McAfee MIS09EMB3RAA User Guide - Page 247

Point-to-Point Protocol Over Ethernet. A method of using the Point-to-Point Protocol PPP

Page 247 highlights

Glossary 245 plain text Text that is not encrypted. See also encryption (page 241). plugin, plug-in A small software program that adds features to or enhances a larger piece of software. For example, plug-ins permit a web browser to access and execute files embedded in HTML documents that are in formats the browser normally would not recognize, such as animation, video, and audio files. POP3 Post Office Protocol 3. An interface between an email client program and the email server. Most home users have a POP3 email account, also known as standard email account. popups Small windows that appear on top of other windows on your computer screen. Pop-up windows are often used in web browsers to display advertisements. port A hardware location for passing data in and out of a computing device. Personal computers have various types of ports, including internal ports for connecting disk drives, monitors, and keyboards, as well as external ports for connecting modems, printers, mice, and other peripherals. potentially unwanted program (PUP) A software program that might be unwanted, despite the possibility that users consented to download it. It can alter the security or the privacy settings of the computer on which it is installed. PUPs can - but does not necessarily - include spyware, adware, and dialers, and might be downloaded with a program that the user wants. PPPoE Point-to-Point Protocol Over Ethernet. A method of using the Point-to-Point Protocol (PPP) dial-up protocol with Ethernet as the transport. protocol A set of rules enabling computers or devices to exchange data. In a layered network architecture (Open Systems Interconnection model), each layer has its own protocols that specify how communication takes place at that level. Your computer or device must support the correct protocol to communicate with other computers. See also Open Systems Interconnection (OSI). proxy A computer (or the software that runs on it) that acts as a barrier between a network and the Internet by presenting only a single network address to external sites. By representing all internal computers, the proxy protects network identities while still providing access to the Internet. See also proxy server (page 245).

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

Glossary
245
plain text
Text that is not encrypted. See also
encryption
(page 241).
plugin, plug-in
A small software program that adds features to or enhances a larger piece of software. For
example, plug-ins permit a web browser to access and execute files embedded in HTML
documents that are in formats the browser normally would not recognize, such as
animation, video, and audio files.
POP3
Post Office Protocol 3. An interface between an email client program and the email server.
Most home users have a POP3 email account, also known as standard email account.
popups
Small windows that appear on top of other windows on your computer screen. Pop-up
windows are often used in web browsers to display advertisements.
port
A hardware location for passing data in and out of a computing device. Personal computers
have various types of ports, including internal ports for connecting disk drives, monitors,
and keyboards, as well as external ports for connecting modems, printers, mice, and other
peripherals.
potentially unwanted program (PUP)
A software program that might be unwanted, despite the possibility that users consented to
download it. It can alter the security or the privacy settings of the computer on which it is
installed. PUPs can — but does not necessarily — include spyware, adware, and dialers,
and might be downloaded with a program that the user wants.
PPPoE
Point-to-Point Protocol Over Ethernet. A method of using the Point-to-Point Protocol (PPP)
dial-up protocol with Ethernet as the transport.
protocol
A set of rules enabling computers or devices to exchange data. In a layered network
architecture (Open Systems Interconnection model), each layer has its own protocols that
specify how communication takes place at that level. Your computer or device must
support the correct protocol to communicate with other computers. See also Open Systems
Interconnection (OSI).
proxy
A computer (or the software that runs on it) that acts as a barrier between a network and
the Internet by presenting only a single network address to external sites. By representing
all internal computers, the proxy protects network identities while still providing access to
the Internet. See also
proxy server
(page 245).