User Manual

Table Of Contents
Path
The exact directions to a file on a computer. These directions are usually
described by means of the hierarchical filing system from the top down.
The route between any two points, such as the communications channel
between two computers.
Phishing
The act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering
private information that will be used for identity theft. The email directs
the user to visit a website where they are asked to update personal
information, such as passwords and credit card, social security, and
bank account numbers, that the legitimate organization already has.
The website, however, is bogus and set up only to steal the user’s
information.
Photon
Photon is an innovative non-intrusive Bitdefender technology, designed
to minimize the performance impact of your security solution. By
monitoring your PC’s activity in the background, it creates usage patterns
that help optimize booting and scanning processes.
Polymorphic virus
A threat that changes its form with each file it infects. Since they have
no consistent binary pattern, such threats are hard to identify.
Port
An interface on a computer to which you can connect a device. Personal
computers have various types of ports. Internally, there are several ports
for connecting disk drives, display screens, and keyboards. Externally,
personal computers have ports for connecting modems, printers, mice,
and other peripheral devices.
In TCP/IP and UDP networks, an endpoint to a logical connection. The
port number identifies what type of port it is. For example, port 80 is
used for HTTP traffic.
Ransomware
Ransomware is a malicious program that tries to make money from
users by locking their vulnerable systems. CryptoLocker, CryptoWall,
Glossary 309
Bitdefender Total Security