G.13 malware
Malware includes viruses, worms, and Trojan horses. Malware, or malicious software, refers to
programs that are designed to damage or disrupt a computer. Malware is generally installed
without the user’s knowledge and describes various types of malicious code, including viruses,
worms and Trojan horses.
G.14 network mask
Specifies which are the subnetwork and host parts of an IP address. Also known as a subnet
mask, netmask or address mask, the network mask is used to specify which parts of the dotted
quad of an IP address identify the subnetwork the host is on and which parts identify the host
itself. Network masks are usually represented in either dotted quad notation (for example,
255.255.255.0) or CIDR notation (for example, 192.0.2.0/24).
G.15 NT LAN Manager
A Microsoft IIS web server integrated authentication method.
(Also known as Windows NT Challenge/Response authentication; recently updated and renamed
Integrated Windows Authentication) NTLM is a Microsoft IIS (Internet Information Services)
integrated authentication method. NTLM is used by such Microsoft applications as Active Directory
and Sharepoint.
Note that NTLM has the following restriction: NTLM can get past a firewall, but is generally stopped
by proxies because NTLM is connection-based, and proxies do not necessarily keep connections
established. Applications such as Sharepoint inside an enterprise that require Integrated Windows
Authentication (which includes NTLM authentication and Kerberos v5 authentication) should add
the local IP address of servers hosting these applications to the browser’s proxy exemption list.
G.16 phishing
Acquisition of identity/passwords by false bank emails and websites. (Also known as carding and
spoofing) Attempting to fraudulently acquire sensitive information, such as passwords and credit
card details, by masquerading as a trustworthy person or business in an apparently official
electronic communication, such as an email or an instant message. The term phishing arises
from the use of increasingly sophisticated lures to "fish" for users’ financial information and
passwords. Sophos email and URL filtering products are configured by default to detect phishing
schemes.
G.17 policy
The Web Appliance’s URL filtering rules.
Sophos Web Appliance | Glossary | 233