Tech

Know your Cookies from Your Malware – Tech Terms explained

Unravel the mysteries of tech terms. It’s a language that is alien to most of us and yet the terms used are becoming part of our daily language. In this article we demystify some of those terms.

404

Web visitors see 404 error pages when they try to reach a web page that doesn’t exist. This usually happens when the web page has been deleted or the visitor mistyped the URL.

Antivirus Software

Antivirus software is an important component of overall computer security, but it’s essential to note that it is not a complete security solution. A comprehensive security strategy should include other measures such as regular software updates, strong passwords, data encryption, and user education to help protect against a wide range of security threats.

Backup

Copy of files and applications made to avoid loss of data and facilitate recovery in the event of a system failure.

Browser Cache

The appliance or instrument through which a browser saves the data needed to see a website, like images and HTML. When you revisit a web page, it’ll take less time to load than the first time you visited it because a cached version of the page was already saved the first time you were there. Because you have a cached version of the page, your browser doesn’t need to send a new request to see that page. 

Cookies/Tracking Cookies

A small file that a web server automatically sends to your personal computer when you browse certain websites. The identifying information they contain includes login credentials (including usernames and passwords), shopping cart information, and preferences. They’re stored as text files on your hard drive so servers can access them when you return to websites you’ve visited before.

Ever made a return visit to a website like Amazon and seen content tailored to your user preferences? That’s because on your first visit, a cookie was installed. When you came back, the website server read your cookie and recognized you.

Device Drivers

Essential software components that facilitate the interaction between an operating system and hardware devices, ensuring that the hardware functions as intended and is compatible with the operating system in use. Basically drivers make sure that your computer runs smoothly and, on occasions, need updating.

DOS/DDOS Attack

“Denial-of-service” or “distributed denial-of-service” attack. An attempt to make a machine or network resource unavailable to its intended users. DoS threats usually target websites or services hosted on high-profile web servers like banks and credit card payment gateways, but they’re also common in business in the form of website attacks.

Downloading and uploading:

Downloading and uploading transfers files from a remote computer to your computer. When downloading from a third party know exactly what you are downloading because on occasions they will include other downloads which you can refuse as you go through the process.   

Ethernet

Ethernet is commonly used in homes for creating wired networks via a cable.. It can provide a more stable and faster connection compared to Wi-Fi, making it ideal for devices like desktop computers ( a cable connecting to your broadband router), printer (connecting to your computer, and smart TVs (connecting to router/computer).

Firewall

A firewall plays a crucial role in safeguarding networks and systems from a wide range of security threats, including viruses, malware, unauthorized access attempts, and data breaches. They are a foundational element of network security and are often used in combination with other security measures, such as antivirus software, intrusion detection systems, and encryption, to create comprehensive security strategies.

IP Address

IP addresses are used to uniquely identify devices on a network. Each IP address is a unique identifier, much like a phone number or a home address.

JPEG

JPEG is a widely used image compression standard and file format that is highly effective for reducing the file size of photographic images and graphics while maintaining acceptable image quality. It has become the de facto format for sharing images on the internet and in various digital media.PNG fulfils a similar function

Machine Learning

An artificial intelligence technique where algorithms are trained to recognize patterns and respond to them by performing tasks. For example, a customer service bot for a travel site might be trained to send you deals related to Bermuda if it recognizes the words, “beach vacation” or “Bermuda.”

Malicious code (malware)

Software designed to infiltrate or damage a computer system without the owner’s informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code including spyware, Trojan horses, viruses, and worms.

Operating system

An operating system, such as Microsoft Windows, is software that manages computer hardware and provides services for computer programs.

PIN

Personal identification number. A short number to authenticate an individual used as an additional access source for computers and mobiles.

Phishing

Phishing is a type of cyberattack and social engineering technique in which malicious actors attempt to deceive individuals into revealing sensitive information, such as login credentials, personal information, or financial details. Phishing attacks typically take the form of fraudulent communications that appear to come from a trusted source, such as a legitimate company, government agency, or even a friend or colleague.

The ultimate goal of phishing is to steal valuable information for malicious purposes, such as identity theft, financial fraud, or gaining unauthorized access to computer systems. Therefore be cautious about clicking on links or downloading attachments in unsolicited messages, verifying the legitimacy of communication, and regularly updating passwords.

PDF

PDF files have become a de facto standard for document sharing, distribution, and archiving due to their versatility, cross-platform compatibility, and ability to preserve document layout and appearance. They are commonly used for various types of documents, including reports, e-books, manuals, forms, brochures, and more.

Removable media

A storage device built and intended to be easily connected to and removed from a computer system – examples include memory sticks, pen drives, external hard drives, and CD/DVDs.

Remote Access

Remote access refers to the ability to connect to and control a computer or network from a location other than the physical location of the computer or network. This allows a provider, such as Microsoft or your broadband provider, to access your computer remotely to solve an issue. Only allow such access when you are 100% sure that they are genuine.

Routers

 A router is a device that connects two local area networks. Your router connects you  to your internet provider.

Search Engine

A search engine is a software application or service that helps users find information on the internet by searching for and retrieving relevant web pages, documents, images, videos, or other types of content. Search engines are designed to make it easier for people to discover and access information online.

Spam

Spam refers to unsolicited or irrelevant electronic messages, typically sent over the internet, with the intention of promoting products, services, or other content. Spam is generally considered annoying, intrusive, and often deceptive. Typically via email you can block the sender from further solicitation

Spyware

Software that is installed surreptitiously on a computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent. While the term suggests software that secretly monitors the user’s behaviour, the functions of spyware include collecting various types of personal information, interfere with control of the computer, changing computer settings, and redirecting web browser activity.

Strong password

A strong password is constructed so that it cannot be easily guessed by another user or a “hacker” program. It is typically a minimum number of positions in length and contains a combination of alphabetic, numeric, or special characters and should not be linked to any personal information such as a birth date, Social Security number, and so on.

Trojan

Destructive programs-usually viruses or worms-that are hidden in an attractive or innocent-looking piece of software, such as a game or graphics program. Victims may receive a Trojan horse program by email or on portable media, often from another unknowing victim, or may be urged to download a file from a website.

Virtual private network (VPN)

 A VPN is a network that allows you to use public Internet connections as private networks. This means you can connect to a site without showing your IP address.

Virus

A computer virus refers to a program that enters your computer—often through email or Internet downloads—and makes copies of itself, spreading throughout your computer and files. There is a wide range of computer viruses out there. They can be anything from merely annoying to horribly damaging—deleting files or making your computer inoperable. Viruses attach themselves to an application on a computer and aren’t actually executed until that application is accessed or run.

Wi-Fi

Wi-Fi is commonly used in homes, offices, public places, and various other environments to provide wireless internet access to multiple devices like smartphones, laptops, tablets, and smart devices. To access Wi-Fi, you need a Wi-Fi-enabled device (such as a smartphone or laptop) and a Wi-Fi router or access point connected to an internet source (e.g., an internet service provider).

If you have issues with your tech our post on how to fix it may provide an answer

You need to sign up or be logged in to leave a comment.