McAfee VSF09EMB1RAA - VirusScan Plus 2009 User Manual page 180

Antivirus, firewall & antispyware
Table of Contents

Advertisement

178
McAfee VirusScan Plus
proxy server
A firewall component that manages Internet traffic to and from a local area network (LAN).
A proxy server can improve performance by supplying frequently requested data, such as a
popular web page, and can filter and discard requests that the owner does not consider
appropriate, such as requests for unauthorized access to proprietary files.
publish
The process of making a backed-up file available publicly, on the Internet. You can access
published files by searching the Backup and Restore library.
Q
quarantine
Enforced isolation of a file or folder suspected of containing a virus, spam, suspicious
content, or potentially unwanted programs (PUPs), so that the files or folders cannot be
opened or executed.
R
RADIUS
Remote Access Dial-In User Service. A protocol that allows user authentication, usually in
the context of remote access. Originally defined for use with dial-in remote access servers,
it is now used in a variety of authentication environments, including 802.1x authentication
of a WLAN user's shared secret. See also A string or key (usually a password) that has been
shared between two communicating parties prior to initiating communication. It is used to
protect sensitive portions of RADIUS messages. See also
(page 178). .
RADIUS
real-time scanning
The process of scanning files and folders for viruses and other activity when they are
accessed by you or your computer.
Recycle Bin
A simulated garbage can for deleted files and folders in Windows.
registry
A database used by Windows to store its configuration information for each computer user,
system hardware, installed programs, and property settings. The database is broken down
into keys, for which values are set. Unwanted programs can change the value of registry
keys or create new ones, to execute malicious code.
roaming
Moving from one access point (AP) coverage area to another without interruption in service
or loss in connectivity.
rogue access point
An unauthorized access point. Rogue access points can be installed on a secure company
network to grant network access to unauthorized parties. They can also be created to allow
an attacker to conduct a man-in-the-middle attack.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Virusscan plus

Table of Contents