User's Manual
Phishing The act of sending an e-mail to a user falsely claiming to be
an established legitimate enterprise in an attempt to scam the
user into surrendering private information that will be used for
identity theft. The e-mail directs the user to visit a Web site
where they are asked to update personal information, such as
passwords and credit card, social security, and bank account
numbers, that the legitimate organization already has. The Web
site, however, is bogus and set up only to steal the user’s in-
formation.
Polymorphic virus A virus that changes its form with each file it infects. Since
they have no consistent binary pattern, such viruses are hard
to identify.
Port An interface on a computer to which you can connect a device.
Personal computers have various types of ports. Internally,
there are several ports for connecting disk drives, display
screens, and keyboards. Externally, personal computers have
ports for connecting modems, printers, mice, and other peri-
pheral devices.
In TCP/IP and UDP networks, an endpoint to a logical connec-
tion. The port number identifies what type of port it is. For
example, port 80 is used for HTTP traffic.
Report file A file that lists actions that have occurred. BitDefender main-
tains a report file listing the path scanned, the folders, the
number of archives and files scanned, how many infected and
suspicious files were found.
Script Another term for macro or batch file, a script is a list of com-
mands that can be executed without user interaction.
Spam Electronic junk mail or junk newsgroup postings. Generally
known as any unsolicited e-mail.
Spyware Any software that covertly gathers user information through
the user's Internet connection without his or her knowledge,
usually for advertising purposes. Spyware applications are
typically bundled as a hidden component of freeware or
shareware programs that can be downloaded from the Internet;
however, it should be noted that the majority of shareware and
freeware applications do not come with spyware. Once in-
stalled, the spyware monitors user activity on the Internet and
123
Glossary