Key concepts

Signature file

This is the file that allows the antivirus to detect threats. It contains malware identifiers.

 

Malware

This term is used to refer to all programs that contain malicious code (MALicious softWARE), whether it is a virus, Trojan, worm or any other threat to the security of IT systems.

Malware tries to infiltrate or damage computers, often without users knowing, for a variety of reasons.

 

Heuristic scan

The genetic heuristic scan analyzes suspicious items on the basis of 'digital genes', represented by a few hundred characters in each scanned file.

This determines the potential of the software to carry out malicious or damaging actions when run on a computer, and whether it is a virus, spyware, a Trojan, a worm, etc.

 

Public network
This is the type of network you will find in Internet cafes, airports, etc. Visibility of computers will be restricted on such networks, and there are restrictions on sharing files, resources and directories.



Trusted network

In this case we are generally talking about office or domestic networks. A computer will be perfectly visible to any other computer on the network. There are no limitations on sharing files, resources or directories.

 

Protocol

System used for interconnection of computers. One of the most commonly-used is TCP-IP.

 

Port

Point through which a computer is accessed and information is exchanged (inbound/outbound) between the computer and external sources (via TCP/IP).

 

IP address

Number that identifies a device interface (usually a computer) on a network that uses the IP protocol.