Welding System User Manual

by what might seem to be a virus, and does not generate
false alarms.
Packed programs A file in a compression format. Many operating systems and
applications contain commands that enable you to pack a
file so that it takes up less memory. For example, suppose
you have a text file containing ten consecutive space charac-
ters. Normally, this would require ten bytes of storage.
However, a program that packs files would replace the space
characters by a special space-series character followed by
the number of spaces being replaced. In this case, the ten
spaces would require only two bytes. This is just one packing
technique - there are many more.
Path The exact directions to a file on a computer. These directions
are usually described by means of the hierarchical filing sys-
tem from the top down.
The route between any two points, such as the communica-
tions channel between two computers.
Phishing The act of sending an e-mail to a user falsely claiming to be
an established legitimate enterprise in an attempt to scam
the user into surrendering private information that will be
used for identity theft. The e-mail directs the user to visit a
Web site where they are asked to update personal informa-
tion, such as passwords and credit card, social security, and
bank account numbers, that the legitimate organization
already has. The Web site, however, is bogus and set up
only to steal the user’s information.
Polymorphic virus A virus that changes its form with each file it infects. Since
they have no consistent binary pattern, such viruses are hard
to identify.
Port An interface on a computer to which you can connect a
device. Personal computers have various types of ports. In-
ternally, there are several ports for connecting disk drives,
display screens, and keyboards. Externally, personal com-
105
Glossary