Security glossary

Antivirus

Software specialized in the fight against the computer viruses. It is generally composed of two modules: the monitor (permanent monitoring) and the scanner (analyzes on request).

Cookie

File recorded on your hard disk by an Internet site that you visited and containing of information on you and your course in the site. It makes it possible to recognize you and facilitate a later visit.

Electronic certificate

Identifying code of an Internet site or a user of transport delivered by an organization of certification and intended to guarantee the identity of the holder.

Firewall

Software intended to control communications Internet and to be opposed to the intrusions and the emission confidential data.

Hacker

Someone delivering itself to the hacking. The motivations of the hackers are various and not necessarily malevolent.

Hacking

Intrusion or takeover on a computer without the knowledge of its owner by the intermediary of Internet.

Heuristic analyze

Method of analysis used by the antiviruses to detect the not indexed viruses.

Password

Continuation of characters being used to authenticate the user of a connection or a software.

NETBIOS

Component of Windows intended to manage the file sharing on a network.

Replication

Process by which a virus inserts copies of itself in other files in order to propagate the infection.

Signature of virus

Continuation characteristic of codes present in a virus which make it possible to detect its presence. The antiviruses use a data base of signatures of virus which must be regularly updated.

Spyware

Software or module of a software of which the goal is to collect information on you and your computer to transmit them to the editor software or to an advertising control.

Temporary internet files

Files stored on your hard disk by your navigator when you consult Internet sites. This makes it possible to post them more quickly if you retrogress.

Trojan horse

Kind of parasite whose role is to facilitate the intrusion of hackers or viruses.

User name

Continuation of characters being used to identify the holder of an account of use of a connection or a service.

Virus

Software programmed to be installed on your computer without your knowledge, then to retort themselves and be disseminated in other files before starting actions prejudicial.

Worm

Parasite diverting the functions of software of transport to be propagated by sending of mails.

If this site were useful, make to you know it by establishing a link.
Here the code to be inserted on your site or your blog :
< a href="http://security.internet.free.fr/"> Internet security</a >