tombstone shopping

A type of identity theft in which a thief researches deaths at a public library or by visiting a graveyard and then applies for a birth certificate in the dead person's name .


Software that is free to use for a set period of time so as to allow a user to try it before purchasing.

Trojan horse

A program posing as a harmless piece of software that can contain malware such as viruses or spyware.


User Datagram Protocol. A method of sending simple messages across a network connection that allows one computer to talk another to exchange information. You'll see it often referenced in a home network router setup.


Universal Serial Bus. A computer port used to attach external devices such as keyboards, mice, joysticks, or digital cameras .

video adapter

A chipset integrated into a computer motherboard that gives it graphics display capabilities.

video card

A circuit board that plugs into a personal computer that gives it graphics display capabilities.


A malicious program that replicates when deployed by a human, usually unknowingly.

virus hoax

An email, usually sent by a well-meaning friend, that contains alerts about a fictitious virus. Virus hoaxes are more of an annoyance than a real threat.

virus signature

A digital snapshot of a virus issued by a software publisher that is used by the publisher's antivirus program to detect a virus.


Virtual private network. A secure connection used to access a company's servers from home across the public Internet. It can also provide a secure connection between a company and a customer's or satellite office.

vulnerability scanner

A program that checks a computer for known weaknesses such as programming errors or security holes.

Absolute Beginners Guide To. Security, Spam, Spyware & Viruses
Absolute Beginners Guide to Security, Spam, Spyware & Viruses
ISBN: 0789734591
EAN: 2147483647
Year: 2005
Pages: 168

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net