Glossary of Terms
ActiveX—ActiveX controls are software modules based on the Microsoft Component Object Model (COM) architecture. They add functionality to software applications by seamlessly incorporating pre-made modules with the basic software package. Modules can be interchanged but still appear as parts of the original software.
On the Internet, ActiveX controls can be linked to web pages and downloaded by an ActiveX-compliant browser. ActiveX controls turn web pages into software pages that perform like any other program launched from a server. ActiveX controls can have full system access. In most instances this access is legitimate, but one should be cautious of malicious ActiveX applications.
Adware—Adware is a legitimate, non-replicating program designed to display ads to the end user, often based on monitoring of browsing habits, and often in exchange for the right to use a program without paying for it.
Anti-antivirus virus—Similar to a retrovirus, anti-antivirus viruses attack, disable, or infect specific antivirus software.
Antivirus software—Antivirus software scans a computer’s memory and disk drives for viruses. If it finds a virus, the application informs the user and may clean, delete, or quarantine any files, directories, or disks affected by the malicious code.
Antivirus virus—Antivirus viruses specifically look for and remove other viruses.
Applet—An applet is any miniature application transported over the Internet, especially as an enhancement to a web page. Authors often embed applets within the HTML page as a foreign program type.
Java applets are usually only allowed to access certain areas of the user’s system. Computer programmers often refer to this area as the sandbox.
Attack—An attack is an attempt to subvert or bypass a system’s security. Attacks may be passive or active.
- Active attacks attempt to destroy data.
- Passive attacks try to intercept or read data without changing it.
Attributes—Characteristics assigned to all files and directories, such as read-only, archive, hidden, or system.
Back door—A feature programmers often build into programs to allow special privileges normally denied to users of the program. Often programmers build back doors so they can fix bugs. If hackers or others learn about a back door, the feature may pose a security risk.
Background scanning—A feature in some anti-virus software to automatically scan files and documents as they are created, opened, closed, or executed.
Background task—A task executed by the system that generally remains invisible to the user. The system usually assigns background tasks a lower priority than foreground tasks. Some malicious software is executed by a system as a background task so the user does not realize unwanted actions are occurring.
Backup—A duplicate copy of data made for archiving purposes or for protection against damage and loss Also the process of creating duplicate data. A backup is not considered secure unless it is stored in a location separate from the original.
Batch files—Text files containing one MS-DOS command on each line of the file. When run, each line executes in sequential order. The batch file AUTOEXEC.BAT is executed when the computer is booted, and it loads
Bayesian filter—A program that uses Bayesian logic to evaluate the header and content of an incoming email message to determine the probability that it constitutes spam.
Bimodal virus—A bimodal virus infects both boot records and files. It is also called a bipartite virus.
BIOS—Stands for Basic Input/Output System. It is the part of the operating system that identifies the set of programs used to boot the computer before it locates the system disk. The BIOS is located in the ROM (Read-Only Memory) area of the system and is usually stored permanently.
Boot—To boot a computer is to start or reset the system so it is ready to run programs for the user. Booting the computer executes various programs to check and prepare the computer for use.
Boot record—A program recorded in the boot sector and contains information on the characteristics and contents of the disk and information needed to boot the computer.
Boot sector—An area located on the first track of floppy disks and logical disks that contains boot record.
Boot sector infector (BSI)—A boot-sector infector virus places its starting code in the boot sector. When the computer tries to read and execute the program in the boot sector, the virus goes into memory where it can gain control over basic computer functions.
Bot network—A bot network is a network of hijacked zombie computers controlled remotely by a hacker. The hacker uses the network to send spam and launch Denial of Service attacks, and may rent the network out to other cyber criminals.
Browser hijacker—A type of spyware that allows the hacker to spy on the infected PC’s browsing activity, to deliver pop-up ads, to reset the browser homepage, and to redirect the browser to other unexpected sites.
Brute-force attack—An attack in which each possible key or password is attempted until the correct one is found.
Bug—An unintentional fault in a program that causes actions that neither the user nor the program author intended.
Cavity virus—A cavity virus overwrites a part of its host file without increasing the length of the file while also preserving the host’s functionality.
Clean—A computer, file, or disk that is free of viruses is considered clean.
Cluster virus—Cluster viruses modify the directory table entries so the virus starts before any other program. The virus code only exists in one location, but running any program runs the virus as well. Because they modify the directory, cluster viruses may appear to infect every program on a disk.
COM file—A type of executable file limited to 64 kb. These simple files are often used for utility programs and small routines. Because COM files are executable, viruses can infect them.
