ⓘ Free online encyclopedia. Did you know? page 219

Adware

Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation p ...

Spyware

Spyware is a type of malware that aims to gather information about a person or organization, without their knowledge, and send such information to hack another entity without the consumers consent. Furthermore, spyware asserts control over a devi ...

SpywareBlaster

SpywareBlaster prevents the download, installation and execution of most spyware, adware, browser hijackers, dialers and other malicious programs based on ActiveX. SpywareBlaster works on the basis of "blacklists" Activating the "Killbit" Clsid o ...

PC Tools (company)

PC Tools, formerly known as WinGuides.com, was a software company acquired by Symantec in 2008; the new owner eventually discontinued the PC Tools name. Company headquarters were in Australia, with offices in Luxembourg, the United States, United ...

Rootkit

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootk ...

Ransomware

Ransomware is a type of malware from cryptovirology that threatens to publish the victims data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowl ...

Netsky (computer worm)

Netsky is a prolific family of computer worms which affect Microsoft Windows operating systems. The first variant appeared on Monday, February 16, 2004. The "B" variant was the first family member to find its way into mass distribution. It appear ...

Sober (worm)

The Sober worm is a family of computer worms that was discovered on October 24, 2003. Like many worms, Sober sends itself as an e-mail attachment, fake webpages, fake pop-up ads, and fake advertisements. The Sober worms must be unpacked and run b ...

Santy

Within 24 hours of its release on 20 December 2004, about 30.000 to 40.000 websites were attacked by Santy. The worm holds a record of spreading worldwide within three hours of its release. It caused writable files of formats such as.php and.html ...

Macro virus

In computing terminology, a macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application. Some applications, such as Microsoft Office, Excel, PowerPoint allow macro programs to ...

Mobile malware

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants, by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have becom ...

Polymorphic code

In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact. That is, the code changes itself each time it runs, but the function of the code will not change at all. For e ...

NANO Antivirus

NANO Antivirus is Russian antivirus software developed by NANO Security Ltd. The software has free and paid versions. NANO Security is a Russian company founded in 2009 by a team which has developed and implemented antivirus software since 2003. ...

Virus (disambiguation)

A virus is a parasitic agent that is smaller than a bacterium and that can only reproduce after infecting a host cell. Virus or The Virus may also refer to: Computer virus, a type of malicious computer program Mobile virus, a type of malicious ce ...

Rogue security software

Rogue security software is a form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on th ...

Flame (malware)

Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system. The program is being used for targeted cyber espionage in Middle Eastern co ...

Regin (malware)

Regin is a sophisticated malware and hacking toolkit used by United States National Security Agency and its British counterpart, the Government Communications Headquarters. It was first publicly revealed by Kaspersky Lab, Symantec, and The Interc ...

Viruses of the Mind

Viruses of the Mind is an essay by British evolutionary biologist Richard Dawkins, first published in the book Dennett and His Critics: Demystifying Mind. Dawkins originally wrote the essay in 1991 and delivered it as a Voltaire Lecture on 6 Nove ...

Internet security

Internet security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems as a whole. ...

Antivirus software

Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, ...

Kaspersky Anti-Virus

Kaspersky Anti-Virus ; formerly known as AntiViral Toolkit Pro ; often referred to as KAV) is an antivirus program developed by Kaspersky Lab. It is designed to protect users from malware and is primarily designed for computers running Microsoft ...

Avast Antivirus

Avast Antivirus is a family of cross-platform internet security applications developed by Avast for Microsoft Windows, macOS, Android and iOS. The Avast Antivirus products include freeware and paid versions that provide computer security, browser ...

Norton AntiVirus

Norton AntiVirus is an anti-virus or anti-malware software product, developed and distributed by Symantec Corporation since 1991 as part of its Norton family of computer security products. It uses signatures and heuristics to identify viruses. Ot ...

Panda Cloud Antivirus

Panda Cloud Antivirus is an antivirus software developed by Panda Security, a free and a paid version are available. It is cloud-based in the sense that files are scanned on a remote server without using processing power of the users machine. The ...

AVG AntiVirus

AVG AntiVirus is a line of antivirus software developed by AVG Technologies, a subsidiary of Avast. It is available for Windows, macOS and Android.

