Symantec 10521146 Administration Guide - Page 347

FTP File Transfer, group, monitoring

Page 347 highlights

Glossary 347 FTP (File Transfer Protocol) gateway gating gigabit Ethernet interface granularity greyware group group, monitoring hack hack tool hacker hardware setup heuristic high availability hijacking host The simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers email, FTP is an application protocol that uses the Internet's TCP/IP protocols. A network point that acts as an entrance to another network. In a company network, a proxy server acts as a gateway between the internal network and the Internet. A gateway can also be any computer or service that passes packets from one network to another network during their trip across the Internet. See blocking. NIC interfaces on the Network Security or network devices capable of up to 1000Mb/s, half or full-duplex, of ethernet traffic. The relative fineness or coarseness by which a mechanism can be adjusted. Programs that do not contain viruses and that are not obviously malicious, but which can be annoying or even harmful to the user. For example, hack tools, accessware, spyware, adware, dialers, and joke programs. A category of user accounts in Symantec Network Security that contains specific, predefined permissions and rights. See also user account. A subset of a cluster. A program in which a significant portion of the code was originally another program. A tool that is used by a hacker to gain unauthorized access to a computer. One type of hack tool is a keystroke logger, which is a program that tracks and records individual keystrokes and can send this information back to the hacker. A term used by some to mean a clever programmer and by others, especially journalists or their editors, to mean someone who tries to break into computer systems. A set of hardware parameters, such as modem type, port/device, and data rate, that is used as a singular named resource in launching a host or remote session. A technology that uses experience-based knowledge rather than virus definitions to identify new threats by examining files for suspicious behavior. See watchdog process. The control of a connection taken by the attacker after the user authentication has been established. 1. In a network environment, a computer that provides data and services to other computers. Services might include peripheral devices, such as printers, data storage, email, or World Wide Web access. 2. In a remote control environment, a computer to which remote users connect to access or exchange data.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

347
Glossary
FTP (File Transfer
Protocol)
The simplest way to exchange files between computers on the Internet. Like the Hypertext
Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the
Simple Mail Transfer Protocol (SMTP), which transfers email, FTP is an application
protocol that uses the Internet’s TCP/IP protocols.
gateway
A network point that acts as an entrance to another network. In a company network, a
proxy server acts as a gateway between the internal network and the Internet. A gateway
can also be any computer or service that passes packets from one network to another
network during their trip across the Internet.
gating
See
blocking
.
gigabit Ethernet
interface
NIC interfaces on the Network Security or network devices capable of up to 1000Mb/s, half
or full-duplex, of ethernet traffic.
granularity
The relative fineness or coarseness by which a mechanism can be adjusted.
greyware
Programs that do not contain viruses and that are not obviously malicious, but which can
be annoying or even harmful to the user. For example, hack tools, accessware, spyware,
adware, dialers, and joke programs.
group
A category of user accounts in Symantec Network Security that contains specific,
predefined permissions and rights. See also
user account
.
group, monitoring
A subset of a cluster.
hack
A program in which a significant portion of the code was originally another program.
hack tool
A tool that is used by a hacker to gain unauthorized access to a computer. One type of hack
tool is a keystroke logger, which is a program that tracks and records individual keystrokes
and can send this information back to the hacker.
hacker
A term used by some to mean a clever programmer and by others, especially journalists or
their editors, to mean someone who tries to break into computer systems.
hardware setup
A set of hardware parameters, such as modem type, port/device, and data rate, that is used
as a singular named resource in launching a host or remote session.
heuristic
A technology that uses experience-based knowledge rather than virus definitions to
identify new threats by examining files for suspicious behavior.
high availability
See
watchdog process
.
hijacking
The control of a connection taken by the attacker after the user authentication has been
established.
host
1. In a network environment, a computer that provides data and services to other
computers. Services might include peripheral devices, such as printers, data storage,
email, or World Wide Web access. 2. In a remote control environment, a computer to which
remote users connect to access or exchange data.