Results | All related links for this item | 1-20 of 60 results for:

Overview x clear all

Refine by type

Refine by product

 

Active X

Overview page. Subjects: Computing.

Trademark A COM (def. 2) technology developed by Microsoft.

See overview in Oxford Index

add-on virus

Overview page. Subjects: Computing.

The most common form of virus. It functions by adding program code to the code of the computer which has been infected. It usually alters the start-up file of the infected computer so that...

See overview in Oxford Index

anti-virus program

Overview page. Subjects: Computing.

A program that detects and isolates viruses in a computer's file storage devices. It also checks incoming files, for example e-mail message attachments, and makes sure that outgoing files...

See overview in Oxford Index

anti-virus software

Overview page. Subjects: Computing.

Software which monitors a computer and its files in order to detect any virus intrusions that have occurred. Such software, for example, examines system files to see if they have been...

See overview in Oxford Index

appending virus

Overview page. Subjects: Computing.

A virus that appends itself to the end of a file, often an innocuous file.

See overview in Oxford Index

applet

Overview page. Subjects: Computing.

A small program in the Java programming language that can be incorporated in a web page to add additional features, such as sound or graphics.

See overview in Oxford Index

application monitor

Overview page. Subjects: Computing.

A form of virus detection software which monitors the execution of programs to see whether they are exhibiting behaviour which is similar to that of viruses: for example, carrying out the...

See overview in Oxford Index

armoured virus

Overview page. Subjects: Computing.

A virus which attempts to subvert any attempts by virus detection software to discover them. The main way they do this is by adding confusing and complex code to the infected computer along...

See overview in Oxford Index

attachment

Overview page. Subjects: Computing.

A data file that is embedded in an electronic mail message. The technicalities of this embedding are hidden by the user agent — to users, the data file appears as a distinct object attached...

See overview in Oxford Index

bacteria

Overview page. Subjects: Computing.

Forms of virus. Bacteria are programs which replicate themselves and then start executing: carrying out some processor- or memory-intensive task such as reading from a file. Each replicated...

See overview in Oxford Index

binder

Overview page. Subjects: Computing.

A program that concatenates (binds) a normal program such as a word processor and a virus in order to hide the virus from detection software.

See overview in Oxford Index

blended threat

Overview page. Subjects: Computing.

A threat to a computer system that uses a number of techniques that are normally employed in isolation such as a virus and a Trojan horse.

See overview in Oxford Index

boot virus

Overview page. Subjects: Computing.

A virus which stores itself on the boot sector of a disk and contains a program which is executed when the computer containing the disk is started up. This program carries out some...

See overview in Oxford Index

companion virus

Overview page. Subjects: Computing.

A virus which replaces a particular program in a computer and is executed when the user issues an instruction to execute the program. For example, it may replace a program which finds files...

See overview in Oxford Index

computer forensics

Overview page. Subjects: Computing.

A general term used to describe any process that is carried out to provide information about a security breach in a network. For example dumping the contents of a file store and examining...

See overview in Oxford Index

cracking

Overview page. Subjects: Computing — Law.

The unauthorized entry into a computer system, usually a networked system, in order to carry out some illegal act such as reading secure files or infecting the system with a virus.

See overview in Oxford Index

crimeware

Overview page. Subjects: Computing.

A generic term used to describe any software that is used to commit a crime on the Internet, for example a virus can be described as crimeware.

See overview in Oxford Index

cryptovirus

Overview page. Subjects: Computing.

A virus that enters a computing system and carries out encryption on the files in the system. The developer of the virus then usually contacts the organization whose computer has been...

See overview in Oxford Index

data vaulting

Overview page. Subjects: Computing.

The process of copying data and storing it remotely from the computer on which it is held. There are two reasons for data vaulting. The first is to enable recovery from an attack such as a...

See overview in Oxford Index

denial of service attack

Overview page. Subjects: Computing.

An attack on a computer system which results in the service being offered to a user or a number of users being severely degraded. Usually this degradation is so serious that the users are...

See overview in Oxford Index