|
|
|
|
|
|
|
Hoaxes- programs that do not directly harm computers, but instead display false messages that harm has been done, or will be done under some circumstances, or warn user about some kind of nonexistent danger. Another form of hoax is false messages about new "uncurable" viruses. These messages are introduced into newsgroups and distributed via e-mail.
Logic bomb- see Trojan Horse
Macro viruses- These infect document files, electronic spreadsheets and databases of several popular software packages.
Mail bomb- massive amounts of email sent to a single system or individual. This is usually done to crash the user's system. Mail bombing is one step beyond flaming and can on many systems result in the cancellation of the bomber's account.
Mail filter- A program that allows a user to sort e-mail messages according to information contained in the header.
Malware- Other harmful programs besides viruses. Trojan horses and Backdoors are examples of Malware.
Netiquette-The rules of etiquette that govern online interaction on the Internet
Network Viruses- use protocols and commands of computer network or email to spread themselves
Signature scanning- used to determine the sender of an e-mail message
Spam-The electronic equivalent of junk mail
Spamming- The sending of the same message indiscriminately by e-mail to large numbers of people. Also the practice of sending copies of a message to many different newsgroups, with no regard to whether the subject matter is appropriate. Sometimes spams are advertisements. Spamming is considered bad netiquette and very unethical because it not only wastes everyone's time, but also costs money. The sender of the messages does not pay the cost.;. it is paid by the sites of the recipient and others on the route.
Trojan horse- Also called a logic bomb, it is often mistaken for a virus. This program appears to be useful and harmless but has harmful side effects such as destroying data or breaking security on the system on which it is run. The side effect is triggered by an event such as the clock reaching a certain date. This program cannot propagate itself, therefore is not a virus.
Unsolicited bulk e-mail- Another name for unsolicited commercial e-mail.
Unsolicited commercial e-mail- Any e-mailed document or documents consisting of advertising material. This is what is often referred to as Spam.
Virus- Boot; File; Macro; Network; A program that infects a computer by attaching itself to another program and propagating itself when that program is executed. A computer can become infected by files downloaded over a network or by the installation of new software or floppy disks that are infected with viruses. Some viruses are only pranks, and perform harmless actions like displaying a screen with a joke message on it. Others can destroy files or wipe out a hard drive.
Worm- A computer program that can make copies of itself, and spreads through connected systems, using up resources in affected computers or causing other damage.
|
|
|
|
|
|
|