upload
McAfee, Inc.
Sektör: Software
Number of terms: 9143
Number of blossaries: 1
Company Profile:
The state of a virus or worm when one of its propagation methods is to search the network for open shares.
Industry:Internet
Also known as time bomb, a program that allows a Trojan to lie dormant and then attack when the conditions are just right. Triggers for logic bombs include a change in a file, a particular series of keystrokes, or a specific time or date.
Industry:Internet
A small device with wireless capability, such as a pocket PC, personal digital assistant (PDA), or cell phone.
Industry:Internet
Runs an anti-virus scan from the command prompt.
Industry:Internet
A method of scanning that looks for virus-like behavior patterns or activities. Most leading anti-virus packages have a heuristic scanning method to detect new or not-yet-known viruses in the field.
Industry:Internet
The COM port, short for communications or serial port, is a location that sends and receives serial data transmissions. The ports are named COM1, COM2, and COM3.
Industry:Internet
This term represents an assumed or alternate name for a virus or Trojan. Some viruses are given multiple names because no central organization exists that is tasked with naming computer viruses.
Industry:Internet
The list of email addresses from which you do not want to receive messages because you believe they will be spam or unsolicited email.
Industry:Internet
Software designed to give an administrator remote control of a system. Remote administration tools can be a significant security threat when controlled by a party other than the legitimate owner or administrator.
Industry:Internet
A method of redirecting Internet traffic to a fake website through domain spoofing. This involves creating a fake DNS record for a real website, typically that of a bank or other commercial enterprise. The fake DNS redirects traffic from the real website to the fraudulent site, with the intention of gathering a customer’s personal data, including username, password, and account information. For example, when a user types the URL of a bank into a browser, the browser performs a DNS lookup to determine the IP address of the bank’s website. DNS servers store a list of domains and their corresponding IP addresses. Hackers insert false information on the DNS server so browsers looking up bank’s IP address are redirected to the fake IP address. On the user’s browser, the site appears legitimate.
Industry:Internet