McAfee MIS09EMB3RAA User Guide - Page 250

standard e-mail account, synchronize, system restore point, SystemGuard, temporary file, Trojan,

Page 250 highlights

248 McAfee Internet Security SSL Secure Sockets Layer. A protocol developed by Netscape for transmitting private documents on the Internet. SSL works by using a public key to encrypt data that is transferred over the SSL connection. URLs that require an SSL connection start with HTTPS instead of HTTP. standard e-mail account See POP3 (page 245). synchronize Resolving inconsistencies between backed up files and those stored on your local computer. You synchronize files when the version of the file in the online backup repository is newer than the version of the file on the other computers. system restore point A snapshot (image) of the contents of the computer's memory or a database. Windows creates restore points periodically and at the time of significant system events, such as when a program or driver is installed. You can also create and name your own restore points at any time. SystemGuard McAfee alerts that detect unauthorized changes to your computer and notify you when they occur. T temporary file A file, created in memory or on disk by the operating system or some other program, to be used during a session and then discarded. TKIP Temporal Key Integrity Protocol (pronounced tee-kip). Part of the 802.11i encryption standard for wireless LANs. TKIP is the next generation of WEP, which is used to secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and a re-keying mechanism, thus fixing the flaws of WEP. Trojan, Trojan horse A program that does not replicate, but causes damage or compromises the security of the computer. Typically, an individual emails a Trojan horse to you; it does not email itself. You can also unknowingly download the Trojan horse from a website or via peer-to-peer networking. trusted list A list of items that you trust and are not being detected. If you trust an item by mistake (for example, a potentially unwanted program or a registry change), or if you want the item to be detected again, you must remove it from this list.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

248
McAfee Internet Security
SSL
Secure Sockets Layer. A protocol developed by Netscape for transmitting private
documents on the Internet. SSL works by using a public key to encrypt data that is
transferred over the SSL connection. URLs that require an SSL connection start with HTTPS
instead of HTTP.
standard e-mail account
See
POP3
(page 245).
synchronize
Resolving inconsistencies between backed up files and those stored on your local
computer. You synchronize files when the version of the file in the online backup
repository is newer than the version of the file on the other computers.
system restore point
A snapshot (image) of the contents of the computer’s memory or a database. Windows
creates restore points periodically and at the time of significant system events, such as
when a program or driver is installed. You can also create and name your own restore
points at any time.
SystemGuard
McAfee alerts that detect unauthorized changes to your computer and notify you when
they occur.
T
temporary file
A file, created in memory or on disk by the operating system or some other program, to be
used during a session and then discarded.
TKIP
Temporal Key Integrity Protocol (pronounced tee-kip). Part of the 802.11i encryption
standard for wireless LANs. TKIP is the next generation of WEP, which is used to secure
802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and
a re-keying mechanism, thus fixing the flaws of WEP.
Trojan, Trojan horse
A program that does not replicate, but causes damage or compromises the security of the
computer. Typically, an individual emails a Trojan horse to you; it does not email itself. You
can also unknowingly download the Trojan horse from a website or via peer-to-peer
networking.
trusted list
A list of items that you trust and are not being detected. If you trust an item by mistake (for
example, a potentially unwanted program or a registry change), or if you want the item to
be detected again, you must remove it from this list.