Glossary

A B C BTN_D.BMP BTN_E.BMP BTN_F.BMP BTN_G.BMP BTN_H.BMP BTN_I.BMP BTN_J.BMP BTN_K.BMP BTN_L.BMP BTN_M.BMP BTN_N.BMP BTN_O.BMP BTN_P.BMP BTN_Q.BMP BTN_R.BMP BTN_S.BMP BTN_T.BMP BTN_U.BMP BTN_V.BMP BTN_W.BMP BTN_X.BMP BTN_Y.BMP BTN_Z.BMP

 

A

adware

Adware (ADvertising-supported softWARE) is software that generates advertisements, usually as banner ads or pop-up windows.

 

Adware is usually bundled with other software and installed without your knowledge. While usually not physically damaging or outright malicious, the intrusive behavior of adware can be annoying and waste system resources.

antivirus

Antivirus programs are software that detect viruses, worms, and other malicious software, and then either removes or disables them. An antivirus can block infections from ever reaching your computer, and it can remove existing infections.

Go back to the top of the topic

B

buffer

A buffer is used to temporarily hold data before transmitting it. A buffer helps compensate for differences in transfer or processing rates between two systems.

 

A buffer overflow, or buffer overrun, occurs when more data is put into the buffer than it can handle. This is a common result of Denial of Service attacks.

C

cookie

A cookie is a small text file that some Web sites save to your local, hard drive while you are browsing the site. Cookies contain identifying information, such as log in and shopping cart information.

 

Cookies are useful for loading Web site preferences and login settings, but they can also contain information that can be passed to others without your knowledge, usually for advertising purposes.

cracking

See hacking/cracking.

Go back to the top of the topic

D

Denial of Service (DoS) attack

A denial of service (DoS) attack is a type of attack that is designed to crash or disable a system by flooding it with useless traffic. A DoS attack can also destroy files.

 

A common form of denial of service attack is a buffer overflow attack.

definition

See virus definition.

drive-by download

A drive-by download is the automatic downloading of software when you visit a Web site, done without your consent and often without any notice. Drive-by-downloads typically exploit security holes or lowered security settings.

Go back to the top of the topic

E

No glossary terms begin with this letter.

F 

firewall

A firewall controls the information passing through an Internet connection. Firewalls keep a computer secure from unauthorized intruders by inspecting traffic and only allowing desired communication through.

 

A firewall can be software, hardware, or a combination of the two.

full system scan

A full system scan is a complete scan for viruses on your computer. The scan checks all your computer's memory, boot records, files, and folders.

 

A full system scan is done either on a schedule or when you perform an on-demand scan (click Perform a full system scan from the Home page).

Go back to the top of the topic

G

No glossary terms begin with this letter.

H

hacking/cracking

Hacking is an attempt to gain unauthorized access into a computer or network. A person who makes such attempts is a hacker.

 

While "hacker" was originally used to describe a person highly skilled in computing, it is now more often used to describe a person who uses that skill for illegal or destructive purposes. Some instead use the term "cracking" for the act of breaching computer security with malicious intent.

heuristics

In a general sense, heuristics is a process of obtaining a result using experience or informed conjecture, rather than by following a set formula or procedure. Heuristics are intended to improve performance.

 

In the context of antivirus software, heuristics is a process where the antivirus attempts to detect infections by looking at behaviors and common patterns, rather than by direct comparison to a virus definition. Heuristics can increase the level of protection, but can also lead to false positives.

Go back to the top of the topic

I

Internet

The Internet is a vast network that comprises an immense number of networks using TCP/IP protocols.

 

Note that the Internet is not synonymous with the World Wide Web. The Web is one of several means (examples of others are FTP and Telnet) for accessing information via the Internet.

Internet Explorer (IE)

Internet Explorer (also "IE") is the Web browser developed by Microsoft. Combined with an Internet connection, it allows you to search for and view information on the World Wide Web. Internet Explorer comes with Windows operating systems and can also be downloaded from Microsoft's Web site.

iolo

The word iolo is not an acronym, as some may believe. "Iolo" is an archaic Welsh name that is actually pronounced "YO-low." However, many people (including us) pronounce it "eye-OH-low." We've also been told that the word iolo means "to vibrate" in the native Hawaiian language.

Go back to the top of the topic

J

No glossary terms begin with this letter.

K

keylogger

A keylogger, or keystroke logger, is a Trojan that captures all keystrokes and then records that information to a log file.

