Symantec 10099585 User Guide - Page 77

Glossary

Page 77 highlights

Glossary access privileges ActiveSync ActiveX alert alias AppleTalk attack signature beam The types of operations that a user can perform on a system resource. For example, a user can have the ability to access a certain directory and open, modify, or delete its contents. The synchronization software for Microsoft Windowsbased Pocket PCs. A method of embedding interactive programs into Web pages. The programs, which are called controls, run when you view the page. A message that appears to signal that an error has occurred or that there is a task that requires immediate attention, such as a system crash or a Virus Alert. A shortcut icon that points to an original object such as a file, folder, or disk. A protocol that is used by some network devices such as printers and servers to communicate. A data pattern that is characteristic of an Internet attack. Intrusion Detection uses attack signatures to distinguish attacks from legitimate traffic. To transfer certain programs and data between two handheld devices using built-in infrared technology.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89

Glossary
access privileges
The types of operations that a user can perform on a
system resource. For example, a user can have the
ability to access a certain directory and open, modify,
or delete its contents.
ActiveSync
The synchronization software for Microsoft Windows-
based Pocket PCs.
ActiveX
A method of embedding interactive programs into
Web pages. The programs, which are called controls,
run when you view the page.
alert
A message that appears to signal that an error has
occurred or that there is a task that requires
immediate attention, such as a system crash or a
Virus Alert.
alias
A shortcut icon that points to an original object such
as a file, folder, or disk.
AppleTalk
A protocol that is used by some network devices such
as printers and servers to communicate.
attack signature
A data pattern that is characteristic of an Internet
attack. Intrusion Detection uses attack signatures to
distinguish attacks from legitimate traffic.
beam
To transfer certain programs and data between two
handheld devices using built-in infrared technology.