Browse Definitions :
Definition

pop-up download (or download pop-up)

A pop-up download (sometimes called a download pop-up ) is a pop-up window that asks the user to download a program to their computer's hard drive. The window may feature a security warning, or some other type of message that is likely to lead to compliance. Often, the pop-up window has no information about the program to be downloaded, and may feature buttons for "download," "yes," or "ok" -- but none for "no" or "cancel." Faced with a pop-up download window, the user may think that the download in question is just a browser plug-in application needed for aspects of a Web site they're visiting, or that the pop-up window was generated by their own computer.

Pop-up downloads often install programs that track online behavior and report it back to a parent company ( spyware ) and programs that use that information to generate specific pop-up advertisements ( adware ). EarthLink, a popular Internet service provider ( ISP ) recently estimated that 40 to 50 percent of their subscribers have such applications running on their computers, usually without the owner's knowledge. Subscribers contacting the ISP to report a problem are often surprised to find that these downloads are the cause.

A less scrupulous variation of automatic installation, called a drive-by download , installs a program on a computer's hard drive without even first generating a pop-up window.

This was last updated in March 2011
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close