Patch: Otherwise known as a software update. A patch is a piece of code that is added to software in order to fix a bug or problem. It is used most frequently as a temporary correction between two version releases.
Phishing: Sending an e-mail falsely claiming to be a legitimate business, one you may already have a relationship with, in an attempt to trick the user into surrendering personal and/or private information. This information is to then be used for identity theft. The e-mails usually direct the user to visit a Website where they are asked to update their information, such as usernames, passwords, credit and debit card numbers, account numbers, Social Security Number, and/or bank account numbers. These are private pieces of information that the legitimate organization could already have. The site, however, is bogus and built for the intention of stealing a users identity.
Pharming: Pharming is similar to phishing, however pharming seeks to obtain information through domain spoofing (which is basically IP Spoofing). Upon setting up a fraudulent website, which resembles and contains copies of pages from a legitimate site, hackers change DNS entrys and users are automatically redirected to a bogus site. At this site, which looks like the legitimate site the user is accustomed to, users are asked to supply private and personal information that is ultimately used in identity theft scams. Phishing attempts to scam most people one at a time, but pharming allows scammers to target large groups of users all at one time.
SMTP: Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.
SPAM: E-mail that is not wanted or requested. Also known as "unsolicited commercial e-mail", "unsolicited bulk e-mail", and "junk mail". SPAM is mostly used for advertising products or to broadcast some social or political commentary.
Spyware: Software that secretly gathers information through a user's Internet connection without their knowledge. Spyware applications are typically bundled as a hidden component of freeware or shareware programs; however, it should be noted that the majority of shareware and freeware do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
Spyware is similar to a Trojan horse in that users install the product when they install something else unknowingly.
There are software applications called Anti-Spyware that are designed to locate and remove Spyware from your computer.
SSL: Short for Secure Sockets Layer, a protocol developed for transmitting private documents via the Internet. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https: instead of http:. In addition, when SSL is in use a small lock
is placed on the taskbar.
TCP/IP: Short for Transmission Control Protocol/Internet Protocol, the suite of communications protocols used to connect hosts on the Internet.
Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves, but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead spreads viruses onto your computer.
Virus: A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
There are software applications called Anti-Virus software that are designed to locate and remove Viruses from your computer.
Worm: A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down.
Web Browser: An application such as Internet Explorer and FireFox designed to display web pages. See our Resources section for information, updates, and links to FireFox and IE browsers.
<--- back