McAfee MIS09EMB3RAA User Guide - Page 246
network, network drive, network map, on-demand scanning, password, password vault, PCI wireless
UPC - 731944575278
View all McAfee MIS09EMB3RAA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 246 highlights
244 McAfee Internet Security N network A collection of IP-based systems (such as routers, switches, servers, and firewalls) that are grouped as a logical unit. For example, a "Finance Network" might include all of the servers, routers, and systems that service a finance department. See also home network (page 242). network drive A disk or tape drive that is connected to a server on a network that is shared by multiple users. Network drives are sometimes called "remote drives". network map A graphical representation of the computers and components that make up a home network. NIC Network Interface Card. A card that plugs into a laptop or other device and connects the device to the LAN. node A single computer connected to a network. O on-demand scanning A scheduled examination of selected files, applications, or network devices to find a threat, vulnerability, or other potentially unwanted code. It can take place immediately, at a scheduled time in the future, or at regularly-scheduled intervals. Compare to on-access scanning. See also vulnerability. P password A code (usually consisting of letters and numbers) you use to gain access to your computer, a program, or a website. password vault A secure storage area for your personal passwords. It allows you to store your passwords with confidence that no other user (even an administrator) can access them. PCI wireless adapter card Peripheral Component Interconnect. A wireless adapter card that plugs into a PCI expansion slot inside the computer. phishing A method of fraudulently obtaining personal information, such as passwords, social security numbers, and credit card details, by sending spoofed emails that look like they come from trusted sources, such as banks or legitimate companies. Typically, phishing emails request that recipients click the link in the email to verify or update contact details or credit card information.