Weekend Definitions:Know what a Blackhat is; a Botnet?

Here are some technology and security definitions from my List of Terms page that you might find interesting. I try to keep my definitions readable to all audiences, but if you have a better one for any of these entries, please send it to me via comment or to my email address below.

3G
Third Generation cellular service. Enhanced wide-area wireless networking at speeds of up to 14 Megabits/second.

4G
Fourth Generation cellular service or WiMAX. An emerging wide-area networking technology that promises a range of 10 miles and speeds of up to 100 Megabits/second.

Anti-virus and anti-malware.
Helpful software applications that scan your computer for certain patterns of infection. The patterns they scan for are the signatures, or definitions, of known forms of malware. Since Internet Bad Guys are creating new forms of malware continuously, it is important that you keep your anti-virus and anti-malware definitions updated. See the “Patches and Updates” definitions below.

Auto-updating
A software tool built into Windows (“Microsoft Update”) and OS X (“Auto Update”) and many other applications which can download and install important security updates and patches for software installed on your computer automatically

Black Tuesday a.k.a. Patch Tuesday
On the second Tuesday of each month Microsoft releases security patches for Windows, Internet Explorer, Office and its other software products. You can have these installed automatically using Microsoft Update.

Blackhats
Hackers who use their skills for explicitly criminal or other malicious ends, such as writing malware (malicious software) to steal credit card numbers and banking data or by phishing; a.k.a. the Bad Guys.

Botnet
Botnets consist of large numbers of hijacked computers that are under the remote control of a criminal or a criminal organization. The hijacked computers —a.k.a. “zombies” or “bots” (short for “robots”) —are recruited using viruses spread by email or drive-by downloads. Worms are used to find and recruit additional computers. The biggest botnets consist of thousands and even millions of computers, most often unprotected home computers.

As always, I appreciate your comments…so please do. And be careful out there…it’s extremely dangerous these days.

Don’t miss an article. If you enter your email address in the Email Subscriptions box on the right column of this page, I’ll send you an email when a new article is posted. I don’t share your email address with anyone…no one; I hate spam too. Please share my site with your friends and family. Thanks.

Home computing is a blast…keep it safe, productive and enjoyable.

Best regards,

Paul

lubicp(at)yahoo.com and if you twitter, follow me @paulsinternet on Twitter.

Advertisements

Leave a comment

Filed under How-To Corner, Internet Security, Wanna Know

What do you think?

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s