F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 311

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

Hidden file
Hidden files are not visible to users. It is possible that a rootkit is
hiding the file from the normal file listings.
Hidden process
Hidden processes are not visible to users. It is possible that a rootkit
is hiding the process from Windows Task Manager.
Host
Any computer on a network that is a repository for services available
to other computers on the network.
HTTP
The Hyper Text Transfer Protocol is the protocol used between a Web
browser and a server to request a document and transfer its contents.
The specification is maintained and developed by the World Wide
Web Consortium.
IPS (Intrusion Prevention System)
A component of Internet Shield that scans incoming network traffic for
certain patterns that indicate an ongoing network attack and can
block any intrustions.
IMAP
Internet Mail Application Protocol. Similar to POP, with the difference
that when using IMAP the e-mails are usually handled in the server,
instead of downloading them to the workstation.
IP
Internet Protocol. The address protocol for TCP packets. When
sending data by using TCP, IP is used to label the packet with sender
and recipient addresses.
IP Address
Internet Protocol Address. A unique network address consisting of 4
numeric strings separated by dots. This will change in IPv6.
CHAPTER D
311

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents