upload
McAfee, Inc.
Industry: Software
Number of terms: 9143
Number of blossaries: 1
Company Profile:
A spoofed web site is one that mimics a real company’s site—mainly financial services sites—in order to steal private information (passwords, account numbers) from people that are tricked into visiting it. Phishing emails contain links to the counterfeit site, which looks exactly like the real company’s site, down to the logo, graphics, and detailed information. Also see: phishing.
Industry:Software
TSR programs stay in memory after being executed. They allow the user to quickly switch back and forth between programs in a non-multitasking environment, such as MS-DOS. Some viruses are TSR programs that stay in memory to infect other files and program. They are also called memory resident programs.
Industry:Software
Certain applications use template files to pre-load default configurations settings. Microsoft Word uses a template called NORMAL. DOT to store information about page setup, margins, and other document information.
Industry:Software
See: Boot record.
Industry:Software
A string is a consecutive series of letters, numbers, and other characters. "afsH(*&@~" is a string; so is "The Mad Hatter. ” Anti-virus applications often use specific strings, called virus signatures, to detect viruses. Also see: signature.
Industry:Software
Stealth viruses attempt to conceal their presence from anti-virus software. Many stealth viruses intercept disk-access requests, so when an anti-virus application tries to read files or boot sectors to find the virus, the virus feeds the program a "clean" image of the requested item. Other viruses hide the actual size of an infected file and display the size of the file before infection. Stealth viruses must be running to exhibit their stealth qualities. They are also called interrupt interceptors.
Industry:Software
Spyware is a wide range of unwanted programs that exploit infected computers for commercial gain. They can deliver unsolicited pop-up advertisements, steal personal information (including financial information such as credit card numbers), monitor web-browsing activity for marketing purposes, or route HTTP requests to advertising sites.
Industry:Software
Spim is spam for instant messaging. The messages can be simple unsolicited ads, or fraudulent phishing mail. Also see: spam, phishing.
Industry:Software
A shared drive is a disk drive available to other computers on the network. Shared drives use the Universal Naming Convention (UNC) to differentiate themselves from other drives. Also see: mapped drives.
Industry:Software
Sparse infector viruses use conditions before infecting files. Examples include files infected only on the 10th execution or files that have a maximum size of 128kb. These viruses use the conditions to infect less often and therefore avoid detection. They are also called sparse viruses.
Industry:Software