McAfee INTERNET SECURITY SUITE 2008 User Manual page 242

Hide thumbs Also See for INTERNET SECURITY SUITE 2008:
Table of Contents

Advertisement

240
McAfee Internet Security
plain text
Text that is not encrypted. See also encryption.
plug-in
A small software program that works with a larger program to provide added functionality.
For example, plug-ins permit a Web browser to access and execute files embedded in
HTML documents that are in formats the browser normally would not recognize (for
example, animation, video, and audio files).
pop-ups
Small windows that appear on top of other windows on your computer screens. Pop-up
windows are often used in Web browsers to display advertisements.
POP3
(Post Office Protocol 3) An interface between an e-mail client program and the e-mail
server. Most home users have a POP3 e-mail account, also known as standard e-mail
account.
port
A place where information goes into and/or out of a computer. For example, a
conventional analog modem is connected to a serial port.
potentially unwanted program (PUP)
A program that gathers and transmits personal information without your permission (for
example, spyware and adware).
PPPoE
(Point-to-Point Protocol Over Ethernet) A method of using the Point-to-Point Protocol
(PPP) dial-up protocol with Ethernet as the transport.
protocol
A format (hardware or software) for transmitting data between two devices. Your computer
or device must support the correct protocol if you want to communicate with other
computers.
proxy
A computer (or the software that runs on it) that acts as a barrier between a network and
the Internet by presenting only a single network address to external sites. By representing
all internal computers, the proxy protects network identities while still providing access to
the Internet. See also proxy server.
proxy server
A firewall component that manages Internet traffic to and from a local area network (LAN).
A proxy server can improve performance by supplying frequently requested data, such as a
popular Web page, and can filter and discard requests that the owner does not consider
appropriate, such as requests for unauthorized access to proprietary files.

Advertisement

Table of Contents
loading

Table of Contents