Saturday, May 1, 2010

Musicmatch Jukebox, Contact

Scene tag!

Abuse: (DT: abuse) If someone such as viruses spread through his homepage, we write to the provider an e-mail in which to report the incident. Therefore, it is often spoken of "Abuse Mail".

Account: An account called conditional access to a computer system. This is broken down as a rule in a user ID (user identification) and a secret password.

Administrator : administrator is the name for the system administrator of a network that has full access rights and is responsible for the care and management of the network.

Bulk Mail : Bulk mail is available for bulk mail. The term is a milder term for spam.

Crypter : Crypter used to encrypt files so that it is harder for virus scanners to detect sieals malware.

DoS (Denial of Service) : In a denial-of-service attack to computers (usually web servers) bombarded with targeted and / or very many questions. This allows them to provide services not run more and break under the weight of.

DDoS (Distributed Denial of Service) :
A distributed denial-of-service attack based on the same
Basically like a normal DOS attack, but with the only difference being that what is involved and a spread attack. Often these attacks with thousands of zombie PCs are carried out.

Dump: is the case of a dump is a copy of something, for example, a copy of a database.

The word dump can be considered in the carding scene for an image of a debit / EC / credit card. So that the data are meant on the magnetic strip.

E-mail:
Electronic mail or electronic mail is one of the main applications of the Internet. Numerous business and personal letters every day electronically sent.

e-mails are not only useful but also a major route for dissemination of harmful programs.
worms reproduce often in that they automatically send e-mail messages the worm contains the appendix.
The virus writers trying not to readers of the e-mail with all the means of camouflage and deception to get them to open the file attached.

Other e-mails entice your readers to visit websites with infected contents. Some HTML e-mails even directly install the worm when you open the e-mail.

To counter this danger, includes anti-virus software protection mechanisms for e-mail programs that recognize the virus already and eliminated before he inadvertently by the user can start.

Exploit : A program that exploits an existing vulnerability in the target computer to execute arbitrary code.

FAQ : a FAQ (frequently asked questions) answers frequently asked questions about a particular topic.

Flooding: Flooding is an umbrella term for various ways to prevent certain hosts within a network by excessive demand or overload.


File Transfer Protocol :

The File Transfer Protocol (file transfer protocol) or FTP is a
transfer protocol for exchanging data between two computers.

FTP is independent of the operating system and the means of transmission.
Unlike, for example HTTP, FTP builds and maintains a connection
not maintained during the entire transmission.

FTP server: on FTP servers (File Transfer Protocol server) will be provided Internet users to download files and directories. For the use of public FTP servers, you can often than with the user "Anonymous" and their own e-mail address Forgot login.

Some viruses and Trojans install their own FTP servers with which they can download files from the infected PC.

FUD (Fully UnDectable): "Fully Undetectable" means that the files that were created with the Crypter (such as RATs, or bots) are detected by any virus scanner.

Hijacker: Hijackers install unnoticed and change the browser settings (for example, the homepage) and its functions (eg search). Therefore, they actually belong to the Trojans.
browser hijackers redirect the user to accidentally (often pornographic) Web sites by the home page or the search is redirected. Sometimes additional menu bars or window can be displayed
that move or not close.
browser hijackers often use security holes and vulnerabilities of the system to nestle deep in it. Most of the Internet Explorer is under attack.
The elimination of the malfunction is usually very complicated.
One of the most infamous browser hijacker is CoolWeb.

ICMP: The Internet Control Message Protocol (ICMP) allows you to send error messages, test packets and information and is part of the TCP / IP.

Instant Messenger:
This refers to communicate directly between two or more people.
The written messages are immediately (instant) and are released immediately call recipient.
usually need to be signed by all participants the same provider.

Internet Relay Chat (IRC):
on the Internet relay chat protocol, two or more persons
perform a text communication via the Internet in real time.

IP Address: The Internet Protocol (IP) address is a numeric address to identify computers on a TCP / IP network. This Address is represented in four bytes (eg 193.98.145.50).
It consists of two parts: 1 Address of the second logical network Address of a host within the logical network.
Since people are not IP addresses can remember so well, they usually use
domain name to host visiting the web.

Keylogger: with a keylogger to record keystrokes and, if sent.

This allows swindle passwords and other personal data. A representative of this species is Padodoor.

Login: The process of dial-up, registration and authentication (usually a password) a user to a computer system is "LogIn" called.

