Unisar 1.24.1867 manual Port, Report file, Script, Startup items, Trojan

Page 101

Glossary

Port

An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally, there are several ports for connecting disk drives, display screens, and keyboards. Externally, personal computers have ports for connecting modems, printers, mice, and other peripheral devices.

In TCP/IP and UDP networks, an endpoint to a logical connection. The port number identifies what type of port it is. For example, port 80 is used for HTTP traffic.

Report file

A file that lists actions that have occurred. BitDefender maintains a report file listing the path scanned, the folders, the number of archives and files scanned, how many infected and suspicious files were found.

Script

Another term for macro or batch file, a script is a list of commands that can be executed without user interaction.

Startup items

Any files placed in this folder will open when the computer starts. For example, a startup screen, a sound file to be played when the computer first starts, a reminder calendar, or application programs can be startup items. Normally, an alias of a file is placed in this folder rather than the file itself.

TCP/IP

Transmission Control Protocol/Internet Protocol - A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic.

Trojan

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the

101

Image 101
Contents Users Guide Users Guide As every cat owner knows, nobody owns a cat BitDefender Antivirus Scanner for Unices Table of Contents Configuration file Testing BitDefender UninstallReal life usage BitDefender integrationFrequently Asked Questions Support UpdatesProduct registration Best practicesBitDefender Antivirus Scanner for Unices Viii End User Software License Agreement End User Software License Agreement End User Software License Agreement Xii Typographical conventions PrefaceConventions used in this book Admonitions CommandBook structure Request for Comments Description and features Description and features Overview Why BitDefender?Data Security Division Softwin Description BitDefender Antivirus Scanner for Unices Product featuresKey Features More in the manual Scanning mechanismFeatures Installation Installation Hardware system requirements PrerequisitesSystem requirements Software system requirements Package naming conventionLinux convention Linux requirementsFreeBSD convention Installation Test the rpm and deb packages Package installationTest the package for integrity Test the FreeBSD tbz package Test the self-extractable archiveInstall the rpm package Install the packageInstall the deb package Install the self-extractable archiveAdditional parameters Install the FreeBSD package InstallerConfigures the quarantine directory Uninstall the rpm package UninstallUninstall the deb package Uninstall using the self-extractable archiveUninstall from the ports collection Uninstall the FreeBSD packageUninstall a package downloaded locally Using BitDefender Using BitDefender System versus User configuration Configuration fileKey Description More about triggered updateRegular users and quarantine Using07 BitDefenderProduct registration Using BitDefenderEicar online resources Testing BitDefenderScan an executable file Scan an archive Command output will be the followingScan a mailbox Tmp/mail.mbox Scan a regular file Real life usageVirus scanning Scan a directory Scan the entire system Actions on archives Scan the archivesScan the mailbox Report Using the log fileDisplay the virus list Get more informationDisplay the product version Virus submissionDesktop integration Midnight CommanderBitDefender integration Do not break the last line Different installation pathKDE Konqueror Action on file in Konqueror KrusaderKrusaders User Actions ROX-FilerPine Information Center PineThis is how the screen should look like What to do with infected emailsExit Status Interval 1,254 BitDefender pipe bdscanpipe EvolutionKMail Filter actions in KMail Server integrationMailScanner Qmail-Scanner installationMailScanner installation Change it to the following form Amavisd-newAmavisd-new installation Using Triggered update UpdatesRun the triggered update Regular updatesEdit the cron table Http proxy Manual updateOrder to extract the updates Check the expiration date Product registrationTrial License License for home or personal use License for commercial use Best practices Best practices Getting help Getting help Frequently Asked Questions Getting help BitDefender Knowledge Base SupportSupport department Web addresses Contact informationAddress Softwin GmbHBitDefender LLC RomaniaGetting help Manual Pages Manual Pages Options SynopsisDescription Manual Pages Actions Files ExamplesSee also BugsManual Pages Glossary Cookie Command lineDisk drive DownloadFalse positive EventsFilename extension HeuristicMail client Macro virusNon-heuristic Packed programsReport file PortScript Startup itemsVirus UpdateVirus definition Worm