Archive for the ‘Glossary’ Category

adwareThe concept of “adware” includes programs that run ads (often in the form of pop-up windows) or redirect search requests to advertising sites.

Adware is often built into freeware or shareware programs, and installed on your computer at the same time with the main application without knowledge or consent. Sometimes adware can secretly download and install on your computer Trojan horse.

Obsolete, not updated on time versions of web browsers may be vulnerable to hacker tools, download adware to your computer. There is also a “program-browser hijackers” that can change the settings of a browser redirect incorrectly typed or incomplete URL-address-specific Web sites or to change the set to the home page. They can also redirect searches to pay (often pornographic) websites. (more…)



There are many ways of penetration of spyware on your computer.

You can download them from the Web site on the Internet, receive e-mail, opening the link received via ICQ, installing unlicensed software from piracy drive, etc.

Spyware programs often mask their presence on your computer or just do not show any sign that they at you “on a visit”. (more…)



Vulnerability – a shortcoming of the software installed on your computer, or used to provide network security.

They can also occur as a result of an incorrect configuration or settings. Hackers exploit vulnerabilities to attack your computer, which can lead to data loss and equipment damage. Software companies, according to the found vulnerabilities and release patches that address the problem after installing it on your computer.

The Software development companies, report about the found vulnerabilities and let out patches which eliminate a problem after installation on your computer. (more…)

What is spam?

Posted: March 5, 2013 in Glossary
Tags: , ,

Stop spamSpam – anonymous unsolicited bulk e-mail distribution, ie electronic equivalent of paper advertising mail, regular mail boxes littering.

Spam is most often used to advertise products and services. Spammers send out a large number of advertisements and cashing in on those who are responsible. In addition, the attackers use spam for phishing attacks and malware.

Over the past ten years has expanded the scope of the spam, and the volume of delivery – increased significantly. At first spam was being sent directly to the individual addresses of the users and it was easy to block. Over time, high-speed Internet channels that give fast and cheap opportunity to massively send spam messages. Spammers have also found that they can use for their own purposes modems individual users – modems are not equipped with means of protection against unauthorized access, and could be used by hackers from anywhere planety.Drugimi words, modems unsuspecting users send out huge amounts of spam. (more…)

Сross Site SсriрtingXSS (Сross Site Sсriрting) – a type of vulnerability of interactive information systems in the network (eg, browsers) that is in server-generated pages embedded scripts that run on the client side.

The specificity of this tactic is that, instead of a direct attack on the server are then used vulnerable server as a means to attack your computer. An attacker can use XSS to bypass access control measures, such as rules limiting the domain. Approximately 80.5% of all recorded in 2007 by Symantec vulnerabilities accounted for by cross-site scripting. Damage from attacks using XSS varies depending on the value of the information processed in the vulnerable site, and the security measures taken by the site owner.

Simply put, XSS, (also known as CSS, which creates confusion with the term ‘Cascading Style Sheets’), is the most common vulnerability occurring among web applications. With XSS an attacker can inject into a Web page with malicious code. XSS is possible because of the lack of validation of data entered by the user, or the lack of filtering. Inadequate handling of user data input may lead to malicious code in the user’s browser. (more…)

KeyloggersKeyloggers – are applications that monitor keyboard keystrokes and sends this information to a malicious user.

This can be done by mail or by sending directly to a server located anywhere in the global network. This information can then be used to collect email or other details from unsuspecting users, and perhaps even to obtain source code of programs at vendors. (more…)

Botnet or zombie network

Posted: October 17, 2012 in Glossary
Tags: , ,

BotnetBotnet or zombie network – a network of computers infected with malware that allows an attacker to remotely manage other people’s machines without the knowledge of their owners.

In recent years, botnets have become a stable source of income for cybercriminals. Consistently low costs and minimum knowledge needed to control the botnet, contribute to popularity, and with it the number of botnets. To DDoS-attacks or spam, carried by zombie networks, attackers and their customers earn thousands of dollars.

Botnets are created to make money. There are several areas of commercially viable applications of zombie networks: DDoS-attacks, collecting confidential information, spam, phishing, search engine spam, wrapping click-counters, etc. It should be noted that profit will be any direction, no matter what the attacker has chosen, and botnet can perform all of these activities simultaneously. (more…)

DDoS attack alertDDoS-attack – Distributed Denial of service, which is one of the most common and dangerous network attacks.

In attack disrupted or completely blocked service attacks, network, systems and other resources. Most DDoS-attacks exploit vulnerabilities in the core protocol Internet (TCP / IP), namely, the method of processing systems request SYN.

There are two main types of attacks that cause a denial of service

  • As a result of the attack of the first type, stops the entire system or network. Hacker sends system data or packets that it does not expect, and it stops the system or it is rebooted.
  • The second type of DDoS-attacks cause an overflow of the system or network with a huge amount of information that can not be processed. (more…)

spywareThis article is devoted quite relevant in the present time the problem – the problem of malicious code. Until a few years ago, the situation was quite simple – there applications (including the operating system) and computer viruses that programs capable of infecting other applications by implementing them in their native. Recently, however, there was a lot of malicious programs, which can not be considered viruses because they do not have the ability to reproduce. For such programs, there are many categories: Trojan, Backdoor, Trojan-Downloader, MalWare, SpyWare, Adware, Dialer … Classification is often quite controversial – manufacturers of various antivirus software include the exact same program for different categories. This article is an attempt to define a classification of malware and to formulate criteria for the program can be classified as SpyWare and Adware. (more…)

What is “Phishing”

Posted: September 11, 2012 in Glossary
Tags: ,

PhishingPhishing – a type of the Internet fraud, which purpose — to obtain identification data of users. This includes stealing passwords, credit card numbers, bank account numbers and other confidential

Phishing is a fraudulent e-mail came to the notice from the banks, service providers, payment systems, and other organizations that, for whatever reason, the recipient urgently need to transfer / update your personal information. The reasons may be called different. This may be a loss of data, damage to the system and so on.

Criminal creates almost exact copy of the site selected bank. Next, using spam techniques to send the letter, drawn up in such a way as to be as similar to a real letter from the selected bank. Bank logos, names of real bank managers. (more…)