Software specialized in the fight against the computer viruses. It is generally composed of two modules: the monitor (permanent monitoring) and the scanner (analyzes on request).
File recorded on your hard disk by an Internet site that you visited and containing of information on you and your course in the site. It makes it possible to recognize you and facilitate a later visit.
Identifying code of an Internet site or a user of transport delivered by an organization of certification and intended to guarantee the identity of the holder.
Software intended to control communications Internet and to be opposed to the intrusions and the emission confidential data.
Someone delivering itself to the hacking. The motivations of the hackers are various and not necessarily malevolent.
Intrusion or takeover on a computer without the knowledge of its owner by the intermediary of Internet.
Method of analysis used by the antiviruses to detect the not indexed viruses.
Continuation of characters being used to authenticate the user of a connection or a software.
Component of Windows intended to manage the file sharing on a network.
Process by which a virus inserts copies of itself in other files in order to propagate the infection.
Continuation characteristic of codes present in a virus which make it possible to detect its presence. The antiviruses use a data base of signatures of virus which must be regularly updated.
Software or module of a software of which the goal is to collect information on you and your computer to transmit them to the editor software or to an advertising control.
Files stored on your hard disk by your navigator when you consult Internet sites. This makes it possible to post them more quickly if you retrogress.
Kind of parasite whose role is to facilitate the intrusion of hackers or viruses.
Continuation of characters being used to identify the holder of an account of use of a connection or a service.
Software programmed to be installed on your computer without your knowledge, then to retort themselves and be disseminated in other files before starting actions prejudicial.
Parasite diverting the functions of software of transport to be propagated by sending of mails.
If this site were useful, make to you know it by
establishing a link.
Here the code to be inserted on your site or your blog :
< a href="http://security.internet.free.fr/"> Internet security</a >