T-W

Trigger

The event that causes a virus to act. The trigger can set off the virus on a certain date (Friday the 13th, or April 15) or when certain conditions have been met (such as when the hard disk is 80 percent full).

Trojan horse

A type of program that pretends to be a useful (usually well-known) program while it really does something else, such as erase files from your computer. Unlike computer viruses, Trojan horses can't duplicate themselves.

Unix

Operating system originally developed at Bell Laboratories in the early 1970s. Unix is one of the most popular operating systems in the world, developed primarily for larger computers, such as mainframes and minicomputers, although a free version of Unix, called Linux, has been gaining popularity on personal computers. See Linux.

Vaccine

A type of antivirus program that claims to protect files from virus infection.

Virus monitor

A program that hides in your computer's memory and watches for signs of a virus infection.

Visual Basic

A program sold by Microsoft that lets you visually design a program and then write BASIC commands to make the program work.

Visual Basic for Applications

A special version of Visual Basic, often abbreviated as VBA, designed for creating programs within Microsoft applications such as Word, Excel, PowerPoint, and Access.

War dialer

A program that can dial a range of phone numbers, searching for a modem on the other line. Can also be used to repetitively dial a single phone number, thereby harassing the recipient. Also called a demon dialer.

Warez

Slang term for pirated software, usually games. Also called appz.

Warm boot

To restart a computer without turning it off and on again. Most computers have a restart or reset button, or you can press CTRL-ALT-DEL.

Web bug

A tiny, invisible graphic file used to track a person's activities on the Internet.

Website defacing

Modifying or replacing web pages with new ones that often display profanity, pornography, or political messages. See Hacktivism.

Web spoofing

To intercept a user's request to view one website and display a different Web site with the intent to deceive.

White hat hacker

Term used to describe a hacker who uses his or her skill for constructive purposes, such as hunting down pedophiles or guarding against malicious (black hat) hackers. See Black hat hacker.

Worm

A type of program that copies itself from computer to computer. Unlike a virus, a worm doesn't infect a file or disk but simply reproduces itself.

Wrapper

A program that can combine two separate programs into a single file, most often used to combine a Trojan horse installation program with an installation program for a legitimate program. Also called a binder or joiner.



Steal This Computer Book 3(c) What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Wont Tell You about the Internet
ISBN: 1593270003
EAN: 2147483647
Year: 2003
Pages: 215
Authors: Wallace Wang

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net