Term
|
Definition
|
---|---|
activate
|
To enable your software after completion of the registration
process. Trend Micro products will
not be operable until product activation is complete. Activate
during installation or after installation (in the management
console) on the Product License screen.
|
ActiveUpdate
|
ActiveUpdate is a function common to many Trend Micro products.
Connected to the Trend Micro update website, ActiveUpdate
provides up-to-date downloads of virus pattern files, scan
engines, and program files via the Internet or the Trend Micro
Total Solution CD.
|
address
|
Refers to a networking address (see IP address) or an email
address, which is the string of characters that specify the
source or destination of an email message.
|
administrator
|
Refers to the system administrator or the person in an
organization who is responsible for activities such as setting
up new hardware and software, allocating user names and
passwords, monitoring disk space and other IT resources,
performing backups, and managing network security.
|
administrator account
|
A user name and password that has administrator-level
privileges.
|
antivirus
|
Computer programs designed to detect and clean computer
viruses.
|
authentication
|
The verification of the identity of a person or a process.
Authentication ensures that digital data transmissions are
delivered to the intended receiver. Authentication also assures
the receiver of the integrity of the message and its source
(where or whom it came from). The simplest form of
authentication requires a user name and password to gain access
to a particular account. Authentication protocols can also be
based on secret-key encryption, such as the Data Encryption
Standard (DES) algorithm, or on public-key systems using digital
signatures. Also see public-key encryption and digital
signature.
|
client
|
A computer system or process that requests a service of another
computer system or process (a server) using some kind of
protocol and accepts the server's responses. A client is part of
a client-server software architecture.
|
configuration
|
Selecting options for how your Trend Micro product will function,
for example, selecting whether to quarantine or delete a
virus-infected email message.
|
default
|
A value that pre-populates a field in the management console
interface. A default value represents a logical choice and is
provided for convenience. Use default values as-is, or change
them.
|
(administrative) domain
|
A group of computers sharing a common database and security
policy.
|
domain name
|
The full name of a system, consisting of its local host name and
its domain name, for example, tellsitall.com. A domain name
should be sufficient to determine a unique Internet address for
any host on the Internet. This process, called "name
resolution", uses the Domain Name System (DNS).
|
download (noun)
|
Data that has been downloaded, for example, from a website via
HTTP.
|
download (verb)
|
To transfer data or code from one computer to another.
Downloading often refers to transfer from a larger host system
(especially a server or mainframe) to a smaller client
system.
|
FAQ
|
Frequently Asked Questions, a list of questions and answers about
a specific topic.
|
file
|
An element of data used for storage, such as an email message or
HTTP download.
|
file type
|
The kind of data stored in a file. Most operating systems use the
file name extension to determine the file type. The file type is
used to choose an appropriate icon to represent the file in a
user interface, and the correct application with which to view,
edit, run, or print the file.
|
spyware/grayware
|
A category of software that may be legitimate, unwanted, or
malicious. Unlike threats such as viruses, worms, and Trojans,
grayware does not infect, replicate, or destroy data, but it may
violate your privacy. Examples of grayware include spyware,
adware, and remote access tools.
|
gateway
|
A gateway is a program or a special-purpose device that transfers
IP datagrams from one network to another until the final
destination is reached.
|
GUI
|
Graphical User Interface, the use of pictures rather than just
words to represent the input and output of a program. This
contrasts with a command line interface where communication is
by exchange of strings of text.
|
hard disk (or hard drive)
|
One or more rigid magnetic disks rotating about a central axle
with associated read/write heads and electronics, used to read
and write hard disks or floppy disks, and to store data. Most
hard disks are permanently connected to the drive (fixed disks)
though there are also removable disks.
|
HTTP
|
Hypertext Transfer Protocol, the client-server TCP/IP protocol
used on the World Wide Web for the exchange of HTML documents.
