KnujOn

KnujOn (nûj-ôn)

Glossary


adware

A type of computer virus the produces pop-up advertisements and adds browser bookmarks/favorites that the user did not submit to. adware that also tracks user site visits and collects personal data is called spyware. more


back door

A flaw or bug in a program or system that allows undetected and unwanted access.


browser hijack

Software that changes your browser property settings, launches pop-ups, adds unwanted bookmarks/favorites, redirects links and modifies home page. See spyware and adware. more.


blocker

A program that blocks unwanted content or spam.


content hijack

Unauthorized use of webcontent. more.


fraud

Deliberate attempts to disguise purpose or identity in order to obtain money, goods, services, access, or information.


filter

software or settings that search for certain content in email, software or webpages.


firewall

Software and/or hardware that sits between an internal network and the Internet. A firewall is designed to prevent intrusion, viruses, etc. more.


hijack

Taking unauthorized control or making unauthorized use of resources belonging to someone else. more.


hoax

A fake story, myth or legend used to deceive people. more.


hack

Access or use of a program or system that was not intended or authorized by the owners or creators. more.


hacker

Person who exploits weakness in software or systems. more.


hacking

The practice of exploiting weakness in software or systems. more.


identity theft

The practice of using someone's personal information(name, identification, phone number, etc) for the purpose of committing crimes or damaging the victim's reputation. more.


intrusions

Unauthorized access to a network. more.


junk mail

Unwanted email. Not all junk mail is spam or phishing, but all phishing and spam is junk mail. more.


port scanning

The practice of testing network or computer ports to see if they are open and unprotected. more.


phishing

Deceptive attempts through email and/or websites to gain access or personal information. more.


pharming

Software that redirects Internet browsers to a predetermined location rather than the one expected by the user. Similar to browser hijacking. more.


registry hack

A program that alters the windows registry. more.


security

The practice or policy of protecting assets from theft, damage, or unauthorized use. more.


spam

Unwanted email solicitations with forged address and identities that often contain viruses. more.


spamming

A deceptive practice of using forged email to solicit sales and information. more.


spyware

A virus that records and transmits your computer and on-line activity. more.


worm

A self-replicating program that uses network connections and email to send copies of itself and hence create more copies at the new location. more.


war dialer

A program that dials numbers randomly or in sequence to find dial-up connections. more.


virus

A program that damages computers or allows unauthorized access. more.


zombie

A hijacked computer that is used to send spam or a gateway for hackers. more.

Privacy Policy and Mission Statement