Glossary
access permissionAccess permission allows a program on your computer to initiate communications with another computer. This is distinct from server permission, which allows a program to "listen" for connection requests from other computers. You can give a program access permission for the Trusted Zone, the Internet Zone, or both.act as a serverA program acts as a server when it "listens" for connection requests from other computers. Several common types of applications, such as chat programs, e-mail clients, and Internet Call Waiting programs, may need to act as servers to operate properly. However, some hacker programs act as servers to listen for instructions from their creators. Zone Labs security software prevents programs on your computer from acting as servers unless you grant server permission.ActiveX controlsA set of technologies developed by Microsoft that can be automatically downloaded and executed by a Web browser. Because ActiveX controls have full access to the Windows operating system, they have the potential to damage software or data on a user's machine.Ad BlockingA Zone Labs security software feature that enables you to block banner, pop-up and other types of advertisements.Advanced Program controlAdvanced Program Control is an advanced security feature that tightens your security by preventing unknown programs from using trusted programs to access the Internet.AlertAdvisorZone Labs AlertAdvisor is an online utility that enables you to instantly analyze the possible causes of an alert, and helps you decide whether to respond Allow or Deny to a Program alert. To use AlertAdvisor, click the More Info button in an alert pop-up. Zone Labs security software sends information about your alert to AlertAdvisor. AlertAdvisor returns an article that explains the alert and gives you advice on what, if anything, you need to do to ensure your security.animated adAn advertisement that incorporates moving images.banner adAn ad that appears in a horizontal banner across a Web page.Blocked ZoneThe Blocked Zone contains computers you want no contact with. Zone Labs security software prevents any communication between your computer and the machines in this Zone.boot sector virusType of computer virus that infects the first or first few sectors of a computer hard drive or diskette drive allowing the virus to activate as the drive or diskette boots.Cache CleanerPrivacy feature that enables you to remove unwanted files and cookies from your computer on demand, or on a scheduled basis.CerberianCerberian is a software development and application services company that filters, monitors and reports on Internet use and activity. ZoneAlarm Pro's Web Filtering feature uses Cerberian content categories to determine whether access to Web sites you visit will be allowed or blocked.clear textClear text, also referred to as "plain text," is data that is being transmitted in textual form and is not encrypted. Because the data is not encrypted, it could be intercepted and read by others during transmission.componentA small program or set of functions that larger programs call on to perform specific tasks. Some components may be used by several different programs simultaneously. Windows operating systems provide many component DLLs (Dynamic Link Libraries) for use by a variety of Windows applications.component learning modeThe period after installation when program control is set to Medium. When in component learning mode, Zone Labs security software can quickly learn the MD5 signatures of many frequently used components without interrupting your work with multiple alerts.cookieA small data file used by a Web site to customize content, remember you from one visit to the next, and/or track your Internet activity. While there are many benign uses of cookies, some cookies can be used to divulge information about you without your consent.Cookie ControlPrivacy feature that allows you to prevent cookies from being stored on your computer.DESShort for Data Encryption Standard, a popular symmetric-key encryption method using a 56-bit key.DestructivenessRefers to the extent of the damage caused by a virus. The Destructiveness rating refers to the degree to which the damage can be reversed. A low Destructiveness rating would indicate that the scale of the interruption was small, and that any damage done could be reversed. A Medium or High Destructiveness rating would indicate that the damage caused may be irreversible, or that it caused a widespread interruption.DHCP (Dynamic Host Configuration Protocol)A protocol used to support dynamic IP addressing. Rather than giving you a static IP address, your ISP may assign a different IP address to you each time you log on. This allows the provider to serve a large number of customers with a relatively small number of IP addresses.DHCP (Dynamic Host Configuration Protocol) Broadcast/MulticastA type of message used by a client computer on a network that uses dynamic IP addressing. When the computer comes online, if it needs an IP address, it issues a broadcast message to any DHCP servers which are on the network. When