|
Adware
These are programs that get downloaded onto your computer,
generally without your knowledge, that throw advertisements
in your face. They can be bundled in with official software,
slipped in undetected past a firewall or anti-virus though
banner or javascript ads, or even in emails. Without proper
protection they are impossible to stop, and even with it,
there is always the chance something will creep though.
Bit Torrent**
A program that allows you to download many different kinds
of computer media. However, just because you can download
something on a program like this dose not mean it's legal.
For more information, you can check out their official site:
Bit Torrent Homepage
Blacklist
That email address or email domain is prevented from sending email to addresses. Blacklisting is like being denied entry into a building. You are not allowed to send certain addresses emails.
If you have a blacklist, then any addresses on the blacklist will automatically be sent to your junk mail folder.
Denial of Service (DOS) attack
Generally hackers will use these to overwhelm a server to
the point it's unable to work. These are generally launched
with a network of zombie computers.
Hacker
A hacker is an individual who breaks into computers. The reason
for them doing so can be multiple, but the end result is always
for money. Different attacks a hacker may use are:
- Taking your computer over as a zombie
- Stealing confidential information (Such as password, user names, banking information)
- Identity thief
HTML (HyperText Markup Language)
The code used to create a web page. This is the most basic of
the web site languages. Other languages used include XML
and XHTML.
Lime Wire**
Lime Wire is a P2P information trading program. However, just
because you can download something on a program like this dose
not mean it's legal.
For more information, you can check out their official site:
Lime
Wire Homepage
P2P**
P2P or peer to peer is the name for a collection of software
that allows users to share files. These kinds of software can
include Lime Wire or Bit
Torrent There are, aside from the obvious benefits of such
programs, many dangers to them. Check out our peer
to peer software page for more information.
Spam
Spam is basically unwanted emails. It can be for any number
of reasons, such as creating an active mailing
list, trying to sell or advertise a web site or product,
or steal your information. For more information on dealing with
spam, check out our dealing with spam
page.
Spoofing
The act of hiding an email address by using another email address
in the 'from' field. This is a common trick used by spammers
to either attempt to bypass blacklists, keep their real email
address hidden, or just to try and stay out of trouble.
Spyware
Similar to adware spyware is installed
onto your computer without your permission. It can come from
numerous sources, including emails, advertisements, or any form
of downloading, including though programs such as lime wire
or Bit Torrent.
Viruses
Programs that are generally written by people who just want
to ruin computers. Viruses rarely have any useful purpose, other
then to disrupt the computer world.
Whitelist
That email address or email domain is always allowed to send
emails to you. Like being given a free pass to the amusement
park. You can always enter, no questions asked.
If you have a whitelist, then any addresses on the whitelist will automatically be sent to your inbox.
XHTML
The middle ground between HTML and XML.
This code is more structured and ridged then basic HTML, but
not as structured as XML.
XML
The most structured of the three different web coding. This
one is currently the one supported by the fewest number of browsers,
while both HTML and XHTML
are backwards compatible with most browsers.
Zombie
This is a computer that is under the control of a hacker. Generally
it's very difficult to tell if your computer is a zombie, unless
you receive complents of either spamming, or committing illegal
activites. Zombie systems can be used for such activities as:
The best way to prevent becoming a zombie is to keep your protection up to date, and be very careful as to what you download.
** Note that Dragonstar dose NOT support
or endorse the use of any of these programs. They are listed
here as a guide for educational purposes only. DragonStar
dose not offer support or file downloads for any of these
programs, nor will any enquires about them be responded to.
Any enquires should be directed to the program's creator.
DragonStar takes no responsibility for any difficulties arising
from your choice to use such programs.

|