Unisar 1.24.1867 manual Events, False positive, Filename extension, Heuristic, Java applet

Page 99

Glossary

Events

An action or occurrence detected by a program. Events can be user actions, such as clicking a mouse button or pressing a key, or system occurrences, such as running out of memory.

False positive

Occurs when a scanner identifies a file as infected when in fact it is not.

Filename extension

The portion of a filename, following the final point, which indicates the kind of data stored in the file.

Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS. They are usually from one to three letters (some sad old OSes support no more than three). Examples include "c" for C source code, "ps" for PostScript, "txt" for arbitrary text.

Heuristic

A rule-based method of identifying new viruses. This method of scanning does not rely on specific virus signatures. The advantage of the heuristic scan is that it is not fooled by a new variant of an existing virus. However, it might occasionally report suspicious code in normal programs, generating the so-called "false positive".

IP

Internet Protocol - A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets.

Java applet

A Java program which is designed to run only on a web page. To use an applet on a web page, you would specify the name of the applet and the size (length and width--in pixels) that the applet can utilize. When the web page is accessed, the browser downloads the applet from a server and runs it on the user's machine (the client). Applets differ from applications in that they are governed by a strict security protocol.

For example, even though applets run on the client, they cannot read or write data onto the client's machine. Additionally, applets are further restricted so that they can only read and write data from the same domain that they are served from.

99

Image 99
Contents Users Guide Users Guide As every cat owner knows, nobody owns a cat BitDefender Antivirus Scanner for Unices Table of Contents BitDefender integration UninstallConfiguration file Testing BitDefender Real life usageBest practices UpdatesFrequently Asked Questions Support Product registrationBitDefender Antivirus Scanner for Unices Viii End User Software License Agreement End User Software License Agreement End User Software License Agreement Xii Preface Conventions used in this bookTypographical conventions Admonitions CommandBook structure Request for Comments Description and features Description and features Overview Why BitDefender?Data Security Division Softwin Description BitDefender Antivirus Scanner for Unices Product featuresKey Features More in the manual Scanning mechanismFeatures Installation Installation Prerequisites System requirementsHardware system requirements Linux requirements Package naming conventionSoftware system requirements Linux conventionFreeBSD convention Installation Package installation Test the package for integrityTest the rpm and deb packages Test the FreeBSD tbz package Test the self-extractable archiveInstall the self-extractable archive Install the packageInstall the rpm package Install the deb packageAdditional parameters Install the FreeBSD package InstallerConfigures the quarantine directory Uninstall using the self-extractable archive UninstallUninstall the rpm package Uninstall the deb packageUninstall the FreeBSD package Uninstall a package downloaded locallyUninstall from the ports collection Using BitDefender Using BitDefender System versus User configuration Configuration fileKey Description More about triggered updateRegular users and quarantine Using07 BitDefenderProduct registration Using BitDefenderTesting BitDefender Scan an executable fileEicar online resources Scan an archive Command output will be the followingScan a mailbox Tmp/mail.mbox Real life usage Virus scanningScan a regular file Scan a directory Scan the entire system Actions on archives Scan the archivesScan the mailbox Report Using the log fileDisplay the virus list Get more informationDisplay the product version Virus submissionMidnight Commander BitDefender integrationDesktop integration Different installation path KDE KonquerorDo not break the last line Action on file in Konqueror KrusaderKrusaders User Actions ROX-FilerPine Information Center PineThis is how the screen should look like What to do with infected emailsExit Status Interval 1,254 BitDefender pipe bdscanpipe EvolutionKMail Filter actions in KMail Server integrationQmail-Scanner installation MailScanner installationMailScanner Change it to the following form Amavisd-newAmavisd-new installation Using Regular updates UpdatesTriggered update Run the triggered updateEdit the cron table Http proxy Manual updateOrder to extract the updates Product registration Trial License License for home or personal useCheck the expiration date License for commercial use Best practices Best practices Getting help Getting help Frequently Asked Questions Getting help Support Support departmentBitDefender Knowledge Base Softwin GmbH Contact informationWeb addresses AddressBitDefender LLC RomaniaGetting help Manual Pages Manual Pages Synopsis DescriptionOptions Manual Pages Actions Files ExamplesSee also BugsManual Pages Glossary Download Command lineCookie Disk driveHeuristic EventsFalse positive Filename extensionPacked programs Macro virusMail client Non-heuristicStartup items PortReport file ScriptWorm UpdateVirus Virus definition