HP Sygate Security Agent User Guide
antivirus: Software and technology that is used to detect malicious computer applications, prevent them from infecting a system, and clean files or applications that are infected with computer viruses. Sygate software works together with, but does not include, antivirus software.
application authentication: Authenticating an application that is running on a network is accomplished by taking the entire binary of an application and performing an MD5 hash and then comparing it with the application fingerprint stored on an Agent. If the application was changed, it may not be authenticated depending on the rules that an Agent is using. See also application control, application fingerprint, DLL authentication, MD5 hash.
application control: Applications and what versions of the particular application can either be allowed or disallowed via security policies.
application fingerprint: A
authentication: The process by which a system identifies an individual or a computer to make sure that the user or computer is who they claim to be.
authorization: The process of granting or denying access to a specific network resource or domain based on the user’s identity.
B
backtrace: A way of using ICMP to determine all the hops between your computer and an intruder on another computer. See also Internet Control Message Protocol (ICMP).
broadcast: Sending a packet to everybody on the network. See also multicast, unicast.
buffer overflow: Applications set aside areas of memory, or buffers, for use as storage, frequently setting aside a finite amount of memory for a buffer. A buffer overflow exists when an application attempts to store more data than can fit in a
52