178
McAfee VirusScan Plus
proxy server
A firewall component that manages Internet traffic to and from a local area network (LAN).
A proxy server can improve performance by supplying frequently requested data, such as a
popular web page, and can filter and discard requests that the owner does not consider
appropriate, such as requests for unauthorized access to proprietary files.
publish
The process of making a backed-up file available publicly, on the Internet. You can access
published files by searching the Backup and Restore library.
Q
quarantine
Enforced isolation of a file or folder suspected of containing a virus, spam, suspicious
content, or potentially unwanted programs (PUPs), so that the files or folders cannot be
opened or executed.
R
RADIUS
Remote Access Dial-In User Service. A protocol that allows user authentication, usually in
the context of remote access. Originally defined for use with dial-in remote access servers,
it is now used in a variety of authentication environments, including 802.1x authentication
of a WLAN user’s shared secret. See also A string or key (usually a password) that has been
shared between two communicating parties prior to initiating communication. It is used to
protect sensitive portions of RADIUS messages. See also
RADIUS
(page 178). .
real-time scanning
The process of scanning files and folders for viruses and other activity when they are
accessed by you or your computer.
Recycle Bin
A simulated garbage can for deleted files and folders in Windows.
registry
A database used by Windows to store its configuration information for each computer user,
system hardware, installed programs, and property settings. The database is broken down
into keys, for which values are set. Unwanted programs can change the value of registry
keys or create new ones, to execute malicious code.
roaming
Moving from one access point (AP) coverage area to another without interruption in service
or loss in connectivity.
rogue access point
An unauthorized access point. Rogue access points can be installed on a secure company
network to grant network access to unauthorized parties. They can also be created to allow
an attacker to conduct a man-in-the-middle attack.
Summary of Contents for VirusScan Plus
Page 1: ...User Guide ...
Page 2: ......
Page 6: ......
Page 28: ......
Page 30: ......
Page 42: ......
Page 46: ......
Page 70: ......
Page 74: ...72 McAfee VirusScan Plus 5 Click OK Note The Allow Outgoing Only Access is the default option ...
Page 82: ......
Page 122: ......
Page 124: ......
Page 130: ......
Page 138: ......
Page 150: ......
Page 154: ......
Page 171: ...Chapter 34 Introduction 169 ...
Page 186: ......