Companion virus—Companion viruses use a feature of DOS that allows software programs with the same name, but with different extensions, to operate with different priorities. Most companion viruses create a COM file which has a higher priority than an EXE file with the same name.
Compromise—To access a system or disclose information without authorization.
Cookies might contain login or registration information, “shopping cart” information or user preferences. When a server receives a browser request that includes a cookie, the server can use the information stored in the cookie to customize the web site for the user.
Crimeware—Malicious software such as viruses, Trojan horses, spyware, deceptive scripts, and other programs used to commit crimes on the Internet including identity theft and fraud.
Cyber criminals—Hackers, crackers, and other malicious users that use the Internet to commit crimes such as identity theft, PC hijacking, illegal spamming, phishing and pharming, and other types of fraud.
Cyber gangs—Groups of hackers, crackers, and other cyber criminals that pool their resources to commit crimes on the Internet.
Default password—The password on a system when it is first delivered or installed.
Denial of Service (DoS)—An attack specifically designed to prevent the normal functioning of a system and thereby to prevent lawful access to the system by authorized users. Hackers can cause Denials of Service attacks by destroying or modifying data or by overloading the system’s servers until service to authorized users is delayed or prevented.
Dialer—Programs that use a system, without your permissions or knowledge, to dial out through the Internet to a 900 number or FTP site, typically to accrue charges.
Direct action virus—A direct-action virus works immediately to load itself into memory, infect other files, and then to unload itself.
Disinfection—Most anti-virus software carries out disinfection after reporting the presence of a virus to the user. During disinfection, the virus may be removed from the system, and whenever possible, any affected data is removed.
DNS—Stands for Domain Name System or Domain Name Server. A DNS server helps users to find their way around the Internet by translating each web site’s IP address, which is a string of numbers, into its easy-to-remember domain name.
DOC file—A Microsoft Word Document file. In the past, these files contained only document data, but with many newer versions of Microsoft Word, DOC files also included small programs called macros. Many virus authors use the macro programming language to associate macros with DOC files. This file type has the extension DOC.
DOS—Stands for Disk Operating System. This is generally any computer operating system, though the term is often used as shorthand for MS-DOS.
Dropper—A carrier file that installs a virus on a computer system. Virus authors often use droppers to shield their viruses from antivirus software. The term injector often refers to a dropper that installs a virus only in memory.
EICAR—European Institute of Computer Antivirus Research.
EICAR Standard Antivirus Test File—A safe and simple way to test the installation and behavior of antivirus software without using a real virus. If executed, it will display the message “EICAR-STANDARD-ANTIVIRUS-TEST-FILE!”
Encrypted virus—An encrypted virus’s code begins with a decryption algorithm and continues with scrambled or encrypted code for the remainder of the virus. Each time it infects, it automatically encodes itself differently, so its code is never the same. Through this method the virus tries to avoid detection by antivirus software.
Encryption—The scrambling of data so that it becomes difficult to unscramble and interpret.
EXE file—An EXE is an executable file. Usually it is executed by double-clicking its icon or an shortcut on the desktop, or by entering the name of the program at a command prompt. Executable files can also be executed from other programs, batch files, or various script files. The vast majority of known viruses infect executable files. Also called program files.
False negative—Occurs when antivirus software fails to indicate that an infected file is truly infected. False negatives are more serious than false positives, although both are undesirable.
False positive—Occurs when antivirus software wrongly claims that a virus is infecting a clean file. False positives usually occur when the string chose for the given virus signature is also present in another program.
Fast infector—Fast infector viruses, when active in memory, infect not only executed programs, but also other programs that are open at the same time. Thus, running an application such as antivirus software, which opens many programs but does not execute them, can result in all programs becoming infected.
FAT—A File Allocation Table. Under MS-DOS, Windows 3.x, 9x, and NT, the FAT is located in the boot sector of the disk and stores the addresses of all the files contained on a disk. Viruses and other malicious programs, as well and normal use and extended wear and tear, can damage the FAT. If the FAT is damaged or corrupted, the operating system may be unable to locate files on the disk.
File viruses—File viruses usually replace or attach themselves to COM and EXE files. They can also infect files with the extensions SYS, DRV, BIN, OVL, and OVY.
File Reputation System—A file reputation system computes and publishes reputation scores for files within a community or domain, based on a collection of opinions that other entities hold about the files. The opinions are typically passed as ratings to a reputation center which uses a specific reputation algorithm to dynamically compute the reputation scores based on the received ratings.
Firewall—A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel. The firewall software analyzes information passing between the two and rejects it if it does not conform to pre-configured rules.
