G-M

Gnutella

Program designed to allow people to "share" audio and video files with each other over a distributed network. See Napster.

Hacker

Slang name given to someone extremely knowledgeable about computers. Pejorative in some circles—but not here. See Cracker.

Hacking

The process of examining and experimenting with something, such as the telephone system or a computer, in order to find out how it works. Hacking often occurs without the owner's knowledge or permission.

Hacktivism

Form of protest that uses computer skills, mostly focusing on website defacing, to spread a message. See Web site defacing.

Hate group

An organization or collection of people who advocate violence and discrimination against another group of people. Usually motivated by religious or racial differences.

Heuristic analysis

Sometimes called rule-based or artificial intelligence analysis, it uses intelligent guesswork, which more often than not finds the solution faster than a standard algorithm. Antivirus programs use heuristic analysis to examine a file, and based on typical virus characteristics, make an educated guess as to whether a file is infected or not.

Hex editor

A program that can directly examine and modify the contents of a file or disk.

Honeypot

A phony target used to tempt hackers. Often used to keep hackers logged on to a system long enough to trace their location, or to lure a hacker into a harmless part of a network so that he or she can't get out and cause real damage . Also called a goat file.

ICQ

Popular instant messaging program.

Identity theft

Passing yourself off as another person electronically.

Information warfare

Popular term to describe hacking on an individual, commercial, and international level.

Integrity checker

A program that examines each file and calculates a numeric result based on that file's size, time, and date stamp. If the integrity checker notices that the file's size, time, or date has changed, it assumes the file may have been infected by a virus or modified by a hacker. See Checksum.

Intrusion-detection system

Program designed to detect the presence of a hacker who has already penetrated a system. Often abbreviated as IDS.

IRC

(Internet Relay Chat) A loosely structured network where people can type and send messages to each other in real time.

Java

Cross-platform programming language used to create web page applets and full-blown applications.

Keystroke recorder

A program that records keystrokes and/or mouse clicks on a computer, usually without the user's knowledge.

Linux

A free version of Unix designed for personal computers. Although Linux can be copied and distributed without restriction, many companies sell their own versions of Linux that include technical support, software, or other value-added services.

Logic bomb

A type of program, often buried within another program, that is set to go off on a certain date or by a specific event, erasing data or crashing the computer. Logic bombs are often inserted by disgruntled programmers willing to sabotage their own programs to get back at their employers.

Macro virus

A virus written using the macro programming language of a particular program. The most common macro viruses are written in WordBasic or Visual Basic for Applications, although a few macro viruses have been written in the macro programming language for WordPerfect and Lotus 1-2-3. See Visual Basic for Applications.

Master Boot Record

(MBR) The information stored on a hard disk that tells the computer how the hard disk is partitioned. Most hard disks have only one partition but can usually be divided into as many as four partitions.

Michelangelo virus

A virus that made headlines in all the major newspapers worldwide in 1992. The Michelangelo virus isn't as common as many other viruses.

MP3

Acronym that stands for Moving Picture Experts Group (MPEG) Audio Layer- 3, a file compression format for storing digital audio. See Napster and Gnutella.

Multipartite virus

A type of virus that can infect both files and boot sectors.

Mutation engine

A programming tool kit designed to help virus writers create polymorphic viruses, which can modify themselves to avoid detection by antivirus scanners. See Polymorphic virus.



Steal This Computer Book 3(c) What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Wont Tell You about the Internet
ISBN: 1593270003
EAN: 2147483647
Year: 2003
Pages: 215
Authors: Wallace Wang

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net