Popup: A new browser window that appears unrequested (by you) on your screen. A gratuitous, easily-programmed visual effect exploited by many web sites often to the consternation of the hapless user.
Particularly annoying are those termed exit popups: browser windows that spring to life when you leave a site or when you close a browser window. (Scripting languages call these "onUnload" and "onClose" events.) We have never encountered one of these that was useful.
Popup blocker
A program that helps to prevent unsolicited windows from appearing on your screen; these windows usually contain advertisements.
Popup stopper
A program that helps to prevent unsolicited windows from appearing on your screen; these windows usually contain advertisements.
Popup test
A site that allows you to check your ad blocking software’s ability to prevent unwanted advertisements. A complete test such as ‘popupcheck’ is necessary to make such a determination.
Popup check
A site that allows you to check your ad blocking software’s ability to prevent unwanted advertisements. A complete test such as ‘popupcheck’ is necessary to make such a determination.
Ad Blocker
A program that helps to prevent unsolicited windows from appearing on your screen; these windows usually contain advertisements.
Toolbar
A row, column, or block of onscreen buttons or icons that, when clicked, activate certain functions of the program. For example, the standard toolbar in Word includes buttons for changing text to italic, bold, or other styles.
Net Send Spam
Windows messenger vulnerability also known as net send spam, messenger spam or winpopup. These types of ads usually take the form of a gray pop up box bearing spam (unsolicited advertisements) with an "OK" button.
Launch-close
Popups that open when you click on a link which at the same time closes the page being viewed. Since the popup opens at the same time the main window is closed, your popup blocker may incorrectly interpret it as a "unload" popup window.
Click-reload
A popup that opens when you click on a link which at the same times reloads the page you are viewing.
Onunload
Loads a popup as you leave the webpage.
Spyware
A general term for a program that surreptitiously monitors your actions. While they are sometimes sinister, like a remote control program used by a hacker, software companies have been known to employ spyware to gather data about customers. The practice is generally frowned upon.
Malware
A generic term increasingly being used to describe any form of malicious software; eg, viruses, trojan horses, malicious active content, etc.
Spam
Unsolicited "junk" e-mail sent to large numbers of people to promote products or services. Sexually explicit unsolicited e-mail is called "porn spam." Also refers to inappropriate promotional or commercial postings to discussion groups or bulletin boards.
AntiSpam
A Software or service to help prevent unsolicited mail and to complicate a spammer’s method of collecting email addresses.
Adware
While not necessarily malware, adware is considered to go beyond the reasonable advertising that one might expect from freeware or shareware. Typically a separate program that is installed at the same time as a shareware or similar program, adware will usually continue to generate advertising even when the user is not running the origianlly desired program. See also cookies, spyware, and web bugs
Web bug
A link on a given Web page or embedded in an email message that contains a link to a different Web site and therefore passes a call, and information, unknown to the user, to a remote site. Most commonly a web bug is either invisible or unnoticeable (typically it is one pixel in size) in order not to alert the user to its presence.
Computer Worm
A self-reproducing program which is distinguished from a virus by copying itself without being attached to a program file, or which spreads over computer networks, particularly via email.
Email Worm
A self-reproducing program which is distinguished from a virus by copying itself without being attached to a program file, or which spreads over computer networks, particularly via email.
Vulnerability Assessment
A measurement of vulnerability which includes the susceptibility of a particular system to a specific attack and the opportunities available to a threat agent to mount that attack
Vulnerability Analysis
The systematic examination of systems in order to determine the adequacy of security measures, identify security deficiencies, and provide data from which to predict the effectiveness of proposed security measures
Trojan Horse
An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data.
Steganography
The activity of concealing a message by hiding the fact that that communication is happening. Steganography is often referred to as "hiding in plain sight."
Security Audit
A search through a computer system for security problems and vulnerabilities.
Scanner
a program which examines computers and network systems examining configurations and looking for security vulnerabilities. This type of program can be used by both defenders and attackers.
Security Scan
A search through a computer system for security problems and vulnerabilities.
Port Scan
A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a "well-known" port number, the computer provides. Port scanning, a favorite approach of computer cracker, gives the assailant an idea where to probe for weaknesses. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed for weakness.
Penetration Testing
The portion of security testing in which the evaluators attempt to circumvent the security features of a system. The evaluators may be assumed to use all system design and implementation documentation, that may include listings of system source code, manuals, and circuit diagrams. The evaluators work under the same constraints applied to ordinary users
Ad Killer
A program that helps to prevent unsolicited windows from appearing on your screen; these windows usually contain advertisements.
Zombie
A specialized type of backdoor or remote access program designed as the agent, or client (middle layer) component of a DDoS (Distributed Denial of Service) network. Once a zombie is installed on a computer, it identifies itself to a master computer, and then waits for instructions from the master computer. Upon receipt of instructions from the master computer, a number of zombie machines will send attack packets to a target computer. Zombie may refer to the control program run to control one of the middle layer computers, or it may refer to a computer so controlled.