Proxy Automatic Configuration (PAC) is a way to automatically set the appropriate proxy for a
given URL request. This is done by developing a JavaScript file with a
.pac
extension that is
used by users’ browsers and which evaluates their URL requests and forwards each request to
the appropriate proxy. This approach has the advantage of being completely within the control of
network administrators and of operating transparently from the perspective of end users. Explaining
how to create, implement and maintain PAC files is beyond the scope of this documentation. For
details on the development and use of PAC files, you can start with Mozilla.org’s
Automatic Discovery of Firewall and Web Proxy Clients
page.
G.21 SophosLabs
A 24/7 network of skilled analysts who respond to evolving security threats. The SophosLabs
organization is a global network of highly skilled analysts who have been protecting businesses
from known and emerging threats for more than 20 years. Focused on rapidly evolving threats
like viruses, spam, phishing schemes, spyware and other malware, SophosLabs provides both
proactive and rapid solutions for all Sophos customers. Our global network of threat analysis
centers ensures Sophos is able to respond to new threats without compromise, achieving the
highest levels of customer satisfaction and protection in the industry.
G.22 spyware
Software that covertly gathers information on users’ internet activities. Spyware gathers user
information through the user’s internet connection without his or her knowledge, usually for
advertising purposes. Spyware applications are typically bundled as a hidden component of
freeware or shareware programs that can be downloaded from the internet. Once installed, the
spyware monitors user activity on the internet, and transmits that information in the background
to someone else.
G.23 Trojan
A seemingly legitimate computer program designed to do damage. A seemingly legitimate computer
program that has been intentionally designed to disrupt and damage computer activity. Trojans
are sometimes used in conjunction with viruses. A backdoor Trojan is a program that allows other
computer users to gain access to your computer across the internet.
G.24 virus
Often viruses will disrupt computer systems or damage the data they contain. A virus requires a
host program and will not infect a computer until it has been run. Some viruses spread across
networks by making copies of themselves or may forward themselves via email. The term 'virus’
is often used generically to refer to both viruses and worms.
236 | Glossary | Sophos Web Appliance