Common technical terms and definitions about the information technology (I.T) industry.

  • Virus
    • A piece of code or program which can copy itself to another computer or device to interfere with a device's operation.
  • Antivirus
    • Software which attempts to stop viruses from entering a computer's operating system or programming
  • Malware
    • An the abbreviation of the word malicious software. Malware is used to gain entry into a computer or device to gather information, gain  access, steal money.
  • Spyware
    • Spyware is a program or code which can steal sensitive information from a computer or device, this might include passwords, documents, data and more.
  • Trojan Horse
    • Is any malicious program which is false or misleading in its use, after installation the program will execute its primary objective, this could be stealing of data.
  • Worm
    • A computer worm is a computer program that replicates itself and spreads across networks; it does not need to attach itself to an existing program.
  • Adware
    • Adware is generally attached to other legitimate programs with the sole purpose to display ads.
  • Grayware
    • Is a broad term which can encompass spyware, adware, joke programs and other unwanted attacks.
  • Spam
    • Spam is unwanted junk mail similar to real junk mail
  • Advanced persistent threats (APT)
    • Is a group of hackers working together using multiple attacks on a business or organization to gain entry and steal data. This kind of attach is used in corporate espionage  and government espionage .
  • Backdoor
    • A backdoor is an entry point in a program allowing anything with access to it to access into a user's computer or device and read or steal data.
  • Backup
    • Backup is a way of storing copied data away from its main area for protection.
  • Blacklist
    • Blacklist is a list of bad emails or websites or anything malicious.
  • Bluetooth
    • Bluetooth is a connection type, phone and laptops will have Bluetooth to send and receive data wireless in close proximity
  • Device
    • A device can be a computer, Laptop, Phone, Table or anything with an operating system.
  • Computer
    • A computer
  • Brute-Force Attack
    • Is a type of attack where a computer program will use dictionary terms to try break into a secure area.
  • DDoS
    • Distributed Denial of Service is where multiple compromised systems called Botnets send information at the same time to one source in an attempt to bring down a service due to high traffic.
  • Firewall
    • Firewall is a software or hardware tool which stops malicious software gaining access to networks or computers or devices.
  • UTM
    • Unified threat management is a software or hardware appliance which has a number of features to stop malicious programs entering a network.
  • VPN
    • Virtual Private Network is a technology which lets a computer using a public internet connection connect to a private network by a secure tunnel.
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text.