User Manual

Events
An action or occurrence detected by a program. Events can be user
actions, such as clicking a mouse button or pressing a key, or system
occurrences, such as running out of memory.
False positive
Occurs when a scanner identifies a file as infected when in fact it is not.
Filename extension
The portion of a filename, following the final point, which indicates the
kind of data stored in the file.
Many operating systems use filename extensions, e.g. Unix, VMS, and
MS-DOS. They are usually from one to three letters (some sad old OSes
support no more than three). Examples include "c" for C source code,
"ps" for PostScript, "txt" for arbitrary text.
Heuristic
A rule-based method of identifying new threats. This method of scanning
does not rely on specific threat information database. The advantage of
the heuristic scan is that it is not fooled by a new variant of an existing
threat. However, it might occasionally report suspicious code in normal
programs, generating the so-called "false positive".
Honeypot
A decoy computer system set to attract hackers to study the way they
act and identify the heretical methods they use to collect system
information. Companies and corporations are more interested in
implementing and using honeypots to improve their overall state of
security.
IP
Internet Protocol - A routable protocol in the TCP/IP protocol suite that
is responsible for IP addressing, routing, and the fragmentation and
reassembly of IP packets.
Java applet
A Java program which is designed to run only on a webpage. To use an
applet on a webpage, you would specify the name of the applet and the
size (length and width, in pixels) that the applet can utilize. When the
webpage is accessed, the browser downloads the applet from a server
Glossary 218
Bitdefender Internet Security