F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 312
312
IPSec
(IETF) The IP Security Protocol is designed to provide interoperable,
high quality, cryptography-based security for IPv4 and IPv6. The set
of security services offered includes access control, connection-less
integrity, data origin authentication, protection against replays,
confidentiality (encryption), and limited traffic flow confidentiality.
These services are provided at the IP layer, offering protection for IP
and/or upper layer protocols.
ISP
Internet Service Provider. An institution that provides access to the
Internet in some form.
JAR
Java ARchive. A file format used for aggregating many files into one.
Kernel Mode
The part of the Windows operating system, through which, among
other things, user-mode applications and services use an API to
interact with the computer's hardware. The Kernel mode also
contains an interface to user-mode, and a facility for synchronizing it's
own services and coordinating all I/O functions. Kernel mode memory
is protected from user mode access.
LAN
(Local Area Network) A computer network limited to the immediate
area, usually the same building or floor of a building. Sometimes
using a simple network protocol.
Malformed header
Malformed e-mail message header. Typically non-standard encoding
of MIME format. Malformation is either caused by a worm, a malicious
person or an error in the sending e-mail client. A rapidly increasing
number of e-mail worms are using malformed e-mails to spread.
Malware
Malware (from "malicious software") is programming or files that are
developed for the purpose of doing harm. This includes computer
viruses, worms and Trojan horses.