Installation guide

NOD32 Installation Guide
53
Operating Memory The area of memory used by the system to run itself and any loaded programs.
Some Operating memory (also called System Memory) on the disk in a “swaple”,
which is a type of Cache, and the rest in the RAM chips on the computer. Viruses
try to load themselves into Operating Memory so that they remain active while the
computer is switched on.
Password Your password, secret word or code used to access information. For instance,
your personal password assigned by ESET to access the ESET servers for
updates, upgrades and downloads. (You may also set your own password to
protect your settings from other users on your computer. This is set by you and
should not be confused with ESET’s password).
POP3 Version 3 of the Post Ofce Protocol. POP3 allows a client computer to retrieve
electronic mail from a POP3 server via a (temporary) TCP/IP or other connection.
It does not provide for sending mail, which is assumed to be done via SMTP or
some other method. IMAP and POP3 are the most common methods for email
retrieval.
Proxy Server A computer specically designed to reduce the amount of bandwidth used, or
to control access to the internet. A proxy will be either a “caching” – meaning it
stores a copy of the content downloaded through it for faster future access – or
“pass through” – meaning it will simply provide a gateway to other services, for
instance websites. Usually home users will not be using a proxy.
RAM Random Access Memory – Used for the operating memory which can be used
by programs to perform necessary tasks while the computer is on; an integrated
circuit memory chip which allows information to be stored and accessed far faster
than from the hard disk.
ROM Read Only Memory - memory whose contents can be accessed and read but
cannot be changed – used mainly for the system BIOS and CMOS chips. (These
tell the machine how to start up and nd the disks)
Runtime Packers Packers do simply as their name suggests, they ‘pack’ or ‘compress’ a program
much the same way a compressor like Pkzip does, packers then attach their own
decryption / loading stub which ‘unpacks’ the program before running it. Packers
are often used by virus writers to try to confuse anti-virus scanners.
SMTP Simple Mail Transfer Protocol. Allows electronic mail to be sent from an email
account. The SMTP dialog usually happens in the background under the control
of the message transfer agent, e.g. sendmail or outlook express.
Spyware Software that secretly collects personal information and delivers it to an
unauthorised 3rd party. Some Spyware can signicantly slow the machine, or
cause system crashes.
ThreatSense.Net™ The ThreatSense.Net™ Early Warning System assists in submitting new malware
threats to ESET’s lab and therefore provides valuable information to help protect
the user’s PC.
Trojan Horse A Trojan Horse is a program intended to perform some covert and usually
malicious act which the victim did not expect or want. It differs from a virus in that
it doesn’t replicate, although some viruses can contain Trojans.
URL Uniform Resource Locator - The structure of a web address. ie: the HTTP part
(HyperText Transfer Protocol), the domain name or IP address and the nal
section (top level domain): [.com] [.uk] [.org] [.net] [.gov]...etc.
For example: http://www.ESET.com
Username Your personal username assigned by ESET to access the ESET servers to
download updates and upgrades.
Virus A computer virus is a self-replicating program that copies itself and that can
“infect” other programs by modifying them or their environment such that a call to
an infected program implies a call to a possibly evolved copy of the virus.
VSD Virus Signature Database - The collective, known “signatures” of viruses,
released by ESET, on average, every day, to keep your computer up to date with
protection.
Worm A subset of viruses which replicate as above but without requiring a host le (The
worm le contains everything necessary for the virus to replicate itself). Worms
require a networked system to reproduce. Email is one method a worm can use
to spread.