Absolute Beginners Guide to Security, Spam, Spyware & Viruses

T-U-V

tombstone shopping

A type of identity theft in which a thief researches deaths at a public library or by visiting a graveyard and then applies for a birth certificate in the dead person's name .

trialware

Software that is free to use for a set period of time so as to allow a user to try it before purchasing.

Trojan horse

A program posing as a harmless piece of software that can contain malware such as viruses or spyware.

UDP

User Datagram Protocol. A method of sending simple messages across a network connection that allows one computer to talk another to exchange information. You'll see it often referenced in a home network router setup.

USB

Universal Serial Bus. A computer port used to attach external devices such as keyboards, mice, joysticks, or digital cameras .

video adapter

A chipset integrated into a computer motherboard that gives it graphics display capabilities.

video card

A circuit board that plugs into a personal computer that gives it graphics display capabilities.

virus

A malicious program that replicates when deployed by a human, usually unknowingly.

virus hoax

An email, usually sent by a well-meaning friend, that contains alerts about a fictitious virus. Virus hoaxes are more of an annoyance than a real threat.

virus signature

A digital snapshot of a virus issued by a software publisher that is used by the publisher's antivirus program to detect a virus.

VPN

Virtual private network. A secure connection used to access a company's servers from home across the public Internet. It can also provide a secure connection between a company and a customer's or satellite office.

vulnerability scanner

A program that checks a computer for known weaknesses such as programming errors or security holes.

Категории