-
1 software update
"Any update, update rollup, service pack, feature pack, critical update, security update, or hotfix used to improve or fix a software product released by Microsoft Corporation." -
2 security disabler
A type of Trojan that disables security settings or products such as antivirus software. -
3 Microsoft Malware Protection Center
"A web portal that supplies the core malicious software (malware)-fighting technology, including the scanning engine and malware definition updates, for Microsoft Forefront Client Security, Forefront Server Security Management Console, Windows Live OneCare, Windows Defender, and other Microsoft security solutions and technologies."English-Arabic terms dictionary > Microsoft Malware Protection Center
-
4 dongle
A security device connected to an input/output port to permit the use of a particular software package on that computer. The use of the hardware key hash permits backup copying of software but prevents its unlicensed use on additional computers. -
5 high priority update
A classification used on the Windows Update web site and by the Windows Update Service to recommend Microsoft software updates and drivers that help protect against the latest publicly known security threats and reliability issues. All software updates and drivers that can be installed by turning on Automatic Updates on your computer are classified as high priority. These can also be installed by visiting the Windows Update web site. -
6 Application Compatibility Toolkit
"A suite of tools that enables software developers, independent software vendors (ISVs), and enterprise IT professionals to determine whether their applications are compatible with a new version of Windows before rolling it out to the company. ACT also enables such individuals to determine how Windows security updates may impact their applications."English-Arabic terms dictionary > Application Compatibility Toolkit
-
7 threat model
"A systematic analysis of identifying assets, and assessing and documenting the security risks associated with those assets exposed via software. The threat modeling process involves an understanding of the goals of an adversary in attacking a system based on the systems assets of interest. The scope of the threat model is defined by the scope of functionality of software being modeled." -
8 Event Viewer
"A component you can use to view and manage event logs, gather information about hardware and software problems, and monitor security events. Event Viewer maintains logs about program, security, and system events." -
9 Windows Intune Endpoint Protection
"A security solution that helps enhance the security of client computers by providing real-time protection against potential threats; keeping malicious software, or malware, definitions up-to-date; and automatically running scans."English-Arabic terms dictionary > Windows Intune Endpoint Protection
-
10 Endpoint Protection
"A security solution that helps enhance the security of client computers by providing real-time protection against potential threats; keeping malicious software, or malware, definitions up-to-date; and automatically running scans." -
11 MSRC severity
"A rating that describes the severity of a security issue addressed by a software update, as determined by the Microsoft Security Response Center (MSRC)." -
12 back door
A hardware or software-based hidden entrance to a computer system that can be used to bypass the system's security policies. -
13 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
14 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
15 trusted platform module
Microchip designed to provide certain basic security-related functions to the software that utilizes TPM. -
16 TPM
Microchip designed to provide certain basic security-related functions to the software that utilizes TPM. -
17 health policy
"A collection of software requirements, security update requirements, and required configuration settings for NAP client computers." -
18 standard account
A type of user account that allows users to install software and change system settings that do not affect other users or the security of the computer. This account type is recommended for daily use. -
19 Microsoft® Office Communicator 2007
"Microsoft instant messaging software that provides security-enhanced, enterprise-grade instant messaging with enhanced voice, video and telephony integration."Microsoft® Office Communicator 2007English-Arabic terms dictionary > Microsoft® Office Communicator 2007
-
20 host adapter
A software component that lets you run tests in a specific environment. This hosting environment may be a specific process such as sqprsqext or a process with particular traits such as limited security or custom environment variables.
- 1
- 2
См. также в других словарях:
Security software — is a generic term referring to any computer program or library whose purpose is to (help) secure a computer system or computer network.* Antivirus software * Cryptographic software * Firewall * Spyware remover * Any Operating system security… … Wikipedia
IKARUS Security Software — Для термина «Ikarus» см. другие значения. IKARUS Тип … Википедия
Avira security software — Infobox Software name = Avira security software caption = Main interface of Avira AntiVir PersonalEdition Classic developer = Avira GmbH released = latest release version = V8.01.00.64 (Search engine) V7.00.05.235 (Virus definition file) latest… … Wikipedia
Next Generation Security Software Ltd — Nest Generation Security Software has been changed to NGS Secure Ltd is a security company headquartered in Manchester, England providing information assurance and compliance services. NGS Secure is the result of an acquisition of a number of… … Wikipedia
Software Security Assurance — Software is itself a resource and thus must be afforded appropriate security. Software also contains and controls data and other resources. Therefore, it must be designed and implemented to protect those resources. Software Security Assurance is… … Wikipedia
Security as a service — refers to the practice of delivering traditional security applications as an Internet based service, on demand, to consumers and businesses. It is an example of the everything as a service trend and shares many of the common characteristics,… … Wikipedia
Software testing — is an empirical investigation conducted to provide stakeholders with information about the quality of the product or service under test [ [http://www.kaner.com/pdfs/ETatQAI.pdf Exploratory Testing] , Cem Kaner, Florida Institute of Technology,… … Wikipedia
Tiger (security software) — Tiger Security Tool Stable release 3.2.3 / March 3, 2010; 19 months ago (2010 03 03) Operating system Unix, Linux, Solaris Available in English … Wikipedia
Security-Enhanced Linux — The SELinux administrator in Fedora 8 Security Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, including United States Department of Defense style mandatory access controls,… … Wikipedia
Software Assurance — (SwA) is defined as “the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at anytime during its lifecycle, and that the software functions in the intended… … Wikipedia
Software as a service — (SaaS, typically pronounced sass ) is a model of software deployment where an application is hosted as a service provided to customers across the Internet. By eliminating the need to install and run the application on the customer s own computer … Wikipedia