Key concepts

Network adapter

The network adapter allows communication between devices connected to each other and also allows resources to be shared between two or more computers. It has a unique identifier.

Adware

Program that automatically runs, displays or downloads advertising to the computer.

Agent

This is the agent responsible for communication between the administered computers and the servers, as well as managing local processes.

Genetic heuristic scan

The genetic heuristic scan analyzes suspect items on the basis of “digital genes”, represented by a few hundred characters in each file scanned. This determines the potential of the software to carry out malicious or damaging action when run on a computer, and whether it is a virus, spyware, a Trojan, a worm, etc.

Antivirus

Program designed to detect and eliminate viruses and other threats.

Signature file

This is the file that allows the antivirus to detect threats.

Broadcast domain

This is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.

Client Web console

The Web console lets you configure, distribute and manage the protection across all the computers on your network. You can also see the security status of your network and generate and print the reports you want.

Quarantine

Quarantine is the place where suspicious or non-disinfectable items are stored, as well as spyware and hacking tools detected.

Dialer

Program that redirects users that connect to the Internet using a modem to a premium-rate number. Premium-rate numbers are telephone numbers for which prices higher than normal are charged.

IP address

Number that identifies an interface in a network device (usually a computer) that uses the IP protocol.

MAC address

Hexadecimal, 48-bit unique identifier of a network card or interface. It is individual; each device has its own MAC address.

Firewall

This is a barrier that can protect information in a system or network when there is a connection to another network, for example, the Internet.

Peer to Peer (P2P) network

Network without fixed client or servers, but a series of nodes that work simultaneously as clients and servers for the other nodes on the network. This is a legal way of sharing files, similar to sending them via email or instant messaging, just more efficient.

In the case of , the P2P feature reduces use of bandwidth for the Internet connection, as computers that have already updated a file from the Internet then share the update with other connected computers. This prevents saturating Internet connections.

Proxy feature

This feature allows to operate on computers without Internet access, accessing the Web through an agent installed on a computer on the same subnet.

Group

In , this is a set of computers to which the same protection configuration profile is applied. includes an initial group or -Default group- to which the administrator can add all the computers to protect. New groups can also be created.

Distribution tool

Once downloaded from the Internet and installed on the administrator's PC, the distribution tool lets you remotely install and uninstall the protection on selected network computers.

Hacking tools

Programs that can be used by a hacker to carry out actions that cause problems for the user of the affected computer (allowing the hacker to control the computer, steal confidential information, scan communication ports, etc.).

Hoaxes

These are spoof messages, normally emails, warning of viruses/threats which do not really exist.

Administration agent identifier

A unique number or GUID (Globally Unique IDentifier) which identifies each administration agent of .

Joke

These are not viruses, but tricks that aim to make users believe they have been infected by a virus.

Blacklist

This is a list of computers to which the protection will not be distributed. If a computer in the blacklist already has the protection installed, it will not be updated. Groups of expired computers and computers whose maximum number of installations allowed has been exceeded are also blacklisted. Other blacklists are made up of URLs to which access is denied through the Web access control settings.

Malware

This term is used to refer to all programs that contain malicious code (MALicious softWARE), whether it is a virus, Trojan, worm or any other threat to the security of IT systems. Malware tries to infiltrate or damage computers, often without users knowing, for a variety of reasons.

Node

In computer networks, each computer on the network is a node, and if talking about the Internet, each server also represents a node.

The cloud

Cloud computing is a technology that allows services to be offered across the Internet. The cloud is a term used metaphorically around the Internet.

Name of the protection distributed and installed by on the computers on the network.

Profile

A profile is a specific protection configuration. Profiles are assigned to a group or groups and then applied to all computers that make up the group.

Phishing

A technique for obtaining confidential information fraudulently. The information targeted includes passwords, credit cards and bank account details.

Local process

Local processes are responsible for performing the tasks necessary to implement and manage the protection on computers.

Protocol

System used for interconnection of computers. One of the most commonly-used is TCP-IP.

Proxy server

A proxy server acts as an intermediary between an internal network (an intranet, for example) and an external connection to the Internet. This allows a connection for receiving files from Web servers to be shared.

Port

Point through which a computer is accessed and information is exchanged (inbound/outbound) between the computer and external sources (via TCP/IP).

Rootkit

A program designed to hide objects such as processes, files or Windows registry entries (often including its own). This type of software is not malicious in itself, but is used by hackers to cover their tracks in previously compromised systems. There are types of malware that use rootkits to hide their presence on the system.

Exchange Server

Mail server developed by Microsoft. Exchange Servers store inbound and/or outbound emails and distribute them to users' email inboxes. To connect to the server and download their email, users must have an email client installed on their computers.

SMTP server

Server that uses SMTP -simple mail transfer protocol- to exchange email messages between computers.

Spyware

A program that is automatically installed with another (usually without the user’s permission and even without the user realizing), and which collects personal data.

Network topology

The communication structure of nodes on a network.

Trojans

Programs that reach computers disguised as harmless programs that install themselves on computers and carry out actions that compromise user confidentiality.

Public network

This is the type of network you will find in cybercafes, airports, etc. Visibility of computers will be restricted on such networks, and there are restrictions on sharing files, resources and directories.

Trusted network

In this case we are generally talking about office or domestic networks. Your computer will be perfectly visible to the other computers on the network. There are no limitations on sharing files, resources or directories.

Environment variable

This is a string of environment information, such as a drive, path or file name that is associated with a symbolic name that Windows can use. You use System in Control Panel or the 'set' command at the command prompt to define environment variables.

Virus

Viruses are programs that can enter computers or IT systems in a number of ways, causing effects that range from simply annoying to highly-destructive and irreparable.