This glossary describes special terms as used in this document or the online help.
Term
Explanation
?
Character that can be used as a wildcard when specifying directories to be scanned or excluded from scanning.
access (verb)
To read data from or write data to a storage device, such as a computer or server.
access (noun)
Authorization to read or write data. Most operating systems allow you to define different levels of access, depending on job responsibilities.
action
The operation to be performed when a virus or other malware has been detected.
Actions typically include clean, quarantine, delete, or pass (deliver/transfer anyway). Delivering/transferring anyway is not recommended—delivering a virus-infected message or transferring a virus-infected file can compromise your network.
activate
To enable your software after completion of the registration process. Trend Micro products will be installed as an evaluation version.Activate during installation or after installation (in the management console) in the Product License screen.
Activation Code
A 37-character code, including hyphens, that is used to activate Trend Micro products. Here is an example of an Activation Code: 9U-HG53-857B-TD54-MMP8-7754-MPP0
Also see Registration Key.
ActiveAction
A set of preconfigured actions (such as clean, delete, or quarantine) to be performed on files that have been affected by a security risk, such as a virus, Trojan, spyware/grayware, or joke program.
ActiveUpdate
ActiveUpdate is a function common to many Trend Micro products. Connected to the Trend Micro update Web site, ActiveUpdate provides up-to-date downloads of virus pattern files, scan engines, and program files via the Internet or the Trend Micro Total Solution CD.
administrator account
A user name and password that has administrator-level privileges.
alert
A message intended to inform a system's users or administrators about a change in the operating conditions of that system or about some kind of error condition.
Big 5
A character encoding method used in Taiwan and Hong Kong for encoding traditional Chinese characters. Refer to the following Web site for more information:
http://en.wikipedia.org/wiki/Big5
clean
To remove virus code from a file or message.
CMconfig
A ServerProtect utility that you can run from the command line to register ServerProtect to Trend Micro Control Manager, to unregister it, or to re-register it.
daemon
A program that is not invoked explicitly, but lies dormant waiting for some condition(s) to occur. The perpetrator of the condition need not be aware that a daemon is lurking.
damage routine
The destructive portion of virus code, also called the payload.
digital signature
Extra data appended to a message which identifies and authenticates the sender and message data using a technique called public-key encryption.
ELF
Executable and Linkable Format—An executable file format for Unix and Linux platforms.
End User License Agreement (EULA)
An End User License Agreement or EULA is a legal contract between a software publisher and the software user. It typically outlines restrictions on the side of the user, who can refuse to enter into the agreement by not clicking "I accept" during installation. Clicking "I do not accept" will, of course, end the installation of the software product.
Many users inadvertently agree to the installation of spyware and adware into their computers when they click "I accept" on EULA prompts displayed during the installation of certain free software.
EUC-KR
A method of 8-bit character encoding used for the Korean language. See the following Web site for more information:
http://en.wikipedia.org/wiki/EUC-KR
EXE file infector
An executable program will a .exe file extension.
exploit
An exploit is code that allows a malicious hacker to take advantage of a software vulnerability or security hole.
failover
The process of automatically switching to a redundant server, system, or network in case your currently active component fails. Failover systems are employed when a critical service, such as ActiveUpdate, is needed on a continuous basis.
file-infecting virus
File-infecting viruses infect executable programs (generally, files that have extensions of .com or .exe). Most such viruses simply try to replicate and spread by infecting other host programs, but some inadvertently destroy the program they infect by overwriting a portion of the original code. A minority of these viruses are very destructive and attempt to format the hard drive at a pre-determined time or perform some other malicious action.
In many cases, a file-infecting virus can be successfully removed from the infected file. However, if the virus has overwritten part of the program's code, the original file will be unrecoverable
FTP
A client-server protocol which allows a user on one computer to transfer files to and from another computer over a TCP/IP network. Also refers to the client program the user executes to transfer files.
GB 2312
A method of character encoding used for Simplified Chinese characters in mainland China and Singapore. See the following Web site for more information:
http://en.wikipedia.org/wiki/Guobiao_code
grayware
A category of software that may be legitimate, unwanted, or malicious. Unlike threats such as viruses, worms, and Trojans, grayware does not infect, replicate, or destroy data, but it may violate your privacy. Examples of grayware include spyware, adware, and remote access tools.
header (networking definition)
Part of a data packet that contains transparent information about the file or the transmission.
