McAfee MIS09EMB3RAA User Guide - Page 248

proxy server, publish, quarantine, RADIUS, real-time scanning, Recycle Bin, registry, roaming, rogue

Page 248 highlights

246 McAfee Internet Security proxy server A firewall component that manages Internet traffic to and from a local area network (LAN). A proxy server can improve performance by supplying frequently requested data, such as a popular web page, and can filter and discard requests that the owner does not consider appropriate, such as requests for unauthorized access to proprietary files. publish The process of making a backed-up file available publicly, on the Internet. You can access published files by searching the Backup and Restore library. Q quarantine Enforced isolation of a file or folder suspected of containing a virus, spam, suspicious content, or potentially unwanted programs (PUPs), so that the files or folders cannot be opened or executed. R RADIUS Remote Access Dial-In User Service. A protocol that allows user authentication, usually in the context of remote access. Originally defined for use with dial-in remote access servers, it is now used in a variety of authentication environments, including 802.1x authentication of a WLAN user's shared secret. See also A string or key (usually a password) that has been shared between two communicating parties prior to initiating communication. It is used to protect sensitive portions of RADIUS messages. See also RADIUS (page 246). . real-time scanning The process of scanning files and folders for viruses and other activity when they are accessed by you or your computer. Recycle Bin A simulated garbage can for deleted files and folders in Windows. registry A database used by Windows to store its configuration information for each computer user, system hardware, installed programs, and property settings. The database is broken down into keys, for which values are set. Unwanted programs can change the value of registry keys or create new ones, to execute malicious code. roaming Moving from one access point (AP) coverage area to another without interruption in service or loss in connectivity. rogue access point An unauthorized access point. Rogue access points can be installed on a secure company network to grant network access to unauthorized parties. They can also be created to allow an attacker to conduct a man-in-the-middle attack.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

246
McAfee Internet Security
proxy server
A firewall component that manages Internet traffic to and from a local area network (LAN).
A proxy server can improve performance by supplying frequently requested data, such as a
popular web page, and can filter and discard requests that the owner does not consider
appropriate, such as requests for unauthorized access to proprietary files.
publish
The process of making a backed-up file available publicly, on the Internet. You can access
published files by searching the Backup and Restore library.
Q
quarantine
Enforced isolation of a file or folder suspected of containing a virus, spam, suspicious
content, or potentially unwanted programs (PUPs), so that the files or folders cannot be
opened or executed.
R
RADIUS
Remote Access Dial-In User Service. A protocol that allows user authentication, usually in
the context of remote access. Originally defined for use with dial-in remote access servers,
it is now used in a variety of authentication environments, including 802.1x authentication
of a WLAN user’s shared secret. See also A string or key (usually a password) that has been
shared between two communicating parties prior to initiating communication. It is used to
protect sensitive portions of RADIUS messages. See also
RADIUS
(page 246). .
real-time scanning
The process of scanning files and folders for viruses and other activity when they are
accessed by you or your computer.
Recycle Bin
A simulated garbage can for deleted files and folders in Windows.
registry
A database used by Windows to store its configuration information for each computer user,
system hardware, installed programs, and property settings. The database is broken down
into keys, for which values are set. Unwanted programs can change the value of registry
keys or create new ones, to execute malicious code.
roaming
Moving from one access point (AP) coverage area to another without interruption in service
or loss in connectivity.
rogue access point
An unauthorized access point. Rogue access points can be installed on a secure company
network to grant network access to unauthorized parties. They can also be created to allow
an attacker to conduct a man-in-the-middle attack.