Tag: Security

What is ActiveX?

ActiveX is a series of computer program distribution and runtime technologies. Developed by Microsoft, ActiveX technologies have been incorporated into almost all of Microsoft's products released in recent years including Windows, Word, Excel, and In... [more]



What is Adware?

Adware is software that is distributed without charge in exchange for the user's consent to view advertisements. The name "adware" is a portmanteau of the words "advertisement" and "software". As computer users turn to FOSS or pirate software to redu... [more]



What is Bluetooth?

Bluetooth is a wireless protocol- a method by which devices can communicate without a physical connection such as a cable. Most devices that have cables of less than a meter's length are suitable candidates for being replaced with Bluetooth devices, ... [more]



What is a Botnet?

A botnet is a network of zombie computers controlled by a single entity. The term is a portmanteau of the phrase "Robot Network". Usually, the zombies in use of a botnet are compromised computers running the Microsoft Windows operating system that ha... [more]



What is a Buffer Overflow?

A buffer overflow is a type of computer security exploit which allows a program to perform functions that it is not designed to do. The responsibility for preventing the possibility of exploit lies in the programmer, however this requires proper plan... [more]



What is a Bug?

A bug is an error in a computer program or hardware. While usually the result of programmer error or oversight, bugs can also be introduced into a program through compiler error, incorrect assumptions about hardware or software interfaces, or can be ... [more]



What is DomainKeys Identified Mail?

DomainKeys Identified Mail is a an email authentication method designed to control spam and phishing. Developed by Yahoo, DKIM is now endorsed by major Internet and email related organizations such as the PGP Corporation, Cisco Systems, and the devel... [more]



What is Firefox?

Firefox is Mozilla Corporation's popular open source web browser. Firefox was originally intended to be a lightweight version of Mozilla's Netscape (Seamonkey) browser, intended for those who need a web browser only and do not need the rest of the so... [more]



What is a Firewall?

A firewall is a system that prevents unauthorized access to and from a network. On personal computers, the network protected is often a single computer. These systems typically rely upon a software firewall, that is, a computer program operating in t... [more]



What is Gator?

Gator was a computer program by Claria Corporation. Notorious as one of the first widespread spyware applications, Gator had inadvertently created a revolution in consumer backlash against irresponsible computer program design and malware proliferati... [more]



What is a Hacker?

A hacker is a computer software or hardware expert who displays exceptional knowledge and understanding in his field. Originally, the term was reserved for those who created or modified their hardware to do things that readily available hardware coul... [more]



What is HTML Email?

HTML Email is a type of email message formatted with the HTML markup language. This means that instead of writing plain text, the authors of email messages formatted in HTML can change the font size and colour of their text, and can add pictures, tab... [more]



What is Internet Explorer?

Internet Explorer is Microsoft's integrated web browser. Known by its acronym IE, the program is referred to as an integrated web browser, rather than as a standard web browser, because of the heavy reliance between it and Microsoft's Windows operati... [more]



What is a Keylogger?

A keylogger is a program that records all input from the keyboard. Although often installed by malware on computers running Microsoft Windows, keyloggers are available for all operating systems and can be installed like any other software. System adm... [more]



What is Malware?

Malware is a portmanteau of "malicious software". The term refers to any computer program that harms the computer running it, or the user of that computer. Typically, malware is installed without the user's knowledge or consent, though it is often pa... [more]



What is a Network?

A network is an interconnected system of nodes, or objects. In computer terminology, networks usually refer to either the electric distribution systems some large IT providers manage, or systems of interconnected computers. The largest of these compu... [more]



What is a PAN?

PAN is an acronym for Personal Area Network. A PAN is a network of battery or solar powered devices worn on the human body to enhance communication, leisure, productivity, or awareness. Typical devices found in a PAN are a cellular telephone, wristwa... [more]



What is Phishing?

Phishing is a form of computer attack in which the attacker poses as a trusted entity. Usually, phishing attacks are conducted against random victims via forged email messages that appear to come from a bank, eBay, PayPal, or another other trusted co... [more]



What is a Rootkit?

A rootkit is a type of computer program that hides its presence from the administrator of the machine. Usually installed as malware, rootkits are very difficult to detect and remove because they erase all evidence of their presence. Often, the only v... [more]



What is a Router?

A router is a computer hardware component that directs data between networks, or within a single network. Often, consumer-grade routers are used to connect several home computers to a single Internet connection, and/or to each other. Commercial route... [more]



What is Spam?

Spam refers to both the process of sending unsolicited messages via the Internet, and to the messages themselves. However, the term "unsolicited messages" is open to debate, and as such what is considered spam varies widely. In the strictest sense, s... [more]



What is Spyware?

Spyware is any computer program that reports usage patterns or specifics of the computer on which it is installed to a third party. Spyware is a type of malware that generally does not adversely affect the performance of the computer on which it is r... [more]



What is SQL Injection?

SQL injection is a type of computer security exploit in which an attacker can gain access to remote database systems. Using a carefully-constructed value for a form field, such as a name or email address, an attacker can fool the application into req... [more]



What is Storm?

The Storm Botnet is a distributed computer network consisting of computers remotely controlled without their owner's knowledge. Computers in the Storm Botnet are home and small office machines running the Microsoft Windows operating system which have... [more]



What is a Virus?

A virus is a computer program that is capable of self-replicating and executing copies of itself on remote systems. In this sense, the computer virus is similar to a biological virus, from whence it draws its name. While a virus by definition does no... [more]



What is XSS?

XSS is an abbreviation for Cross Site Scripting. This refers to a type of computer security vulnerability where malicious users can add carefully-constructed comments to webpages with the intention of fooling web browsers. While most websites have fi... [more]



What is a Zero-Day Exploit?

A zero-day exploit is a computer security vulnerability that is being actively practiced before knowledge of the exploit becomes public information. Usually, two groups of experts research and discover new security exploits: those who are interested ... [more]



What is a Zombie?

A zombie is a computer that is remotely controlled by an unauthorized entity. Most active zombies today are personal computers running the Microsoft Windows operating system that have been infected with malware. Other zombies may be compromised Windo... [more]



What is Zonealarm?

Zonealarm is a software-based firewall for the Microsoft Windows operating system. It is produced by Zone Labs and released under several different versions, each providing different features and cost. Some of these versions include anti-virus protec... [more]


Search:

  • Custom Search

Newsletter

Bookmarking:

EntreCard

Something New!

7 more days...