Glossary

A - B - C - D - E - G - H - I - J - M - N - O - P - Q - S - T - U - W

access permission
Access permission allows a program on your computer to initiate communications with another computer. This is distinct from server permission, which allows a program to "listen" for connection requests from other computers. You can give a program access permission for the Trusted Zone, the Internet Zone, or both.
act as a server
A program acts as a server when it "listens" for connection requests from other computers. Several common types of applications, such as chat programs, e-mail clients, and Internet Call Waiting programs, may need to act as servers to operate properly. However, some hacker programs act as servers to listen for instructions from their creators. Zone Labs security software prevents programs on your computer from acting as servers unless you grant server permission.
ActiveX controls
A set of technologies developed by Microsoft that can be automatically downloaded and executed by a Web browser. Because ActiveX controls have full access to the Windows operating system, they have the potential to damage software or data on a user's machine.
Ad Blocking
A Zone Labs security software feature that enables you to block banner, pop-up and other types of advertisements.
Advanced Program control
Advanced Program Control is an advanced security feature that tightens your security by preventing unknown programs from using trusted programs to access the Internet.
AlertAdvisor
Zone Labs AlertAdvisor is an online utility that enables you to instantly analyze the possible causes of an alert, and helps you decide whether to respond Allow or Deny to a Program alert. To use AlertAdvisor, click the More Info button in an alert pop-up. Zone Labs security software sends information about your alert to AlertAdvisor. AlertAdvisor returns an article that explains the alert and gives you advice on what, if anything, you need to do to ensure your security.
animated ad
An advertisement that incorporates moving images.
banner ad
An ad that appears in a horizontal banner across a Web page.
Blocked Zone
The Blocked Zone contains computers you want no contact with. Zone Labs security software prevents any communication between your computer and the machines in this Zone.
boot sector virus
Type of computer virus that infects the first or first few sectors of a computer hard drive or diskette drive allowing the virus to activate as the drive or diskette boots.
Cache Cleaner
Privacy feature that enables you to remove unwanted files and cookies from your computer on demand, or on a scheduled basis.
Cerberian
Cerberian is a software development and application services company that filters, monitors and reports on Internet use and activity. ZoneAlarm Pro's Web Filtering feature uses Cerberian content categories to determine whether access to Web sites you visit will be allowed or blocked.
clear text
Clear text, also referred to as "plain text," is data that is being transmitted in textual form and is not encrypted. Because the data is not encrypted, it could be intercepted and read by others during transmission.
component
A small program or set of functions that larger programs call on to perform specific tasks. Some components may be used by several different programs simultaneously. Windows operating systems provide many component DLLs (Dynamic Link Libraries) for use by a variety of Windows applications.
component learning mode
The period after installation when program control is set to Medium. When in component learning mode, Zone Labs security software can quickly learn the MD5 signatures of many frequently used components without interrupting your work with multiple alerts.
cookie
A small data file used by a Web site to customize content, remember you from one visit to the next, and/or track your Internet activity. While there are many benign uses of cookies, some cookies can be used to divulge information about you without your consent.
Cookie Control
Privacy feature that allows you to prevent cookies from being stored on your computer.
DES
Short for Data Encryption Standard, a popular symmetric-key encryption method using a 56-bit key.
Destructiveness
Refers to the extent of the damage caused by a virus. The Destructiveness rating refers to the degree to which the damage can be reversed. A low Destructiveness rating would indicate that the scale of the interruption was small, and that any damage done could be reversed. A Medium or High Destructiveness rating would indicate that the damage caused may be irreversible, or that it caused a widespread interruption.
DHCP (Dynamic Host Configuration Protocol)
A protocol used to support dynamic IP addressing. Rather than giving you a static IP address, your ISP may assign a different IP address to you each time you log on. This allows the provider to serve a large number of customers with a relatively small number of IP addresses.