a DHCP server receives the broadcast, it assigns an IP address to the computer.dial-up connectionConnection to the Internet using a modem and an analog telephone line. The modem connects to the Internet by dialing a telephone number at the Internet Service Provider's site. This is in distinction to other connection methods, such as Digital Subscriber Lines, that do not use analog modems and do not dial telephone numbers.DLL (Dynamic Link Library)A library of functions that can be accessed dynamically (that is, as needed) by a Windows application.DNS (Domain Name Server)A data query service generally used on the Internet for translating host names or domain names (like www.yoursite.com) into Internet addresses (like 123.456.789.0).embedded objectAn object such as a sound file or an image file that is embedded in a Web page.EncryptionThe process of transmitting scrambled data so that only authorized recipients can unscramble it. For instance, encryption is used to scramble credit card information when purchases are made over the Internet.gatewayIn networking, a combination of hardware and software that links two different types of networks. For example, if you are on a home or business Local Area Network (LAN), a gateway enables the computers on your network to communicate with the Internet.hashA hash is a number generated by a formula from a string of text in such a way that it is unlikely that some other text would produce the same value. Hashes are used to ensure that transmitted messages have not been tampered with.heartbeat messagesMessages sent by an Internet Service Provider (ISP) to make sure that a dial-up connection is still in use. If it appears a customer is not there, the ISP might disconnect her so that her IP address can be given to someone else.high-rated alertsAn alert that is likely to have been caused by hacker activity. High-rated Firewall alerts display a red band at the top of the alert pop-up. In the Log Viewer, you can see if an alert was high-rated by looking in the Rating column.HTTP Referrer Header FieldAn optional field in the message that opens a Web page, containing information about the "referring document." Properly used, this field helps Web masters administer their sites. Improperly used, it can divulge your IP address, your workstation name, login name, or even (in a poorly-implemented e-commerce site) your credit card number. By selecting Remove Private Header information in the Cookies tab, you prevent this header field from transferring any information about you.ICMP (Internet Control Message Protocol)An extension of the Internet Protocol that supports error control and informational messages. The "ping" message is a common ICMP message used to test an Internet connection.ICS (Internet Connection Sharing)ICS is a service provided by the Windows operating system that enables networked computers to share a single connection to the Internet.index.datIndex.dat files keep copies of everything that was in your Temporary Internet, Cookies, and History folders even AFTER these files have been deleted.informational alertsThe type of alerts that appear when Zone Labs security software blocks a communication that did not match your security settings. Informational alerts do not require a response from you.Internet ZoneThe Internet Zone contains all the computers in the world-except those you have added to the Trusted Zone or Blocked Zone.Zone Labs security software applies the strictest security to the Internet Zone, keeping you safe from hackers. Meanwhile, the medium security settings of the Trusted Zone enable you to communicate easily with the computers or networks you know and trust-for example, your home network PCs, or your business network.IP addressThe number that identifies your computer on the Internet, as a telephone number identifies your phone on a telephone network. It is a numeric address, usually displayed as four numbers between 0 and 255, separated by periods. For example, 172.16.100.100 could be an IP address.Your IP address may always be the same. However, your Internet Service Provider (ISPs) may use Dynamic Host Configuration Protocol (DHCP) to assign your computer a different IP address each time you connect to the Internet.ISP (Internet Service Provider)A company that provides access to the Internet. ISPs provide many kinds of Internet connections to consumers and business, including dial-up (connection over a regular telephone line with a modem), high-speed Digital Subscriber Lines (DSL), and cable modem.Java appletA small Internet-based program written in Java that is usually embedded in an HTML page on a Web site and can be executed from within a browser.JavaScriptA popular scripting language that enables some of the most common interactive content on Web sites. Some of the most frequently used JavaScript functions include Back and History links, changing images on mouse-over, and opening and closing browser windows. Zone Labs security software default settings allow JavaScript because it is so common and because most of its uses are harmless.Mail ServerThe remote computer from