Search This Blog

Powered By Blogger

Total Pageviews

Wednesday, February 22, 2006

Few things to know about Computers

419 Scam
A type of
advance fee fraud originating from West Africa, so called because 419 is the section of the Nigerian legal code that covers the crime.

802.11
A standard for
wireless networks that ensures interoperability between different manufacturers. 802.11 networks come in three different variants: a, b and g. 802.11b is the most common while a and g are much faster. Usually cards capable of faster speeds are backwardly-compatible to the b standard.

Access point
A wireless hub that links together different
802.11 network cards to form an ‘infrastructure’ wireless network (as opposed to ad-hoc).

Access privileges
The ability of users to read, change or delete files


ActiveX
A Microsoft system that allows reusable software components, especially applied to those downloaded on web pages to make them interactive.


Ad-hoc network
A
wireless network that links computers on a peer-to-peer basis rather than routing traffic through a central access point.

Administrator
A user with sufficient access rights to allow them to manage the access rights of other users and carry out other high-level computer management tasks.


Advance fee fraud
Any fraud that tricks victims into paying money up front on the false hope of receiving a large windfall later


Adware
A form of
spyware that displays unwanted adverts on a computer

AIM
AOL
Instant Messaging, a system for doing instant messaging
Antivirus software
Software specifically designed for the detection and prevention of known
viruses.

ASCII
American Standard Code for Information Interchange, a widely used code for digitally representing letters, numbers and punctuation marks


Attachment

Files, such as programs or documents, that are attached to an email

Authentication
The process for verifying that someone or something is who or what it claims to be. In private and public computer
networks (including the Internet), authentication is generally done with passwords.


Back door

A loophole in a computer's security systems that allows a
hacker access to it
Backup
Copying data and system files in case of disaster

Biometric
Using body measurements, such as fingerprints, irises, as a means of
authentication.
BIOS Password
A BIOS is software code that links the operating system to the hardware – it is the most basic piece of software on a computer. It usually includes the ability to stop an unauthorised user starting the machine.

Black hat
A
hacker who uses their skills to break into computer systems.
Bluetooth
An industry standard for short-range wireless connections between devices like mobile phones, headsets, computers and
PDAs
Boot
To start up or reset a computer

Boot password
A password that applies while a computer starts up and before any operating system can be loaded

Botnet
A collection of PCs which have been infected by a
virus and which are under the central control of criminals or evil hackers.
Broadband
Broadband connections to the Internet differ from
dial-up connections in two ways. First, they are much faster, typically ten times quicker than a modem. Second, they are normally left connected to the Internet permanently and not just when they are in use. Examples of broadband connections include: ADSL, cable modem and fibre-optic leased lines.
Browser
A program that lets users read and navigate pages on the World Wide Web, such as Mozilla Firefox or Microsoft Internet Explorer

Buffer
A region of memory reserved for use as an intermediate repository in which data is temporarily held before it is transferred between two locations or devices.

Buffer overrun
A condition that results from adding more information to a
buffer than it was designed to hold. An attacker may exploit this vulnerability to take over a system.
Bug
A failure, error or flaw in a computer program

Byte
A unit or measure of computer memory, usually consisting of eight binary digits (bits) processed together; usually enough to store a single letter or digit.

Certificate
An encrypted file containing user or
server identification information, which is used to verify identity and to help establish a security-enhanced link.
Chat rooms
An online discussion group where you can chat (by typing) with other users in real time

Compact Disc
A CD-ROM is a data version of a music CD capable of storing up to 700mb of data. Using a CD recorder it is possible to create new CD-ROMs.

Computer security
The discipline, techniques, and tools designed to help protect the confidentiality, integrity, and availability of data and systems.

Cookie
A small data file that is stored on a user's local computer for record-keeping purposes and which contains information about the user that is pertinent to a Web site, such as user preferences.

Cracker
A malicious
hacker who uses their skills to do bad things.
Cracking
Finding a password by trying many combinations and words.

Critical update
A broadly released fix for a specific problem addressing a critical
bug.
Cyberslacking
Wasting time, usually at work, using the internet

Data Protection Act
The Data Protection Act 1984 sets out the legal basis for handling and protecting private information and data in the UK

Decryption
The process of converting encrypted data back into its original form.

