Header image
 
   
  

 
 
 

 
 
Internet Terms

Adware
These are programs that get downloaded onto your computer, generally without your knowledge, that throw advertisements in your face. They can be bundled in with official software, slipped in undetected past a firewall or anti-virus though banner or javascript ads, or even in emails. Without proper protection they are impossible to stop, and even with it, there is always the chance something will creep though.

Bit Torrent**
A program that allows you to download many different kinds of computer media. However, just because you can download something on a program like this dose not mean it's legal.
For more information, you can check out their official site: Bit Torrent Homepage

Blacklist
That email address or email domain is prevented from sending email to addresses. Blacklisting is like being denied entry into a building. You are not allowed to send certain addresses emails.
If you have a blacklist, then any addresses on the blacklist will automatically be sent to your junk mail folder.

Denial of Service (DOS) attack
Generally hackers will use these to overwhelm a server to the point it's unable to work. These are generally launched with a network of zombie computers.

Hacker
A hacker is an individual who breaks into computers. The reason for them doing so can be multiple, but the end result is always for money. Different attacks a hacker may use are:

  • Taking your computer over as a zombie
  • Stealing confidential information (Such as password, user names, banking information)
  • Identity thief


HTML (HyperText Markup Language)
The code used to create a web page. This is the most basic of the web site languages. Other languages used include XML and XHTML.

Lime Wire**
Lime Wire is a P2P information trading program. However, just because you can download something on a program like this dose not mean it's legal.
For more information, you can check out their official site: Lime Wire Homepage

P2P**
P2P or peer to peer is the name for a collection of software that allows users to share files. These kinds of software can include Lime Wire or Bit Torrent There are, aside from the obvious benefits of such programs, many dangers to them. Check out our peer to peer software page for more information.

Spam
Spam is basically unwanted emails. It can be for any number of reasons, such as creating an active mailing list, trying to sell or advertise a web site or product, or steal your information. For more information on dealing with spam, check out our dealing with spam page.

Spoofing
The act of hiding an email address by using another email address in the 'from' field. This is a common trick used by spammers to either attempt to bypass blacklists, keep their real email address hidden, or just to try and stay out of trouble.

Spyware
Similar to adware spyware is installed onto your computer without your permission. It can come from numerous sources, including emails, advertisements, or any form of downloading, including though programs such as lime wire or Bit Torrent.

Viruses
Programs that are generally written by people who just want to ruin computers. Viruses rarely have any useful purpose, other then to disrupt the computer world.

Whitelist
That email address or email domain is always allowed to send emails to you. Like being given a free pass to the amusement park. You can always enter, no questions asked.
If you have a whitelist, then any addresses on the whitelist will automatically be sent to your inbox.

XHTML
The middle ground between HTML and XML. This code is more structured and ridged then basic HTML, but not as structured as XML.

XML
The most structured of the three different web coding. This one is currently the one supported by the fewest number of browsers, while both HTML and XHTML are backwards compatible with most browsers.

Zombie
This is a computer that is under the control of a hacker. Generally it's very difficult to tell if your computer is a zombie, unless you receive complents of either spamming, or committing illegal activites. Zombie systems can be used for such activities as: The best way to prevent becoming a zombie is to keep your protection up to date, and be very careful as to what you download.

** Note that Dragonstar dose NOT support or endorse the use of any of these programs. They are listed here as a guide for educational purposes only. DragonStar dose not offer support or file downloads for any of these programs, nor will any enquires about them be responded to. Any enquires should be directed to the program's creator. DragonStar takes no responsibility for any difficulties arising from your choice to use such programs.

 

Valid XHTML 1.0 Transitional