 

With a keylogger, a hacker can capture your logins, passwords, credit card numbers, and any other confidential information that you type. Once collected, this information can be silently transmitted to the Trojan’s creator for malicious purposes, such as credit card or bank fraud.

 

Note: A keylogger can also be a legitimate program that is intentionally and knowingly installed, such as by an employer tracking staff activity.

L

No glossary terms begin with this letter.

Go back to the top of the topic

M

malware

Malware (MALicious softWARE) is a generic term covering a range of software programs that are designed to damage computers or to obtain unauthorized information from computers.

 

Specific types of malware include viruses, worms, and Trojans.

MB (megabyte)

A megabyte (MB) is a standard unit used to measure the storage capacity of a disk and the amount of computer memory. A megabyte (colloquially, "meg") is equal to approximately one million bytes.

MHz (megahertz)

Megahertz (MHz) is the common measure of the operating speed of a computer's processor. One MHz is equal to one million cycles per second.

 

The higher the MHz, the better the performance.

Go back to the top of the topic

N

network

A network is a group of computers (two or more) and other devices connected by a communications link. A network enables all the computers and devices to interact with each other.

 

Networks can be small or large, permanently connected through wires or cables, or temporarily connected through phone lines or wireless transmissions.

 

The largest network is the Internet, which is a worldwide group of networks.

O

operating system

An operating system is the software that controls and manages computer hardware and basic system operations. The operating system loads programs into the computer’s memory, runs these programs, and manages peripherals like disks and printers. Commonly used are operating systems are Windows and Mac OS.

Go back to the top of the topic

P

packet

Information is transmitted across the Internet in packets. A packet bundles information so that it can be routed.

 

A packet consists of a header (which has information on the source, the destination, and how the packet should be handled) and the actual data being transmitted.  

POP3

POP3 (Post Office Protocol Version 3) is an email protocol that a vast number email programs use to retrieve email messages. This protocol most often transmits on TCP port 110.

 

See also: SMTP.

port (hardware)

A port is a connection point on a computer that allows you to connect devices that pass data into and out of the computer.

 

For example, a printer and a modem are connected to a computer through a port. Sample types of ports are parallel, serial, and USB.

port (networking)

A port is an address associated with a program or process on a computer; different applications listen and transmit on different ports. The port number directs packets to the appropriate application.

 

Ports are assigned to standard protocols such as HTTP and SMTP so that programs know which port to use for a connection. The most well-known port is 80, which transmits HTTP traffic over the World Wide Web.

protocol

A protocol is a set of standard rules that establish how data is transmitted between computers.

proxy server

A proxy server is a server located on a network between client software and another server.

 

A proxy server can be used to regulate Internet communications, by inspecting traffic and determining if anything should be denied transmission.

Go back to the top of the topic

Q

Quarantine

The quarantine is a location on the drive where iolo AntiVirus stores files it suspects are infected. A quarantined file cannot function or infect any other files; as long as a file is stored in Quarantine, it does not pose a threat.

Go back to the top of the topic

R

RAM (random access memory)

Random access memory is the working memory of a computer where data is temporarily stored for various processes.

 

A higher amount of RAM means there is more space available for temporary data storage, which can speed processing.

RAT (remote access Trojan)

A remote access Trojan (RAT) is a malicious software program that gives someone remote access to and control of a computer.

 

A RAT can capture screen, sound, and video content, and often includes keylogging capabilities. With a RAT, imposters can send email messages that will appear to be from you, modify your documents, and use your PC to attack other computers.

registry

The registry is a database repository that holds configuration files used by your Windows operating system. The registry stores settings about user profiles and preferences; installed software, hardware and drivers; and other data required by the operating system.

router

A router is a networking device that forwards packets across a network to their destinations. A router acts as a junction between two or more networks to transfer data packets among them.

Go back to the top of the topic

S

self-extracting file

A self-extracting file is a compressed file that decompresses itself when executed. Self-extracting files are often used to transmit software over the Internet because they conserve disk space and reduce download time.

server

A server is a computer that delivers information and software to other computers linked by a network.

 

Servers come in many forms; for example: application servers, Web servers, database servers, and mail servers.

signature

See virus signature.

SMTP

SMTP (Simple Mail Transport Protocol) is an email protocol that a vast number of email programs use to send email messages. This protocol most often transmits on TCP port 25.

