- Settore: Software
- Number of terms: 9143
- Number of blossaries: 1
- Company Profile:
A blog is a web site where users regularly post up-to-date journal entries of their thoughts on any subject they choose. It is readable by anyone on the web.
Industry:Software
A bimodal virus infects both boot records and files. It is also called a bipartite virus. Also see: boot-sector infector, file virus, multipartite.
Industry:Software
It is the part of the operating system that identifies the set of programs used to boot the computer before it locates the system disk. The BIOS is located in the ROM (Read-Only Memory) area of system and is usually stored permanently.
Industry:Software
A background task is a task executed by the system that generally remains invisible to the user. The system usually assigns background tasks a lower priority than foreground tasks. Some malicious software is executed by a system as a background task so the user does not realize unwanted actions are occurring.
Industry:Software
Back Orifice is a program developed and released by The Cult of the Dead Cow (cDc). It is not a virus; instead, it is a remote administration tool with the potential for malicious misuse. If installed by a hacker, it has the ability to give a remote attacker full system administrator privileges to your system. It can also “sniff” passwords and confidential data and quietly email them to a remote site. Back Orifice is an extensible program—programmers can change and enhance it over time. Also see: password sniffing.
Industry:Software
N. A backup is a duplicate copy of data made for archiving purposes or for protection against damage and loss. V. A backup is also the process of creating duplicate data. Some programs back up data files while maintaining both the current version and the preceding version on disk. However, a backup is not considered secure unless it is stored in a location separate from the original.
Industry:Software
Background scanning is a feature in some anti-virus software to automatically scan files and documents as they are created, opened, closed, or executed.
Industry:Software
A back door is a feature programmers often build into programs to allow special privileges normally denied to users of the program. Often programmers build back doors so they can fix bugs. If hackers or others learn about a back door, the feature may pose a security risk. This is also called a trap door.
Industry:Software
An attack is an attempt to subvert or bypass a system's security. Attacks may be passive or active. Active attacks attempt to alter or destroy data. Passive attacks try to intercept or read data without changing it. Also see: brute-force attack, Denial of Service, hijacking, password attacks, password sniffing.
Industry:Software
Attributes are characteristics assigned to all files and directories. Attributes include: read-only, archive, hidden, or system.
Industry:Software