DHCP (Dynamic Host Configuration Protocol) Broadcast/Multicast
A type of message used by a client computer on a network that uses dynamic IP addressing. When the computer comes online, if it needs an IP address, it issues a broadcast message to any DHCP servers which are on the network. When a DHCP server receives the broadcast, it assigns an IP address to the computer.
dial-up connection
Connection to the Internet using a modem and an analog telephone line. The modem connects to the Internet by dialing a telephone number at the Internet Service Provider's site. This is in distinction to other connection methods, such as Digital Subscriber Lines, that do not use analog modems and do not dial telephone numbers.
DLL (Dynamic Link Library)
A library of functions that can be accessed dynamically (that is, as needed) by a Windows application.
DNS (Domain Name Server)
A data query service generally used on the Internet for translating host names or domain names (like www.yoursite.com) into Internet addresses (like 123.456.789.0).
embedded object
An object such as a sound file or an image file that is embedded in a Web page.
Encryption
The process of transmitting scrambled data so that only authorized recipients can unscramble it. For instance, encryption is used to scramble credit card information when purchases are made over the Internet.
gateway
In networking, a combination of hardware and software that links two different types of networks. For example, if you are on a home or business Local Area Network (LAN), a gateway enables the computers on your network to communicate with the Internet.
hash
A hash is a number generated by a formula from a string of text in such a way that it is unlikely that some other text would produce the same value. Hashes are used to ensure that transmitted messages have not been tampered with.
heartbeat messages
Messages sent by an Internet Service Provider (ISP) to make sure that a dial-up connection is still in use. If it appears a customer is not there, the ISP might disconnect her so that her IP address can be given to someone else.
high-rated alerts
An alert that is likely to have been caused by hacker activity. High-rated Firewall alerts display a red band at the top of the alert pop-up. In the Log Viewer, you can see if an alert was high-rated by looking in the Rating column.
HTTP Referrer Header Field
An optional field in the message that opens a Web page, containing information about the "referring document." Properly used, this field helps Web masters administer their sites. Improperly used, it can divulge your IP address, your workstation name, login name, or even (in a poorly-implemented e-commerce site) your credit card number. By selecting Remove Private Header information in the Cookies tab, you prevent this header field from transferring any information about you.
ICMP (Internet Control Message Protocol)
An extension of the Internet Protocol that supports error control and informational messages. The "ping" message is a common ICMP message used to test an Internet connection.
ICS (Internet Connection Sharing)
ICS is a service provided by the Windows operating system that enables networked computers to share a single connection to the Internet.
index.dat
Index.dat files keep copies of everything that was in your Temporary Internet, Cookies, and History folders even AFTER these files have been deleted.
informational alerts
The type of alerts that appear when Zone Labs security software blocks a communication that did not match your security settings. Informational alerts do not require a response from you.
Internet Zone
The Internet Zone contains all the computers in the world-except those you have added to the Trusted Zone or Blocked Zone.
Zone Labs security software applies the strictest security to the Internet Zone, keeping you safe from hackers. Meanwhile, the medium security settings of the Trusted Zone enable you to communicate easily with the computers or networks you know and trust-for example, your home network PCs, or your business network.
IP address
The number that identifies your computer on the Internet, as a telephone number identifies your phone on a telephone network. It is a numeric address, usually displayed as four numbers between 0 and 255, separated by periods. For example, 172.16.100.100 could be an IP address.
Your IP address may always be the same. However, your Internet Service Provider (ISPs) may use Dynamic Host Configuration Protocol (DHCP) to assign your computer a different IP address each time you connect to the Internet.
ISP (Internet Service Provider)
A company that provides access to the Internet. ISPs provide many kinds of Internet connections to consumers and business, including dial-up (connection over a regular telephone line with a modem), high-speed Digital Subscriber Lines (DSL), and cable modem.
Java applet
A small Internet-based program written in Java that is usually embedded in an HTML page on a Web site and can be executed from within a browser.
JavaScript
A popular scripting language that enables some of the most common interactive content on Web sites. Some of the most frequently used JavaScript functions include Back and History links, changing images on mouse-over, and opening and closing browser windows. Zone Labs security software default settings allow JavaScript because it is so common and because most of its uses are harmless.
Mail Server
The remote computer from which the e-mail program on your computer retrieves e-mail messages sent to you.