Denial of service
Flooding a
network with unwanted packets to slow it down.
Denial of Service Attack
By overloading a service
hackers seek to make it unavailable to legitimate users. For example, by sending millions of spam emails simultaneously to a mail server, ordinary traffic will get clogged up.
Desktop firewall
A
firewall that operates on a user's computer (as opposed to a gateway firewall)
Dialler
A piece of software that uses a
modem to connect to the internet
Dial-up Connection
A dial-up connection uses a
modem (or sometimes an ISDN terminal adaptor) to connect to an ISP. Usually these connections are quite slow and only open while the user is actually online.
Digital Audio Tape
A tape format used to store and
backup data.
Digital signature
Data that is bundled with a message or transmitted separately and is used to identify and authenticate the sender and message data. A valid digital
signature also confirms that the message has not been tampered with.
Discoverable
A
Bluetooth device that has been set up to broadcast its existence to other Bluetooth devices
Domain Name Server
A
server that converts recognisable domain names (e.g. Microsoft.com) into their unique IP address (e.g. 207.46.245.222).
Download
To transfer a copy of a file from a remote computer to a requesting computer by means of a
modem or network.
Dumpster diving
A method of
social engineering in which criminals raid rubbish bins to gather telling personal information
DVD writer
A device for creating DVDs

DVD-ROM
A version of the DVD format designed to store data rather than video

Easter Egg
An unexpected ‘feature’ built into a computer program by the author

Eavesdropping
listening to the information as it is transmitted over the air

Elevation of privilege
When a user (particularly a
malicious user) gains more access rights than they normally have.
Email attachment
See '
attachments'
Email filter
Software that scans incoming email for
spam or other unwanted material and filters it accordingly
Encryption
The process of converting data into cipher text to prevent it from being understood by an unauthorized party.

Escrow
When money or other assets are held by a trusted third party pending completion of a transaction

FAQ
Frequently Asked Questions

File sharing
Making files available over the internet to other users, typically music or video files

Filter
A program designed to monitor what is being loaded into a web
browser or email program and block certain types of material
Fingerprint recognition
A
biometric form of authentication using fingerprints
Firewall
Hardware or software designed to prevent unauthorized access to a computer or
network over the internet
Flame
An irate email

Freeloading
where a
wireless network is used to share a broadband internet connection, there is a risk that unauthorised users will bogart your connection
FTP
File Transfer Protocol, a method of transmiting data files over the internet

Full backup
A
backup where all the chosen files are backed up, regardless of whether they have changed since the last backup
Gateway firewall
A
firewall that operates at the point where a private local area network connects to the public internet
Geek
Someone who is fascinated by technology, perhaps obsessively

Gigabyte
1024
megabytes
Grooming
The process by which a paedophile prepares a child for a meeting, especially via the internet, with the intention of committing a sexual offence.


Hacker
Hackers are technical
wizards. Most are innocent geeks who enjoy working with computers. However, some use their skills for more sinister purposes: illegally breaking into systems or writing viruses and other malware.
Hard disk
A fixed magnetic disk drive used to store data on personal computers

Hardware firewall
A
firewall that operates as a standalone device, such as a router, rather than running in software on a computer
Hoax email
An otherwise harmless email that is designed to cause alarm or get itself forward to other users (or both). For example a fake
virus warning or a chain letter.
Honey pot
A system designed to look like a regular
network but which, in fact, monitors and traces unauthorised access.
HTML Format Email
An email that uses
HTML to make emails look like web pages.
Hypertext Mark up Language
The computer code that is used to describe the contents of web pages.

ICQ
See '
instant messaging'
Identity theft
The crime of impersonating someone, using their private information, for financial gain

IETF
Internet Engineering Task Force is the body that defines the standards underlying the internet

IMEI
International Mobile Equipment Identification: a unique serial number built into GSM mobile phones. *#06# on your phone to find out its IMEI number.

Incremental backup
A
backup where only files that have changed since the last backup are stored, making it quicker than a full backup.
Information Commissioner
In the UK, the Information Commissioner is the champion of public openness and personal privacy, in the context of the
Data Protection Act 1998 and the Freedom of Information Act 2000
Information security
The art and science of protecting computers and data from misuse

Information theft
Theft of valuable data, such as customer records or engineering designs

Instant messaging
Sending short text messages in real time over the internet. Systems include
MSN Messenger, ICQ, AOL Instant Messanger and Yahoo!
Internet Service Provider
A company that provides access to the Internet.

IP Address
A unique address that is used to identify a computer on the Internet. In its basic form it is made up of four numbers separated by dots, called a dotted IP address (for example 192.168.0.1).

IPSec
IP Security: IPSec provides security for transmission of sensitive information over unprotected
networks such as the Internet. IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices.
IT security
See '
information security'


Java
A programming language originally developed by Sun Microsystems; now widely used on the internet and on mobile devices

Javascript
A programming language derived from
Java that is used to make web pages more interactive

KB article
A technical document in the Microsoft® Knowledge Base accessible through Microsoft.com.