Fram—Spam forwarded to you by a family member, friend, or colleague.
Hacker—A person who creates and modifies computer software and hardware, including computer programming, administration, and security-related items. Criminal hackers create malware in order to commit crimes.
Hijacking—An attack whereby an active, established session is intercepted and used by the attacker. Hijacking can occur locally if, for example, a legitimate user leaves a computer unattended. Remote hijacking can occur via the Internet.
Hole—A vulnerability in the design software and/ or hardware that allows circumvention of security measures.
Host—A term often used to describe the computer file to which a virus attaches itself. Most viruses run when the computer or user tries to execute the host file.
In the wild (ITW)—A virus is “in the wild” if it is verified as having caused an infection outside a laboratory situation. Most viruses are in the wild.
Infection—The action a virus carries out when it enters a computer system or storage device.
Joke programs—Are not viruses, but may contain a virus if infected or otherwise altered.
Key—The Windows Registry uses keys to store computer configuration settings. When a user installs a new program or the configuration settings are otherwise altered, the values of these keys change. If viruses modify these keys, they can do damage.
Keylogger—Malicious programs that record the key strokes a user types on their PC, including instant message and email text, email addresses, web sites visited, passwords, credit card and account numbers, addresses, and other private data.
Library file—Library files contain groups of often-used computer code that different programs can share. A virus that infects a library file automatically may appear to infect any program using the library file.
Logic bomb—A type of Trojan horse that executes when specific conditions occur. Triggers for logic bombs can include a change in a file, a particular series of keystrokes, or a specific time or date.
Macro—A series of instructions designed to simplify repetitive tasks within a program such as Microsoft Word, Excel, or Access. Macros execute when a user opens the associated file. Macros are in mini-programs and can be infected by viruses.
Macro virus—A malicious macro. Macro viruses are written in a macro programming language and attach to a document file such as Word or Excel. When a document or template containing the macro virus is opened in the target application, the virus runs, does its damage, and copies itself into other documents. Continual use of the program results in the spread of the virus.
Mail bomb—An excessively large email, or many thousands of messages sent to user’s email account. This is done to crash the system and prevent genuine messages from being received.
Malicious code—A piece of code designed to damage a system and the data it contains, or to prevent the system from being used in its normal manner.
Malware—A generic term used to describe malicious software such as viruses, Trojan horses, spyware, and malicious active content.
Mapped drives—Network drives assigned local drive letters that are locally accessible.
Master boot record (MBR)—The 340-byte program located in the master boot sector. This program reads the partition table, determines what partition to boot, and transfers control to the program stored in the first sector of that partition.
Master boot sector—The first sector of a hard disk.
Master boot sector virus—Master boot sector viruses infect the master boot sector of hard drives, though they spread through the boot record of floppy disks. The virus stays in memory, waiting for DOS to access a floppy disk, and then infects the boot record on each floppy disk DOS accesses.
Memory-resident virus—A memory-resident virus stays in memory after it executes, and it infects other files when certain conditions are met.
MP3 file—Moving Picture Experts Group Audio Layer 3 files. They are highly compressed audio tracks, and are very popular on the Internet. MP3 files are not programs, and viruses cannot infect them.
MS-DOS—Microsoft Disk Operating System. Windows systems rely heavily on MS-DOS and can execute most MS-DOS commands.
Multipartite virus—Multipartite viruses use a combination of techniques including infecting documents, executables, and boot sector records to infect computers. Removing multipartite viruses requires cleaning both the boot sectors and any infected files.
Mutating virus—A virus that changes, or mutates, as it progresses through its host files making disinfection more difficult.
Not in the wild—Viruses “not in the wild” are in the real world but fail to spread successfully.
NTFS—NT File System. A Windows NT file system used to organize and keep track of files.
On-access scanner—An on-access scanner is a real-time virus scanner that scans disks and files automatically in the background as the computer accesses the files.
On-demand scanner—A virus scanner that users start manually. Most on-demand scanner allow the user to set various configurations and to scan specific files, folders, and disks.
Operating system (OS)—The underlying software that enables you to interact with the computer. The operating system controls computer storage, communications, and task management functions. Examples include, MS-DOS, MacOS, Linux, and Windows.
Overwriting virus—An overwriting virus copies its code over its host file’s data, thus destroying the original program. Disinfection is possible, although files cannot be recovered. It is usually necessary to delete the original file and replace it with a clean copy.
Password attacks—An attempt to obtain or decrypt a legitimate user’s password. Hackers can use password dictionaries, cracking programs, and password sniffers in password attacks. Defense against password attacks is rather limited, but creating strong passwords can help.
