This glossary describes special terms as used in this document or the online help.
Term
|
Explanation
|
?
|
Character that can be used as a wildcard when specifying directories to be scanned
or
excluded from scanning.
|
access (verb)
|
To read data from or write data to a storage device, such as a computer or server.
|
access (noun)
|
Authorization to read or write data. Most operating systems allow you to define different
levels of access, depending on job responsibilities.
|
action
|
The operation to be performed when a virus or other malware has been detected.
Actions typically include clean, quarantine, delete, or pass (deliver/transfer anyway).
Delivering/transferring anyway is not recommended—delivering a virus-infected message
or
transferring a virus-infected file can compromise your network.
|
activate
|
To enable your software after completion of the registration process. Trend Micro
products
will be installed as an evaluation version.Activate during installation or after
installation (in the management console) in the Product License screen.
|
Activation Code
|
A 37-character code, including hyphens, that is used to activate Trend Micro products.
Here is an example of an Activation Code: 9U-HG53-857B-TD54-MMP8-7754-MPP0
Also see Registration Key.
|
ActiveAction
|
A set of preconfigured actions (such as clean, delete, or quarantine) to be performed
on
files that have been affected by a security risk, such as a virus, Trojan, spyware/grayware,
or joke program.
|
ActiveUpdate
|
ActiveUpdate is a function common to many Trend Micro products. Connected to the Trend
Micro update Web site, ActiveUpdate provides up-to-date downloads of virus pattern
files,
scan engines, and program files via the Internet or the Trend Micro Total Solution
CD.
|
administrator account
|
A user name and password that has administrator-level privileges.
|
alert
|
A message intended to inform a system's users or administrators about a change in
the
operating conditions of that system or about some kind of error condition.
|
Big 5
|
A character encoding method used in Taiwan and Hong Kong for encoding traditional
Chinese characters. Refer to the following Web site for more information: http://en.wikipedia.org/wiki/Big5 |
clean
|
To remove virus code from a file or message.
|
CMconfig
|
A ServerProtect utility that you can run from the command line to register ServerProtect
to Trend Micro Control Manager, to unregister it, or to re-register it.
|
daemon
|
A program that is not invoked explicitly, but lies dormant waiting for some condition(s)
to occur. The perpetrator of the condition need not be aware that a daemon is lurking.
|
damage routine
|
The destructive portion of virus code, also called the payload.
|
digital signature
|
Extra data appended to a message which identifies and authenticates the sender and
message
data using a technique called public-key encryption.
|
ELF
|
Executable and Linkable Format—An executable file format for Unix and Linux platforms.
|
End User License Agreement (EULA)
|
An End User License Agreement or EULA is a legal contract between a software publisher
and
the software user. It typically outlines restrictions on the side of the user, who
can
refuse to enter into the agreement by not clicking "I accept" during installation.
Clicking
"I do not accept" will, of course, end the installation of the software product.
Many users inadvertently agree to the installation of spyware and adware into their
computers when they click "I accept" on EULA prompts displayed during the installation
of
certain free software.
|
EUC-KR
|
A method of 8-bit character encoding used for the Korean language. See the following
Web
site for more information:
http://en.wikipedia.org/wiki/EUC-KR
|
EXE file infector
|
An executable program will a .exe file extension.
|
exploit
|
An exploit is code that allows a malicious hacker to take advantage of a software
vulnerability or security hole.
|
failover
|
The process of automatically switching to a redundant server, system, or network in
case
your currently active component fails. Failover systems are employed when a critical
service, such as ActiveUpdate, is needed on a continuous basis.
|
file-infecting virus
|
File-infecting viruses infect executable programs (generally, files that have extensions
of .com or .exe). Most such viruses simply try to replicate and spread by infecting
other
host programs, but some inadvertently destroy the program they infect by overwriting
a
portion of the original code. A minority of these viruses are very destructive and
attempt
to format the hard drive at a pre-determined time or perform some other malicious
action.
In many cases, a file-infecting virus can be successfully removed from the infected
file.
However, if the virus has overwritten part of the program's code, the original file
will be
unrecoverable
|
FTP
|
A client-server protocol which allows a user on one computer to transfer files to
and from
another computer over a TCP/IP network. Also refers to the client program the user
executes
to transfer files.
|
GB 2312
|
A method of character encoding used for Simplified Chinese characters in mainland
China
and Singapore. See the following Web site for more information:
http://en.wikipedia.org/wiki/Guobiao_code
|
grayware
|
A category of software that may be legitimate, unwanted, or malicious. Unlike threats
such
as viruses, worms, and Trojans, grayware does not infect, replicate, or destroy data,
but it
may violate your privacy. Examples of grayware include spyware, adware, and remote
access
tools.
|
header (networking definition)
|
Part of a data packet that contains transparent information about the file or the
transmission.
|
HTML virus
|
A virus targeted at HTML (Hyper Text Markup Language), the authoring language used
to
create information in a Web page. The virus resides in a Web page and downloads via
a user’s
browser.
