242
McAfee Total Protection
encryption
A method of encoding information so that unauthorized parties cannot access it. When the
data is encoded, the process uses a “key” and mathematical algorithms. Encrypted
information cannot be decrypted without the proper key. Viruses sometimes use
encryption in an attempt to escape detection.
ESS
Extended service set. Two or more networks that form a single subnetwork.
event
In a computer system or program, an incident or occurrence that can be detected by
security software, according to predefined criteria. Typically an event triggers an action,
such as sending a notification or adding an entry to an event log.
external hard drive
A hard drive that is stored outside of the computer.
F
file fragments
Remnants of a file scattered throughout a disk. File fragmentation occurs as files are added
or deleted, and can slow your computer’s performance.
firewall
A system (hardware, software, or both) designed to prevent unauthorized access to or from
a private network. Firewalls are frequently used to prevent unauthorized Internet users
from accessing private networks connected to the Internet, especially an intranet. All
messages entering or leaving the intranet pass through the firewall, which examines each
message and blocks those that do not meet the specified security criteria.
H
home network
Two or more computers that are connected in a home so that they can share files and
Internet access. See also
LAN
(page 243).
hotspot
A geographic boundary covered by a Wi-Fi (802.11) access point (AP). Users who enter a
hotspot with a wireless laptop can connect to the Internet, provided that the hotspot is
“beaconing” (advertising its presence) and authentication is not required. Hotspots are
often located in heavily populated areas such as airports.
I
integrated gateway
A device that combines the functions of an access point (AP), router, and firewall. Some
devices also include security enhancements and bridging features.
intranet
A private computer network, usually inside an organization, that can be accessed only by
authorized users.
Содержание MTP09EMB1RAA - Total Protection 2009
Страница 1: ...User Guide...
Страница 2: ......
Страница 6: ......
Страница 28: ......
Страница 30: ......
Страница 42: ......
Страница 46: ......
Страница 70: ......
Страница 74: ...72 McAfee Total Protection 5 Click OK Note The Allow Outgoing Only Access is the default option...
Страница 82: ......
Страница 114: ...112 McAfee Total Protection Note To view the most up to date statistics click Refresh under Active Programs...
Страница 120: ......
Страница 128: ......
Страница 146: ......
Страница 162: ......
Страница 190: ......
Страница 192: ......
Страница 198: ......
Страница 206: ......
Страница 218: ......
Страница 222: ......
Страница 239: ...Chapter 49 McAfee Total Protection 237...
Страница 254: ......