EasyManuals Logo

Sophos WS100 User Manual

Sophos WS100
237 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #236 background imageLoading...
Page #236 background image
Proxy Automatic Configuration (PAC) is a way to automatically set the appropriate proxy for a
given URL request.This is done by developing a JavaScript file with a .pac extension that is
used by users browsers and which evaluates their URL requests and forwards each request to
the appropriate proxy.This approach has the advantage of being completely within the control of
network administrators and of operating transparently from the perspective of end users. Explaining
how to create, implement and maintain PAC files is beyond the scope of this documentation. For
details on the development and use of PAC files, you can start with Mozilla.orgs PAC End User
Guide for Firefox and Microsofts Automatic Discovery of Firewall and Web Proxy Clients page.
G.21 SophosLabs
A 24/7 network of skilled analysts who respond to evolving security threats.The SophosLabs
organization is a global network of highly skilled analysts who have been protecting businesses
from known and emerging threats for more than 20 years. Focused on rapidly evolving threats
like viruses, spam, phishing schemes, spyware and other malware, SophosLabs provides both
proactive and rapid solutions for all Sophos customers. Our global network of threat analysis
centers ensures Sophos is able to respond to new threats without compromise, achieving the
highest levels of customer satisfaction and protection in the industry.
G.22 spyware
Software that covertly gathers information on users internet activities. Spyware gathers user
information through the users internet connection without his or her knowledge, usually for
advertising purposes. Spyware applications are typically bundled as a hidden component of
freeware or shareware programs that can be downloaded from the internet. Once installed, the
spyware monitors user activity on the internet, and transmits that information in the background
to someone else.
G.23 Trojan
A seemingly legitimate computer program designed to do damage. A seemingly legitimate computer
program that has been intentionally designed to disrupt and damage computer activity. Trojans
are sometimes used in conjunction with viruses. A backdoor Trojan is a program that allows other
computer users to gain access to your computer across the internet.
G.24 virus
Often viruses will disrupt computer systems or damage the data they contain. A virus requires a
host program and will not infect a computer until it has been run. Some viruses spread across
networks by making copies of themselves or may forward themselves via email.The term 'virus
is often used generically to refer to both viruses and worms.
236 | Glossary | Sophos Web Appliance

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Sophos WS100 and is the answer not in the manual?

Sophos WS100 Specifications

General IconGeneral
BrandSophos
ModelWS100
CategoryFirewall
LanguageEnglish

Related product manuals