- Industry: Software
- Number of terms: 9143
- Number of blossaries: 1
- Company Profile:
A search pattern — often a simple string of characters or bytes — expected to be found in every instance of a particular virus. Usually, different viruses have different signatures. Anti-virus scanners use signatures to locate specific viruses.
Industry:Internet
Refers to software that you can install on a computer. An application can be a complex combination of executable files (EXEs), DLLs, data files, registry settings, and install/uninstall files.
Industry:Internet
A collection of zombie PCs. Botnet is short for robot network. A botnet can consist of tens or even hundreds of thousands of zombie computers. A single PC in a botnet can automatically send thousands of spam messages per day. The most common spam messages come from zombie computers.
Industry:Internet
A condition in an operating system or application that allows data input that will manipulate an integer value in the application to corrupt memory.
Industry:Internet
The maximum amount of information that can be transmitted over a channel (wired, wireless). For digital devices, bandwidth is measured in bits per second (bps). For analog devices, bandwidth is measured in Hertz (Hz).
Industry:Internet
Machine code (often written in assembly language) used as the payload to exploit a software bug. This method enables the hacker to communicate with the computer through the operating system command line.
Industry:Internet
An unwanted electronic message, most commonly unsolicited bulk email. Typically, spam is sent to multiple recipients who did not ask to receive it. Types include email spam, instant messaging spam, Usenet newsgroup spam, web search-engine spam, spam in blogs, and mobile phone-messaging spam. Spam includes legitimate advertisements, misleading advertisements, and phishing messages designed to trick recipients into giving up personal and financial information. Email messages are not considered spam if a user has signed up to receive them.
Industry:Internet
A modified version of an existing virus. A variant is usually deliberately produced by the virus author or another person amending the virus code. If changes to the original are small, most anti-virus products will also detect variants. However, if the changes are large, the variant may go undetected by anti-virus software. McAfee identifies variants by a letter-based extension after the virus family name (e.g., W32/Virus. A, W32/Virus. B). When more than 26 variants of a virus are identified in a single family, a two-letter extension is used (e.g., W32/Virus. Aa, W32/Virus. Ab).
Industry:Internet
Intermediate distribution of a product that addresses specific issues. This is previously called HotFix release.
Industry:Internet
Includes the location on a computer system that stores email messages or files, containing viruses or other suspicious code. The system administrator reviews the messages or files to determine how to respond.
Industry:Internet