Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] verifying backups VHDSL (Very High Bit Rate DSL) virtual-circuit packet switching virus hoaxes viruses worms; spyware [See also trojan horses] virus protection strategies automated virus scanning/updates document backups email vetting 2nd in-house policies/rules threat monitoring user education virus scanning virus protection strategies virus scanning (antivirus software) viruses boot sector viruses criteria for defining file viruses 2nd macro viruses polymorphic viruses worms spyware; virus hoaxes [See also trojan horses] visual indicators LED 2nd NIC 2nd states list table VLAN (Virtual Local Area Networks) 2nd 802.lq specification (IEEE) advantages of memberships MAC-based 2nd port-based protocol-based 2nd VPN (virtual private networks) access methods clients protocols servers |