upload
McAfee, Inc.
Industry: Software
Number of terms: 9143
Number of blossaries: 1
Company Profile:
A zombie is a PC that has been infected with a virus or Trojan horse that puts it under the remote control of an online hijacker. The hijacker uses it to generate spam or launch Denial of Service attacks. Also see: spam, Denial of Service.
Industry:Software
A DNS server helps users find their way around the Internet by translating each web site’s IP address, which is a string of numbers, into its easy-to-remember domain name.
Industry:Software
A zoo virus exists in the collections of researchers and has never infected a real-world computer system. Also see: in the wild.
Industry:Software
zoo
A zoo is a collection of viruses used for testing by researchers. Also see: in the wild, zoo virus.
Industry:Software
Worms are parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network. Worms often spread via Internet Relay Chat (IRC).
Industry:Software
A ZIP file is a compressed file. A zip archive contains compressed collections of zipped files. ZIP files are popular on the Internet because users can deliver multiple files in a single container, and the compressed files save disk space and download time. A ZIP file can contain viruses if any of the files packaged in it contain viruses, but the ZIP file itself is not directly dangerous. Other archive files include RAR, and LHA files. This file type has the extension ZIP.
Industry:Software
Windows Scripting Host (WSH) is a Microsoft-integrated module that lets programmers use any scripting language to automate operations throughout the Windows desktop.
Industry:Software
Warm booting is restarting a computer without first turning off the power. Using CTL+ALT+DEL or the reset button on many computers can warm boot a machine. Also see: cold boot, reset.
Industry:Software
Visual Basic Script is a programming language that can invoke any system function--including starting, using and shutting down other applications without--user knowledge. VBS programs can be embedded in HTML files and provide active content via the Internet. Since not all content is benign, users should be careful about changing security settings without understanding the implications. This file type has the extension VBS.
Industry:Software
Virus hoaxes are not viruses, but are usually emails warning people about a virus or other malicious software program. Some hoaxes cause as much trouble as viruses by causing massive amounts of unnecessary email. Most hoaxes contain one or more of the following characteristics: * Warnings about alleged new viruses and their damaging consequences * Demands that the reader forward the warning to as many people as possible * Pseudo-technical "information" describing the virus * Bogus comments from officials: FBI, software companies, news agencies, etc. If you receive an email message about a virus, check with a reputable source to ensure the warning is real. Click here to learn about hoaxes and the damage they cause. Sometimes hoaxes start out as viruses and some viruses start as hoaxes, so both viruses and virus hoaxes should be considered a threat.
Industry:Software