background preloader

Anglais

Facebook Twitter

Learn the Terms - OnGuard Online. Virus Glossary. Spyware, Adware and Trojan Horse Research - Glossary. Adware (logiciel publicitaire) En général, les composants adwares (logiciels publicitaires) s'installent le long d'un shareware (partagiciel) ou freeware (gratuiciel) et apportent des publicités ciblées sur votre ordinateur. Ces publicités sont des sources de revenus pour le développeur du logiciel. L'adware affiche des publicités de type Web à travers des fenêtres contextuelles ou des bannières de publicité inopportunes. BHO (Browser Helper Object) Un BHO (Objet d'aide à la navigation) peut sembler être une barre d'outils bien utile dans Microsoft Internet Explorer (IE).

Pourtant, un BHO malveillant peut changer votre page d'accueil par défaut pour qu'elle soit dirigée vers un autre site ou bien envoyer un historique de vos habitudes de navigation à des tiers dans le but de faire de la publicité ciblée. Pirates de navigateur (Browser Hijackers) Les pirates de navigateur peuvent prendre le contrôle de votre navigateur Web. Composeurs (dialers) Enregistreurs de frappe (Keyloggers) Glossary. Understanding privacy and taking charge of how your information is collected and used online requires an understanding of basic terms related to the Internet, information technologies and privacy. As often as possible, we've attempted to link to this glossary from terms as they arise in this site.

But you may also encounter new terms when installing new software, hooking up a new computer, or reading about privacy issues in the press. This glossary is an alphabetical list of terms and definitions you may find helpful as you encounter unfamiliar words. a | b | c | d | e | f | g | h |i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z Access The third principle of fair information practices, along with (1) Notice, (2) Choice, and (4) Security. Affirmative customization Refers to a site's or an Internet service provider's use of personal data to tailor or modify the content or design of the site to specifications affirmatively selected by a particular individual. Aggregate. Glossary of terms. Thirty years ago, the first computer virus appeared, Elk Cloner, displaying a short poem when an infected computer booted up for the 50th time. Since then, cybercriminals have created millions of viruses and other malware—email viruses, Trojans, Internet worms, spyware, keystroke loggers—some spreading worldwide and making headlines.

Many people have heard about viruses that fill your computer screen with garbage or delete your files. In the popular imagination, malware still means pranks or sabotage. The early 1990s saw global panic about the Michelangelo virus. However, this is far from the truth today. The threats are no less real now, but they are low-profile, well-targeted, and more likely to be about making cash than creating chaos. Today, malware is unlikely to delete your hard disk, corrupt your spreadsheet, or display a message. More commonly, though, viruses don’t cause any apparent damage or announce their presence at all. Spearphishing is an example. Glossary of Terms Used in Security and Intrusion Detection. Access Control Access Control ensures that resources are only granted to those users who are entitled to them. Access Control List (ACL) A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource.

Access Control Service A security service that provides protection of system resources against unauthorized access. Access Management Access Management is the maintenance of access information which consists of four tasks: account administration, maintenance, monitoring, and revocation. Access Matrix An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell. Account Harvesting Account Harvesting is the process of collecting all the legitimate account names on a system. ACK Piggybacking ACK piggybacking is the practice of sending an ACK inside another packet going to the same destination. Active Content Activity Monitors Address Resolution Protocol (ARP) Digital Libraries: Glossary (1999) Glossary Digital libraries have absorbed terminology from many fields, including computing, libraries, publishing, law, and more.

This glossary gives brief explanations of how some common terms are used in digital libraries today, which may not be the usage in other contexts. Often the use in digital libraries has diverged from or extended the original sense of a term. AACR2 (Anglo-American Cataloguing Rules) A set of rules that describe the content that is contained in library catalog records. abstracting and indexing services Secondary information services that provide searching of scholarly and scientific information, in particular of individual journal articles. access management Control of access to material in digital libraries. ACM Digital Library A digital library of the journals and conference proceedings published by the Association for Computing Machinery. Alexandria Digital Library A digital library of geospatial information, based at the University of California, Santa Barbara. cache.

