upload
McAfee, Inc.
Industry: Software
Number of terms: 9143
Number of blossaries: 1
Company Profile:
A virus that attaches or associates itself with a file. File infectors usually append or prepend themselves to regular program files or overwrite program code. File infectors can also be programs that associate themselves with program file names without attaching.
Industry:Internet
A term for spammers who create a large number of blogs with links to a spam site. Because the links are included in a large number of blogs, they have high search-engine rankings. Splogs are created to attract people to spam sites, primarily via Google.
Industry:Internet
To use the defects found in software code or function on a system to elevate privileges, execute code remotely, cause denial of service, or prompt other attacks. A buffer overflow is one example of an exploit.
Industry:Internet
The isolation of files that are suspected of containing a virus, spam, suspicious content, or PUPs. Quarantined files cannot be opened or executed.
Industry:Internet
Also known as PWS, a type of Trojan used specifically to steal a user’s password.
Industry:Internet
An extension to the FAT system and caters to large disks and long file names.
Industry:Internet
The concept that a computer virus could spread around the world in less than 15 minutes. It is based on Andy Warhol’s idea that every individual will have 15 minutes of fame in their life.
Industry:Internet
A virus that spreads by creating duplicates of itself on other drives, systems, or networks. A mass-mailing worm is one that requires a user’s intervention to spread, (e.g., opening an attachment or executing a downloaded file). Unlike viruses, worms do not infect other files. Most of today’s email viruses are worms. A self-propagating worm does not require user intervention to spread. Examples of self-propagating worms include Blaster, Sasser, and Conficker.
Industry:Internet
A type of process that is considered to have a higher possibility of being infected or accessing infected files. This includes processes that launch other processes, such as Microsoft Windows Explorer or the command prompt; processes that execute macro or script code, such as WINWORD or CSCRIPT; and processes to download from the Internet, such as browsers, instant messengers, and mail clients.
Industry:Internet
A string is a consecutive series of letters, numbers, and other characters. Examples include “afsH(*&@~” and “The Mad Hatter. ” Anti-virus applications often use specific strings, called virus signatures, to detect viruses.
Industry:Internet