Glossary

A B C

 

A

adware

Adware (ADvertising-supported softWARE) is software that generates advertisements, usually as banner ads or pop-up windows.

 

Adware is usually bundled with other software and installed without your knowledge. While usually not physically damaging or outright malicious, the intrusive behavior of adware can be annoying and waste system resources.

Go back to the top of the topic

B

buffer

A buffer is used to temporarily hold data before transmitting it. A buffer helps compensate for differences in transfer or processing rates between two systems.

 

A buffer overflow, or buffer overrun, occurs when more data is put into the buffer than it can handle. This is a common result of Denial of Service attacks.

C

cookie

A cookie is a small text file that some Web sites save to your local, hard drive while you are browsing the site. Cookies contain identifying information, such as log in and shopping cart information.

 

Cookies are useful for loading Web site preferences and login settings, but they can also contain information that can be passed to others without your knowledge, usually for advertising purposes.

cracking

See hacking/cracking.

Go back to the top of the topic

D

Denial of Service (DoS) attack

A denial of service (DoS) attack is a type of attack that is designed to crash or disable a system by flooding it with useless traffic. A DoS attack can also destroy files.

 

Common forms of denial of service attacks are buffer overflow attacks and SYN attacks.

digital signature

A digital signature is an electronic stamp of authentication that is often included in distributed software.

 

The publishers of software use digital signatures to guarantee authenticity and assure recipients that the software comes from them. The cryptographic technology used by a digital signature ensures that the signature cannot be altered.

domain name

A domain name is the text name corresponding to the numeric IP address of a computer on the Internet. Like the IP address, a domain name must be unique. Unlike the IP address, every computer on the Internet does not have to have a domain name.

 

A domain name has 2 or more parts, separated by dots.

drive-by download

A drive-by download is the automatic downloading of software when you visit a Web site, done without your consent and often without any notice. Drive-by-downloads typically exploit security holes or lowered security settings.

Go back to the top of the topic

E

No glossary terms begin with this letter.

F 

firewall

A firewall controls the information passing through an Internet connection. Firewalls keep a computer secure from unauthorized intruders by inspecting traffic and only allowing desired communication through.

 

A firewall can be software, hardware, or a combination of the two.

FTP

FTP (File Transfer Protocol) is used for exchanging files over the Internet.

Go back to the top of the topic

G

No glossary terms begin with this letter.

H

hacking/cracking

Hacking is an attempt to gain unauthorized access into a computer or network. A person who makes such attempts is a hacker.

 

While "hacker" was originally used to describe a person highly skilled in computing, it is now more often used to describe a person who uses that skill for illegal or destructive purposes. Some instead use the term "cracking" for the act of breaching computer security with malicious intent.

HTTP (HyperText Transfer Protocol)

HTTP (HyperText Transfer Protocol) is a method used to transfer or convey information on the World Wide Web.

Go back to the top of the topic

I

ICMP (Internet Control Message Protocol)

The Internet Control Message Protocol (ICMP) is used to confirm that two hosts can communicate with each other. It sends informational and error messages between the hosts that are attempting to communicate. This protocol is often used by network administrators for troubleshooting.

IGMP (Internet Group Management Protocol)

The Internet Group Management Protocol (IGMP) support multicasting, which allows one computer on the Internet to send content to multiple other computers. IGMP messages are used by the multicast routers to track group memberships on each of its networks.

Internet

The Internet is a vast network that comprises an immense number of networks using TCP/IP protocols.

 

Note that the Internet is not synonymous with the World Wide Web. The Web is one of several means (examples of others are FTP and Telnet) for accessing information via the Internet.

Internet Explorer (IE)

Internet Explorer (also "IE") is the Web browser developed by Microsoft. Combined with an Internet connection, it allows you to search for and view information on the World Wide Web. Internet Explorer comes with Windows operating systems and can also be downloaded from Microsoft's Web site.

iolo

The word iolo is not an acronym, as some may believe. "Iolo" is an archaic Welsh name that is actually pronounced "YO-low." However, many people (including us) pronounce it "eye-OH-low." We've also been told that the word iolo means "to vibrate" in the native Hawaiian language.

IP address

An IP (Internet Protocol) address is a unique number that identifies a computer or network on the Internet. Every computer or server connected to the Internet has its own IP address, and each Web site has an IP address.

 

The IP address is four numbers divided by periods, where each number can range from 0 to 255; for example: 216.239.51.100

 

See also: domain name

IP subnet mask

An IP subnet mask is a unique number that identifies a portion of a single, host network. The host network has one IP address and each of its subnetworks, or subnets, has its own IP subnet mask.

