Hoax
Definition: A hoax is an attempt to trick a user into believing something that is not true. It is mainly associated with emails with claims that are too good to be true or ask you to do things like forward […]
Definition: A hoax is an attempt to trick a user into believing something that is not true. It is mainly associated with emails with claims that are too good to be true or ask you to do things like forward […]
Definition: A hijacker, also known as a browser hijacker or homepage hijacker, is a type of malware which resets your browser settings so that your homepage is changed and may redirect any or all of you web page requests to
Definition: Heuristics uses past experience to make educated guesses about the present. Using rules and decisions based on analysis of past network or email traffic, heuristic scanning in antivirus software can self-learn and use artifical intelligence to attempt to block
Definition: Commonly used to refer to any individual who uses their knowledge of networks and computer systems to gain unauthorized access to computer systems. While often used interchangeably, the term hacker typically applies to those who break in out of
Definition: Freeware is any program offered free of charge. Applications developed under the GPL, or open source, licensing agreements are also free, but freeware goes beyond just open source products to include products where the code itself might be protected,
Definition: Forensic is really a legal term. At its root it means something that is worthy of discussing in a court of law or that is related to the application of knowledge to a legal problem. It has been glorified
Definition: A flaw can refer to either a Bug, in the case of a flaw in the actual code of an application or operating system, or a flaw could be a vulnerability, in the case of a weakness or oversight
Definition: Basically, a firewall is a protective barrier between your computer, or internal network, and the outside world. Traffic into and out of the firewall is blocked or restricted as you choose. By blocking all unnecessary traffic and restricting other
Definition: An exploit is a term used to describe an attack against a specific vulnerability. The attack “exploits” or takes advantage of a certain vulnerability in order to compromise a target system in some way.
Definition: Encryption is taking your text, data or other communications and encoding it so that those who should not see or hear it will not be able to. An encrypted file will appear as gibberish unless you have the password