List of terms
Actions — Based
on the rules set in the Admin Panel, the Agent carries
out actions on user computers. These actions are terminating
a process, forbidding an event, notifying
an administrator, informing the user, saving copied files, and
ending user sessions.
Agent — a Security
Curator component that runs on user computers, collecting
information for display in the Admin Panel and carrying out
actions with regard to users.
Agent list — User
computers are added to this list in the Admin Panel. The
list shows active and inactive computers.
Data Filtration — the
display of user-requested data as the result
of a user-created query.
Data stream —
an abstraction used to read and write files, sockets and
the like in a uniform manner. Streams are
a convenient, unified programming interface for reading and
writing files (including special files and, particularly, those
associated with a device), sockets and transferring data
Data transfer protocols —
a set of agreements for the exchange of data between
various programs. Protocols set the methods for transferring
messages and processing network errors, as well as allow
for designing standards that are not tied to a particular
DNS (Domain Name System) -a
distributed system which returns an IP address
or other information for a query containing a host’s
(computer or other network device) domain name. DNS
is used on TCP/IP networks.
Event — a message
from a piece of software (or component) indicating
what has happened.
File operations — There
are two types of file operations: those associated with
opening a file and those that are not. File operations are
opening a file for changes, deleting a file, renaming
a file, copying a file, transferring a file
to another file system/drive, and getting or changing
File Transfer Protocol
(FTP) — a file transfer protocol for
transferring files over computer networks. FTP allows connecting
to FTP servers, viewing folder contents, downloading files
from the server and uploading files to the server.
Filter list — a list
of rules for filtering data for display; these rules are
created in the Data Flow section using parameters that specify
an event on a user computer.
Host — a computer
or server connected to a local or global
network on which a database is located.
IP address (Internet Protocol
Address) — the address of a node
on an IP-based network. When connecting over
the Internet, the address must be globally unique, while
on local networks, the address must be unique within the
IP protocol — the
basic protocol for the Internet. The IP protocol is used
for the non-guaranteed delivery of data, which
are split into so-called packets sent from one network
node to another, and serves as the basis for
higher-level protocols such as TCP and UDP.
Mail protocol — This
protocol includes several protocols used for
POP3 (Post Office Protocol Version
3) — This is used by mail clients
to receive e-mail messages from a server.
Usually used together with SMTP.
SMTP (Simple Mail Transfer Protocol) — This
network protocol is designed to transfer
e-mail over TCP/IP networks. Used to send mail
from users to servers and between servers for further
forwarding to the end recipient.
IMAP (Internet Message Access Protocol) —
This protocol for accessing Internet e-mail
is used for incoming mail and provides additional functions,
most notably, keyword search while storing mail on the server
and not in local memory.
Network port — this
parameter of the TCP and UDP protocols determines the
destination of IP data packets transmitted
to a host over a network. Every program processes
data which come through a particular port. Usually, some
widespread network protocols have standard port numbers (for
example, web servers usually accept HTTP data on TCP port 80),
although it most cases a program can use any port.
Process — the execution
of a computer program’s passive instructions. The sum
total of the interconnected and interacting actions which
transform input into output.
Proxy server —
a service on computer networks that allows clients
to make indirect requests for other network resources. The
client firsts connects to the proxy server and requests
a resource (for example, e-mail) located
on another server. Then the proxy server either connects
to the specified server and receives the resource from it,
or it returns the resource from its own cache
(if the proxy has its own cache). A proxy server also
allows protecting client computers from some kinds of network
Regular expressions —
a system for using syntax to parse text fragments
according to a formalized template; based
on a system for writing search patterns.
Recipient — the person
to whom a message or e-mail
is addressed (sent), the addressee of correspondence.
TCP protocol (Transmission Control
Protocol) — one of the primary network protocols
on the Internet, used to control the transmission
of data on TCP networks and subnetworks. TCP
is a data stream sent from one source to another.
This protocol guarantees that the application will receive data
in exactly the same order in which they were sent,
Telnet protocol (Teletype
Network) — a network protocol for a network
text interface using TCP transport. Its main task
is to allow terminal devices and terminal processes
to interact with one another. Read more.
URL (Uniform Resource
Locator) — a uniform locator (location
identifier) for a resource.
The traditional way of writing a URL is:
Scheme — scheme name
for accessing a resource, usually the network protocol
is what is meant
Username — a user’s computer identity
that is used to access a resource
Password — the password associated with the
Host — a host domain name mapped using
DNS or a host IP address in the form
of four numbers separated by periods. These numbers have
a value from 0 to 255.
Port — the host’s port for connections
URL path — information that details where the
resource is located (depending on the protocol).