 

Like the IP address, the IP subnet number is four numbers divided by periods, where each number can range from 0 to 255.

 

Example:

IP address: 187.199.127.5

IP subnet mask: 255.255.240.0

Go back to the top of the topic

J

No glossary terms begin with this letter.

K

keylogger

A keylogger, or keystroke logger, is a Trojan that captures all keystrokes and then records that information to a log file.

 

With a keylogger, a hacker can capture your logins, passwords, credit card numbers, and any other confidential information that you type. Once collected, this information can be silently transmitted to the TrojanÆs creator for malicious purposes, such as credit card or bank fraud.

 

Note: A keylogger can also be a legitimate program that is intentionally and knowingly installed, such as by an employer tracking staff activity.

L

No glossary terms begin with this letter.

Go back to the top of the topic

M

malware

Malware (MALicious softWARE) is a generic term covering a range of software programs that are designed to damage computers or to obtain unauthorized information from computers.

 

Specific types of malware include viruses, worms, and Trojans.

MB (megabyte)

A megabyte (MB) is a standard unit used to measure the storage capacity of a disk and the amount of computer memory. A megabyte (colloquially, "meg") is equal to approximately one million bytes.

MHz (megahertz)

Megahertz (MHz) is the common measure of the operating speed of a computer's processor. One MHz is equal to one million cycles per second.

 

The higher the MHz, the better the performance.

Go back to the top of the topic

N

network

A network is a group of computers (two or more) and other devices connected by a communications link. A network enables the computers and devices to interact with each other.

 

Networks can be small or large, permanently connected through wires or cables, or temporarily connected through phone lines or wireless transmissions.

 

The largest network is the Internet, which is a worldwide group of networks.

O

operating system

An operating system is the software that controls and manages computer hardware and basic system operations. The operating system loads programs into the computerÆs memory, runs these programs, and manages peripherals like disks and printers.

Go back to the top of the topic

P

packet

Information is transmitted across the Internet in packets. A packet bundles information so that it can be routed.

 

A packet consists of a header (which has information on the source, the destination, and how the packet should be handled) and the actual data being transmitted.  

PING

A PING (Packet Internet Groper) is used to test whether a system is reachable on an IP network. It is formally called an ICMP Echo.

 

The computer making an incoming connection attempt sends an ICMP Echo Request packet to the target computer and waits for a response. If the target system responds with an Echo Reply, then the original system knows that computer is reachable.  

port (hardware)

A port is a connection point on a computer that allows you to connect devices that pass data into and out of the computer.

 

For example, a printer and a modem are connected to a computer through a port. Sample types of ports are parallel, serial, and USB.

port (networking)

A port is an address associated with a program or process on a computer; different applications listen and transmit on different ports. The port number directs packets to the appropriate application.

 

Ports are assigned to standard protocols such as HTTP and SMTP so that programs know which port to use for a connection. The most well-known port is 80, which transmits HTTP traffic over the World Wide Web.

 

See Ports for information on designating port settings in iolo Personal Firewall.

protocol

A protocol is a set of standard rules that establish how data is transmitted between computers.

proxy server

A proxy server is a server located on a network between client software and another server.

 

A proxy server can be used to regulate Internet communications, by inspecting traffic and determining if anything should be denied transmission.

Q

No glossary terms begin with this letter.

Go back to the top of the topic

R

RAM (random access memory)

Random access memory is the working memory of a computer where data is temporarily stored for various processes.

 

A higher amount of RAM means there is more space available for temporary data storage, which can speed processing.

RAT (remote access Trojan)

A remote access Trojan (RAT) is a malicious software program that gives someone remote access to and control of a computer.

 

A RAT can capture screen, sound, and video content, and often includes keylogging capabilities. With a RAT, imposters can send e-mail messages that will appear to be from you, modify your documents, and use your PC to attack other computers.

registry

The registry is a database repository that holds configuration files used by your Windows operating system. The registry stores settings about user profiles and preferences; installed software, hardware and drivers; and other data required by the operating system.

Remote Desktop

A Remote Desktop connection gives you access to a computer while you are at another, remote computer (for example, you could connect to your work computer from home). Working remotely, you have mouse and keyboard control over the computer and can access all of the computer's applications, files, and networks.

At a minimum, Remote Desktop functionality requires the proper software and access through the firewall.

router

A router is a networking device that forwards packets across a network to their destinations. A router acts as a junction between two or more networks to transfer data packets among them.

