![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/6/3b/63bff206-3317-4ea6-b13f-6a0448f89f74/63bff206-3317-4ea6-b13f-6a0448f89f74-bg92.png)
passwords and credit card, social security, and bank account numbers, that the
legitimate organization already has. The Web site, however, is bogus and set up
only to steal the user’s information.
Polymorphic virus
A virus that changes its form with each file it infects. Since they have no consistent
binary pattern, such viruses are hard to identify.
Port
An interface on a computer to which you can connect a device. Personal
computers have various types of ports. Internally, there are several ports for
connecting disk drives, display screens, and keyboards. Externally, personal
computers have ports for connecting modems, printers, mice, and other peripheral
devices.
In TCP/IP and UDP networks, an endpoint to a logical connection. The port number
identifies what type of port it is. For example, port 80 is used for HTTP traffic.
Report file
A file that lists actions that have occurred. BitDefender maintains a report file
listing the path scanned, the folders, the number of archives and files scanned,
how many infected and suspicious files were found.
Rootkit
A rootkit is a set of software tools which offer administrator-level access to a
system. The term was first used for the UNIX operating systems and it referred
to recompiled tools which provided intruders administrative rights, allowing them
to conceal their presence so as not to be seen by the system administrators.
The main role of rootkits is to hide processes, files, logins and logs. They may
also intercept data from terminals, network connections or peripherals, if they
incorporate the appropriate software.
Rootkits are not malicious in nature. For example, systems and even some
applications hide critical files using rootkits. However, they are mostly used to
hide malware or to conceal the presence of an intruder into the system. When
combined with malware, rootkits pose a great threat to the integrity and the security
of a system. They can monitor traffic, create backdoors into the system, alter files
and logs and avoid detection.
Script
Another term for macro or batch file, a script is a list of commands that can be
executed without user interaction.
Glossary
133
BitDefender Antivirus 2008