User Manual
period of time. An expired subscription can be automatically renewed
using the information provided by the user at the first purchase.
System tray
Introduced with Windows 95, the system tray is located in the Windows
taskbar (usually at the bottom next to the clock) and contains miniature
icons for easy access to system functions such as fax, printer, modem,
volume, and more. Double click or right-click an icon to view and access
the details and controls.
TCP/IP
Transmission Control Protocol/Internet Protocol - A set of networking
protocols widely used on the internet that provides communications
across interconnected networks of computers with diverse hardware
architectures and various operating systems. TCP/IP includes standards
for how computers communicate and conventions for connecting
networks and routing traffic.
Threat
A program or piece of code that is loaded onto your computer without
your knowledge and runs against your will. Most threats can also
replicate themselves. All computer threats are manmade. A simple threat
that can copy itself over and over again is relatively easy to produce.
Even such a simple threat is dangerous because it will quickly use all
available memory and bring the system to a halt. An even more
dangerous type of threat is one capable of transmitting itself across
networks and bypassing security systems.
Threat Information Update
The binary pattern of a threat, used by the security solution to detect
and eliminate the threat.
Trojan
A destructive program that masquerades as a benign app. Unlike
malicious software programs and worms, Trojans do not replicate
themselves but they can be just as destructive. One of the most insidious
types of Trojan horse threats is a program that claims to rid your
computer of threats but instead introduces threats onto your computer.
The term comes from a story in Homer's Iliad, in which the Greeks give
a giant wooden horse to their foes, the Trojans, ostensibly as a peace
Glossary 223
Bitdefender Internet Security










