upload
McAfee, Inc.
Industry: Software
Number of terms: 9143
Number of blossaries: 1
Company Profile:
A mail bomb is an excessively large email (typically many thousands of messages) or one large message sent to a user's email account. This is done to crash the system and prevent genuine messages from being received.
Industry:Software
A macro virus is a malicious macro. Macro viruses are written in a macro programming language and attach to a document file such as Word or Excel. When a document or template containing the macro virus is opened in the target application, the virus runs, does its damage, and copies itself into other documents. Continual use of the program results in the spread of the virus.
Industry:Software
A macro is a series of instructions designed to simplify repetitive tasks within a program such as Microsoft Word, Excel, or Access. Macros execute when a user opens the associated file. Microsoft's latest macro programming language is simple to use, powerful, and not limited to Word documents. Macros are in mini-programs and can be infected by viruses. Also see: macro virus.
Industry:Software
A logic bomb is a type of Trojan horse that executes when specific conditions occur. Triggers for logic bombs can include a change in a file, a particular series of keystrokes, or a specific time or date. Also see: time bomb.
Industry:Software
Library files contain groups of often-used computer code that different programs can share. Programmers who use library code make their programs smaller since they do not need to include the code in their program. A virus that infects a library file automatically may appear to infect any program using the library file. In Windows systems, the most common library file is the Dynamic Link Library; its extension is DLL.
Industry:Software
Keyloggers are malicious programs that record the key strokes a user types on their PC, including instant message and email text, email addresses, web sites visited, passwords, credit card and account numbers, addresses, and other private data.
Industry:Software
key
The Windows Registry uses keys to store computer configuration settings. When a user installs a new program or the configuration settings are otherwise altered, the values of these keys change. If viruses modify these keys, they can do damage.
Industry:Software
Joke programs are not viruses, but may contain a virus if infected or otherwise altered. These are also called practical joke programs.
Industry:Software
JavaScript is a scripting language that can run wherever there is a suitable script interpreter such as web browsers, web servers, or the Windows Scripting Host. The scripting environment used to run JavaScript greatly affects the security of the host machine: A web page with JavaScript runs within a web browser in much the same way as Java applets and does not have access to host machine resources. An Active Server Page (ASP) or a Windows Scripting Host (WSH) script containing JavaScript is potentially hazardous since these environments allow scripts unrestricted access to machine resources (file system, registry, etc. ) and application objects.
Industry:Software
See: dropper.
Industry:Software