HTML virus
A virus targeted at HTML (Hyper Text Markup Language), the authoring language used to create information in a Web page. The virus resides in a Web page and downloads via a user’s browser.
HTTPS
Hypertext Transfer Protocol Secure—A variant of HTTP used for handling secure transactions.
host
A computer connected to a network.
incoming files
Files being placed on your server.
IntelliScan
IntelliScan is a Trend Micro scanning technology that optimizes performance by examining file headers using true file type recognition, and scanning only file types known to potentially harbor malicious code. True file type recognition helps identify malicious code that can be disguised by a harmless extension name.
“in the wild”
Describes known viruses that are actively circulating.
intranet
Any network which provides similar services within an organization to those provided by the Internet outside it, but which is not necessarily connected to the Internet.
IP
Internet Protocol—See IP address.
IP address
Internet address for a device on a network, typically expressed using dot notation such as 123.123.123.123.
ISO-2002-JP
A widely-used character encoding method for the Japanese language See the following Web site for more information:
http://en.wikipedia.org/wiki/ISO_2022
ISO-8859-1
A character encoding language that uses a single 8-bit code to represent an alphabetic character. ISO-8859-1 supports many European languages. See the following Web site for more information:
http://en.wikipedia.org/wiki/Iso-8859-1
Java Runtime Environment (JRE)
A Java Virtual Machine, set of class libraries, and other components needed to run applets and applications written in the Java programming language. The JRE also includes a Java plug-in and Java Web Start, which enables you to launch Java-based applications without complicated installation procedures. Refer to the following Web site for more information: http://java.sun.com
joke program
An executable program that is annoying or causes users undue alarm. Unlike viruses, joke programs do not self-propagate and should be removed from your system.
Konquerer Desktop Environment (KDE)
The KDE is a easy-to-use desktop environment for Unix platforms, that offers an integrated help system, a consistent look and feel for applications, standardized menus and toolbars, internationalization, and useful applications. KDE version 3.2 or above is required for use of the Quick Access console menus in ServerProtect. For more information about KDE, refer to the following Web site: http://www.kde.org/
Kernel Hook Module (KHM)
A linking mechanism between ServerProtect and your version of the LInux operating system.
Latin-1
One of 6 preferred character sets available with ServerProtect. Also see ISO-8859-1.
license certificate
A document that proves you are an authorized user of a Trend Micro product.
listening port
A port utilized for client connection requests for data exchange.
load balancing
Load balancing is the mapping (or re-mapping) of work to processors, with the intent of improving the efficiency of a concurrent computation.
log storage directory
Directory on your server that stores log files.
macro
A command used to automate certain functions within an application.
MacroTrap
A Trend Micro utility that performs a rule-based examination of all macro code that is saved in association with a document. Macro virus code is typically contained in part of the invisible template that travels with many documents (.dot, for example, in Microsoft Word documents). MacroTrap checks the template for signs of a macro virus by seeking out key instructions that perform virus-like activity—instructions such as copying parts of the template to other templates (replication), or instructions to execute potentially harmful commands (destruction).
macro virus
Macro viruses are often encoded as an application macro and included in a document. Unlike other virus types, macro viruses are not specific to an operating system and can spread via email attachments, Web downloads, file transfers, and cooperative applications.
malware (malicious software)
Programming or files that are developed for the purpose of doing harm, such as viruses, worms, and Trojans.
management console
The user interface for your Trend Micro product.
mass mailer (also known as a Worm)
A malicious program that has high damage potential, because it causes large amounts of network traffic.
mixed threat attack
Complex attacks that take advantage of multiple entry points and vulnerabilities in enterprise networks, such as the “Nimda” or “Code Red” threats.
multi-partite virus
A virus that has characteristics of both boot sector viruses and file-infecting viruses.
network virus
A type of virus that uses network protocols, such as TCP, FTP, UDP, HTTP, and email protocols to replicate. Network viruses often do not alter system files or modify the boot sectors of hard disks. Instead, they infect the memory of client machines, forcing them to flood the network with traffic, which can cause slowdowns or even complete network failure.
outgoing files
Files being copied or moved from your server to another location.
pattern file (also known as Official Pattern Release)
The pattern file, as referred to as the Official Pattern Release (OPR), is the latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that you get optimum protection from the latest virus threats. This pattern file is most effective when used with the latest scan engine.
polymorphic virus
A virus that is capable of taking different forms.
quarantine
To place infected data such as infected HTTP downloads or infected FTP files in an isolated directory (the Quarantine Directory) on your server.