Go back to the top of the topic

S

server

A server is a computer that delivers information and software to other computers linked by a network.

 

Servers come in many forms; for example: application servers, Web servers, database servers, and mail servers.

spyware

Spyware is tracking software that is installed on your computer without your notice or consent. It sends information about your computing activities back to its source, usually for advertising purposes, but sometimes for more dangerous purposes such as identity theft or credit card fraud.

 

The effect of spyware varies depending on what its creator's intentions are and can include consumption of valuable system resources, random lockups, crashes, or slowdowns; Web browser Home page or search page redirection; unwanted software installation; and incessant pop-up ads.

SYN

SYN is a packet used to synchronize sequence numbers on two connecting computers. A SYN packet is sent when a computer is attempting to connect to a remote computer; the SYN is acknowledged by a SYN/ACK packet sent by the responding computer.

system tray

The system tray is located in the Windows taskbar (usually at the bottom of the screen, next to the clock) and contains icons that allow easy access to system functions.

Go back to the top of the topic

T

taskbar

The taskbar contains the Windows Start button, buttons for every open application, and the system tray.

 

The taskbar generally appears on the bottom of your computer screen, but it can be dragged to either side of the screen or the top of the screen.

TCP

The TCP (Transmission Control Protocol) converts data messages generated by an application into packets that can be sent over the IP protocol.

 

Unlike UDP, TCP is a connection-oriented protocol. TCP guarantees delivery of data and also guarantees that packets are delivered in the same order in which they were sent.

TCP/IP

TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols that form the foundation of Internet communication. It is a standard for transmitting data over networks and enabling communication between a variety of systems.

Trojan/Trojan horse

A Trojan, or Trojan horse, is a software program that appears to be desirable or useful, but intentionally does something you do not expect.

 

The effects of Trojans can range from simply displaying pop-up ads to destroying files or enabling the theft of data.

 

Trojans are distributed in executable files, such as through email attachments, CDs, and Internet downloads. People can be lured into installing a Trojan because it appears that it will serve a legitimate purpose. Unlike viruses and worms, a Trojan is not designed to make automatic copies of itself. However, Trojans can carry viruses and other malicious software within them.

 

Some specific types of Trojans include keyloggers and RATs.

trusted publisher

A trusted publisher is a software manufacturer or distributor that you have designated as trusted on the Manage Trusted Publishers window.

 

When adding a trusted publisher, you can choose from any of the publishers that have digitally-signed programs and files on your computer.

Go back to the top of the topic

U

UDP

The UDP (User Datagram Protocol) converts data messages generated by an application into packets that can be sent over networks.

 

Unlike TCP, UDP is a connection-less protocol. It does not verify that a connection has been established with the receiving system.

 

UDP is often used for streaming video and audio.

Go back to the top of the topic

V

virus

A computer virus is a software program designed to alter the operation of a computer.

 

Most viruses are malicious and intended to cause damage, but even a benign virus can harm a system. Viruses can damage files, software programs, the registry, and hardware.

 

Viruses are distributed in executable files, such as through email attachments, CDs, and Internet downloads. A virus infection occurs when the infected file is run. A virus also automatically replicates, or makes copies of itself, by secretly embedding its programming code into other programs.

 

The term "virus" is often used as a generic, collective reference that includes other types of malicious programs, such as worms and Trojans.

Go back to the top of the topic

W

Windows Explorer

Windows Explorer (also "Explorer") displays a hierarchical view of the drives, folders, and files on your computer. Using Windows Explorer, you can open, copy, move, rename, and search for files and folders. Windows Explorer is an application that is part of Windows operating systems.

World Wide Web (Web)

The World Wide Web, or simply "Web", is the largest and most commonly used network on the Internet. The Web uses the HTTP protocol to transmit Web pages and other information.

 

Note that the World Wide Web is not synonymous with the Internet. The Web is one of several means for accessing information via the Internet.

worm

A computer worm is a software program designed to reproduce and spread among computers.

 

Most worms are malicious and intended to overwhelm system memory or network bandwidth. Worms can crash an entire network of computers or an individual computer.

 

Worms are generally distributed in email attachments or through unprotected Internet activity. A worm spreads very rapidly because it is self-contained. It replicates itself and, unlike viruses, a worm does not need to infect another program to spread.

Go back to the top of the topic

X

No glossary terms begin with this letter.

Y

No glossary terms begin with this letter.

Z

zombie

A zombie is computer that has had its security compromised and is remotely controlled, such as by a RAT.