Key logger
A
virus that logs a user's keystrokes as they type in order to capture private information, passwords or credit card information. Occasionally, key loggers can be physical devices attached to a PC.
Kilobyte
1024
bytes
Kludge
See
Kluge
Kluge
an effective but inelegant solution to a problem

Layer-2 Tunnelling Protocol
Layer-2 Tunnelling Protocol:
L2TP provides security for transmission of sensitive information over unprotected networks such as the Internet.
Linux
An open-source, freely-available operating system originally developed by Linus Torvalds

Local Area Network
A local computer
network for communication between computers.

MAC Filtering
Each
network card has a unique ID called a MAC. A wireless network access point can be configured to give access to specific network cards (and the computers in which they are installed) and exclude others on the basis of these MAC addresses.
Macro
A macro is a script of basic activities created by a user to automate repetitive tasks

Macro virus
A
macro virus uses the macro capabilities of common applications like word processors to implement virus-like behaviour
Mail bomb
An excessively large amount of e-mail data sent to a user's e-mail address in an attempt to make the user's e-mail program crash or to prevent the user from receiving further legitimate messages.

Mail relaying
A practice in which an attacker sends e-mail messages from another system's e-mail
server in order to use its resources and/or make it appear that the messages originated from the other system.
Malicious user
A person who has access to a system and poses a security threat to it. An example is someone who tries to elevate their privileges to gain access to data they are not supposed to see.

Megabyte
1024
kilobytes
Memory stick
A removable solid-state memory device

Microsoft Base Line Security Analyser
A free tool from Microsoft that searches computers for known security vulnerabilities and suggests remedies.

Modem
A device that links computers over the public telephone
network, typically to connect to the internet
MP3
MPEG-1 Audio Layer-3 is a standard for compressing and storing sound files, typically for music

MP3 Player
A device that plays
MP3 music files
MSN Messenger
See '
instant messaging'

Network
A number of computers that are connected to one another

Non-repudiation
A method of transmitting information (typically email) where the sender gets proof of delivery and the recipient is certain of the identity of the sender so that neither can later deny having processed the information

Online backup
A
backup method in which data is transmitted over the internet to a trusted third party for storage
Open source
Computer software that has been developed in a collaborative way by volunteers on a non-commercial basis

Own3d
See '
Owned'
Owned
When a computer has been taken over by bad
hackers


Packet
The basic unit of data transmission on a
network
Padlock
A symbol in a web
browser that indicates that an encrypted (SSL) connection is being used to communicate with a site that has a valid certificate
Pairing
When two
Bluetooth devices establish a permanent, secure, trusted relationship
Patch
A software update.

PDA
A portable digital assistant, typically a handheld computer like a PocketPC.

peer-to-peer
A
network in which each computer is capable of being both a server and a client; typically used to share music files over the internet
penetration testing
When trusted
hackers simulate an attack on a computer system in the hope of revealing vulnerabilities and finding opportunities for improving its security
Pharming
An exploit in which criminals disrupt the normal functioning of
DNS software which translates internet domain names into addresses. The user enters a correct address but is redirected to a fake website.
Phishing
An attempt at
identity theft in which criminals lead users to a counterfeit website in the hope that they will disclose private information such as user names or passwords
Ping
A simple program that communicates with another computer over a
network to see if it is responsive. Now often used as a form of human communication (“I’ll ping you later”).
Piracy
Illegal use or duplication of material covered by intellectual propery laws, such as copyright

Pop-up
A small window which appears over a web page to display an advertisement

Port
Each
network service on a given computer has its own port, like a telephone extension.
Port scanner
Software which scans a given
IP address looking for open ports
Port sniffer
A
hacker program designed to find open or unguarded ports.
PPTP
Point-to-Point Tunnelling Protocol: PPTP provides security for transmission of sensitive information over unprotected
networks such as the Internet.
Premium rate
A telephone number, prefixed by 00 or 09, which costs a lot when dialled

Private key
One of two keys in
public key encryption. The user keeps the private key secret and uses it to encrypt digital signatures and to decrypt received messages.
Privilege escalation
See
Elevation of Privilege
Proxy server
A
firewall component that manages Internet traffic to and from a local area network (LAN) and can provide other functions, such as document caching and access control.
Public key
One of two keys in
public key encryption. The user releases this key to the public and anyone can use it to encrypt messages to be sent to the user and decrypt the user's digital signature. Compare private key.
Public key encryption
An asymmetric
encryption scheme that uses a pair of keys for encryption: the public key encrypts data, and a corresponding secret key decrypts it. For digital signatures, the process is reversed: the sender uses the secret key to create a unique electronic number that can be read by anyone possessing the corresponding public key, which verifies that the message is truly from the sender. See also private key, public key.
Public key infrastructure
Generally, the laws, policies, standards, and software that regulate or manipulate
certificates and public and private keys.


