Symantec 10521146 Administration Guide - Page 347
FTP File Transfer, group, monitoring
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 347 highlights
Glossary 347 FTP (File Transfer Protocol) gateway gating gigabit Ethernet interface granularity greyware group group, monitoring hack hack tool hacker hardware setup heuristic high availability hijacking host The simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers email, FTP is an application protocol that uses the Internet's TCP/IP protocols. A network point that acts as an entrance to another network. In a company network, a proxy server acts as a gateway between the internal network and the Internet. A gateway can also be any computer or service that passes packets from one network to another network during their trip across the Internet. See blocking. NIC interfaces on the Network Security or network devices capable of up to 1000Mb/s, half or full-duplex, of ethernet traffic. The relative fineness or coarseness by which a mechanism can be adjusted. Programs that do not contain viruses and that are not obviously malicious, but which can be annoying or even harmful to the user. For example, hack tools, accessware, spyware, adware, dialers, and joke programs. A category of user accounts in Symantec Network Security that contains specific, predefined permissions and rights. See also user account. A subset of a cluster. A program in which a significant portion of the code was originally another program. A tool that is used by a hacker to gain unauthorized access to a computer. One type of hack tool is a keystroke logger, which is a program that tracks and records individual keystrokes and can send this information back to the hacker. A term used by some to mean a clever programmer and by others, especially journalists or their editors, to mean someone who tries to break into computer systems. A set of hardware parameters, such as modem type, port/device, and data rate, that is used as a singular named resource in launching a host or remote session. A technology that uses experience-based knowledge rather than virus definitions to identify new threats by examining files for suspicious behavior. See watchdog process. The control of a connection taken by the attacker after the user authentication has been established. 1. In a network environment, a computer that provides data and services to other computers. Services might include peripheral devices, such as printers, data storage, email, or World Wide Web access. 2. In a remote control environment, a computer to which remote users connect to access or exchange data.