Home > Microsoft Security > Microsoft Security Glossary

Microsoft Security Glossary

Cavity infection A type of infection where a virus finds a gap in a file and inserts itself into it. Spambot A bot that sends spam at the direction of a remote attacker, usually as part of a spam botnet. SMB 3.0 (Server Message Block 3.0) - SMB 3.0 (... Least-privilege user account (LUA) An account on your PC that has very few permissions so it can't be used to change any settings. http://0pacity.com/microsoft-security/microsoft-security-essentials-xp.html

Programmers can use APIs to easily access these functions when they develop their software. Bitcoin mining New bitcoins are created by bitcoin mining. His topics range from programming and operating systems to home security and accessibility. See also: password stealer.

This helps stop deceptive messages. Mobile Computing ( Find Out More About This Site ) Lithium Ion battery (Li-Ion) A Lithium Ion (Li-Ion) battery is a rechargeable battery with twice the energy capacity of a Nickel-Cadmium Microsoft Monitoring Agent - The Microsoft Monitoring ...

Search Engine Optimization (SEO) tips See All Answers Ask a Question Powered by ITKnowledgeExchange.com 20 Newest Terms computer network virus (computer virus) blockchain motherboard boot sector two-factor authentication (2FA) binary ERP Gives you control of what changes someone can make to your PC. Microsoft Web Platform Installer (Web PI) Microsoft Windows - Windows is a personal computer operating sy... This is one of the reasons why it's important to have a strong password that can't be guessed.

Microsoft Azure Resource Manager - Microsoft Azu... This means it won't work for any legitimate users. Remote Desktop Protocol - Remote Desktop Protocol (RDP) i... A section of a webpage, like an advertisement, that links to another webpage.

Microsoft Windows BranchCache - Microsoft BranchCac... Phishers use phony websites or deceptive email messages that mimic trusted businesses and brands to steal personally identifiable information (PII), such as user names, passwords, credit card numbers, and identification numbers. Microsoft Windows Server Desktop Experience Microsoft Windows Server Event Viewer - Mic... The MMPC blog post "Another way Microsoft is disrupting the malware ecosystem" explains how click fraud works.

Resilient File System (ReFS) - ReFS (ResilientFile S... Proof-of-Concept (PoC) code Code that's written to prove that a particular method of malware attack can work. Improper input validation A potential vulnerability when a form isn't validated properly and may allow unintentional actions to happen. Microsoft Office 365 Groups - Microsoft Office 365 Gr...

Distributed ledgers can be thought of... this contact form This is the same as when Windows automatically downloads the update, and can be useful if you aren't always connected to the Internet or haven't turned your PC on for a SmartScreen - SmartScreen is a Microsoft filtering tool designed to d... Instant messaging programs: By sending an instant message that includes a copy of itself, using programs such as Windows Live Messenger or Skype.

User elevationWhen someone is using your PC with higher privileges than they should have.Virtool A detection that is used mostly for malware components, or tools used for malware-related actions, such as The malicious hacker uses malware to do this in the background, so you won't see it happening. Bots on a large number of PCs can be connected to form a botnet. have a peek here CAPTCHAs are puzzles that are easy to solve for a human, but hard for a computer.

Their goal is to get you to reveal your personal information, such as your user names, passwords, or credit card numbers. S Signature A set of characteristics that can identify a malware family or variant. He recently assisted the EC Council in developing its new advanced cryptography course.

Some malware can steal your banking details, lock your PC until you pay a ransom, or use your PC to send spam.

Viruses, worms, and trojans are all types of malware. A single cleaning can involve several disinfections with your security software. Social Engineering A technique that defeats security precautions by exploiting human vulnerabilities. Bitcoins A form of digital currency.

Also see password stealer (PWS). Command and control server The server from which an operator controls the bot nodes in a botnet. Microsoft Windows 10 Continuum - Microsoft Windows... Check This Out For example, this can include downloading files, changing your PC settings, displaying messages and watching what keys you press.

Ransomware-as-a-service Ransomware that is relatively easy to use for attackers, as they can inititate a ransomware attack without having to code or design their own malware. He's contributed articles to such magazines as DevSource, asp.netPro, InformIT, SQL Server Professional, Visual C++ Developer, Hard Core Visual Basic, and Visual Basic Developer. SAP ( Find Out More About This Site ) ERP (enterprise resource planning) Enterprise resource planning (ERP) is an industry term for the broad set of activities that help an organization Microsoft Windows Explorer - Microsoft Windows Explore...

Microsoft Windows 8 Modern - Microsoft Windows 8 Moder... Microsoft SharePoint Server 2010 - Microsoft Sha... For more information, see our ransomware page. Form grabbing A malware technique that can steal your website sign in information or change the web content that you see.

Next Generation Secure Computing Base (NGSCB) NGSCB - The Next Generation Secure Computing Base (NGSCB) is a part of the ... Injector A type of program that inserts its code into other running processes. Alert level We give all the malware that we detect an alert level. Bots are a subcategory of backdoor trojans.

To many words given to listing step of simple actions at the same time there is no explaination benefits or consequence of the modications of the configuration. Man-in-the-browser (MITB) attack A type of web-based threat where a malicious program makes changes to a website without the website owner knowing it is happening. This helps the researchers to provide stronger protection against the malware in-the-wild.