The network adapter (or network card) allows communication between devices connected to each other and also allows resources to be shared between two or more computers. It has a unique identifier.
This is the file that allows the antivirus to detect threats.
Quarantine is the place where suspicious or non-disinfectable items are stored, as well as spyware and hacking tools detected.
Number that identifies an interface in a network device (usually a computer) that uses the IP protocol.
Hexadecimal, 48-bit unique identifier of a network card or interface. It is individual: each device has its own MAC address.
Some of the firewall configuration rules are established by and are updated periodically.
This is a barrier that can protect information in a system or network when there is a connection to another network, for example, the Internet.
This is a list of computers to which the protection will not be distributed. If a computer in the blacklist already has the protection installed, it will not be updated or leverage Collective Intelligence.
Generally, home or office networks. Your computer will be visible to others on the network and vice versa. You will be able to share resources, files and directories with others on the network.
This is the type of network you will find in Internet cafes, airports, etc. Visibility of computers will be restricted on such networks, and there are restrictions on sharing files, resources and directories.
System used for interconnection of computers. One of the most commonly used is TCP-IP.
Point through which a computer is accessed and information is exchanged (inbound/outbound) between the computer and external sources (via TCP/IP).
Viruses are programs that can enter computers or IT systems in a number of ways, causing effects that range from simply annoying to highly-destructive and irreparable.