Searching the memory and disk drives of a computer (usually by an antivirus program) for malicious software, such as viruses, worms, and Trojan horses.
The computer code fingerprint for a virus, worm, Trojan horse, adware, or spyware program that allows it to be identified by an antivirus or antispyware/antiadware program.
Popular, free Internet-based voice chat service.
Unsolicited e-mail sent to thousands of people in attempts to advertise a product, promote a stock, or launch a scam.
Software that is designed to collect information in secret, might or might not install in stealth, and is designed to transmit that information to second or third parties covertly employing users' Internet connections without their consent and knowledge.
SSID (service set identifier)
A term used for the name of a WLAN.
stateful packet inspection (SPI)
Examining each packet that flows through a firewall to make sure the packet is a) in response to a legitimate request by a computer on the home network and b) the correct packet in the expected sequence of packets.
static IP address
Having an IP address assigned by the Internet service provider, which does not change.