T-U-V - tombstone shopping
-
A type of identity theft in which a thief researches deaths at a public library or by visiting a graveyard and then applies for a birth certificate in the dead person's name . -
- trialware
-
Software that is free to use for a set period of time so as to allow a user to try it before purchasing. -
- Trojan horse
-
A program posing as a harmless piece of software that can contain malware such as viruses or spyware. -
- UDP
-
User Datagram Protocol. A method of sending simple messages across a network connection that allows one computer to talk another to exchange information. You'll see it often referenced in a home network router setup. -
- USB
-
Universal Serial Bus. A computer port used to attach external devices such as keyboards, mice, joysticks, or digital cameras . -
- video adapter
-
A chipset integrated into a computer motherboard that gives it graphics display capabilities. -
- video card
-
A circuit board that plugs into a personal computer that gives it graphics display capabilities. -
- virus
-
A malicious program that replicates when deployed by a human, usually unknowingly. -
- virus hoax
-
An email, usually sent by a well-meaning friend, that contains alerts about a fictitious virus. Virus hoaxes are more of an annoyance than a real threat. -
- virus signature
-
A digital snapshot of a virus issued by a software publisher that is used by the publisher's antivirus program to detect a virus. -
- VPN
-
Virtual private network. A secure connection used to access a company's servers from home across the public Internet. It can also provide a secure connection between a company and a customer's or satellite office. -
- vulnerability scanner
-
A program that checks a computer for known weaknesses such as programming errors or security holes. -
|