It conventionally uses port 80.
|
HTTPS
|
Hypertext Transfer Protocol Secure, a variant of HTTP used for
handling secure transactions.
|
host
|
A computer connected to a network.
|
Internet
|
A client-server hypertext information retrieval system, based on
a series of networks connected with routers. The Internet is a
modern information system and a widely accepted medium for
advertising, online sales, and services, as well as university
and many other research networks. The World Wide Web is the most
familiar aspect of the Internet.
|
Internet Protocol (IP)
|
An Internet standard protocol that defines a basic unit of data
called a datagram. A datagram is used in a connectionless,
best-effort, delivery system. The Internet protocol defines how
information gets passed between systems across the Internet.
|
intranet
|
Any network which provides similar services within an
organization to those provided by the Internet outside it, but
which is not necessarily connected to the Internet.
|
IP
|
Internet Protocol, dee IPv4 address or IPv6 address.
|
IPv4 address
|
Internet address for a device on a network, typically expressed
using dot notation such as
123.123.123.123.
|
IPv6 address
|
Internet address for a device on a network, typically expressed
as
1234:1234:1234:1234:1234:1234:1234:1234.
|
IT
|
Information technology, to include hardware, software,
networking, telecommunications, and user support.
|
Java file
|
Java is a general-purpose programming language developed by Sun
Microsystems. A Java file contains Java code. Java supports
programming for the Internet in the form of platform-independent
Java applets. (An applet is a program written in Java
programming language that can be included in an HTML page. When
you use a Java-technology enabled browser to view a page that
contains an applet, the applet’s code is transferred to your
system and is executed by the browser’s Java Virtual
Machine.)
|
Java malicious code
|
Virus code written or embedded in Java. Also see Java file.
|
JavaScript virus
|
JavaScript is a simple programming language developed by Netscape
that allows web developers to add dynamic content to HTML pages
displayed in a browser using scripts. Javascript shares some
features of Sun Microsystems Java programming language, but was
developed independently.A JavaScript virus is a virus that is
targeted at these scripts in the HTML code. This enables the
virus to reside in web pages and download to a user’s desktop
through the user’s browser.Also see VBscript virus.
|
KB
|
Kilobyte, 1024 bytes of memory.
|
license
|
Authorization by law to use a Trend Micro product.
|
link (also called hyperlink)
|
A reference from some point in one hypertext document to some
point in another document or another place in the same document.
Links are usually distinguished by a different color or style of
text, such as underlined blue text. When you activate the link,
for example, by clicking on it with a mouse, the browser
displays the target of the link.
|
local area network (LAN)
|
Any network technology that interconnects resources within an
office environment, usually at high speeds, such as Ethernet. A
local area network is a short-distance network used to link a
group of computers together within a building. 10BaseT Ethernet
is the most commonly used form of LAN. A hardware device called
a hub serves as the common wiring point, enabling data to be
sent from one machine to another over the network. LANs are
typically limited to distances of less than 500 meters and
provide low-cost, high-bandwidth networking capabilities within
a small geographical area.
|
malware (malicious software)
|
Programming or files that are developed for the purpose of doing
harm, such as viruses, worms, and Trojans.
|
management console
|
The user interface for your Trend Micro product. Also known as
the product console.
|
Mbps
|
Millions of bits per second, a measure of bandwidth in data
communications.
|
MB
|
Megabyte, 1024 kilobytes of data.
|
mixed threat attack
|
Complex attacks that take advantage of multiple entry points and
vulnerabilities in enterprise networks, such as the “Nimda” or
“Code Red” threats.
|
Network Address Translation (NAT)
|
A standard for translating secure IP addresses to temporary,
external, registered IP address from the address pool. This
allows Trusted networks with privately assigned IP addresses to
have access to the Internet. This also means that you don’t have
to get a registered IP address for every machine in your
network.
|
network virus
|
A type of virus that uses network protocols, such as TCP, FTP,
UDP, HTTP, and email protocols to replicate. Network viruses
often do not alter system files or modify the boot sectors of
hard disks. Instead, they infect the memory of client machines,
forcing them to flood the network with traffic, which can cause
slowdowns or even complete network failure.
|
notification (Also see action and target)
|
A message that is forwarded to one or more of the following:
system administrator, sender of a message, recipient of a
message, file download, or file transfer. The purpose of the
notification is to communicate that a prohibited action has
taken place, or was attempted, such as a virus being detected in
an attempted HTTP file download.
|
operating system
|
The software which handles tasks such as the interface to
peripheral hardware, scheduling tasks, and allocating storage.
