Hijacker
Definition: A hijacker, also known as a browser hijacker or homepage hijacker, is a type of malware which resets your browser settings so that your homepage is changed and may redirect any or all of you web page requests to […]
Definition: A hijacker, also known as a browser hijacker or homepage hijacker, is a type of malware which resets your browser settings so that your homepage is changed and may redirect any or all of you web page requests to […]
Definition: Heuristics uses past experience to make educated guesses about the present. Using rules and decisions based on analysis of past network or email traffic, heuristic scanning in antivirus software can self-learn and use artifical intelligence to attempt to block
Definition: Commonly used to refer to any individual who uses their knowledge of networks and computer systems to gain unauthorized access to computer systems. While often used interchangeably, the term hacker typically applies to those who break in out of
Definition: Freeware is any program offered free of charge. Applications developed under the GPL, or open source, licensing agreements are also free, but freeware goes beyond just open source products to include products where the code itself might be protected,
Definition: Forensic is really a legal term. At its root it means something that is worthy of discussing in a court of law or that is related to the application of knowledge to a legal problem. It has been glorified
Definition: A flaw can refer to either a Bug, in the case of a flaw in the actual code of an application or operating system, or a flaw could be a vulnerability, in the case of a weakness or oversight
Definition: Basically, a firewall is a protective barrier between your computer, or internal network, and the outside world. Traffic into and out of the firewall is blocked or restricted as you choose. By blocking all unnecessary traffic and restricting other
Definition: An exploit is a term used to describe an attack against a specific vulnerability. The attack “exploits” or takes advantage of a certain vulnerability in order to compromise a target system in some way.
Definition: Encryption is taking your text, data or other communications and encoding it so that those who should not see or hear it will not be able to. An encrypted file will appear as gibberish unless you have the password
Definition: Email spoofing is the act of forging the header information on an email so that it appears to have originated from somewhere other than its true source. The protocol used for email, SMTP (Simple Mail Transfer Protocol), does not