which the e-mail program on your computer retrieves e-mail messages sent to you.MD5 SignatureA digital "fingerprint" used to verify the integrity of a file. If a file has been changed in any way (for example, if a program has been compromised by a hacker), its MD5 signature will change as well.Medium-rated AlertAn alert that was probably caused by harmless network activity, rather than by a hacker attack.MIME-type integrated objectAn object such as an image, sound file, or video file that is integrated into an e-mail message. MIME stands for Multipurpose Internet Mail Extensions.Mobile CodeExecutable content that can be embedded in Web pages or HTML e-mail. Mobile code helps make Web sites interactive, but malicious mobile code can be used to modify or steal data, and for other malevolent purposes.Mobile Code ControlA Zone Labs security software feature that enables you to block active controls and scripts on the Web sites you visit. While mobile code is common on the Internet and has many benign uses, hackers can sometimes use it for malevolent purposes.NetBIOS (Network Basic Input/Output System)A program that allows applications on different computers to communicate within a local network. By default, Zone Labs security software allows NetBIOS traffic in the Trusted Zone, but blocks it in the Internet Zone. This enables file sharing on local networks, while protecting you from NetBIOS vulnerabilities on the Internet.OpenSSLOpenSSL is an open source security protocol based on the SSL library developed by Eric A. Young and Tim J. Hudson.packetA single unit of network traffic. On "packet-switched" networks like the Internet, outgoing messages are divided into small units, sent and routed to their destinations, then reassembled on the other end. Each packet includes the IP address of the sender, and the destination IP address and port number.pass-lockWhen the Internet Lock is engaged, programs given pass-lock permission can continue accessing the Internet. Access permission and server permission for all other programs is revoked until the lock is opened.persistent cookieA cookie put on your hard drive by a Web site you visit. These cookies can be retrieved by the Web site the next time you visit. While useful, they create a vulnerability by storing information about you, your computer, or your Internet use in a text file.PervasivenessPervasiveness refers to a virus' potential to spread. A boot sector virus that spreads through the manual sharing of floppy disks is given a low Pervasiveness rating, while a worm that has the ability to send itself out to a large number of victims is given a high pervasiveness rating.pingA type of ICMP message (formally "ICMP echo") used to determine whether a specific computer is connected to the Internet. A small utility program sends a simple "echo request" message to the destination IP address, and then waits for a response. If a computer at that address receives the message, it sends an "echo" back. Some Internet providers regularly "ping" their customers to see if they are still connected.pop-under adAn ad that appears in a new browser window that opens under the window you're looking at, so you don't see the ad until you close the original browser window.pop-up adAn ad that appears in a new browser window that 'pops up' in front of the window you're looking at.portA channel in or out of your computer. Some ports are associated with standard network protocols; for example, HTTP (Hypertext Transfer Protocol) is traditionally addressed to port 80. Port numbers range from 1 to 65535.port scanA technique hackers use to find unprotected computers on the Internet. Using automated tools, the hacker systematically scans the ports on all the computers in a range of IP addresses, looking for unprotected or "open" ports. Once an open port is located, the hacker can use it as an access point to break in to the unprotected computer.Privacy AdvisorA small display that shows you when Zone Labs security software blocks cookies or mobile code, and enables you to un-block those elements for a particular page.private networkA home or business Local Area Network (LAN). Private networks are placed in the Trusted Zone by default.Product Update ServiceZone Labs subscription service that provides free updates to Zone Labs security software. When you purchase Zone Labs security software, you automatically receive a year's subscription to product update service.programs listThe list of programs to which you can assign Internet access and server permissions. The list is shown in the Programs tab of the Program Control panel. You can add programs to the list, or remove programs from it.protocolA standardized format for sending and receiving data. Different protocols serve different purposes; for example SMTP (Simple Mail Transfer Protocol) is used for sending e-mail messages; while FTP (File Transfer Protocol) is used to send large files of different types. Each protocol is associated with a specific port, for example, FTP messages are addressed to port 21.public networkA large network, such as that associated with an ISP. Public