are some form of a masquerade or
phishing attack, designed to convince you that the attacker is trustworthy
as a friend or as a legitimate authority figure. The attacker might use an
email, phone call, or even face-time interview to deceive you. Common social
engineering attacks include greeting cards
, bogus
lottery winnings, stock investment scams, warnings from an alleged banker
that you’ve been hacked, credit card companies pretending to protect you.
Read more about social engineering here
…
Social Engineering Attacks
http://antivirus.about.com/od/securitytips/tp/socialengineeringattacks.htm
Below start the third and last set of internet terms for beginners in 2015.
*Link to thurd set of ie terms
http://netforbeginners.about.com/od/internetlanguage/tp/the-top-internet-ter
ms-for-beginners.02.htm
21. Phishing and Whaling
‘Phishing’ is what modern-day con men do to defraud you of your personal
accounts. Phishing is the use of convincing-looking emails and web pages to
lure you into typing your account numbers and passwords/PINs. Often in the
form of fake eBay web pages, fake PayPal warning messages, and fake bank
login screens, phishing attacks
can be
very convincing to anyone who is not trained to watch for the subtle clues.
As a rule, smart users distrust any email link that says “you should login
and confirm this”.
Read more about phishing
and whaling
here…
Internet Phishing and Email Scams – What Phishing and Email Scams Look Like
http://netforbeginners.about.com/od/scamsandidentitytheft/ig/Phishing-Scams-
and-Email-Cons/
22. Addons and Plugins
Addons are custom software modifications. User optionally install addons to
improve the power of their Web browsers or office software. Examples
include: a custom eBay toolbar for your Firefox browser, a new search
feature for your Outlook email. Most addons are free, and can be found and
downloaded from the Web.
Plugins are a special kind of web browser addon. Plugins are essentially
required addons, if you wish to view very specialized web pages. Examples
include: Adobe Flash or Shockwave player, Microsoft Silverlight player,
Adobe Acrobat pdf reader.
Read more about addons here
…
Best Overall Add-On (Non-Security)
http://browsers.about.com/library/bl-best-overall-addon.htm
Read more about plugins here
…
Basic Web Browser Plug-Ins and Extensions
http://netforbeginners.about.com/od/p/a/The-Best-Internet-Plugins.htm
23. Trojan
A trojan is a special kind of hacker program that relies on the user to
welcome it and activate it. Named after the famous Trojan horse tale, a
trojan program masquerades as a legitimate file or software program.
Sometimes it will be an innocent-looking movie file, or an installer that
pretends to be actual anti-hacker software. The power of the trojan attack
comes
from users naively downloading and running the trojan file.
Read more about trojan malicious programs here
…
Trojan – What Is a Trojan
http://antivirus.about.com/od/whatisavirus/g/trojan.htm
24. Spamming and Filtering
‘Spam’ has two meanings. 1) Spam can mean ‘the rapid reptition of a keyboard
command’. But more commonly, 2) spam is the jargon name of
‘unwanted/unsolicited email’. Spam email
is usually comprised of two sub-categories: high-volume
advertising, and hackers attempting to lure you into divulging your
passwords.
Filtering is the popular-but-imperfect defense against spam. Filtering uses
software that reads your incoming email for keyword combinations, andthen
either deletes or quarantines messages that appear to be spam. Look for a
‘spam’ or ‘junk’ folder in your mailbox to see your quarantine of filtered
email.
More on spam and filtering here
…
Spam and How to Get Rid of It – About Email
http://email.about.com/od/spamandgettingridofit/
25. Cloud Computing and Software-as-a-Service (SaaS)
Cloud computing
is a fancy term to describe that your software is online and
‘borrowed’, instead of purchased and actually installed on your computer.
Web-based email is the most prevalent example of cloud computing: the users’
email is all stored and accessed ‘in the cloud’ of the Internet, and not
actually on their own computers. This is the modern version of the 1970’s
mainframe computing model. As part of the cloud computing model, ‘Software
as a Service’ is the business model that claims people would rather rent
software than actually own it. With their web browsers, users access the
cloud of the Internet, and log into their online rented copies of their SaaS
software
.
