A | B | C | D | E
| F | G
| H | I | J
| K | L
| M | N
| O | P | Q
| R | S | T | U | V | W | X | Y
| Z |
A
ActiveX
Address Book
Administrator rights
ADSL (Asymmetric Digital Subscriber Line)
Adware
Algorithm
Alias
ANSI (American National Standards Institute)
Anti-Debug / Anti-debugger
Antivirus / Antivirus Program
API (Application Program Interface)
Armouring
ASCII
ASP (Active Server Page)
Attributes
AutoSignature
B
Backdoor
Backup copy
Batch files /BAT Files
BBS (Bulleting Board System)
BIOS (Basic Input / Output System)
Bit (Binary digit)
Boot / Master Boot Record (MBR)
Boot Disk / System disk
Boot virus
Browser
Buffer
Bug
Bus
Byte
C
Cache
Chat / IRC / ICQ
Checkbox
Client
Cluster
CMOS (Computer Metal Oxide Semiconductor)
Code
Companion / companion virus / Spawning
Compressed / Compress / Compression / Decompress
Cookie
Country of origin
Cracker
CRC (CRC number or code)
CVP
Cylinder
D
Damage level
Database
DDoS / Distributed Denial of Service
Debug / Debugger
Deleted items
Dialer
Direct action
Directory / Folder
Disinfection
Distribution level
DNS (Domain Name System)
DoS / Denial of Service
Download
Driver / Controller
Dropper
Dynamic Link Library (DLL)
E
EICAR
ELF -files- (Executable and Linking Format)
Emergency Disk / Rescue Disk
Encryption / Self-encryption
EPO (Entry Point Obscuring)
Exceptions
Executable file or program
Exploit
Extension
F
Family / Group
FAQ (Frequently Asked Question)
FAT (File Allocation Table)
File / Document
File certification
Firewall
FireWire
First appeared on...
Format
Freeware
FTP (File Transfer Protocol)
G
Gateway
GDI (Graphics Device Interface)
Gopher
Groupware
H
Hacker
Hacking tool
Hardware
Header (of a file)
Heuristic scan
Hoax
Host
HTTP (HyperText Transfer Protocol)
I
ICMP (Internet Control Message Protocol)
IFS (Installable File System)
IIS (Internet Information Server)
IMAP (Internet Message Access Protocol)
In circulation
In The Wild
Inbox
Incremental update
Infection
Interface
Interrupt
Interrupt vector
IP (Internet Protocol) / TCP-IP
IRC (Internet Relay Chat)
ISP (Internet Provider)
J
Java
Java Applets
JavaScript
Joke
K
Kernel
Keylogger
L
LAN (Local Area Network)
Link / Hyperlink
Link virus
Local
Logic bomb
Loop
M
Macro virus
Macro
Mail profile
Malware
Map
MAPI
Mask
Means of infection
Means of transmission
Microprocessor / Processor
MIME (Multipurpose Internet Mail Extensions)
Modem
Module
MS-DOS (Disk Operating System)
Multipartite
Mutex (Mutual Exclusion Object)
N
Net drive
Network
Network adaptor / card
Newsgroup
Nuke (attack)
Nuker
O
OLE (Object Linking and Embedding)
On-demand / Popup scan
Operating system (OS)
Overwrite
P
P2P (Peer to Peer)
Packaging
Parameter
Partition
Partition table
Password
Password stealer
Payload
PDA (Personal Digital Assistant)
PE (Portable executable)
Permanent protection
Platform
Polymorphic / Polymorphism
Pop-up menu
POP (Post Office Protocol)
Port / Communication port
Prepending
Preview Pane
Process killer
Process or task
Program
Programming language
Protocol
Proxy
R
RAM (Random Access Memory)
Recycle bin
Redirect
Remote control
Rename
Replicate
Resident / Resident virus
Restart
Ring
ROM (Read Only Memory)
Root directory
Routine
Rule of functioning, Connection rule
S
Scanning -ports, IP addresses-
Scheduled scan
SCR files
Screensaver
Script / Script virus
Sector
Security patch
Security risk
Self-encryption
Sent items
Server
Service
Shareware
Signature / Identifier
SMTP (Simple Mail Transfer Protocol)
Software
SOS virus
Spam
Spammer
Spy program
SQL (Structured Query Language)
Status bar
Stealth
String
Suspicious file
Symptoms of infection
System Service
T
Task list
Technical name
Telnet
Template / Global template
Textbox
Threat level
Title bar
Track
Trigger
Trojan / Trojan horse
TSR (Terminate and Stay Resident)
Tunneling
U
UDP (User Datagram Protocol)
Update
Updates
Upgrade
UPX
URL (Uniform Resource Locator)
V
Vaccination
Variant
Virus
Virus Signature File
Volume
Vulnerability
W
WAN
(Wide Area Network)
Windows
desktop
Windows
Explorer
Windows
Registry
Windows
Registry Key
Windows
taskbar
WINS
(Windows Internet Name Service)
Workstation
Worm
Write-protected
Write
access/ permission
WSH
(Windows Scripting Host)
X
XOR (OR-Exclusive)
Z
Zip
Zoo (virus)