AVG Technologies

AVG Technologies is a subsidiary of Avast. AVG develops and markets cybersecurity, privacy, performance, and utility software for desktop computers and mobile devices. It typically offers freeware, earning revenues from advertisers and from users ...

AVS

Address Verification System, a security measure in credit card processing Adult Verification System, a system used by websites to confirm that someone accessing their site is of the age of majority

Avira

Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for their antivirus software Avira Free Security. Avira was founded in 2006, but the anti virus application is under active development since ...

Comodo Internet Security

Comodo Internet Security is developed and distributed by Comodo Group, a freemium Internet security suite that includes an antivirus program, personal firewall, sandbox and a host-based intrusion prevention system.

Graugon AntiVirus

Graugon AntiVirus is antivirus software based on Clam Antivirus developed and maintained by the Graugon Software Group. The software has undergone several name changes and was relaunched in mid-2008.

Dr. Web

Dr.Web is a software suite developed by Russian anti-malware company Doctor Web. First released in 1992, it became the first anti-virus service in Russia. The company also offers anti-spam solutions and is used by Yandex to scan e-mail attachment ...

AOL Active Virus Shield

AOL Active Virus Shield was a free antivirus utility made available by AOL. Its engine was based on the one used by Kaspersky Anti-Virus. The program is no longer available.

Freemium

Freemium, a portmanteau of the words "free" and "premium", is a pricing strategy by which a product or service is provided free of charge, but money is charged for additional features, services, or virtual or physical goods that expand the functi ...

Avast

Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic that researches and develops computer security software, machine learning and artificial intelligence. Avast has more than 435 m ...

ESET

ESET is a Slovak internet security company that offers anti-virus and firewall products. ESET is headquartered in Bratislava, Slovakia, and was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010. It plays a si ...

ESET NOD32

ESET NOD32 Antivirus, commonly known as NOD32, is an antivirus software package made by the Slovak company ESET. ESET NOD32 Antivirus is sold in two editions, Home Edition and Business Edition. The Business Edition packages add ESET Remote Admini ...

Kaspersky Internet Security

Kaspersky Internet Security is an internet security suite developed by Kaspersky Lab compatible with Microsoft Windows and Mac OS X. KIS offers protection from malware, as well as email spam, phishing and hacking attempts, and data leaks. Kaspers ...

Computer security

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of ...

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system. To exploit a vulnerability, an attacker must have at least one applicable ...

Application security

Application security encompasses measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities. Different techniques are used to surface such security vulnerabilities at different stages ...

Information security

Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or at least reducing the probability of u ...

Tokenization (data security)

Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value. The token is a reference that map ...

Security information management

Security information management is an information security industry term for the collection of data such as log files into a central repository for trend analysis.

Firewall

Firewall may refer to: Firewall physics, a hypothetical phenomenon where a freely falling observer spontaneously burns up at the horizon of a black hole Firewall construction, a barrier inside a building, designed to limit the spread of fire, hea ...

Personal firewall

A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall. A personal firewall differs from a ...

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrus ...

ZoneAlarm

ZoneAlarm is an internet security software company that provides consumer antivirus and firewall products. ZoneAlarm was developed by Zone Labs, which was acquired in March 2004 by Check Point. ZoneAlarms firewall security products include an inb ...

Zyxel

Zyxel Communications Corp. is a manufacturer of networking devices. Headquartered in Hsinchu, Taiwan, Zyxel maintains branch offices in North America, Europe, and Asia. It has around 1.500 employees globally, with distributors in more than 70 cou ...

Apple Inc.

Apple Inc. is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services. It is considered one of the Big Four tech companies ...

Apple Maps

Apple Maps is a web mapping service developed by Apple Inc. It is the default map system of iOS, macOS, and watchOS. It provides directions and estimated times of arrival for automobile, pedestrian, and public transportation navigation. Apple Map ...

Encyclopedic dictionary

Translation
Free and no ads
no need to download or install

Pino - logical board game which is based on tactics and strategy. In general this is a remix of chess, checkers and corners. The game develops imagination, concentration, teaches how to solve tasks, plan their own actions and of course to think logically. It does not matter how much pieces you have, the main thing is how they are placement!

online intellectual game →