Technology Toolkit


adware

A form of malicious code that displays unsolicited advertising on your computer.



antivirus software

Computer software that attempts to block malicious programs/code/software (called viruses or malware) from harming your computer.



blog

A diary or personal journal kept on a Web site, usually updated frequently, that might be private or might be intended for public viewing.



bots

Computer programs that automatically perform a repetitive task, such as searching through Web sites or indexing information.



buddies (buddy list)

A list of friends you interact with online through various media such as instant messaging.



buddy search

When two (or more) Internet users search the Web together, both users see the search results simultaneously.



chat room

An online site used for social interaction, usually based on a topic or theme, where people with shared interests can meet others.



content filtering

Allows you to block certain types of content from being displayed. There are certain Web sites that you know you don't want your children to see. Many software programs allow you to block information that you find inappropriate or offensive. Some of the things you can screen for include coarse language, nudity, sex, and violence. In addition, many Internet browsers have parental controls to help protect your child from stumbling onto inappropriate sites. You can often choose separate levels of security for each child based on their ages and maturity levels.



cybercriminals

Those who commit criminal activity that targets computers or information or that leverages computers and online information to find real-world victims.



cybersex

Also called "computer sex," "Net sex," and "hot chat." Refers to virtual sex encounters in which two or more persons pretend to be having actual sex through describing their actions and responding to their partner's descriptions. This is mostly done through text, images, voice, and video.



discussion boards

Also called Internet forums, message boards, and bulletin boards. These are online sites that allow users to post comments on a particular topic.



download

Transferring material from a server or remote computer to your computer, mobile device, or game console.



e-mail signature

A block of text added at the end of an e-mail message, usually automatically. It can contain your full name, your job description, location, or phone number, and even an inspirational thought.



emoticons

Small graphics (like smiley faces) used to indicate emotional state, opinion, or response when no body language is providing those cues.



file sharing

The ability to store files either in a central place that can be shared with as few as one other person or publicly. Files can be stored on the Internet or on any computer that provides access to others. File sharing allows others who have permission to access the shared file to modify or download it.



firewall

A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer through a network such as the Internet. Installing or activating a firewall feature on your home computer is one of the most important actions you can take to help to protect your computer.



for-pay items (winks, avatars)

Low-cost add-on products that allow users to customize their experiences on cell phones or in instant messaging devices. These can be cartoon-like images (called avatars) or animated cartoons (called winks) that you can send to others.



game console

A machine that is specifically designed for playing video games (although it might also play movies), often hooked up to a TV or computer monitor for viewing. Not all game consoles are capable of Internet connections or are connected to the Internet, but if they are connected they allow users to play games with others remotely.



gamer tag

The nickname a user has chosen to be identified by when playing Internet games.



gaming

The act of playing or participating in online games.



grooming

The systematic way that sexual predators manipulate their victims into trusting them, depending on them, and ultimately meeting them. This usually involves sympathy, subtle ways to alienate the victim from others, and flattery. It might also involve money, gifts, or promises of workespecially "modeling jobs." Predators are very skilled at tuning into whatever tactics will work with a particular child given their specific vulnerabilities, and adapt their strategies accordingly. This might occur over only a few days, or might happen over an extended period of time, often between one and six months of slow "seduction." Often older children are so mentally manipulated that they actually come to believe it is a "love" relationship and might willingly participate in their own abuse. It might take years for them to realize the exploitive nature of the abuse.



GSM (Global System for Mobile communication)

A digital cellular telephone technology. This system is used mainly in Europe, Australia, and the Middle East, although it is becoming more popular in the United States.



handle

(as in "blog handle") A nickname an Internet user chooses to display to others online.



identity theft

Stealing someone's identity in order to impersonate them, usually for financial gain.



instant messaging

A real-time, text-based communication used on desktop computers, cell phones, and other devices to send short messages between individuals.



interactive gaming

The ability to play games online, interacting with other players. Covers a broad spectrum of activities from children's games to online gambling.



