In the TCP/IP protocol, a TCP port identifies a logical connection that an application can use to transport data. For example, TCP port 80 is normally used to send HTTP messages.
The primary storage area for new transactions made to ESE databases. Data is written to these logs sequentially as transactions occur. Regular database maintenance routines then commit changes in the logs to the actual databases.
A malicious program that embeds itself inside a normal, safe- looking program. Whereas viruses need to attach themselves to replicate, Trojans embed themselves entirely within another program. When the host program is run, the Trojan runs as well.