|
HTTPS
|
Hypertext Transfer Protocol Secure—A variant of HTTP used for handling secure
transactions.
|
host
|
A computer connected to a network.
|
incoming files
|
Files being placed on your server.
|
IntelliScan
|
IntelliScan is a Trend Micro scanning technology that optimizes performance by examining
file headers using true file type recognition, and scanning only file types known
to
potentially harbor malicious code. True file type recognition helps identify malicious
code
that can be disguised by a harmless extension name.
|
“in the wild”
|
Describes known viruses that are actively circulating.
|
intranet
|
Any network which provides similar services within an organization to those provided
by
the Internet outside it, but which is not necessarily connected to the Internet.
|
IP
|
Internet Protocol—See IP address.
|
IP address
|
Internet address for a device on a network, typically expressed using dot notation
such as
123.123.123.123.
|
ISO-2002-JP
|
A widely-used character encoding method for the Japanese language See the following
Web
site for more information:
http://en.wikipedia.org/wiki/ISO_2022
|
ISO-8859-1
|
A character encoding language that uses a single 8-bit code to represent an alphabetic
character. ISO-8859-1 supports many European languages. See the following Web site
for more
information:
http://en.wikipedia.org/wiki/Iso-8859-1
|
Java Runtime Environment (JRE)
|
A Java Virtual Machine, set of class libraries, and other components needed to run
applets
and applications written in the Java programming language. The JRE also includes a
Java
plug-in and Java Web Start, which enables you to launch Java-based applications without
complicated installation procedures. Refer to the following Web site for more information:
http://java.sun.com
|
joke program
|
An executable program that is annoying or causes users undue alarm. Unlike viruses,
joke
programs do not self-propagate and should be removed from your system.
|
Konquerer Desktop Environment (KDE)
|
The KDE is a easy-to-use desktop environment for Unix platforms, that offers an integrated
help system, a consistent look and feel for applications, standardized menus and toolbars,
internationalization, and useful applications. KDE version 3.2 or above is required
for use
of the Quick Access console menus in ServerProtect. For more information about KDE,
refer to
the following Web site: http://www.kde.org/
|
Kernel Hook Module (KHM)
|
A linking mechanism between ServerProtect and your version of the LInux operating
system.
|
Latin-1
|
One of 6 preferred character sets available with ServerProtect. Also see ISO-8859-1.
|
license certificate
|
A document that proves you are an authorized user of a Trend Micro product.
|
listening port
|
A port utilized for client connection requests for data exchange.
|
load balancing
|
Load balancing is the mapping (or re-mapping) of work to processors, with the intent
of
improving the efficiency of a concurrent computation.
|
log storage directory
|
Directory on your server that stores log files.
|
macro
|
A command used to automate certain functions within an application.
|
MacroTrap
|
A Trend Micro utility that performs a rule-based examination of all macro code that
is
saved in association with a document. Macro virus code is typically contained in part
of the
invisible template that travels with many documents (.dot, for example, in Microsoft
Word
documents). MacroTrap checks the template for signs of a macro virus by seeking out
key
instructions that perform virus-like activity—instructions such as copying parts of
the
template to other templates (replication), or instructions to execute potentially
harmful
commands (destruction).
|
macro virus
|
Macro viruses are often encoded as an application macro and included in a document.
Unlike
other virus types, macro viruses are not specific to an operating system and can spread
via
email attachments, Web downloads, file transfers, and cooperative applications.
|
malware (malicious software)
|
Programming or files that are developed for the purpose of doing harm, such as viruses,
worms, and Trojans.
|
management console
|
The user interface for your Trend Micro product.
|
mass mailer (also known as a Worm)
|
A malicious program that has high damage potential, because it causes large amounts
of
network traffic.
|
mixed threat attack
|
Complex attacks that take advantage of multiple entry points and vulnerabilities in
enterprise networks, such as the “Nimda” or “Code Red” threats.
|
multi-partite virus
|
A virus that has characteristics of both boot sector viruses and file-infecting
viruses.
|
network virus
|
A type of virus that uses network protocols, such as TCP, FTP, UDP, HTTP, and email
protocols to replicate. Network viruses often do not alter system files or modify
the boot
sectors of hard disks. Instead, they infect the memory of client machines, forcing
them to
flood the network with traffic, which can cause slowdowns or even complete network
failure.
|
outgoing files
|
Files being copied or moved from your server to another location.
|
pattern file (also known as Official Pattern Release)
|
The pattern file, as referred to as the Official Pattern Release (OPR), is the latest
compilation of patterns for identified viruses. It is guaranteed to have passed a
series of
critical tests to ensure that you get optimum protection from the latest virus threats.
