McAfee VSF09EMB1RAA - VirusScan Plus 2009 User Manual page 182

Antivirus, firewall & antispyware
Table of Contents

Advertisement

180
McAfee VirusScan Plus
SSL
Secure Sockets Layer. A protocol developed by Netscape for transmitting private
documents on the Internet. SSL works by using a public key to encrypt data that is
transferred over the SSL connection. URLs that require an SSL connection start with HTTPS
instead of HTTP.
standard e-mail account
See
(page 177).
POP3
synchronize
Resolving inconsistencies between backed up files and those stored on your local
computer. You synchronize files when the version of the file in the online backup
repository is newer than the version of the file on the other computers.
system restore point
A snapshot (image) of the contents of the computer's memory or a database. Windows
creates restore points periodically and at the time of significant system events, such as
when a program or driver is installed. You can also create and name your own restore
points at any time.
SystemGuard
McAfee alerts that detect unauthorized changes to your computer and notify you when
they occur.
T
temporary file
A file, created in memory or on disk by the operating system or some other program, to be
used during a session and then discarded.
TKIP
Temporal Key Integrity Protocol (pronounced tee-kip). Part of the 802.11i encryption
standard for wireless LANs. TKIP is the next generation of WEP, which is used to secure
802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and
a re-keying mechanism, thus fixing the flaws of WEP.
Trojan, Trojan horse
A program that does not replicate, but causes damage or compromises the security of the
computer. Typically, an individual emails a Trojan horse to you; it does not email itself. You
can also unknowingly download the Trojan horse from a website or via peer-to-peer
networking.
trusted list
A list of items that you trust and are not being detected. If you trust an item by mistake (for
example, a potentially unwanted program or a registry change), or if you want the item to
be detected again, you must remove it from this list.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Virusscan plus

Table of Contents