|
|
Programs that display advertisements, often retrieved off the Internet. See Freeware, Open source, and Shareware.
(Advanced Encryption Standard) An encryption standard defined by the United States government. See DES.
A program or website that strips away an email address from a message and then forwards it, allowing you to send email without revealing your identity or location.
A program that detects and removes computer viruses.
(America Online) The most popular (and hated) online service in the world.
A low-level machine programming language. Each specific family of microprocessors (such as Intel or Motorola microprocessors) has its own assembly language that allows maximum flexibility in controlling the computer. Most viruses are written in assembly language, although a few are written in BASIC, C, or Pascal.
A hidden entry point into a computer or program. Hackers often create back doors in a computer so they can return later and quickly bypass any security or log-in procedures normally required.
One of the most popular remote access Trojan horse programs. See RAT and Trojan horse.
Term describing a hacker who uses his or her skills for malicious purposes, such as deleting files and crashing computers. See White hat hacker.
Popular encryption algorithm freely available for anyone to use.
The part of the disk that identifies the disk type (floppy or hard), the size of the file allocation table, the number of hidden files, and the number of files in the root directory. Every disk has a boot sector, which makes every disk vulnerable to boot viruses. See Boot virus.
A virus that infects the boot sector of a disk.
A method of discovering a password by exhaustively trying all possible combinations of words and numbers until you find the right one.
Popular programming languages used to write most operating systems and programs such as Linux, Windows, and Microsoft Word. C was the original language used to develop Unix, while C++ is an object-oriented version of C.
Generic term for programs, such as parental control programs, that block or limit access to certain websites and Usenet newsgroups. See Parental control software.
The numeric result of some calculation (for example, a one-way hash function) based on the physical contents of a file, that uniquely identifies that particular file. If the file changes in any way, its checksum also changes. Checksums are often stored in a separate file that may be encrypted, hidden, or saved on a separate floppy disk. Antivirus and anti–Trojan horse programs use checksums to identify when a file may have been altered (and thus possibly infected). Similarly, computer forensics experts often use checksums to verify that a file hasn't been changed since the computer was first seized by the police.
One or more sectors on a disk, containing all or part of a file. See Slack space.
(complementary metal-oxide semiconductor) A battery-powered chip that stores information about a computer's configuration. Many viruses target this chip because it can keep your computer from working properly.
To turn a computer off and then back on again. See Warm boot.
A now obsolete type of MS-DOS virus that stores itself as a separate file, usually as a .com file. Companion viruses name themselves after an infected program file, such as wp.exe, but with the .com file extension.
A program that converts source code into an executable program. See Decompiler.
1. A malicious hacker. 2. A type of program that can defeat encryption or copy protection.
Defeating a program's copy-protection method or bypassing any password or encryption scheme.
A program that creates credit card numbers using the same mathematical formula used by the credit card companies.
Capable of running on multiple operating systems.
|
|