keystroke logging

A legitimate way for software developers to understand what is happening as they write code. It can also be used to track a user's activities online to either monitor or spy on (depending on your point of view) what they type and what sites they visit. A keystroke-logging program might be downloaded by parents to watch their children, by children to watch their parents, or by one adult to watch another adult. It might also be downloaded onto your computer in stealth by malicious cybercriminals who then have information about your online activities sent to them so that they learn your passwords and banking information, for example.



location application

A program that enables you to locate the whereabouts of anybody logged on to the Internet from a variety of devices.



malware

Stands for malicious software; an umbrella term that includes any type of harmful codeTrojans, worms, spyware, adware, and so onthat infiltrates a computer without the consent of the computer user and is designed to damage the computer, collect information, or allow the computer to be subverted and used remotely to send spam.



Multimedia Messaging Service (MMS)

A method for sending messages from mobile phones that includes audio, video, or images.



mobile computing

Use of a portable device that provides computer functions and can usually connect to the Internet, even when changing locations.



parental controls

Products or services that offer options to parents to help restrict their child's experiences with media or filter media content. These restrictions are currently applied to television services, computer and video games, and Internet access.



peer-to-peer

A method of sharing files directly over the Internet from one Internet-enabled device to another (computer, mobile phone, and so on). This is often done with music files, for example, which might violate copyright laws if the people involved make copies of the material without permission to do so.



persona

The person an Internet user chooses to appear to be, rather than the person they are. For example, a 56-year-old man might assume the persona of a 12-year-old girl who wants to meet other 12-year-old girls.



personal digital assistant (PDA)

A small handheld computing device typically used to track appointments, contacts, and e-mail.



phishing

The practice of scamming someone into divulging confidential information they normally would not provide to a stranger. The lure is typically via e-mail that brings the user to a scam Web site. The purpose of phishing is to gather the information needed to steal a victim's money or identity.



posting information

To upload information to the Web.



predator

Anyone who preys on others.



remote access

The ability to allow access to your computer by another user at another location. Remote access is often used in technical support as a way to fix problems, as it provides full access to the information stored on the computer through a data link.



scam

To con, cheat, trick, swindle, sting, or rip off others.



search engine

An Internet service that helps you search for information on the Web.



smartphone

A handheld device that incorporates features of a mobile phone, with PDA functions such as a calendar or contact database. Smartphones allow you to install additional features on them.



SMS

Stands for Short Message Service, a form of text messaging on cell phones, sometimes used between computers and cell phones.



social networking

A category of Internet applications to help connect friends, business partners, or other individuals together using a variety of tools.



spam

Unsolicited e-mail attempting to sell you something. Also known as junk mail.



spim

Spam sent via an instant message, typically unsolicited and attempting to sell you something.



splog

Spam sent via blogs, typically unsolicited and attempting to sell you something.



spyware

Software that collects information about you without your knowledge or consent and sends it back to whomever wrote the spyware program. Spyware might look for your banking information, personal information, and so on. It is illegal and pervasive.



Subscriber Identity Module (SIM)

A small card that holds your identity, authentication, address book, and so on, in some cellular phones.



surfing

Similar to channel surfing on a television, Internet surfing involves users browsing around various Web sites following whatever interests them.



text messaging

A method of sending short messages (also called SMSes, txts, or texting) between mobile phones, other computing devices, and even some landline phones.



URL

Uniform Resource Locator, a unique Internet address of a file or destination. To find a particular site or document, type the URL into the browser window and the browser will bring up that particular Web site.



user name

The name a user selects to be identified by, for example on a computer on a network or in an online gaming forum (also called nickname or gamer tag).



videocams

Also called webcams. Video cameras that are often (though not always) attached to a computer so that a video image can be sent to another when communicating online.



virus

A self-replicating software program that spreads to other computers by sending copies of itself to other devices hidden in code or attached to documents. Viruses are often deliberately destructive to any device that becomes "infected," often destroying data or disabling the device's operating system.



Voice over Internet Protocol (VoIP)

Use of an Internet protocol to transmit voice communications. VoIP allows you to hold voice conversations over the Internet.



web hosting

A service that provides individuals, organizations, and businesses with online storage space to store and share information, images, blogs, video, or any other content accessible through the Web.





Look Both Ways. Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors: Linda Criddle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net