upload
McAfee, Inc.
Branche: Software
Number of terms: 9143
Number of blossaries: 1
Company Profile:
Infection is the action a virus carries out when it enters a computer system or storage device.
Industry:Software
A virus is "in the wild" (ITW) if it is verified as having caused an infection outside a laboratory situation. Most viruses are in the wild and differ only in prevalence. Also see: zoo virus.
Industry:Software
A hole is a vulnerability in the design software and/or hardware that allows circumvention of security measures.
Industry:Software
Host is a term often used to describe the computer file to which a virus attaches itself. Most viruses run when the computer or user tries to execute the host file.
Industry:Software
Hijacking is an attack whereby an active, established session is intercepted and used by the attacker. Hijacking can occur locally if, for example, a legitimate user leaves a computer unprotected. Remote hijacking can occur via the Internet.
Industry:Software
Heuristic analysis is behavior-based analysis of a computer program by anti-virus software to identify a potential virus. Often heuristic scanning produces false alarms when a clean program behaves as a virus might.
Industry:Software
A hacker is a person who creates and modifies computer software and hardware, including computer programming, administration, and security-related items. This can be done for either negative or positive reasons. Criminal hackers create malware in order to commit crimes. Also see: malware, cyber criminals, cyber gangs.
Industry:Software
Spam forwarded to you by a family member, friend or colleague. Learn more about fram here.
Industry:Software
A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel. The firewall software analyzes information passing between the two and rejects it if it does not conform to pre-configured rules.
Industry:Software
File viruses usually replace or attach themselves to COM and EXE files. They can also infect files with the extensions SYS, DRV, BIN, OVL, and OVY. File viruses may be resident or non-resident, the most common being resident or TSR (terminate-and-stay-resident) viruses. Many non-resident viruses simply infect one or more files whenever an infected file runs. These are also called parasitic viruses, file infectors, or file infecting viruses.
Industry:Software