Read more about cloud computing and SaaS here
…
What Is ‘Cloud Computing’?
http://netforbeginners.about.com/od/c/f/cloudcomputing.htm
26. Apps and Applets
Apps and applets are small software applications. They are designed to be
much smaller than regular computer software, but still provide very useful
functions. Lately, apps are very popular with cellphone and mobile
platforms; specifically: with the Apple iPhone and the Google Android
phone.
Examples of apps: rangefinder GPS for golfing, song identification
software, restaurant reviews, pocket video games, language translators for
traveling.
Read about popular apps here
…
What is the Best Free iPhone App – Readers Pick the Best Free iPhone App
According to about.com
http://cellphones.about.com/od/softwarereviews/f/readers-choice-awards-best-
free-iphone-app.htm
27. Encryption and Authentication
Encryption is the mathematical scrambling of data so that it is hidden from
eavesdroppers. Encryption uses complex math formulas (‘ciphers’) to turn
private data into meaningless gobbledygook that only trusted readers can
unscramble. Encryption is the basis for how we use the public Internet as a
pipeline to conduct trusted business, like online banking and online credit
card purchasing. On the provision that reliable encryption is in place,
your banking information and credit card numbers are kept private.
Authentication is directly related to encryption. Authentication is the
complex way that computer systems verify that you are who you say you are.
More on encryption and authenticating
…
Encryption – 40-bit vs 128-bit Encryption – What is the Difference?
http://compnetworking.about.com/od/networksecurityprivacy/l/aa011303a.htm
28. Ports and Port Forwarding
‘Network ports’ are thousands of tiny electronic ‘lanes’ that comprise your
network connection. Every computer has 65,536 tiny ports, through which
Internetworking data travels in and out. By using port management tools
like a hardware router, users can control port access to better safeguard
themselves against hackers.
‘Port forwarding
‘ is
the semi-complex technique of opening specific network ports. You would
port-forward to speed up your downloading and speed up your online
connections for gaming and teleconferencing.
Read more about ports and port forwarding here
…
What Is “Port Forwarding”? How Do I Set My Own?
http://netforbeginners.about.com/od/p/f/What-Is-Port-Forwarding.htm
29. Firewall
Firewall is a generic term to describe ‘a barrier against destruction’. It
comes from the building term of a protective wall to prevent the spreading
of housefires or engine compartment fires. In the case of computing,
‘firewall’ means to have software and/or hardware protecting you from
hackers and viruses.
Computing firewalls range from small antivirus software packages, to very
complex and expensive software + hardware solutions. All the many kinds of
computer firewalls
offer some kind
of safeguard against hackers vandalizing or taking over your computer
system.
Read more about computer
firewalls for personal use…
Top Free Personal Firewalls and Firewall
Software Downloads
According to about.com
http://compnetworking.about.com/od/firewalls/tp/homefirewalls.htm
30. Archives and Archiving
A computer ‘archive’ is one of two things: a compressed container of
multiple smaller data files, or a purposeful long-term storage of files that
are not going to be used often. In some cases, an archive can be both.
The act of ‘archiving’, similarly, is one of two things: to combine and
squeeze multiple files into a larger single file (for easier emailing); or,
archiving is when you will retire data and documents to be put into
long-term storage (e.g. your thousands of old emails in your inbox).
Read about popular archiving software, WinZip
…
What Is ‘Zip’ and ‘WinZip’? How Do Zip Files Work?
http://netforbeginners.about.com/od/downloadingfiles/f/how-zip-files-work.ht
m
Read about archiving your old email here
…
Archiving Old Mail in Outlook – Keep the PST File Small
http://email.about.com/od/outlooktips/qt/et_archive_mail.htm
Version: 2014.0.4830 / Virus Database: 4365/10652 – Release Date: 09/16/15]]>
Related