McAfee VSF09EMB1RAA User Guide - Page 178

network, network drive, network map, on-demand scanning, password, password vault, PCI wireless

Page 178 highlights

176 McAfee VirusScan Plus N network A collection of IP-based systems (such as routers, switches, servers, and firewalls) that are grouped as a logical unit. For example, a "Finance Network" might include all of the servers, routers, and systems that service a finance department. See also home network (page 174). network drive A disk or tape drive that is connected to a server on a network that is shared by multiple users. Network drives are sometimes called "remote drives". network map A graphical representation of the computers and components that make up a home network. NIC Network Interface Card. A card that plugs into a laptop or other device and connects the device to the LAN. node A single computer connected to a network. O on-demand scanning A scheduled examination of selected files, applications, or network devices to find a threat, vulnerability, or other potentially unwanted code. It can take place immediately, at a scheduled time in the future, or at regularly-scheduled intervals. Compare to on-access scanning. See also vulnerability. P password A code (usually consisting of letters and numbers) you use to gain access to your computer, a program, or a website. password vault A secure storage area for your personal passwords. It allows you to store your passwords with confidence that no other user (even an administrator) can access them. PCI wireless adapter card Peripheral Component Interconnect. A wireless adapter card that plugs into a PCI expansion slot inside the computer. phishing A method of fraudulently obtaining personal information, such as passwords, social security numbers, and credit card details, by sending spoofed emails that look like they come from trusted sources, such as banks or legitimate companies. Typically, phishing emails request that recipients click the link in the email to verify or update contact details or credit card information.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

176
McAfee VirusScan Plus
N
network
A collection of IP-based systems (such as routers, switches, servers, and firewalls) that are
grouped as a logical unit. For example, a “Finance Network” might include all of the
servers, routers, and systems that service a finance department. See also
home network
(page 174).
network drive
A disk or tape drive that is connected to a server on a network that is shared by multiple
users. Network drives are sometimes called “remote drives”.
network map
A graphical representation of the computers and components that make up a home
network.
NIC
Network Interface Card. A card that plugs into a laptop or other device and connects the
device to the LAN.
node
A single computer connected to a network.
O
on-demand scanning
A scheduled examination of selected files, applications, or network devices to find a threat,
vulnerability, or other potentially unwanted code. It can take place immediately, at a
scheduled time in the future, or at regularly-scheduled intervals. Compare to on-access
scanning. See also vulnerability.
P
password
A code (usually consisting of letters and numbers) you use to gain access to your computer,
a program, or a website.
password vault
A secure storage area for your personal passwords. It allows you to store your passwords
with confidence that no other user (even an administrator) can access them.
PCI wireless adapter card
Peripheral Component Interconnect. A wireless adapter card that plugs into a PCI
expansion slot inside the computer.
phishing
A method of fraudulently obtaining personal information, such as passwords, social
security numbers, and credit card details, by sending spoofed emails that look like they
come from trusted sources, such as banks or legitimate companies. Typically, phishing
emails request that recipients click the link in the email to verify or update contact details
or credit card information.