A comprehensive list of security terms that you must know

The technical terms in this glossary are intended only as a basic aid to understanding the pages on this website.

null

Adware Blocker

Adware Blocker is a software program
which stops / blocks all unwanted pop-up advertisement that disrupt your online

Read More

experience. K7 TotalSecurity has got a pop-up blocker which stops adware from installing in your PC. Adwares are sometimes malicious and hence an Adware Blocker is essential for a PC connected to Internet.

null

Executable (.exe)

A file that contains a set of code written to run/create a program. Most of the viruses are attached with the

Read More

.exe setup files, and researchers say that most of the users get infected when they execute the file believing it to be a genuine program. A good Internet Security Software with an Antivirus Program and Firewall would be able disinfect the virus or stop the virus from being executed.

null

Malware

Malicious Software in short Malware is a form of computer program which can infiltrate and damage a computer

without the user's knowledge. Viruses, worms, trojans, rootkits, backdoors, spyware, adware come under the malware category.

null

Spyware

A program which obtains users' information and transfers it to third parties, without users' knowledge. In a way, Spyware

Read More

is also similar to Adware. Spyware is known to be one of top fraudulent activity carried out over in the internet.

null

Virus

A software program which is capable of reproducing itself within the computer and harm the system's program files, which may

Read More

even lead to system crash/damage.

null

Antivirus Software

Antivirus Software is a program that detects and eliminates or neutralizes a virus program, if a PC is infected. In simple terms,

Read More

Antivirus Software is a Virus Protection Software which protects computers from potential virus attacks.

null

Firewall

A Hacker Intrusion Detection System, which stops unwanted / unknown network trying to access your computer when

Read More

connected to Internet. On Daily Basis, there are so many victims who get affected by hacker attacks resulting in loss of control over their PCs and thereby, in personal life by losing valuables. A firewall would monitor both incoming and outgoing network traffic and alerts the user if there is any suspicious network trying to gain access to the user's computer.

null

Phishing

A type of fraudulent activity in which a criminal attempts to make a victim believe by showing a false identity.

their important & confidential information.

null

System Monitor

An important feature in K7 TotalSecurity - Internet Security Software - which alerts users, when there is an attempt to

Read More

change the system security settings. Because most of the phishing attacks are carried on only after changing the computer security settings, this is a very important part of Internet Security Software.

null

Worm

Unlike a virus, a worm is not a parasite. It is capable of reproducing and spreading itself to damage or infect a computer and its

Read More

network of PCs. This makes them even more dangerous than viruses.

null

E-mail borne virus

A malicious program capable of
spreading via email. Email borne Virus threats are increasing day-by-day.

Read More

They are dangerous as they spread fast from one network to another through email.

null

Hacker

A programmer who tries to gain unauthorized access to a computer by breaking the security setting without the

user's knowledge. If the hacker gains access, he can steal information or install unwanted software programs in a computer to get the data transferred to third parties.

null

Pop-up

A window or applet which appears automatically and displays an ad without the consent of the user. Certain

Read More

Pop-Ups also utilizes more of system resources and install spyware or adware in a PC without the user's knowledge.

null

Trojan Horse

This is also known as Trojan. A Trojan is a worm or virus, which is programmed by a third party to carry out a specific task

Read More

without the user's knowledge or consent.