McAfee VSF08EMB3RUA User Guide - Page 179

publish, quarantine, quick archive, RADIUS, real-time scanning, Recycle Bin, registry, restore,

Page 179 highlights

Glossary 177 publish To make a backed up file available publicly, on the Internet. You can access published files by searching the Data Backup library. Q quarantine To isolate. For example, in VirusScan, suspect files are detected and quarantined so that they cannot cause harm to your computer or files. quick archive To archive only those files that have changed since the last full or quick archive. See also full archive. R RADIUS (Remote Access Dial-In User Service) A protocol that allows user authentication, usually in the context of remote access. Originally defined for use with dial-in remote access servers, the RADIUS protocol is now used in a variety of authentication environments, including 802.1x authentication of a WLAN user's shared secret. real-time scanning To scan files and folders for viruses and other activity when they are accessed by you or your computer. Recycle Bin A simulated garbage can for deleted files and folders in Windows. registry A database in which Windows stores its configuration information. The registry contains profiles for each computer user and information about system hardware, installed programs, and property settings. Windows continually references this information during its operation. restore To retrieve a copy of a file from the online backup repository or an archive. roaming To move from one Access Point (AP) coverage area to another without interruption in service or loss in connectivity. rogue access point An unauthorized Access Point. Rogue access points can be installed on a secure company network to grant network access to unauthorized parties. They can also be created to allow an attacker to conduct a man-in-the-middle attack.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

Glossary
177
publish
To make a backed up file available publicly, on the Internet. You can access published files
by searching the Data Backup library.
Q
quarantine
To isolate. For example, in VirusScan, suspect files are detected and quarantined so that
they cannot cause harm to your computer or files.
quick archive
To archive only those files that have changed since the last full or quick archive. See also
full archive.
R
RADIUS
(Remote Access Dial-In User Service) A protocol that allows user authentication, usually in
the context of remote access. Originally defined for use with dial-in remote access servers,
the RADIUS protocol is now used in a variety of authentication environments, including
802.1x authentication of a WLAN user's shared secret.
real-time scanning
To scan files and folders for viruses and other activity when they are accessed by you or
your computer.
Recycle Bin
A simulated garbage can for deleted files and folders in Windows.
registry
A database in which Windows stores its configuration information. The registry contains
profiles for each computer user and information about system hardware, installed
programs, and property settings. Windows continually references this information during
its operation.
restore
To retrieve a copy of a file from the online backup repository or an archive.
roaming
To move from one Access Point (AP) coverage area to another without interruption in
service or loss in connectivity.
rogue access point
An unauthorized Access Point. Rogue access points can be installed on a secure company
network to grant network access to unauthorized parties. They can also be created to allow
an attacker to conduct a man-in-the-middle attack.