Expert IT support for Los Angeles Businesses

Security Glossary

Search for glossary terms (regular expression allowed)
Begin with Contains Exact term


Term Definition
A portable computer that uses a touchscreen as its primary input device. Most tablets are small and weigh less than the average laptop.
Process of connecting your mobile phone to a laptop or similar data device using a data cable or wirelessly via Bluetooth. This is commonly done to connect a device, such as a laptop, to the Internet using a mobile phone.
The process of sending or receiving written messages using a mobile phone. Texting is a common form of communication among mobile phone users. See also: Short Message Service (SMS).
Time bomb
A malicious action triggered at a specific date or time.
Triggered event
An action built into a virus that is set off by a specific condition. Examples include a message displayed on a specific date or reformatting a hard drive after the 10th execution of a program.
Trojan (Trojan horse)
Malicious programs disguised as legitimate software. Users are typically tricked into loading and executing it on their systems. One key factor that distinguishes a Trojan from viruses and worms is that Trojans don't replicate.
A virus technique designed to prevent antivirus applications from working correctly. Antivirus programs work by intercepting the operating system before it can execute a virus. Tunneling viruses try to intercept the actions before the antivirus software can detect the malicious code. New antivirus programs can recognize many viruses with tunneling behavior.
Also known as URL hijacking, it relies on mistakes such as typographical errors made by Internet users when inputting a website address into a browser. If the user accidentally enters the incorrect website address, they are lead to an alternative website that usually is designed for malicious purposes.