A clever or elegant modification to computer software to gain unauthorized access or otherwise cause computer software to malfunction.
hacker
A person able to exploit a computer system or gain unauthorized access, usually by creating or modifying computer software.
heuristics
Process where information about known viruses is used to attempt detection of unknown or suspected viruses, attempting to halt viruses based on their behavior instead of exact signature.
hijacker
Applications that are designed to hijack the user's home page, HOSTS file, browser favorites, chosen search engine, or system settings.
hotspot
A wireless network available for use in a public place such as a coffee shop or airport.
HTTP (Hypertext Transfer Protocol)
This is the computer communication language used to retrieve information from web pages written in certain "markup" languages.