User Manual

Table Of Contents
some of these apps collect may cause privacy concerns for users who
were not fully aware of the terms in the license agreement.
Archive
A disk, tape, or directory that contains files that have been backed up.
A file that contains one or more files in a compressed format.
Backdoor
A hole in the security of a system deliberately left in place by designers
or maintainers. The motivation for such holes is not always sinister;
some operating systems, for example, come out of the box with privileged
accounts intended for use by field service technicians or the vendor's
maintenance programmers.
Boot sector
A sector at the beginning of each disk that identifies the disk's
architecture (sector size, cluster size, and so on). For startup disks, the
boot sector also contains a program that loads the operating system.
Boot virus
A threat that infects the boot sector of a fixed or floppy disk. An attempt
to boot from a diskette infected with a boot sector virus will cause the
threat to become active in memory. Every time you boot your system
from that point on, you will have the threat active in memory.
Botnet
The term “botnet” is composed of the words “robot” and “network”.
Botnets are internet-connected devices infected with threats and can
be used to send spam emails, steal data, remotely control vulnerable
devices, or spread spyware, ransomware, and other kinds of threats.
Their objective is to infect as many connected devices as possible, such
as PCs, servers, mobile or IoT devices belonging to big companies or
industries.
Browser
Short for web browser, a software app used to locate and display
webpages. Popular browsers include Microsoft Internet Explorer, Mozilla
Firefox and Google Chrome. These are graphical browsers, which means
that they can display graphics as well as text. In addition, most modern
Glossary 304
Bitdefender Total Security