F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 308

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

308
Authorization
The right to perform an action on an object. Also the act of proving
this right.
Backdoor
A malicious application or plug-in that opens up a possibility for a
remote user to access the compromised computer. This is very often
an application that opens up one or more listening ports and waits for
connections from the outside, but there are variations of this. Many
Viruses, Trojans and Worms install backdoors as part of their attack.
Bit
The smallest unit of memory size, sets of which make up bytes,
arranged in a sequential pattern to express text, numbers, or other
detailed information, recognizable by the computer's processing
system.
Broadcast traffic
Broadcast traffic comes from one specific computer and is sent to a
whole network or subnetwork. Usually done by using the
broadcasting mechanisms of the LAN (e.g. Ethernet), and not
forwarded between networks.
Browser hijacking
An application which attempts to take control of your web start page,
or other web sites you are likely to visit, is known as browser hijacker.
Browser hijacker tries to force you to visit a web site to inflate the
traffic for higher advertising revenues.
Byte
A set of bits that represent a single character. There are 8 bits in a
byte.
Certificate
See Public Key.
Client
A program that is used to contact and obtain data from a Server
program on another computer.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents