Word of The Day

Thu
02
Jul
Dennis Faas's picture

XSS Cross Site Scripting

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. XSS: Background The expression "cross-site ... scripting" originated from the fact that a malicious web site could load another web site into another frame or window then use Javascript to read or write data on the other web site. The definition gradually changed to mean the injection of HTML and Javascript into a web page. Example of a Cross-site Scripting Attack Examples of an XSS code include ... (view more)

Wed
17
Jun
Dennis Faas's picture

Click Fraud

Click fraud is a type of Internet crime that occurs in pay per click online advertising. How Click Fraud Works A person or automated computer program imitates a legitimate user clicking on an ad online a web site. The ad is clicked for the purpose ... of generating a charge (per click) to the advertiser. Click Fraud with respect to PPC Advertising Pay per click (PPC) advertising is an arrangement in which web sites ("publishers") display clickable ads from an advertising network in exchange for revenue earned for each ad clicked. Each time a (believed to be) valid user clicks on an ad, ... (view more)

Fri
05
Jun
Dennis Faas's picture

Patch Tuesday

Patch Tuesday is the second Tuesday of each month, the day on which Microsoft releases security patches. Windows Updates Starting with Windows 98, Microsoft included Windows Update: a system that automatically checks for security patches and fixes ... for MS Windows, MS Office, and other Microsoft products, and notifies the user of such updates. Automatic Updates vs Windows Updates The idea of Windows Update system suffered from two primary issues. On one hand, less experienced users were not aware of updates, and would not run them -- leaving their system vulnerable to exploits. Microsoft's ... (view more)

Tue
02
Jun
Dennis Faas's picture

ePaper

Electronic paper, also called ePaper, is a display technology designed to mimic the appearance of ordinary ink on paper. Electrophoretic displays are considered prime examples of the electronic paper category, because of their paper-like appearance ... and low power consumption. Unlike a conventional flat panel display, which uses a backlight to illuminate its pixels, electronic paper reflects light like ordinary paper and is capable of holding text and images indefinitely without drawing electricity, while allowing the image to be changed later. Easy Viewing ePaper is considered more comfortable ... (view more)

Wed
27
May
Dennis Faas's picture

Rootkit

A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. The tools are are intended to conceal running processes, files or system data, which allows the intruder maintain ... access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. A computer with a rootkit on it is called a rooted computer. Functions of a Rootkit A rootkit typically hides logins, processes, files, and logs and may include software to ... (view more)

Fri
22
May
Dennis Faas's picture

Drive-by Download

The expression 'drive-by download' is used in four increasingly common meanings: 1. Downloads which the user indirectly authorized but without understanding the consequences. For example: by installing an unknown ActiveX component or Java applet. ... Note that Microsoft Internet Explorer uses the ActiveX scripting language, whereas Mozilla Firefox does not; thus, many argue that Firefox is considerably more secure than Internet Explorer because it is not susceptible to ActiveX-based attacks. (Source: cnet.com ) 2. Any download that happens without knowledge of the user. 3. A download of spyware, ... (view more)

Tue
19
May
Dennis Faas's picture

Botnet

Botnet is a jargon term for a collection of software robots, or "bots," that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing ... software. Zombie Computers and Botnets While the term "botnet" can be used to refer to any group of bots, the word is generally used to refer to a collection of compromised computers (called Zombie computers) running software, usually installed via worms, Trojan horses, or backdoors, under a common command-and-control infrastructure. How it ... (view more)

Thu
14
May
Dennis Faas's picture

Device Driver

In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. How it Works A driver typically communicates with the device through the computer bus or ... communications subsystem to which the hardware is connected. When a calling program invokes a routine in the driver, the driver issues commands to the device. Once the device sends data back to the driver, the driver may invoke routines in the original calling program. Drivers are hardware-dependent and operating-system-specific. They usually provide the ... (view more)

Mon
11
May
Dennis Faas's picture

Spam

Spam is the abuse of electronic messaging systems (including most broadcast mediums, digital delivery systems) to send unsolicited bulk messages indiscriminately. People who create electronic spam are called spammers. Geographical Origins of Spam As ... of this writing and according to experts from SophosLabs, 28.4% of global spam comes from the U.S. In second place is South Korea, bringing 5.2% of global spam. Following the list are China (including Hong Kong): 4.9%; Russia: 4.4%; Brazil: 3.7%; France: 3.6%; Germany: 3.4%; Turkey: 3.%; Poland: 2.7%; United Kingdom (specifically Great Britain): 2 ... (view more)

Thu
07
May
Dennis Faas's picture

Executable File

In computing, an executable file causes a computer to perform indicated tasks according to encoded instructions, as opposed to a file that only contains data. Files that contain instructions for an interpreter or virtual machine may be considered ... executables, but are more specifically called scripts or bytecode. Executables are also called "binaries" in contrast to the program's source code. Binary Files A binary file is a computer file which may contain any type of data, encoded in binary form for computer storage and processing purposes. For example, a computer document file that contains ... (view more)

Pages

Subscribe to RSS - Word of The Day