 

See also: POP3.

spyware

Spyware is tracking software that is installed on your computer without your notice or consent. It sends information about your computing activities back to its source, usually for advertising purposes, but sometimes for much more dangerous purposes such as identity theft or credit card fraud.

 

The effect of spyware varies depending on what its creator’s intentions are and can include consumption of valuable system resources, random lockups, crashes, or slowdowns; Web browser Home page or search page redirection; unwanted software installation; and random or incessant pop-up ads.

system tray

The system tray is located in the Windows taskbar (usually at the bottom of the screen, next to the clock) and contains icons that allow easy access to system functions.

Go back to the top of the topic

T

taskbar

The taskbar contains the Windows Start button, buttons for every open application, and the system tray.

 

The taskbar generally appears on the bottom of your computer screen, but it can be dragged to either side of the screen or the top of the screen.

TCP

The TCP (Transmission Control Protocol) converts data messages generated by an application into packets that can be sent over the IP protocol.

 

Unlike UDP, TCP is a connection-oriented protocol. TCP guarantees delivery of data and also guarantees that packets are delivered in the same order in which they were sent.

TCP/IP

TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols that form the foundation of Internet communication. It is a standard for transmitting data over networks and enabling communication between a variety of systems.

Trojan/Trojan horse

A Trojan, or Trojan horse, is a software program that appears to be desirable or useful, but intentionally does something you do not expect.

 

The effects of Trojans can range from simply displaying pop-up ads to destroying files or enabling the theft of data.

 

Trojans are distributed in executable files, such as through email attachments, CDs, and Internet downloads. People can be lured into installing a Trojan because it appears that it will serve a legitimate purpose. Unlike viruses and worms, a Trojan is not designed to make automatic copies of itself. However, Trojans can carry viruses and other malicious software within them.

 

Some specific types of Trojans include keyloggers and RATs.

Go back to the top of the topic

U

UDP

The UDP (User Datagram Protocol) converts data messages generated by an application into packets that can be sent over networks.

 

Unlike TCP, UDP is a connection-less protocol. It does not verify that a connection has been established with the receiving system.

 

UDP is often used for streaming video and audio.

Go back to the top of the topic

V

virus

A computer virus is a software program designed to alter the operation of a computer.

 

Most viruses are malicious and intended to cause damage, but even a benign virus can harm a system. Viruses can damage files, software programs, the registry, and hardware.

 

Viruses are distributed in executable files, such as through email attachments, CDs, and Internet downloads. A virus infection occurs when the infected file is run. A virus also automatically replicates, or makes copies of itself, by secretly embedding its programming code into other programs.

 

The term "virus" is often used as a generic, collective reference that includes other types of malicious programs, such as worms and Trojans.

virus definition

A virus definition is a file that contains virus signatures (see below) and other information used by iolo AntiVirus to detect, remove and repair known viruses. When iolo AntiVirus scans your computer, it is searching for qualities that match information in its definition files.

 

Keeping the virus definitions up to date is vital to protecting your computer.

virus signature

A virus signature is a unique string of code that makes up of all or part of a computer virus, worm, or other malicious code. The virus signature is like a fingerprint that can be used to identify specific viruses. Virus signatures are saved in a virus definition (see above).

Go back to the top of the topic

W

Windows Explorer

Windows Explorer (also "Explorer") displays a hierarchical view of the drives, folders, and files on your computer. Using Windows Explorer, you can open, copy, move, rename, and search for files and folders. Windows Explorer is an application that is part of Windows operating systems.

World Wide Web (Web)

The World Wide Web, or simply "Web", is the largest and most commonly used network on the Internet. The Web uses the HTTP protocol to transmit Web pages and other information.

 

Note that the World Wide Web is not synonymous with the Internet. The Web is one of several means for accessing information via the Internet.

worm

A computer worm is a software program designed to reproduce and spread among computers.

 

Most worms are malicious and intended to overwhelm system memory or network bandwidth. Worms can crash an entire network of computers or an individual computer.

 

Worms are generally distributed in email attachments or through unprotected Internet activity. A worm spreads very rapidly because it is self-contained. It replicates itself and, unlike viruses, a worm does not need to infect another program to spread.

Go back to the top of the topic

X

No glossary terms begin with this letter.

Y

No glossary terms begin with this letter.

Z

zombie

A zombie is computer that has had its security compromised and is remotely controlled, such as by a RAT.