KnujOn (nûj-ôn)



A type of computer virus the produces pop-up advertisements and adds browser bookmarks/favorites that the user did not submit to. adware that also tracks user site visits and collects personal data is called spyware. more

back door

A flaw or bug in a program or system that allows undetected and unwanted access.

browser hijack

Software that changes your browser property settings, launches pop-ups, adds unwanted bookmarks/favorites, redirects links and modifies home page. See spyware and adware. more.


A program that blocks unwanted content or spam.

content hijack

Unauthorized use of webcontent. more.


Deliberate attempts to disguise purpose or identity in order to obtain money, goods, services, access, or information.


software or settings that search for certain content in email, software or webpages.


Software and/or hardware that sits between an internal network and the Internet. A firewall is designed to prevent intrusion, viruses, etc. more.


Taking unauthorized control or making unauthorized use of resources belonging to someone else. more.


A fake story, myth or legend used to deceive people. more.


Access or use of a program or system that was not intended or authorized by the owners or creators. more.


Person who exploits weakness in software or systems. more.


The practice of exploiting weakness in software or systems. more.

identity theft

The practice of using someone's personal information(name, identification, phone number, etc) for the purpose of committing crimes or damaging the victim's reputation. more.


Unauthorized access to a network. more.

junk mail

Unwanted email. Not all junk mail is spam or phishing, but all phishing and spam is junk mail. more.

port scanning

The practice of testing network or computer ports to see if they are open and unprotected. more.


Deceptive attempts through email and/or websites to gain access or personal information. more.


Software that redirects Internet browsers to a predetermined location rather than the one expected by the user. Similar to browser hijacking. more.

registry hack

A program that alters the windows registry. more.


The practice or policy of protecting assets from theft, damage, or unauthorized use. more.


Unwanted email solicitations with forged address and identities that often contain viruses. more.


A deceptive practice of using forged email to solicit sales and information. more.


A virus that records and transmits your computer and on-line activity. more.


A self-replicating program that uses network connections and email to send copies of itself and hence create more copies at the new location. more.

war dialer

A program that dials numbers randomly or in sequence to find dial-up connections. more.


A program that damages computers or allows unauthorized access. more.


A hijacked computer that is used to send spam or a gateway for hackers. more.

Privacy Policy and Mission Statement