This
pattern file is most effective when used with the latest scan engine.
|
polymorphic virus
|
A virus that is capable of taking different forms.
|
quarantine
|
To place infected data such as infected HTTP downloads or infected FTP files in an
isolated directory (the Quarantine Directory) on your server.
|
Quick Access console
|
Menus and ServerProtect command-line equivalents installed in the KDE.
|
Red Hat
|
An open source operating system produced by Red Hat, Inc. For more information, see
the
following Web site:
http://www.redhat.com/
|
Registration Key
|
A 22-character code, including hyphens, that is used to register in the Trend Micro
customer database.
|
RemoteInstall
|
A ServerProtect utility that can be used to install ServerProtect on remote machines,
to
update the KHM on remote machines, to convert .CSV result files into RemoteInstall.conf
format, and to update ServerProtect configuration on remote machines.
|
RemoteInstall.conf
|
The config file for the RemoteInstall utility
|
replicate
|
To self-reproduce. As used in this documentation, the term refers to viruses or worms
that
can self-reproduce.
|
Samba
|
Samba is an open source suite of software that provides file and print services which
allow a host running on a non-Windows platform to interact with a Windows client or
server
as if it were a Windows file and print server. For more information, see the following
URL:
http://us5.samba.org/samba/
|
sector
|
A physical portion of a disk.
|
Secure Sockets Layer (SSL)
|
A protocol designed by Netscape for providing data security layered between application
protocols (such as HTTP, Telnet, or FTP) and TCP/IP. This security protocol provides
data
encryption, server authentication, message integrity, and optional client authentication
for
a TCP/IP connection.
|
shared drive
|
A computer peripheral device that is used by more than one person, thus increasing
the
risk of exposure to viruses.
|
signature
|
See virus signature.
|
Simplified Chinese
|
One of 6 preferred character sets available with ServerProtect. Also see GB 2312.
|
SNMP
|
Simple Network Management Protocol—A protocol that supports monitoring of devices
attached
to a network for conditions that merit administrative attention.
|
SNMP trap
|
A trap is a programming mechanism that handles errors or other problems in a computer
program. An SNMP trap handles errors related to network device monitoring.
See SNMP.
|
squid
|
An open source proxy server and Web cache.
|
SUSE
|
An open source operating system produced by Novell, Inc. For more information, see
the
following Web site:
http://www.novell.com/
|
TCP
|
Transmission Control Protocol—TCP is a networking protocol, most commonly used in
combination with IP (Internet Protocol), to govern connection of computer systems
to the
Internet.
|
Telnet
|
The Internet standard protocol for remote logon that runs on top of TCP/IP (Transmission
Control Protocol/Internet Protocol). This term can also refer to networking software
that
acts as a terminal emulator for a remote logon session.
|
Total Solution CD
|
A CD containing the latest product versions and all the patches that have been applied
during the previous quarter. The Total Solution CD is available to all Trend Micro
Premium
Support customers.
|
Traditional Chinese
|
One of 6 preferred character sets available with ServerProtect. Also see Big 5.
|
trigger
|
An event that causes an action to take place. For example, your Trend Micro product
detects a virus in an email message. This may trigger the message to be placed in
quarantine, and a notification to be sent to the system administrator, message sender,
and
message recipient.
|
Trojan Horse
|
A malicious program that is disguised as something benign. A Trojan is an executable
program that does not replicate, but instead, resides on a system to perform malicious
acts,
such as opening a port for an intruder.
|
true file type
|
Used by IntelliScan, a virus scanning technology, to identify the type of information
in a
file by examining the file headers, regardless of the file name extension (which could
be
misleading).
|
US-ASCII
|
A character encoding method used in modern English and other Western European languages.
See the following Web site for more information:
http://en.wikipedia.org/wiki/US-ASCII
|
VBscript virus
|
VBscript (Microsoft Visual Basic scripting language) is a simple programming language
that
allows Web developers to add interactive functionality to HTML pages displayed in
a browser.
For example, developers might use VBscript to add a “Click Here for More Information”
button
on a Web page.
A VBscript virus is a virus that is targeted at these scripts in the HTML code. This
enables the virus to reside in Web pages and download to a user’s desktop through
the user’s
browser.
Also see JavaScript virus.
|
virus signature
|
A virus signature is a unique string of bits that identifies a specific virus. Virus
signatures are stored in the Trend Micro virus pattern file. The Trend Micro scan
engine
compares code in files, such as the body of an email message, or the content of an
HTTP
download, to the signatures in the pattern file. If a match is found, the virus is
detected,
and is acted upon (for example, cleaned, deleted, or quarantined) according to your
security
policy.
|
wildcard
|
A term used in reference to specifying a directory path, where an asterisk (*) represents
any characters. For example, to specify any directory 2 levels down from /opt, you
could
type /opt/*/*. The term originates from card games, in which a specific card, identified
as
a "wildcard," can be used for any number or suit in the card deck.
|
worm
|
A self-contained program (or set of programs) that is able to spread functional copies
of
itself or its segments to other computer systems.
|
"Zip of Death"
|
A zip (or archive) file of a type that when decompressed, expands enormously (for
example
1000%) or a zip file with thousands of attachments. Compressed files must be decompressed
during scanning. Huge files can slow or stop your network.
|