networks are placed in the Internet Zone by default.quarantineZone Labs security software's MailSafe quarantines incoming e-mail attachments whose filename extensions (for example, .EXE or .BAT) indicate the possibility of auto-executing code. By changing the filename extension, quarantining prevents the attachment from opening without inspection. This helps protect you from worms, viruses, and other malware that hackers distribute as e-mail attachments.scriptA series of commands that execute automatically, without the user intervening. These usually take the form of banners, menus that change when you move your mouse over them, and popup ads.security levelsThe High, Med., and Low settings that dictate the type of traffic allowed into or out of your computer.self-signed certificateA public-key certificate for which the public key bound by the certificate and the private key used to sign the certificate are components of the same key pair, which belongs to the signer.server permissionServer permission allows a program on your computer to "listen" for connection requests from other computers, in effect giving those computers the power to initiate communications with yours. This is distinct from access permission, which allows a program to initiate a communications session with another computer.Several common types of applications, such as chat programs, e-mail clients, and Internet Call Waiting programs, may need server permission to operate properly. Grant server permission only to programs you're sure you trust, and that require it in order to work.If possible, avoid granting a program server permission for the Internet Zone. If you need to accept incoming connections from only a small number of machines, add those machines to the Trusted Zone, and then allow the program server permission for the Trusted Zone only.session cookieA cookie stored in your browser's memory cache that disappears as soon as you close your browser window. These are the safest cookies because of their short life-span.SHA1An algorithm used for creating a hash of data.skyscraper adAn ad that appears in a vertical column along the side of a Web page.SpamAn inappropriate attempt to use a mailing list or USENET or other networked communications facility as if it were are broadcast medium by sending unsolicited messages to a large number of people.stealth modeWhen Zone Labs security software puts your computer in stealth mode, any uninvited traffic receives no response--not even an acknowledgement that your computer exists. This renders your computer invisible to other computers on the Internet, until permitted program on your computer initiates contact.TCP (Transmission Control Protocol)One of the main protocols in TCP/IP networks, which guarantees delivery of data, and that packets are delivered in the same order in which they were sent.third party cookiepersistent cookie that is placed on your computer, not by the Web site you are visiting, but by an advertiser or other \'third party.\' These cookies are commonly used to deliver information about your Internet activity to that third party.Trojan HorseA malicious program that masquerades as something useful or harmless, such as a screen saver. Some Trojan horses operate by setting themselves up as servers on your computer, listening for connections from the outside. If a hacker succeeds in contacting the program, he can effectively take control of your computer. This is why it's important to only give server permission to programs you know and trust. Other Trojan horses attempt to contact a remote address automatically.TrueVector security engineThe primary component of Zone Labs security software security. It is the TrueVector engine that examines Internet traffic and enforces security rules.Trusted ZoneThe Trusted Zone contains computers you trust and want to share resources with.For example, if you have three home PCs that are linked together in an Ethernet network, you can put each individual computer or the entire network adapter subnet in the Zone Labs security software Trusted Zone. The Trusted Zone's default medium security settings enable you to safely share files, printers, and other resources over the home network. Hackers are confined to the Internet Zone, where high security settings keep you safe.UDP (User Datagram Protocol)A connection-less protocol that runs on top of IP networks and is used primarily for broadcasting messages over a network.Web bugAn image file, often 1x1 pixel, designed to monitor visits to the page (or HTML e-mail) containing it. Web bugs are used to find out what advertisements and Web pages you have viewed. If you have blocked web bugs using Privacy control, blank boxes will appear in place of the web bugs.WildRefers to a virus that is spreading as a result of normal day-to-day operations on and between the computers of unsuspecting users. The Wild rating refers to the number of customer reports about this virus. A low Wild rating will reflect a low number of customer reports, whereas a Medium or High Wild rating will reflect a more substantial number of customer reports.
|