http://www.
onlinesecurityauthority.com
onlinesecurityauthority.com
onlinesecurityauthority.com

OSA Glossary

  Online Security Authority Terms & Words 

TERM &  WORD

        Definition of Terms & Words
adware a form of spyware that monitors viewers’ surfing habits, web sites viewed, sends this data to advertisers who then invoke popup ads
anti virus term applied to software designed to detect and keep a virus from entering and infecting a computer
Anti-virus Software Anti-virus software scans a computer’s memory and disk drives for viruses. When a virus is found, the result is displayed. The software may clean, delete or quarantine any files, directories or disks affected by the malicious code.
Anti-antivirus Virus Anti-antivirus viruses attack, disable or infect specific anti-virus software
Attack An attempt to subvert or bypass a system’s security. Attacks may be passive or active. Active attacks attempt to alter or destroy data. Passive attacks try to intercept or read data without changing it.  Some attacks result in Denial of Service, Hijacking, Password Attacks, Password Sniffing, virus attack
Back Door A programmer’s tool sometimes built into programs to allow special privileges normally denied to users of the program. Often programmers build back doors so they can fix bugs. The feature can pose a security risk if hackers or others learn about it.
Backup A duplicate copy of data made for archiving purposes or for protecting against damage or loss. Some programs backup data files while maintaining both the current version and the preceding version on disk. To be considered secure, the Backup must be  stored away from the original.
Blog a quick and easy way to share timely information (updated news, trends, developments), answer questions, express opinions and exchange views.
Browser Hijacker a program that attempts to alter home page, search page and/or other browser settings.
 
backup device includes floppy disks, CD’s, Zip disks, tape drives, on  which clean files and data can be recorded for future use
CAN SPAM Act legislation signed into law in 2004, designed to establish guidelines for commercial email to minimize spam and penalize spammers 
chat loggers a type of spyware that detects and records chat room messages. It is capable of screening for specific topics and reporting to the person who installed it, who can actually be at a remote location.
child safe Internet resources that are free of pornography, hate, mayhem, etc., that are available to children through responsible search engines, websites, when surfing the World Wide Web.
compromise To access or disclose information without authorization.
cookie Cookies are blocks of text placed in a file on your computer’s hard disk. Web sites use cookies to identify users who revisit the site. Cookies can be used to gather more information about a user than would be possible without them.
data recovery disaster recovery… see hard drive recovery
email recorders software that monitors email exchanges. Some available  email recorders automatically save POP or SMTP email packets in easily viewable Outlook Express format, displaying details including real contents.
file sharing Peer to Peer exchange of files for music, images, etc, such as Kazaa, and others. Requires caution to avoid hidden viruses and malware
firewall Hardware and/or software designed to keep unauthorized outsiders from tampering with a computer system or network. (The system can be a standalone computer, a small Local Area Network  or a company-wide network with thousands of users).
hacker / cracker Generally, internet hackers like to think of themselves as an elite group of information seekers, very good at exploring computer systems and networks.             

Briefly, Crackers are criminal Hackers

hard drive recovery saving the files and data on a hard drive after it has had a virus infection removed (also names ‘Data Recovery’)
identity theft the deliberate assumption of another person’s identity, usually to gain access to their credit or frame them for some crime.
keylogger software and hardware keystroke loggers that monitor, record and often transmit your keystrokes to undesirable third parties
keystroke monitor see Keylogger
malware malicious programs, ie, adware, spyware, etc,. that monitor your internet and other computer activities and report stolen personal information and surfing habits to unknown third parties, often for criminal purposes.
message blocker software that minimizes or stops Messenger Spam pop-ups on your monitor screen. Po up messages are among  the fastest growing type of unsolicited advertising on the Internet today!
MyDoom one of many similar worms that use infected computers’ address lists to send emails containing other viruses to all listings in your address book
online security The state of being free from danger or injury while using a computer connected to the internet
password recorders Spy software that secretly records all passwords, email, and keystrokes
personal privacy the right of individuals to protect financial, historical, and  other personal and secret information from identity thieves and other parties who have no reason to have it
phishing Criminal use of the Internet to send official-looking (but fraudulent) e-mail that purports to have been sent by a familiar business or organization -seeking personal and private information from unsuspecting individuals,
to be used by criminals for stealing identities and money.
popups additional windows that appear suddenly on top of the page your are viewing which are triggered by code buried in the source code of the window that that was opened originally
   
SCAM A scam is any attempt to remove money from you by promising you something you’ll never get; a swindle; a fraudulent business scheme
SPAM Spam is email that appears in email inboxes without our permission that often contains pornography, scams, unwanted ads and spyware
spoofing a practice of Spammers who use misleading information in the subject line of your incoming email to entice you to open a message which usually contains ads for undesirable or unwanted products, etc.
spyware malicious programs that often send personal data, passwords and other private personal and financial data to third parties
Stinger A FREE downloadable program (not an online virus scanner) from McAfee that finds and removes viruses on an infected computer
trojan / trojan horses are impostor files that claim to be something desirable but are actually malicious. Trojan horse programs do not replicate themselves. They contain malicious code that causes loss, or even theft, of data when triggered
UCE unsolicited commercial email, the accepted official terminology for Spam
 
virus A computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission. Some viruses display symptoms, and some viruses damage files and computer systems, but neither symptoms nor damage is essential in the definition of a virus; a non-damaging virus is still a virus.
virus grief Unhappiness brought about by a computer virus infection including the problems encountered in recovering lost files and data and restoring normal system operation.
virus hoax Hoaxes are not viruses, but are usually deliberate or unintentional
e-mail messages warning people about a virus or other malicious software programs that aren’t actually viruses.
virus infection the existence (visible or hidden) of viruses, worms, spyware, malware and other similar threatening and harmful  software injected into your computer system.
virus symptoms The apparent indications of something not quite right with the system operation,  the complete failure of certain programs, repeated email bounces, and other abnormalities
virus protection the practice of creating security systems for your computer, such that  viruses, worms, trojan horses, malware, etc, are unable to penetrate and infect it.
worm a parasitic computer program that replicates, but unlike viruses, does not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network  

 CLICK for More Glossary words & terms

Add Me As a Friend

Categories

Archives

OSA Gang

Blog Marketing
Jack Humphrey's blog marketing, social marketing, and link building tips.

The Publicists Assistant
We are experienced in helping clients receive the Online Publicity and Radio Publicity they deserve. Since your success determines our success, we are dedicated to bringing you RESULTS!

Recent Peeps

OSA Highlights





Submit Blog & RSS Feeds



OSA & CHW Radio

blogcatalog





googlesyndication