D-F

Decompiler

A type of program that reconstructs a program's original source code from an executable file. Decompilers exist for Visual Basic, Java, and other programming languages. See Disassembler.

Delphi

Rapid-application development tool based on the Pascal programming language. Often used to write remote access Trojan horse programs. See RAT and Visual Basic.

Denial-of-service attack

The tying up of a computer's resources to prevent its use by others. Often abbreviated as DoS.

DES

(Data Encryption Standard) An encryption method. DES can be cracked and is thus considered useless for encrypting valuable or sensitive information. See AES.

Desktop-monitoring program

Program designed to spy and record the activities of a person on a computer without his or her knowledge. See Spyware.

Dictionary attack

A way of finding a password by trying a list of common passwords such as Star Trek lingo, names of cars, or titles of popular movies.

Direct action virus

A virus that does something immediately each time you run it, such as attack your hard disk or display a message on the screen.

Disassembler

A program that generates assembly language source code from an executable program file. See Assembly language and Decompiler.

Email bombing

Clogging up an email account by sending a large number of email messages or several huge files. See Fax bombing and Phone call flooding.

Encryption

A method of scrambling data to make it unreadable by others. See AES and DES.

EXE file

A common name for a file that contains a program such as a word processor or a game. An EXE file is a relocatable program that can be used to store larger programs.

False negative

When a program, such as an antivirus or anti–Trojan horse program, fails to detect a result. When an anti-virus program fails to detect a legitimate virus, that result is called a false negative.

False positive

When a program, such as an antivirus or anti–Trojan horse program, incorrectly claims an error. When an anti-virus program incorrectly identifies a virus where none exists, the result is called a false positive.

Fast infector

A type of virus that infects program files whenever the computer loads or examines the virus file.

FAT

(file allocation table) Part of the disk that contains information about the size and location of all the other files on the disk. Each time you format a disk, it creates two identical FATs, which store information on the clusters used by each file stored on the disk. If your disk's FAT gets messed up, the files are still on the disk, but your computer will no longer be able to find or use them.

Fax bombing

Sending multiple messages to a fax machine to prevent others from using it. See Email bombing and Phone call flooding.

File infector

Another name for program infectors.

Firewall

Utility designed to keep intruders out of a network or individual computer.

Flooder

A malicious program designed to overwhelm a target computer with more data than it can handle. See Denial-of-service attack and Email bombing.

Forensics

The science of recovering deleted files for evidence.

Fortress phone

Slang name for a pay phone, referring to its extensive defenses designed to keep people from breaking into it.

Freeware

Software that can be copied, distributed, and given away without payment of any kind. See Adware and Shareware.



Steal This Computer Book 3(c) What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Wont Tell You about the Internet
ISBN: 1593270003
EAN: 2147483647
Year: 2003
Pages: 215
Authors: Wallace Wang

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net