McAfee MIS08EMB3RUA User Guide - Page 236

include: Young Child, Child, Younger Teenager, Older Teenager, and Adult.

Page 236 highlights

234 McAfee Internet Security bandwidth The amount of data that can be transmitted in a fixed amount of time. blacklist In anti-phishing, a list of Web sites that are considered fraudulent. browser A program used to view Web pages on the Internet. Popular Web browsers include Microsoft Internet Explorer and Mozilla Firefox. brute-force attack A method of decoding encrypted data, such as passwords, through exhaustive effort (brute force) rather than intellectual strategy. Brute force is considered an infallible, although time-consuming, attack method. Brute-force attacking is also called brute-force cracking. buffer overflow A condition that occurs when suspicious programs or processes try to store more data in a buffer (temporary storage area) on your computer than it can hold. Buffer overflows corrupt or overwrite data in adjacent buffers. C cache A temporary storage area on your computer. For example, to increase Web browsing speed and efficiency, your browser can retrieve a Web page from its cache (rather than from a remote server) the next time you want to view it. cipher text Encrypted text. Cipher text is unreadable until it has been converted into plain text (that is, decrypted). client An application that runs on a personal computer or workstation and relies on a server to perform some operations. For example, an e-mail client is an application that lets you send and receive e-mail. compression A process by which files are compressed into a form that minimizes the space required to store or transmit it. content-rating group In Parental Controls, an age group to which a user belongs. Content is made available or blocked based on the content rating group to which a user belongs. Content rating groups include: Young Child, Child, Younger Teenager, Older Teenager, and Adult.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267

234
McAfee Internet Security
bandwidth
The amount of data that can be transmitted in a fixed amount of time.
blacklist
In anti-phishing, a list of Web sites that are considered fraudulent.
browser
A program used to view Web pages on the Internet. Popular Web browsers include
Microsoft Internet Explorer and Mozilla Firefox.
brute-force attack
A method of decoding encrypted data, such as passwords, through exhaustive effort (brute
force) rather than intellectual strategy. Brute force is considered an infallible, although
time-consuming, attack method. Brute-force attacking is also called brute-force cracking.
buffer overflow
A condition that occurs when suspicious programs or processes try to store more data in a
buffer (temporary storage area) on your computer than it can hold. Buffer overflows
corrupt or overwrite data in adjacent buffers.
C
cache
A temporary storage area on your computer. For example, to increase Web browsing speed
and efficiency, your browser can retrieve a Web page from its cache (rather than from a
remote server) the next time you want to view it.
cipher text
Encrypted text. Cipher text is unreadable until it has been converted into plain text (that is,
decrypted).
client
An application that runs on a personal computer or workstation and relies on a server to
perform some operations. For example, an e-mail client is an application that lets you send
and receive e-mail.
compression
A process by which files are compressed into a form that minimizes the space required to
store or transmit it.
content-rating group
In Parental Controls, an age group to which a user belongs. Content is made available or
blocked based on the content rating group to which a user belongs. Content rating groups
include: Young Child, Child, Younger Teenager, Older Teenager, and Adult.