McAfee VSF09EMB1RAA User Guide - Page 182
standard e-mail account, synchronize, system restore point, SystemGuard, temporary file, Trojan,
UPC - 731944576664
View all McAfee VSF09EMB1RAA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 182 highlights
180 McAfee VirusScan Plus SSL Secure Sockets Layer. A protocol developed by Netscape for transmitting private documents on the Internet. SSL works by using a public key to encrypt data that is transferred over the SSL connection. URLs that require an SSL connection start with HTTPS instead of HTTP. standard e-mail account See POP3 (page 177). synchronize Resolving inconsistencies between backed up files and those stored on your local computer. You synchronize files when the version of the file in the online backup repository is newer than the version of the file on the other computers. system restore point A snapshot (image) of the contents of the computer's memory or a database. Windows creates restore points periodically and at the time of significant system events, such as when a program or driver is installed. You can also create and name your own restore points at any time. SystemGuard McAfee alerts that detect unauthorized changes to your computer and notify you when they occur. T temporary file A file, created in memory or on disk by the operating system or some other program, to be used during a session and then discarded. TKIP Temporal Key Integrity Protocol (pronounced tee-kip). Part of the 802.11i encryption standard for wireless LANs. TKIP is the next generation of WEP, which is used to secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and a re-keying mechanism, thus fixing the flaws of WEP. Trojan, Trojan horse A program that does not replicate, but causes damage or compromises the security of the computer. Typically, an individual emails a Trojan horse to you; it does not email itself. You can also unknowingly download the Trojan horse from a website or via peer-to-peer networking. trusted list A list of items that you trust and are not being detected. If you trust an item by mistake (for example, a potentially unwanted program or a registry change), or if you want the item to be detected again, you must remove it from this list.