A type of identity theft in which a thief researches deaths at a public library or by visiting a graveyard and then applies for a birth certificate in the dead person's name .
trialware
Software that is free to use for a set period of time so as to allow a user to try it before purchasing.
Trojan horse
A program posing as a harmless piece of software that can contain malware such as viruses or spyware.
UDP
User Datagram Protocol. A method of sending simple messages across a network connection that allows one computer to talk another to exchange information. You'll see it often referenced in a home network router setup.
USB
Universal Serial Bus. A computer port used to attach external devices such as keyboards, mice, joysticks, or digital cameras .
video adapter
A chipset integrated into a computer motherboard that gives it graphics display capabilities.
video card
A circuit board that plugs into a personal computer that gives it graphics display capabilities.
virus
A malicious program that replicates when deployed by a human, usually unknowingly.
virus hoax
An email, usually sent by a well-meaning friend, that contains alerts about a fictitious virus. Virus hoaxes are more of an annoyance than a real threat.
virus signature
A digital snapshot of a virus issued by a software publisher that is used by the publisher's antivirus program to detect a virus.
VPN
Virtual private network. A secure connection used to access a company's servers from home across the public Internet. It can also provide a secure connection between a company and a customer's or satellite office.
vulnerability scanner
A program that checks a computer for known weaknesses such as programming errors or security holes.