In this documentation, the term also refers to the software that
presents a window system and graphical user interface.
|
parameter
|
A variable, such as a range of values (a number from 1 to
10).
|
pattern file (also known as Official Pattern Release)
|
The pattern file, as referred to as the Official Pattern Release
(OPR), is the latest compilation of patterns for identified
viruses. It is guaranteed to have passed a series of critical
tests to ensure that you get optimum protection from the latest
virus threats. This pattern file is most effective when used
with the latest scan engine.
|
port
|
A logical channel or channel endpoint in a communications system,
used to distinguish between different logical channels on the
same network interface on the same computer. Each application
program has a unique port number associated with it.
|
proxy
|
A process providing a cache of items available on other servers
which are presumably slower or more expensive to access.
|
proxy server
|
A World Wide Web server which accepts URLs with a special prefix,
used to fetch documents from either a local cache or a remote
server, then returns the URL to the requester.
|
scan
|
To examine items in a file in sequence to find those that meet a
particular criteria.
|
scan engine
|
The module that performs antivirus scanning and detection in the
host product to which it is integrated.
|
sector
|
A physical portion of a disk. (Also see partition, which is a
logical portion of a disk.)
|
Secure Socket Layer (SSL)
|
Secure Socket Layer (SSL), is a protocol designed by Netscape for
providing data security layered between application protocols
(such as HTTP, Telnet, or FTP) and TCP/IP. This security
protocol provides data encryption, server authentication,
message integrity, and optional client authentication for a
TCP/IP connection.
|
server
|
A program which provides some service to other (client) programs.
The connection between client and server is normally by means of
message passing, often over a network, and uses some protocol to
encode the client's requests and the server's responses. The
server may run continuously (as a daemon), waiting for requests
to arrive, or it may be invoked by some higher-level daemon
which controls a number of specific servers.
|
shared drive
|
A computer peripheral device that is used by more than one
person, thus increasing the risk of exposure to viruses.
|
signature
|
See virus signature.
|
SNMP
|
Simple Network Management Protocol, a protocol that supports
monitoring of devices attached to a network for conditions that
merit administrative attention.
|
traffic
|
Data flowing between the Internet and your network, both incoming
and outgoing.
|
Transmission Control Protocol/Internet Protocol (TCP/IP)
|
A communications protocol which allows computers with different
operating systems to communicate with each other. Controls how
data is transferred between computers on the Internet.
|
trigger
|
An event that causes an action to take place. For example, your
Trend Micro product detects a virus in an email message. This
may trigger the message to be placed in quarantine, and a
notification to be sent to the system administrator, message
sender, and message recipient.
|
true-file type
|
Used by IntelliScan, a virus scanning technology, to identify the
type of information in a file by examining the file headers,
regardless of the file name extension (which could be
misleading).
|
URL
|
Universal Resource Locator, a standard way of specifying the
location of an object, typically a web page, on the Internet,
for example, www.trendmicro.com. The URL maps to an IP address
using DNS.
|
virtual IP address (VIP address)
|
A VIP address maps traffic received at one IP address to another
address based on the destination port number in the packet
header.
|
Virtual Local Area Network (VLAN)
|
A logical (rather than physical) grouping of devices that
constitute a single broadcast domain. VLAN members are not
identified by their location on a physical subnetwork but
through the use of tags in the frame headers of their
transmitted data. VLANs are described in the IEEE 802.1Q
standard.
|
Virtual Private Network (VPN)
|
A VPN is an easy, cost-effective and secure way for corporations
to provide telecommuters and mobile professionals local dial-up
access to their corporate network or to another Internet Service
Provider (ISP). Secure private connections over the Internet are
more cost-effective than dedicated private lines. VPNs are
possible because of technologies and standards such as tunneling
and encryption.
|
virtual router
|
A virtual router is the component of Screen OS that performs
routing functions.
|
virtual system
|
A virtual system is a subdivision of the main system that appears
to the user to be a stand-alone entity. Virtual systems reside
separately from each other in the same Trend Micro GateLock
remote appliance; each one can be managed by its own virtual
system administrator.
|
virus
|
A computer virus is a program – a piece of executable code – that
has the unique ability to infect. Like biological viruses,
computer viruses can spread quickly and are often difficult to
eradicate. In addition to replication, some computer viruses
share another commonality: a damage routine that delivers the
virus payload. While payloads may only display messages or
images, they can also destroy files, reformat your hard drive,
or cause other damage. Even if the virus does not contain a
damage routine, it can cause trouble by consuming storage space
and memory, and degrading the overall performance of your
computer.
|
Web
|
The World Wide Web, also called the web or the Internet.
|
Web server
|
A server process running at a website which sends out web pages
in response to HTTP requests from remote browsers.
|
workstation (also known as client)
|
A general-purpose computer designed to be used by one person at a
time and which offers higher performance than normally found in
a personal computer, especially with respect to graphics,
processing power and the ability to carry out several tasks at
the same time.
|