Key concepts

Network adapter

The network adapter (or network card) allows communication between devices connected to each other and also allows resources to be shared between two or more computers. It has a unique identifier.

Signature file

This is the file that allows the antivirus to detect threats.

Quarantine

Quarantine is the place where suspicious or non-disinfectable items are stored, as well as spyware and hacking tools detected.

IP address

Number that identifies an interface in a network device (usually a computer) that uses the IP protocol.

MAC address

Hexadecimal, 48-bit unique identifier of a network card or interface. It is individual: each device has its own MAC address.

Rule files

Some of the firewall configuration rules are established by and are updated periodically.

Firewall

This is a barrier that can protect information in a system or network when there is a connection to another network, for example, the Internet.

Blacklist

This is a list of computers to which the protection will not be distributed. If a computer in the blacklist already has the protection installed, it will not be updated or leverage Collective Intelligence.

Trusted network

Generally, home or office networks. Your computer will be visible to others on the network and vice versa. You will be able to share resources, files and directories with others on the network.

Public network

This is the type of network you will find in Internet cafes, airports, etc. Visibility of computers will be restricted on such networks, and there are restrictions on sharing files, resources and directories.

Protocols

System used for interconnection of computers. One of the most commonly used is TCP-IP.

Port

Point through which a computer is accessed and information is exchanged (inbound/outbound) between the computer and external sources (via TCP/IP).

Virus

Viruses are programs that can enter computers or IT systems in a number of ways, causing effects that range from simply annoying to highly-destructive and irreparable.