Quick Access console
Menus and ServerProtect command-line equivalents installed in the KDE.
Red Hat
An open source operating system produced by Red Hat, Inc. For more information, see the following Web site:
http://www.redhat.com/
Registration Key
A 22-character code, including hyphens, that is used to register in the Trend Micro customer database.
RemoteInstall
A ServerProtect utility that can be used to install ServerProtect on remote machines, to update the KHM on remote machines, to convert .CSV result files into RemoteInstall.conf format, and to update ServerProtect configuration on remote machines.
RemoteInstall.conf
The config file for the RemoteInstall utility
replicate
To self-reproduce. As used in this documentation, the term refers to viruses or worms that can self-reproduce.
Samba
Samba is an open source suite of software that provides file and print services which allow a host running on a non-Windows platform to interact with a Windows client or server as if it were a Windows file and print server. For more information, see the following URL:
http://us5.samba.org/samba/
sector
A physical portion of a disk.
Secure Sockets Layer (SSL)
A protocol designed by Netscape for providing data security layered between application protocols (such as HTTP, Telnet, or FTP) and TCP/IP. This security protocol provides data encryption, server authentication, message integrity, and optional client authentication for a TCP/IP connection.
shared drive
A computer peripheral device that is used by more than one person, thus increasing the risk of exposure to viruses.
signature
See virus signature.
Simplified Chinese
One of 6 preferred character sets available with ServerProtect. Also see GB 2312.
SNMP
Simple Network Management Protocol—A protocol that supports monitoring of devices attached to a network for conditions that merit administrative attention.
SNMP trap
A trap is a programming mechanism that handles errors or other problems in a computer program. An SNMP trap handles errors related to network device monitoring.
See SNMP.
squid
An open source proxy server and Web cache.
SUSE
An open source operating system produced by Novell, Inc. For more information, see the following Web site:
http://www.novell.com/
TCP
Transmission Control Protocol—TCP is a networking protocol, most commonly used in combination with IP (Internet Protocol), to govern connection of computer systems to the Internet.
Telnet
The Internet standard protocol for remote logon that runs on top of TCP/IP (Transmission Control Protocol/Internet Protocol). This term can also refer to networking software that acts as a terminal emulator for a remote logon session.
Total Solution CD
A CD containing the latest product versions and all the patches that have been applied during the previous quarter. The Total Solution CD is available to all Trend Micro Premium Support customers.
Traditional Chinese
One of 6 preferred character sets available with ServerProtect. Also see Big 5.
trigger
An event that causes an action to take place. For example, your Trend Micro product detects a virus in an email message. This may trigger the message to be placed in quarantine, and a notification to be sent to the system administrator, message sender, and message recipient.
Trojan Horse
A malicious program that is disguised as something benign. A Trojan is an executable program that does not replicate, but instead, resides on a system to perform malicious acts, such as opening a port for an intruder.
true file type
Used by IntelliScan, a virus scanning technology, to identify the type of information in a file by examining the file headers, regardless of the file name extension (which could be misleading).
US-ASCII
A character encoding method used in modern English and other Western European languages. See the following Web site for more information:
http://en.wikipedia.org/wiki/US-ASCII
VBscript virus
VBscript (Microsoft Visual Basic scripting language) is a simple programming language that allows Web developers to add interactive functionality to HTML pages displayed in a browser. For example, developers might use VBscript to add a “Click Here for More Information” button on a Web page.
A VBscript virus is a virus that is targeted at these scripts in the HTML code. This enables the virus to reside in Web pages and download to a user’s desktop through the user’s browser.
Also see JavaScript virus.
virus signature
A virus signature is a unique string of bits that identifies a specific virus. Virus signatures are stored in the Trend Micro virus pattern file. The Trend Micro scan engine compares code in files, such as the body of an email message, or the content of an HTTP download, to the signatures in the pattern file. If a match is found, the virus is detected, and is acted upon (for example, cleaned, deleted, or quarantined) according to your security policy.
wildcard
A term used in reference to specifying a directory path, where an asterisk (*) represents any characters. For example, to specify any directory 2 levels down from /opt, you could type /opt/*/*. The term originates from card games, in which a specific card, identified as a "wildcard," can be used for any number or suit in the card deck.
worm
A self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems.
"Zip of Death"
A zip (or archive) file of a type that when decompressed, expands enormously (for example 1000%) or a zip file with thousands of attachments. Compressed files must be decompressed during scanning. Huge files can slow or stop your network.