The glossary below contains many of the terms you will find in common use throughout the Symantec Security Response website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.
To be listed as a non-vulnerable system, a system must be potentially vulnerable to the exploit. For example, it is unlikely that a Microsoft OS vulnerability would also effect the Linux OS because of fundamental differences. As a result, even though the Linux OS is not vulnerable, it would not be listed as a non-vulnerable system.
Follow us for all the latest news, tips and updates.