A backdoor refers to any method by which unauthorized or even authorized users can get around standard security measures and gain high-level user access on a computer system, network, or software application. Backdoors can also be installed by software or hardware makers as a deliberate means of gaining access to their technology after the fact. Backdoors of the non-criminal variety …
How important is a strong password?
Passwords provide the first line of defense against unauthorized access to your computer and personal information. The stronger your password, the more protected your computer will be from hackers and malicious software. You should maintain strong passwords for all accounts on your computer. Unauthorized access is a potentially major problem for anyone who uses computers or high-tech devices such as …
MP3 (Digital Encoding Process) Granted US Patent – 5,579,430
November 26, 1996 A United States Patent 5,579,430 is granted to the Fraunhofer Institut in Germany for a “digital encoding process”, the technology used in MEPG Audio Layer III, more commonly known as MP3. MP3 is a digital music format for creating high-quality sound files. It has transformed the way people buy and listen to music. The great attraction of …
What is a VPN (Virtual Private Network)?
A VPN (Virtual Private Network) creates a secure connection to the internet called a tunnel. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and encrypt traffic from the ISP (Internet Service Provider). Many services create a secure connection to the internet using third-party applications, which are easy to install, configure, and …
What is Blackhole Exploit Kit?
This threat is caused by code that can be hacked into a web page. When you browse to a web page with this threat it will exploit vulnerabilities in your Internet browser/plugins and force adware, phishing programs or any other type of fraudulent software to be installed on your device. The most popular variants of Blackhole Exploit Kit are Blackhole …
What is a Rootkit?
Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid detection. Techniques known as rootkits allow this concealment, by modifying the host’s operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system’s list of processes, or keep its files …
What is a Computer Virus?
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term “virus” is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Any virus will by definition make unauthorized changes to a …
What is Malware?
Malware, short for malicious software, is software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. While it is often software, it can also appear in the form of scripts or code. ’Malware’ is a general term used to refer to a variety of forms of hostile, intrusive, or annoying …
What is Spyware?
Spyware is a type of malware installed on computers that collect information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. While the term …