OpenVPN: You can build with OpenVPN encrypted connections to other computers or to other networks.
It is possible for all its Internet traffic through a tunnel to OpenVPNVerbindung.
In this case you are outside, only the IP from the host to which you
has established a connection.

P2P (peer to peer) case of "peer to peer" networks, there is no central server and all computers on the network operate on an equal footing.

Patch: A patch fixes bugs or security vulnerabilities in software. The patch replaces only the corrupted files and not the full version of the software.

Payload: payload is the English name for the payload of a virus (in the literal sense).
The release of the payload may be associated with a condition, known as the payload triggers. Since some researchers see also the use of system resources and bandwidth
as the payload, the definition of loss function is controversial.

Phishing: Phishing is the attempt personal information such as login names, passwords, Credit card numbers, bank access, data, etc. to get through fake websites or unsolicited emails.

Mostly, phishing attempts directed at customers of banks with online banking services (City Bank, Post Bank), payment services (Paypal), Internet service providers (AOL) or online stores (eBay, Amazon).
This one is generally headed by email or Instant Messenger to fake websites that the sides of the models are modeled very closely.

Posting:
posting refers to a message that will be published on the Internet, especially in newsgroups, mailing lists and forums.

protocol : A protocol used for communication between different computers on a network. It contains a formal set of rules that control the exchange of messages.
Examples of protocols include FTP, HTTP, POP3 or TCP / IP.

Provider: Provider of Internet access.

Proxy: A proxy serves as an intermediary between the sender and receiver, the receiver does not know the address of the sender, but only that of the proxy.

piracy (Warez engl.):
A pirated copy is a non-licensed, non-authorized copy of a program that is illegal was made from an original product.
Any property or the making of a pirated copy is punishable under copyright protection.

RAT (Remote Administration Tool):
These tools are controlled by the computers of the victims of the fraudsters in the distance.

Server: The server is called a program that provides a client data or services.

Skype: With Skype you can make calls over the Internet - either with their PC or a suitable phone. Potential targets are here
other computers on the Internet and the fixed or mobile network.


Social Engineering: Social Engineering
As Überredungstatiken are called to reveal that a hacker causes a user to information he can use it to the user or his organization to harm.
Often this feigned authority to gain access or passwords.

Stealer:
main purpose is the obtaining of access to the victim's machine.

spam : mid 90's called spam the excessive proliferation of the same message in Usenet forums.
The term itself is a sketch from Monty Python back. Now used to spam multiple meanings.
As the preamble to all spam is unsolicited e-mails.
confined in a narrow sense, the term spam to junk mail;
means:
worms, hoaxes, phishing mails and auto responder will not count.

Spammer: someone who sends unsolicited

Spyware: Spyware is software that records the activities and processes on a computer and this information without the knowledge of strangers and / or consent of the owner makes available.
Spyware is often used to for Commercials surfing behavior ysieren **** to, or spy on access to bank or online accounts.

SSH (Secure Shell): Secure Shell is common particularly in the Linux and Unix areas. This protocol can be accessed via an encrypted connection to remote computers.
is also possible to tunnel the connections through the computer on which you are logged.

transaction number (TAN): The transaction number is used for online banking transactions to the second identification in addition to the PIN.
While the PIN (almost) always remains the same and therefore more time can be used, the TAN is only valid for a single financial transaction.
Each online banking business must be used to putting a new TAN.

Trojans : The name Trojan horse is similar to the historical model and describes a program that pretends the user to have a specific and desired function. In addition, Trojans, however, contain a hidden program portion which, as it opens a back door to infected computers and
granted almost full access to the affected system - without the user noticing.
The methods of trojans to hide are here
almost unlimited. Thus, these insidious programs are often sent as screen savers or games via e-mail.
A unique enough already started and the malware infects the system.

Update: The term "update" are called updates of data and programs (eg, software, antivirus data, databases). For example, users have the G Data Security Software the opportunity to regularly update anti-virus signatures via the Internet
(virus update). can

But the anti-virus software does take them with a software update to the latest version.

Virtual : The virtual is called an environment if they are not on the real life (RL, English real life.) Is based, but is generated by the computer. Confusingly, this is referred to virtual reality (VR).

zombie PC : As a zombie called a PC that can be remotely controlled via a backdoor. **** Og the cinematic model obeys the zombie PC only master the hidden and often performs his criminal orders.
Many zombies are grouped into so-called botnets.