Password sniffing—The use of a sniffer to capture passwords as they cross a network. The sniffer can be hardware or software, and most are passive and only log passwords.
Payload—Refers to the effects produced by a virus attack.
Peer-to-peer (P2P) networking—A distributed system of file sharing where any PC on the network can see any other PC on the network. Users access each others’ hard drives to download files.
Pretty Good Privacy (PGP)—Considered the strongest program for encrypting data files and/ or email messages on PCs and Macintosh computers. PGP includes authentication to verify the sender of a message and non-repudiation to prevent someone denying they sent a message.
Pharming—Exploitation of a vulnerability in DNS server software that allows a hacker to redirect a legitimate Web site’s traffic to a counterfeit Web site. The spoofed site is designed to steal personal information such as usernames, passwords, and account information.
Phishing—A form of criminal activity using social engineering techniques through email or instant messaging. Phishers attempt to fraudulently acquire other people’s personal information, such as passwords or credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication.
Piggyback—Gain unauthorized access to a system by exploiting an authorized users’ legitimate connection.
Polymorphic virus—Polymorphic viruses create varied (though fully functional) copies of themselves as a way to avoid detection by anti-virus software. Some polymorphic virus use different encryption schemes and require different decryption routines.
Pop-up ads—Forms of online advertising on the Internet intended to attract Web traffic or capture email addresses. Pop-ups are generally new web browser windows to display advertisements.
Program infector—A program infector virus infects other program files once an infected application is executed and the activated virus is loaded into memory.
Ransomware—Malicious software that encrypts the hard drive of the PC that is infects. The hacker then extorts money from the PC’s owner in exchange for decryption software to make the PC’s data usable again.
Real-time scanner—An antivirus software application that operates as a background task, allowing the computer to continue working at a normal speed while it works.
Redirect—An action used by some viruses to point a command to a different location. Often this different location is the address of the virus and not the original file or application.
Rename—An action by which a user or program assigns a new name to a file. Viruses may rename program files and take the name of the file so that running the program inadvertently runs the virus.
Replication—The process by which a virus makes copies of itself in order to carry out subsequent infections. Replication is one of major criteria separating viruses from other computer programs.
Reset—Restart a computer without turning it off.
Resident extension—Memory-resident portion of a program that remains active after the program ends. It essentially becomes an extension to the operating system.
Resident virus—A resident virus loads into memory and remains inactive until a trigger event. When the event occurs, the virus activates, either infecting a file or disk, or causing other consequences.
Rogue program—A term the media uses to denote any program intended to damage programs or data, or to breach a system’s security.
Rootkit— A stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.
RTF file—RTF stands for Rich Text Format. It is an alternative format to the DOC file type supported by Microsoft Word.
Scanner—A virus detection program that searches for viruses.
Sector viruses—See “boot sector infector” or “master boot sector virus”
Self-encrypting virus—Viruses that attempt to conceal themselves from antivirus programs. Most antivirus programs attempt to find viruses by looking for certain patterns of code that are unique to each virus.
Self-extracting files—A self-extracting file decompresses part of itself when executed. Software authors often use this file type to transmit files and software via the Internet, since compressed files conserve space and reduce download time. Some antivirus products may not search self-extracting file components.
Self-garbling viruses—A self-garbling virus attempts to hide from antivirus software by garbling its own code. When these viruses spread, they change the way they are encoded so antivirus software cannot find them. A small portion of the virus code decodes the garbled code when activated.
Shared drive—A disk drive available to other computers on the network.
Shareware—Software distributed for evaluation without cost, but that requires payment to the author for full rights.
Signature—A search pattern—often a simple string of characters or bytes—expected to be found in every instance of a particular virus.
Slow infector—Slow infector viruses are active in memory and only infect new or modified files.
SMTP—Simple Mail Transport Protocol. It is the Internet email delivery format for transmitting email messages between servers.
Sniffer—A software program that monitors network traffic. Hackers use sniffers to capture data transmitted over a network.
Spam—Unsolicited or undesired bulk electronic messages. There is email spam, instant messaging spam, Usenet newsgroup spam, web search-engine spam in blogs, and mobile phone messaging spam. Spam includes legitimate advertisements, misleading advertisements, and phishing messages designed to trick recipients into giving up personal and financial information.
Spam filter—A program used to detect unsolicited email to prevent spam from making it to a user’s inbox. Filters are places on email and ISP servers, in anti-spam software, and in anti-phishing browsers.
Sparse infector—Sparse infector viruses use conditions before infecting files.
