A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |

 

 

A

ActiveX

Address Book

Administrator rights

ADSL (Asymmetric Digital Subscriber Line)

Adware

Algorithm

Alias

ANSI (American National Standards Institute)

Anti-Debug / Anti-debugger

Antivirus / Antivirus Program

API (Application Program Interface)

Armouring

ASCII

ASP (Active Server Page)

Attributes

AutoSignature

 

B

Backdoor

Backup copy

Batch files /BAT Files

BBS (Bulleting Board System)

BIOS (Basic Input / Output System)

Bit (Binary digit)

Boot / Master Boot Record (MBR)

Boot Disk / System disk

Boot virus

Browser

Buffer

Bug

Bus

Byte

 

C

Cache

Chat / IRC / ICQ

Checkbox

Client

Cluster

CMOS (Computer Metal Oxide Semiconductor)

Code

Companion / companion virus / Spawning

Compressed / Compress / Compression / Decompress

Cookie

Country of origin

Cracker

CRC (CRC number or code)

CVP

Cylinder

 

D

Damage level

Database

DDoS / Distributed Denial of Service

Debug / Debugger

Deleted items

Dialer

Direct action

Directory / Folder

Disinfection

Distribution level

DNS (Domain Name System)

DoS / Denial of Service

Download

Driver / Controller

Dropper

Dynamic Link Library (DLL)

 

E

EICAR

ELF -files- (Executable and Linking Format)

Emergency Disk / Rescue Disk

Encryption / Self-encryption

EPO (Entry Point Obscuring)

Exceptions

Executable file or program

Exploit

Extension

 

F

Family / Group

FAQ (Frequently Asked Question)

FAT (File Allocation Table)

File / Document

File certification

Firewall

FireWire

First appeared on...

Format

Freeware

FTP (File Transfer Protocol)

 

G

Gateway

GDI (Graphics Device Interface)

Gopher

Groupware

 

H

Hacker

Hacking tool

Hardware

Header (of a file)

Heuristic scan

Hoax

Host

HTTP (HyperText Transfer Protocol)

 

I

ICMP (Internet Control Message Protocol)

IFS (Installable File System)

IIS (Internet Information Server)

IMAP (Internet Message Access Protocol)

In circulation

In The Wild

Inbox

Incremental update

Infection

Interface

Interrupt

Interrupt vector

IP (Internet Protocol) / TCP-IP

IRC (Internet Relay Chat)

ISP (Internet Provider)

 

J

Java

Java Applets

JavaScript

Joke

 

K

Kernel

Keylogger

 

L

LAN (Local Area Network)

Link / Hyperlink

Link virus

Local

Logic bomb

Loop

 

M

Macro virus

Macro

Mail profile

Malware

Map

MAPI

Mask

Means of infection

Means of transmission

Microprocessor / Processor

MIME (Multipurpose Internet Mail Extensions)

Modem

Module

MS-DOS (Disk Operating System)

Multipartite

Mutex (Mutual Exclusion Object)

 

N

Net drive

Network

Network adaptor / card

Newsgroup

Nuke (attack)

Nuker

 

O

OLE (Object Linking and Embedding)

On-demand / Popup scan

Operating system (OS)

Overwrite

 

P

P2P (Peer to Peer)

Packaging

Parameter

Partition

Partition table

Password

Password stealer

Payload

PDA (Personal Digital Assistant)

PE (Portable executable)

Permanent protection

Platform

Polymorphic / Polymorphism

Pop-up menu

POP (Post Office Protocol)

Port / Communication port

Prepending

Preview Pane

Process killer

Process or task

Program

Programming language

Protocol

Proxy

 

R

RAM (Random Access Memory)

Recycle bin

Redirect

Remote control

Rename

Replicate

Resident / Resident virus

Restart

Ring

ROM (Read Only Memory)

Root directory

Routine

Rule of functioning, Connection rule

 

S

Scanning -ports, IP addresses-

Scheduled scan

SCR files

Screensaver

Script / Script virus

Sector

Security patch

Security risk

Self-encryption

Sent items

Server

Service

Shareware

Signature / Identifier

SMTP (Simple Mail Transfer Protocol)

Software

SOS virus

Spam

Spammer

Spy program

SQL (Structured Query Language)

Status bar

Stealth

String

Suspicious file

Symptoms of infection

System Service

 

T

Task list

Technical name

Telnet

Template / Global template

Textbox

Threat level

Title bar

Track

Trigger

Trojan / Trojan horse

TSR (Terminate and Stay Resident)

Tunneling

 

U

UDP (User Datagram Protocol)

Update

Updates

Upgrade

UPX

URL (Uniform Resource Locator)

 

V

Vaccination

Variant

Virus

Virus Signature File

Volume

Vulnerability

 

W

WAN (Wide Area Network)

Windows desktop

Windows Explorer

Windows Registry

Windows Registry Key

Windows taskbar

WINS (Windows Internet Name Service)

Workstation

Worm

Write-protected

Write access/ permission

WSH (Windows Scripting Host)

 

X

XOR (OR-Exclusive)

 

Z

Zip

Zoo (virus)