A SERVICE OF

logo

Spam
Electronic junk mail or junk newsgroup postings. Generally known as any
unsolicited e-mail.
Spyware
Any software that covertly gathers user information through the user's Internet
connection without his or her knowledge, usually for advertising purposes. Spyware
applications are typically bundled as a hidden component of freeware or shareware
programs that can be downloaded from the Internet; however, it should be noted
that the majority of shareware and freeware applications do not come with
spyware. Once installed, the spyware monitors user activity on the Internet and
transmits that information in the background to someone else. Spyware can also
gather information about e-mail addresses and even passwords and credit card
numbers.
Spyware's similarity to a Trojan horse is the fact that users unwittingly install the
product when they install something else. A common way to become a victim of
spyware is to download certain peer-to-peer file swapping products that are
available today.
Aside from the questions of ethics and privacy, spyware steals from the user by
using the computer's memory resources and also by eating bandwidth as it sends
information back to the spyware's home base via the user's Internet connection.
Because spyware is using memory and system resources, the applications running
in the background can lead to system crashes or general system instability.
Startup items
Any files placed in this folder will open when the computer starts. For example,
a startup screen, a sound file to be played when the computer first starts, a
reminder calendar, or application programs can be startup items. Normally, an
alias of a file is placed in this folder rather than the file itself.
System tray
Introduced with Windows 95, the system tray is located in the Windows taskbar
(usually at the bottom next to the clock) and contains miniature icons for easy
access to system functions such as fax, printer, modem, volume, and more.
Double click or right click an icon to view and access the details and controls.
TCP/IP
Transmission Control Protocol/Internet Protocol - A set of networking protocols
widely used on the Internet that provides communications across interconnected
networks of computers with diverse hardware architectures and various operating
systems. TCP/IP includes standards for how computers communicate and
conventions for connecting networks and routing traffic.
Glossary
134
BitDefender Antivirus 2008