Terms related to spyware, including definitions about malware and words and phrases about online advertising, adware and online privacy.
Browse ACC - POL
-
- access point mapping - War driving, also called access point...
- ActiveX - ActiveX is a set of object-oriented programming (OOP) technolog...
- ActiveX control - An ActiveX control is a component program objec...
- ActiveX Data Objects - ActiveX Data Objects (ADO) is an appl...
- ActiveX Data Objects (ADO) - ActiveX Data Objects (ADO...
- ADO - ActiveX Data Objects (ADO) is an application program interface from Mic...
- adware - Generically, adware (spelled all lower case) is any software appl...
- anonymizer - Anonymous Web surfing allows a user to visit Web sites wi...
- anonymous Web surfing - Anonymous Web surfing allows a user...
- anonymous Web surfing (Web anonymizer, SafeWeb)
- anti-spyware software - Anti-spyware software is a type of ...
- back door - A back door is a means of access to a computer program that...
- backdoor - A back door is a means of access to a computer program that b...
- barnacle - In a computer, a barnacle is unwanted programming, such as ad...
- BIOS rootkit - A BIOS-level rootkit is programming that exists in a ...
- bluesnarf - Bluesnarfing is the theft of information from a wireless de...
- bluesnarfing - Bluesnarfing is the theft of information from a wirel...
- bot - A bot (short for "robot") is a program that operates as an agent for a ...
- bot (robot) - A bot (short for "robot") is a program that operates as...
- browser hijacker - A browser hijacker (sometimes called hijackwa...
- browser hijacker (hijackware) - A browser hijacker ...
- bundling - In purchasing, bundling is the practice of marketing two or m...
- cache poisoning - Cache poisoning, also called domain name system...
- cache poisoning (domain name system poisoning o...
- clipboard hijack attack - A clipboard hijacking is an exp...
- computer barnacle - In a computer, a barnacle is unwanted progr...
- Computer-based Discovery - Electronic discovery (also ca...
- Content Discovery - Electronic discovery (also called e-discove...
- contextual marketing - Contextual marketing is an online mar...
- cookie - A cookie is information that a Web site puts on your hard disk so...
- cookie poisoning - On the Web, cookie poisoning is the modificat...
- Crash Course: Spyware - In general, spyware is any technolo...
- data integrity - Integrity, in terms of data and network security,...
- decryption - Encryption is the conversion of data into a form, called ...
- DelFly - DelFly is a remotely controlled, camera-equipped, highly maneuver...
- Digital Discovery - Electronic discovery (also called e-discove...
- Digital Evidence - Electronic discovery (also called e-discovery...
- Digital Evidence Discovery - Electronic discovery (als...
- DNS cache poisoning - Cache poisoning, also called domain nam...
- DNS poisoning - Cache poisoning, also called domain name system (DN...
- domain name system poisoning - Cache poisoning, also...
- download pop up - A pop-up download (sometimes called a download ...
- download pop-up - A pop-up download (sometimes called a download ...
- drive-by download - A drive-by download is a program that is au...
- driveby download - A drive-by download is a program that is auto...
- e discovery - Electronic discovery (also called e-discovery or edisco...
- e-discovery - Electronic discovery (also called e-discovery or edisco...
- e-Mail Discoverability - Electronic discovery (also called...
- EDD - Electronic discovery (also called e-discovery or ediscovery) refers to ...
- ediscovery - Electronic discovery (also called e-discovery or ediscove...
- Electronic Content Discovery - Electronic discovery ...
- Electronic Data Discovery - Electronic discovery (also ...
- Electronic Data Management - Electronic discovery (als...
- electronic discovery - Electronic discovery (also called e-d...
- electronic discovery (e-discovery or ediscovery)
- Electronic Document Discovery - Electronic discover...
- Electronic Evidence - Electronic discovery (also called e-dis...
- Electronic Evidence Discovery - Electronic discover...
- Electronic Information Discovery - Electronic di...
- Electronic-discovery - Electronic discovery (also called e-d...
- Email Discoverability - Electronic discovery (also called e...
- eMail Evidence Discovery - Electronic discovery (also ca...
- eMail Search and Discovery - Electronic discovery (als...
- encrypt - Encryption is the conversion of data into a form, called a ciph...
- encryption - Encryption is the conversion of data into a form, called ...
- Enterprise Search and Discovery - Electronic disc...
- evil twin - In security, an evil twin is a home-made wireless access po...
- Firesheep - Firesheep is a Firefox plug-in that automates session hijac...
- firewall - A firewall is a set of related programs, located at a network...
- freeware - Freeware (not to be confused with free software) is programmi...
- ham - Spam is unsolicited e-mail on the Internet.
- hijackware - A browser hijacker (sometimes called hijackware) is a typ...
- identity theft - According to the Identity Theft Resource Center, ...
- iJacking - According to the Identity Theft Resource Center, identity the...
- industrial espionage - Industrial espionage is the covert an...
- integrity - Integrity, in terms of data and network security, is the as...
- intelligent pop-up blocker - A pop-up blocker (sometim...
- Java Script - JavaScript is an interpreted programming or script lang...
- JavaScript - JavaScript is an interpreted programming or script langua...
- junk e-mail - Spam is unsolicited e-mail on the Internet.
- Kazaa Media Desktop - Kazaa (its full name is Kazaa Media Des...
- Kazaa Media Desktop (KMD) - Kazaa (its full name is Kaz...
- key logger - A keylogger, sometimes called a keystroke logger, key log...
- keylogger - A keylogger, sometimes called a keystroke logger, key logge...
- keylogger (keystroke logger, key logger, or sys...
- keylogging software - A keylogger, sometimes called a keystro...
- keystroke logger - A keylogger, sometimes called a keystroke log...
- KMD - Kazaa (its full name is Kazaa Media Desktop or KMD) is a decentralized ...
- Learning Guide: Spyware - Why spyware isn't just a home-u...
- Legal Discovery - Electronic discovery (also called e-discovery o...
- location poisoning - URL poisoning, also known as location poi...
- malicious software - Malware (for "malicious software") is any...
- malvertizement - A malvertizement is malicious coding served throu...
- malware - Malware (for "malicious software") is any program or file that ...
- malware (malicious software) - Malware (for "malicio...
- Personalization - On a Web site, personalization is the process o...
- PGP - Pretty Good Privacy (PGP) is a popular program used to encrypt and decr...
- pharming - Pharming is a scamming practice in which malicious code is in...
- phishing kit - A phishing kit is a collection of tools assembled to ...
- POLP - The principle of least privilege (POLP) is the practice of limiting a...