A type of identity theft in which a thief researches deaths at a public library or by visiting a graveyard and then applies for a birth certificate in the dead person's name .
Software that is free to use for a set period of time so as to allow a user to try it before purchasing.
A program posing as a harmless piece of software that can contain malware such as viruses or spyware.
User Datagram Protocol. A method of sending simple messages across a network connection that allows one computer to talk another to exchange information. You'll see it often referenced in a home network router setup.
Universal Serial Bus. A computer port used to attach external devices such as keyboards, mice, joysticks, or digital cameras .
A chipset integrated into a computer motherboard that gives it graphics display capabilities.
A circuit board that plugs into a personal computer that gives it graphics display capabilities.
A malicious program that replicates when deployed by a human, usually unknowingly.
An email, usually sent by a well-meaning friend, that contains alerts about a fictitious virus. Virus hoaxes are more of an annoyance than a real threat.
A digital snapshot of a virus issued by a software publisher that is used by the publisher's antivirus program to detect a virus.
Virtual private network. A secure connection used to access a company's servers from home across the public Internet. It can also provide a secure connection between a company and a customer's or satellite office.
A program that checks a computer for known weaknesses such as programming errors or security holes.