FOLDOC - Computing Dictionary. S Glossary of Internet Terms. The URL of this document is: which is where you can look for the latest, most complete version. Feel free to make links to that URL. Back to Index 1xRTT -- (Single Carrier (1x) Radio Transmission Technology) A wireless communications protocol used for connections to networks by devices such as laptop computers. 1xRTT has the capability of providing data transfer speeds of up to 144 thousand bps. 1xRTT is a built on top of another widely used protocol, CDMA and is also called CMDA2000. See also: bps, CDMA, Network, Protocol ADN -- (Advanced Digital Network) Usually refers to a 56Kbps leased-line. See also: bps, Leased Line ADSL -- (Asymmetric Digital Subscriber Line) A DSL line where the upload speed is different from the download speed.

See also: Download, DSL, SDSL, Upload Ajax -- (Asynchronous JavaScript and XML) Often (but not always) the data fetched by the javascript code is in XML format. See also: JavaScript, Web page, XML Anonymous FTP See also: FTP. The Tech Terms Computer Dictionary. Definition: TechEncyclopedia from TechWeb. Glossary | Virginia Tech Certification Authority | Virginia Tech. Glossary - Learn more about malware - Microsoft Malware Protecti. Webopedia: Online Computer Dictionary for Computer and Internet.

Center for Democracy & Technology | Keeping the Internet Open, I. Computer Glossary, Computer Terms - Technology Definitions and C. Top Stories How to research enterprise tech purchases Conquering the tech buying landscape can be challenging. Learn how to navigate each stage of the buying cycle, identify business goals and integrate insightful research. Pros and cons of facial recognition While facial recognition can offer many security and authentication benefits, flawed or misused facial recognition systems can put consumers at risk. 18 companies on stock exchange innovating in AI Keep an eye on the AI innovators as the turbulent AI industry evolves. 34 AI content generators to explore in 2024 Artificially generated media continues to progress.

View All Learning Content Browse Definitions By Topic In-Depth Guides What is data governance and why does it matter? New & Updated Definitions Tech News Getty Images/iStockphoto Microsoft allies with OpenAI rival Mistral AI Broadcom to sell VMware EUC division to KKR for $3.8B New merger guidelines, crackdown affect business strategies Octopus Deploy reels in Codefresh for GitOps expertise. UK | Hi-tech crime: A glossary. Like many subjects, information security comes with its own terminology and the jargon can be opaque to outsiders. Click below to shed light on the murky world of cyber crime.

Unwanted programs that, once installed, bombard users with unwanted adverts. Often those pushing the aware programs get paid for every machine they manage to recruit. Some adware poses as fake computer security software. Can be very hard to remove. A hacker that uses his or her skills for explicitly criminal or malicious ends. Has been used to mean the writers of destructive viruses or those that use attacks to knock websites offline. The name given to an individual computer in a larger botnet and which is more than likely a home PC running Windows. A large number of hijacked computers under the remote control of a single person via net-based command and control system. The biggest botnets can have tens of thousands of hijacked computers in them.

One of the names for the controller or operator of a botnet. DDoS. Glossary. ASC includes the following Glossary in order to clarify some of the terms used in this document, particularly the more frequently used terms in anti-spyware products and research. This Glossary will be updated as we continue with our work. ActiveX Control: See “Browser Plug-in.” Advertising Display Software: Any program that causes advertising content to be displayed. Adware: A type of Advertising Display Software, specifically certain executable applications whose primary purpose is to deliver advertising content potentially in a manner or context that may be unexpected and unwanted by users.

Many adware applications also perform tracking functions, and therefore may also be categorized as Tracking Technologies. Some consumers may want to remove Adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance. Browser Helper Object (BHOs): see “Browser Plug-in.” About WordNet - WordNet - About WordNet.

WordNet is supported by the National Science Foundation under Grant Number 0855157. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the creators of WordNet and do not necessarily reflect the views of the National Science Foundation. About WordNet WordNet® is a large lexical database of English. Nouns, verbs, adjectives and adverbs are grouped into sets of cognitive synonyms (synsets), each expressing a distinct concept. Synsets are interlinked by means of conceptual-semantic and lexical relations. The resulting network of meaningfully related words and concepts can be navigated with the browser. WordNet is also freely and publicly available for download. WordNet superficially resembles a thesaurus, in that it groups words together based on their meanings.

Structure The main relation among words in WordNet is synonymy, as between the words shut and close or car and automobile. Relations Adjectives are organized in terms of antonymy.