RAID
A Redundant Array of Inexpensive Disks. Instead of using one large, expensive disk, most
servers use a RAID array. There are different levels of redundancy, so a RAID level 5 has the highest level of safety. A single disk in the array can fail or even be removed and the data remains safe.
Recordable DVD
A DVD that is capable of storing data when used in a DVD burner

Remote desktop
A system that allows one computer to display the screen of another and to operate it remotely

Removable media
Storage devices that use removable media, such as ZIP drives

Repudiation
For example, buying something from an online auction and then failing to pay for it. Deleting or modifying a file in an untraceable or deniable way.

Rogue dialler
A
dialler that is created by criminals to dial premium rate numbers
Root
An administrative
user account with special privileges
Root access
Gaining access to a computer as a
root user
Root kit
A set of tools used by
hackers to get control of a computer
Router
A device that determines the next
network point to which a data packet should be forwarded on its way toward its destination. Routers are used to move packets around the Internet and most broadband connections end with a router in your building that connects your LAN to the rest of the Internet.


Script kiddies
Inexperienced
hackers who use publicly available tools.
Server
A computer that provides a service to other computers over a
network.
Signature
The 'fingerprint' that is used by anti-
virus software to detect an infection.
Smart card
A form of user
authentication that relies on a credit card-sized card with an embedded chip
Social engineering
Tricks performed by
malicious users offline to gain access to secure systems, for example impersonating a technical support agent.
Software firewall
A
firewall that runs on a computer as a program, as opposed to a hardware firewall
Spam
Unsolicited commercial e-mail. Also known as junk e-mail.

Spoof
To make a transmission appear to come from a user other than the user who performed the action.

Spoofing
For example forging email messages or scanning internet
packets to acquire a valid password, with which to hack into a computer.
Spyware
Unwanted software that secretly monitors a user's activity, scans for private information or gives outsiders control of a computer

SSID
The SSID is the name given to a
wireless network which enables users to find it.
SSL
Secure Socket Layer, a
public key encryption system that secures world wide web communications over the internet
Strong password
A password that provides an effective defence against unauthorized access to a resource. See
Use strong passwords.

Tampering
Altering the contents of
packets as they travel over the internet or altering data on computer disks once a network has been penetrated.
TCP/IP
Transmission Control Protocol / Internet Protocol. The protocols, or conventions, that computers use to communicate over the Internet

Technology journalist
A harmless drudge.

Token
A physical object, such as a
smart card, used to authenticate users
Toolbar
An add-in for a web
browser that adds functionality
Traffic
The transmission of
packets over a network, signifying communication between computers
Trojan horse
A computer program that appears to be useful but that actually does damage.

Upgrade
See '
patch'
USB
Universal Serial Bus: a standard for connecting computers and peripherals

Usenet
An internet-based public bulletin board system that allows users to post messages to different newsgroups

User account
A set of rules defining access to files and systems on a computer that is personal to a given individual

Username
A code name that, with a password, unlocks a
user account

Virtual private network
A private data
network that makes use of a public network, such as the Internet, by encrypting data at one node and using security procedures that provides a "tunnel" through which the data can pass to another node.
Virus
Code written with the express intention of replicating itself. A virus attempts to spread from computer to computer by infecting another file, typically an executable program. Besides spreading, viruses can be used to do harm or for criminal activity. See also: trojan,
worm and spyware.
Voice over IP
A technology for transmitting phone-like voice conversations over the internet

Vulnerability
Any product flaw, administrative process or act, or physical exposure that makes a computer susceptible to attack by a
malicious user.

War chalking
Using chalk symbols on walls to indicate the presence and configuration of an insecure
wireless network.
War driving
Locating insecure
wireless networks by scanning for them with a portable computer and special software.
Warez
Pirated software

Webcam
A digital camera that can transmit images over the internet to users who access a given webpage

Webmail
An email system that uses a web
browser to read and send emails rather than a standalone email client program
WEP
WEP data
encryption is defined by the 802.11 standard to prevent eavesdropping and access to the network by malicious users.
White hat
A non-criminal
hacker, who uses their skills legally
Wi-Fi
See '
802.11'
Wiki
A collaborative method of developing content for a website

Windows Messenger
See '
instant messaging'
Wireless network
See
802.11
Wizard
A
hacker of great ability. Also a high level administrator on a multi-user adventure game.
Worm
A subclass of
virus. A worm generally spreads without user action and distributes complete copies (possibly modified) of itself across networks. A worm can consume memory or network bandwidth, thus causing a computer to stop responding.
WPA
WiFi Protected Access: a method of encrypting
802.11 traffic as a protection against eavesdropping

XYZZY
The magic word in Adventure, a game from 1977; often used in other programs.

ZIP disk
A storage device with
removable media from Iomega

No comments: