• September 21, 2005 21 Sep'05

    crimeware

    Crimeware is any computer program or set of programs designed expressly to facilitate illegal activity online.  Continue Reading

  • September 21, 2005 21 Sep'05

    ridge

    In the biometric process of fingerscanning, a ridge is a curved line in a finger image.  Continue Reading

  • September 21, 2005 21 Sep'05

    minutiae

    In the biometric process of fingerscanning, minutiae are specific points in a finger image.  Continue Reading

  • September 21, 2005 21 Sep'05

    hybrid virus (multi-part or multipartite virus)

    A hybrid virus (sometimes called a multi-part or multipartite virus) is one that combines characteristics of more than one type to infect both program files and system sectors.  Continue Reading

  • September 21, 2005 21 Sep'05

    Web filter

    A Web filter is a program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user.  Continue Reading

  • September 21, 2005 21 Sep'05

    topsite

    A topsite is a stringently protected underground FTP server at the top of the distribution chain for pirated content, such as movies, music, games, and software.  Continue Reading

  • September 21, 2005 21 Sep'05

    chaffing and winnowing

    Chaffing and winnowing are dual components of a privacy-enhancement scheme that does not require encryption.  Continue Reading

  • September 21, 2005 21 Sep'05

    goat

    In biometric verification, a goat is a system end-user who is refused access to the system because their biometric data pattern is outside the range recognized by the system.  Continue Reading

  • September 21, 2005 21 Sep'05

    PUP (potentially unwanted program)

    A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.  Continue Reading

  • September 21, 2005 21 Sep'05

    Register of Known Spam Operations (ROKSO)

    The Register of Known Spam Operations (ROKSO) is a list of over 500 professional spammers that is maintained by the Spamhaus Project, an organization dedicated to identifying and exposing spam operators.  Continue Reading

  • September 21, 2005 21 Sep'05

    shoulder surfing

    Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.  Continue Reading

  • September 21, 2005 21 Sep'05

    dumpster diving

    Dumpster diving is looking for treasure in someone else's trash.  Continue Reading

  • September 21, 2005 21 Sep'05

    DSO exploit (data source object exploit)

    A data source object (DSO) exploit is a form of spyware that takes advantage of data binding to gain access to the hard drive of a computer connected to the Internet.  Continue Reading

  • September 21, 2005 21 Sep'05

    stealth virus

    In computer security, a stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.  Continue Reading

  • September 21, 2005 21 Sep'05

    Elk Cloner

    Elk Cloner was the first computer virus known to have spread in the wild.  Continue Reading

  • September 21, 2005 21 Sep'05

    cocooning

    Cocooning is the act of insulating or hiding oneself from the normal social environment, which may be perceived as distracting, unfriendly, dangerous, or otherwise unwelcome, at least for the present.  Continue Reading

  • September 21, 2005 21 Sep'05

    Quiz: Who Done IT? A Murder Mystery

    How to take the quiz: - After reading the question, click on the answer that you think is correct  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close