MD5 Signature
A digital "fingerprint" used to verify the integrity of a file. If a file has been changed in any way (for example, if a program has been compromised by a hacker), its MD5 signature will change as well.
Medium-rated Alert
An alert that was probably caused by harmless network activity, rather than by a hacker attack.
MIME-type integrated object
An object such as an image, sound file, or video file that is integrated into an e-mail message. MIME stands for Multipurpose Internet Mail Extensions.
Mobile Code
Executable content that can be embedded in Web pages or HTML e-mail. Mobile code helps make Web sites interactive, but malicious mobile code can be used to modify or steal data, and for other malevolent purposes.
Mobile Code Control
A Zone Labs security software feature that enables you to block active controls and scripts on the Web sites you visit. While mobile code is common on the Internet and has many benign uses, hackers can sometimes use it for malevolent purposes.
NetBIOS (Network Basic Input/Output System)
A program that allows applications on different computers to communicate within a local network. By default, Zone Labs security software allows NetBIOS traffic in the Trusted Zone, but blocks it in the Internet Zone. This enables file sharing on local networks, while protecting you from NetBIOS vulnerabilities on the Internet.
OpenSSL
OpenSSL is an open source security protocol based on the SSL library developed by Eric A. Young and Tim J. Hudson.
packet
A single unit of network traffic. On "packet-switched" networks like the Internet, outgoing messages are divided into small units, sent and routed to their destinations, then reassembled on the other end. Each packet includes the IP address of the sender, and the destination IP address and port number.
pass-lock
When the Internet Lock is engaged, programs given pass-lock permission can continue accessing the Internet. Access permission and server permission for all other programs is revoked until the lock is opened.
persistent cookie
A cookie put on your hard drive by a Web site you visit. These cookies can be retrieved by the Web site the next time you visit. While useful, they create a vulnerability by storing information about you, your computer, or your Internet use in a text file.
Pervasiveness
Pervasiveness refers to a virus' potential to spread. A boot sector virus that spreads through the manual sharing of floppy disks is given a low Pervasiveness rating, while a worm that has the ability to send itself out to a large number of victims is given a high pervasiveness rating.
ping
A type of ICMP message (formally "ICMP echo") used to determine whether a specific computer is connected to the Internet. A small utility program sends a simple "echo request" message to the destination IP address, and then waits for a response. If a computer at that address receives the message, it sends an "echo" back. Some Internet providers regularly "ping" their customers to see if they are still connected.
pop-under ad
An ad that appears in a new browser window that opens under the window you're looking at, so you don't see the ad until you close the original browser window.
pop-up ad
An ad that appears in a new browser window that 'pops up' in front of the window you're looking at.
port
A channel in or out of your computer. Some ports are associated with standard network protocols; for example, HTTP (Hypertext Transfer Protocol) is traditionally addressed to port 80. Port numbers range from 1 to 65535.
port scan
A technique hackers use to find unprotected computers on the Internet. Using automated tools, the hacker systematically scans the ports on all the computers in a range of IP addresses, looking for unprotected or "open" ports. Once an open port is located, the hacker can use it as an access point to break in to the unprotected computer.
Privacy Advisor
A small display that shows you when Zone Labs security software blocks cookies or mobile code, and enables you to un-block those elements for a particular page.
private network
A home or business Local Area Network (LAN). Private networks are placed in the Trusted Zone by default.
Product Update Service
Zone Labs subscription service that provides free updates to Zone Labs security software. When you purchase Zone Labs security software, you automatically receive a year's subscription to product update service.
programs list
The list of programs to which you can assign Internet access and server permissions. The list is shown in the Programs tab of the Program Control panel. You can add programs to the list, or remove programs from it.
protocol
A standardized format for sending and receiving data. Different protocols serve different purposes; for example SMTP (Simple Mail Transfer Protocol) is used for sending e-mail messages; while FTP (File Transfer Protocol) is used to send large files of different types. Each protocol is associated with a specific port, for example, FTP messages are addressed to port 21.