Spim—Spam for instant messaging. These messages can be simple unsolicited ads, or fraudulent phishing mail.
Spoofed web site—A site that mimics a real company’s site—mainly financial services sites—in order to steal private information such as passwords or account numbers, from people that are tricked into visiting. Phishing emails contain links to counterfeit sites, which looks exactly like the real company’s site, down to the logo, graphics, and detailed information.
Spyware—A wide range of unwanted programs that exploit infected computers for commercial gain. They can deliver unsolicited pop-up advertisements, steal personal information, monitor web-browsing activity for marketing purposes, or route HTTP requests to advertising sites.
Stealth virus—Stealth viruses attempt to conceal their presence from antivirus software. Many stealth viruses intercept disk-access requests, so when the antivirus application tries to read files or boot sectors to find the virus, the virus feeds the program a “clean” image for the requested item.
String—A consecutive series of letters, numbers, and other characters. “afsH8&DJs” is a string, as well as “The Mad Hatter”. Antivirus applications often use specific strings, called virus signatures, to detect viruses.
Template—Certain applications use template files to pre-load default configurations settings.
Time bomb—A malicious action triggered at a specific date or time.
Timestamp—The time of creation or last modification recorded on a file or another object. Users can usually find the timestamp in the Properties section of a file.
Top of Memory (TOM)—A design limitation at the 640kb mark on most PCs. Often the boot record does not completely reach top of memory, thus leaving empty space. Boot-sector infectors often try to conceal themselves by hiding around the top of memory.
Triggered event—An action built into a virus that is set off by a specific condition. Examples include a message displayed on a specific date or reformatting a hard drive after the 10th execution of a program.
Trojan horse—A malicious program that pretends to be a benign application. It purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but they can be just as destructive.
TSR—Stands for Terminate and Stay Resident. TSR programs stay in memory after being executed. They allow the user to quickly switch back and forth between programs in a non-multitasking environment, such as MS-DOS. Some viruses are TSR programs that stay in memory to infect other files and programs.
Tunneling—A virus technique designed to prevent antivirus applications from working correctly. Antivirus programs work by intercepting the operating system before it can execute a virus. Tunneling viruses try to intercept the actions before the antivirus software can detect the malicious code. New antivirus programs can recognize many viruses with tunneling behavior.
Universal Naming Convention (UNC)—The standard for naming network drives.
Vaccination—A technique some antivirus programs use to store information about files in order to notify the user about file changes. Internal vaccines store the information within the file itself, while external vaccines use another file to verify the original for possible changes.
Variant—A modified version of a virus. It is usually produced on purpose by the virus author or another person amending the virus code. If changes to the original are small, most antivirus products will also detect variants. However, if the changes are large, the variant may go undetected by antivirus software.
Visual Basic Script (VBS)—A programming language that can invoke any system function—including starting, using, and shutting down other applications—without user knowledge. VBS can be embedded in HTML files and provide active content via the Internet.
Virus—A computer program file capable or attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission. Some viruses attach to files so when the infected file executes, the virus also executes. Other viruses sit in a computer’s memory and infect files as the computer opens, modifies, or creates the files. Some viruses display symptoms, and others damage files and computer systems, but neither is essential in the definition of a virus.
Virus hoaxes—Virus hoaxes are not viruses, but are usually emails warning people about a virus or other malicious software program. Some hoaxes cause as much trouble as viruses by causing massive amounts of unnecessary email. Most hoaxes contain one or more of the following characteristics:
- Warnings about alleged new viruses and their damaging consequences.
- Demands that the reader forward the warning to as many people as possible.
- Pseudo-technical “information” describing the virus.
- Bogus comment from officials: FBI, software companies, news agencies, etc.
Warm boot—Restarting a computer without first turning off the power. Using CTL+ALT+DEL or the reset button on many computers can warm boot a machine.
Windows scripting—Windows Scripting Host is a Microsoft-integrated module that lets programmers use any scripting language to automate operations throughout the Windows desktop.
Worm—Parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network.
ZIP file—A compressed file. A zip archive contains compressed collections of zipped files. ZIP files are popular on the Internet because users can deliver multiple files in a single container, and the compressed files save disk space and download time. A ZIP file can contain viruses if any of the files packaged in it contain viruses.
Zombie—A PC that has been infected with a virus or Trojan horse that puts it under the remote control of an online hijacker. The hijacker uses it to generate spam or launch Denial of Service attacks.
Zoo—A collection of viruses used for testing by researchers.
Zoo virus—A zoo virus exists in the collections of researchers and has never infected a real-world computer system.