Malware
Be Aware of the World Wide Web
Key Logging
The practice of covertly recording and monitoring keystrokes made on a remote computer, typically using a dedicated software application or piece of implanted hardware.
Virus
A software program capable of reproducing itself and usually capable of causing great harm to files or other programs.
Worms
A computer worm is a standalone Malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
Trojan Horse
A Trojan horse, or Trojan, is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These backdoors tend to be invisible to average users. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems.
Spy Ware
Software that self-installs on a computer, enabling information to be gathered covertly about a person's Internet use, passwords. This enables the Hacker to use this information to his advantage to either buy or create more destruction.
Adware
Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there.
Firewall
A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set. A network's firewall builds a bridge between the internal network or computer it protects, upon securing that the other network is secure and trusted, usually an network, such as the Internet.