public network
A large network, such as that associated with an ISP. Public networks are placed in the Internet Zone by default.
quarantine
Zone Labs security software's MailSafe quarantines incoming e-mail attachments whose filename extensions (for example, .EXE or .BAT) indicate the possibility of auto-executing code. By changing the filename extension, quarantining prevents the attachment from opening without inspection. This helps protect you from worms, viruses, and other malware that hackers distribute as e-mail attachments.
script
A series of commands that execute automatically, without the user intervening. These usually take the form of banners, menus that change when you move your mouse over them, and popup ads.
security levels
The High, Med., and Low settings that dictate the type of traffic allowed into or out of your computer.
self-signed certificate
A public-key certificate for which the public key bound by the certificate and the private key used to sign the certificate are components of the same key pair, which belongs to the signer.
server permission
Server permission allows a program on your computer to "listen" for connection requests from other computers, in effect giving those computers the power to initiate communications with yours. This is distinct from access permission, which allows a program to initiate a communications session with another computer.
Several common types of applications, such as chat programs, e-mail clients, and Internet Call Waiting programs, may need server permission to operate properly. Grant server permission only to programs you're sure you trust, and that require it in order to work.
If possible, avoid granting a program server permission for the Internet Zone. If you need to accept incoming connections from only a small number of machines, add those machines to the Trusted Zone, and then allow the program server permission for the Trusted Zone only.
session cookie
A cookie stored in your browser's memory cache that disappears as soon as you close your browser window. These are the safest cookies because of their short life-span.
SHA1
An algorithm used for creating a hash of data.
skyscraper ad
An ad that appears in a vertical column along the side of a Web page.
Spam
An inappropriate attempt to use a mailing list or USENET or other networked communications facility as if it were are broadcast medium by sending unsolicited messages to a large number of people.
stealth mode
When Zone Labs security software puts your computer in stealth mode, any uninvited traffic receives no response--not even an acknowledgement that your computer exists. This renders your computer invisible to other computers on the Internet, until permitted program on your computer initiates contact.
TCP (Transmission Control Protocol)
One of the main protocols in TCP/IP networks, which guarantees delivery of data, and that packets are delivered in the same order in which they were sent.
third party cookie
persistent cookie that is placed on your computer, not by the Web site you are visiting, but by an advertiser or other \'third party.\' These cookies are commonly used to deliver information about your Internet activity to that third party.
Trojan Horse
A malicious program that masquerades as something useful or harmless, such as a screen saver. Some Trojan horses operate by setting themselves up as servers on your computer, listening for connections from the outside. If a hacker succeeds in contacting the program, he can effectively take control of your computer. This is why it's important to only give server permission to programs you know and trust. Other Trojan horses attempt to contact a remote address automatically.
TrueVector security engine
The primary component of Zone Labs security software security. It is the TrueVector engine that examines Internet traffic and enforces security rules.
Trusted Zone
The Trusted Zone contains computers you trust and want to share resources with.
For example, if you have three home PCs that are linked together in an Ethernet network, you can put each individual computer or the entire network adapter subnet in the Zone Labs security software Trusted Zone. The Trusted Zone's default medium security settings enable you to safely share files, printers, and other resources over the home network. Hackers are confined to the Internet Zone, where high security settings keep you safe.
UDP (User Datagram Protocol)
A connection-less protocol that runs on top of IP networks and is used primarily for broadcasting messages over a network.
Web bug
An image file, often 1x1 pixel, designed to monitor visits to the page (or HTML e-mail) containing it. Web bugs are used to find out what advertisements and Web pages you have viewed. If you have blocked web bugs using Privacy control, blank boxes will appear in place of the web bugs.
Wild
Refers to a virus that is spreading as a result of normal day-to-day operations on and between the computers of unsuspecting users. The Wild rating refers to the number of customer reports about this virus. A low Wild rating will reflect a low number of customer reports, whereas a Medium or High Wild rating will reflect a more substantial number of customer reports.

Join the Zone Labs User Forum!

Get this User Guide in PDF format:





Zone Labs, Inc.

http://www.zonelabs.com