Symantec 10099585 User Guide - Page 77
Glossary
UPC - 037648232289
View all Symantec 10099585 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 77 highlights
Glossary access privileges ActiveSync ActiveX alert alias AppleTalk attack signature beam The types of operations that a user can perform on a system resource. For example, a user can have the ability to access a certain directory and open, modify, or delete its contents. The synchronization software for Microsoft Windowsbased Pocket PCs. A method of embedding interactive programs into Web pages. The programs, which are called controls, run when you view the page. A message that appears to signal that an error has occurred or that there is a task that requires immediate attention, such as a system crash or a Virus Alert. A shortcut icon that points to an original object such as a file, folder, or disk. A protocol that is used by some network devices such as printers and servers to communicate. A data pattern that is characteristic of an Internet attack. Intrusion Detection uses attack signatures to distinguish attacks from legitimate traffic. To transfer certain programs and data between two handheld devices using built-in infrared technology.