossary 243
IP address
Internet Protocol address. An address used to identify a computer or device on a TCP/IP
network. The format of an IP address is a 32-bit numeric address written as four numbers
separated by periods. Each number can be 0 to 255 (for example, 192.168.1.100).
IP spoofing
Forging the IP addresses in an IP packet. This is used in many types of attacks including
session hijacking. It is also often used to fake the email headers of spam so they cannot be
properly traced.
K
key
A series of letters and numbers used by two devices to authenticate their communication.
Both devices must have the key. See also
WEP
(page 250),
WPA
(page 251),
WPA2
(page
251),
WPA2-PSK
(page 251),
WPA-PSK
(page 251).
L
LAN
Local Area Network. A computer network that spans a relatively small area (for example, a
single building). Computers on a LAN can communicate with each other and share
resources such as printers and files.
launchpad
A U3 interface component that acts as a starting point for launching and managing U3 USB
programs.
M
MAC address
Media Access Control address. A unique serial number assigned to a physical device (NIC,
network interface card) accessing the network.
man-in-the-middle attack
A method of intercepting and possibly modifying messages between two parties without
either party knowing that their communication link has been breached.
MAPI
Messaging Application Programming Interface. A Microsoft interface specification that
allows different messaging and workgroup programs (including email, voicemail, and fax)
to work through a single client, such as the Exchange client.
message authentication code (MAC)
A security code used to encrypt messages that are transmitted between computers. The
message is accepted if the computer recognizes the decrypted code as valid.
MSN
Microsoft Network. A group of web-based services offered by Microsoft Corporation,
including a search engine, email, instant messaging, and portal.
Summary of Contents for MTP09EMB1RAA - Total Protection 2009
Page 1: ...User Guide...
Page 2: ......
Page 6: ......
Page 28: ......
Page 30: ......
Page 42: ......
Page 46: ......
Page 70: ......
Page 82: ......
Page 120: ......
Page 128: ......
Page 146: ......
Page 162: ......
Page 190: ......
Page 192: ......
Page 198: ......
Page 206: ......
Page 218: ......
Page 222: ......
Page 239: ...Chapter 49 McAfee Total Protection 237...
Page 254: ......