Unisar 1.24.1867 manual Macro virus, Mail client, Non-heuristic, Packed programs, Path

Page 100

Glossary

Macro virus

A type of computer virus that is encoded as a macro embedded in a document. Many applications, such as Microsoft Word and Excel, support powerful macro languages.

These applications allow you to embed a macro in a document, and have the macro execute each time the document is opened.

Mail client

An e-mail client is an application that enables you to send and receive e-mail.

Memory

Internal storage areas in the computer. The term memory identifies data storage that comes in the form of chips, and the word storage is used for memory that exists on tapes or disks. Every computer comes with a certain amount of physical memory, usually referred to as main memory or RAM.

Non-heuristic

This method of scanning relies on specific virus signatures. The advantage of the non-heuristic scan is that it is not fooled by what might seem to be a virus, and does not generate false alarms.

Packed programs

A file in a compression format. Many operating systems and applications contain commands that enable you to pack a file so that it takes up less memory. For example, suppose you have a text file containing ten consecutive space characters. Normally, this would require ten bytes of storage.

However, a program that packs files would replace the space characters by a special space-series character followed by the number of spaces being replaced. In this case, the ten spaces would require only two bytes. This is just one packing technique - there are many more.

Path

The exact directions to a file on a computer. These directions are usually described by means of the hierarchical filing system from the top down.

The route between any two points, such as the communications channel between two computers.

Polymorphic virus

A virus that changes its form with each file it infects. Since they have no consistent binary pattern, such viruses are hard to identify.

100

Image 100
Contents Users Guide Users Guide As every cat owner knows, nobody owns a cat BitDefender Antivirus Scanner for Unices Table of Contents Uninstall Configuration file Testing BitDefenderReal life usage BitDefender integrationUpdates Frequently Asked Questions SupportProduct registration Best practicesBitDefender Antivirus Scanner for Unices Viii End User Software License Agreement End User Software License Agreement End User Software License Agreement Xii Conventions used in this book PrefaceTypographical conventions Command AdmonitionsBook structure Request for Comments Description and features Description and features Why BitDefender? OverviewData Security Division Softwin Description Product features BitDefender Antivirus Scanner for UnicesKey Features Scanning mechanism More in the manualFeatures Installation Installation System requirements PrerequisitesHardware system requirements Package naming convention Software system requirementsLinux convention Linux requirementsFreeBSD convention Installation Test the package for integrity Package installationTest the rpm and deb packages Test the self-extractable archive Test the FreeBSD tbz packageInstall the package Install the rpm packageInstall the deb package Install the self-extractable archiveAdditional parameters Installer Install the FreeBSD packageConfigures the quarantine directory Uninstall Uninstall the rpm packageUninstall the deb package Uninstall using the self-extractable archiveUninstall a package downloaded locally Uninstall the FreeBSD packageUninstall from the ports collection Using BitDefender Using BitDefender Configuration file System versus User configurationMore about triggered update Key DescriptionUsing07 BitDefender Regular users and quarantineUsing BitDefender Product registrationScan an executable file Testing BitDefenderEicar online resources Command output will be the following Scan an archiveScan a mailbox Tmp/mail.mbox Virus scanning Real life usageScan a regular file Scan a directory Scan the entire system Scan the archives Actions on archivesScan the mailbox Using the log file ReportGet more information Display the virus listVirus submission Display the product versionBitDefender integration Midnight CommanderDesktop integration KDE Konqueror Different installation pathDo not break the last line Krusader Action on file in KonquerorROX-Filer Krusaders User ActionsPine Pine Information CenterWhat to do with infected emails This is how the screen should look likeExit Status Interval 1,254 Evolution BitDefender pipe bdscanpipeKMail Server integration Filter actions in KMailMailScanner installation Qmail-Scanner installationMailScanner Amavisd-new Change it to the following formAmavisd-new installation Using Updates Triggered updateRun the triggered update Regular updatesEdit the cron table Manual update Http proxyOrder to extract the updates Trial License License for home or personal use Product registrationCheck the expiration date License for commercial use Best practices Best practices Getting help Getting help Frequently Asked Questions Getting help Support department SupportBitDefender Knowledge Base Contact information Web addressesAddress Softwin GmbHRomania BitDefender LLCGetting help Manual Pages Manual Pages Description SynopsisOptions Manual Pages Actions Examples FilesBugs See alsoManual Pages Glossary Command line CookieDisk drive DownloadEvents False positiveFilename extension HeuristicMacro virus Mail clientNon-heuristic Packed programsPort Report fileScript Startup itemsUpdate VirusVirus definition Worm