- Industry: Software
- Number of terms: 9143
- Number of blossaries: 1
- Company Profile:
A message announcing a virus, intrusion detection, or other computer activity. The message can be sent automatically by a predefined configuration to system administrators and users via email, pager, or phone.
Industry:Internet
A type of application program interface (API) used to develop Windows applications, allowing a computer to communicate with other computers and applications (such as web browsers) via TCP/IP.
Industry:Internet
A complete failure of the operating system. When a program fails, it usually has an opportunity to display an error or diagnostic message. If the entire system fails, no such message appears and keystrokes and mouse clicks are ignored. In the worst cases, the system cannot restart without the computer being rebooted.
Industry:Internet
A set of rules enabling computers or devices to exchange data with one another with as few errors as possible. These rules govern issues such as error checking and data compression.
Industry:Internet
This program automatically searches for information and performs repetitive tasks. A bot can also generate generic traffic over the network. While bots are not always malicious, the most common are Internet relay chat (IRC) bots that can install malware or potentially unwanted programs, distribute compromised machine lists, and organize zombies for distributed denial of service (DDoS) attacks.
Industry:Internet
Part of the McAfee convention for naming viruses and Trojans. This suffix is attached to the end of virus names to indicate a “dropper,” a file that installs or drops other malware.
Industry:Internet
Executable files can be compressed with a packer that shrinks and possibly encrypts the original code. The packed executable decompresses and/or decrypts itself in memory while it is running, so the file on disk is never similar to the memory image of the file. Packers are designed to prevent reverse engineering and supply some level of copy protection, although they can also be used to avoid security software.
Industry:Internet
Also known as an encrypted virus, a type of virus that attempts to conceal itself from anti-virus programs, most of which try to find viruses by looking for certain patterns of code (known as virus signatures) that are unique to each virus. To avoid detection, self-encrypting viruses encrypt these text strings differently with each infection.
Industry:Internet
A change made to data, code, or a file so it must be processed, or decrypted, before a system can read or access it. Viruses may use encryption to hide their viral code in an attempt to escape detection. Viruses may also encrypt or change code or data on a system as part of their payload. One of the most common forms of encryption is password protection on ZIP (. Zip) files.
Industry:Internet
A specific script file format (. Bat) containing one MS-DOS command on each line of the file. When run, each line executes in sequential order. Batch files run on Microsoft-compatible operating systems, such as DOS, OS/2, and Windows.
Industry:Internet