A ‘Trojan Horse’, often shortened to ‘Trojan’ is a program that attempts to hijack certain Internet functions, like redirecting your start page to the hijacker’s own start page, redirecting search queries to an undesired search engine, or replacing search results from popular search engines with the hackers own information. It is designed to appear innocent but It is a harmful piece of software. Trojan Horses do not have the ability to replicate themselves like viruses, but they can lead to viruses being installed on a machine, since they allow the computer to be controlled by the Trojan creator.
A ‘Virus’ is a program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own.
‘Bot’ is derived from the word ‘Robot’. Bots automate tasks and are typically used to gather information. Some are good – such as a ‘Googlebot’, which helps your SEO by crawling your website text. However sometimes Bots can be be used for malicious intent. This can include logging your keystrokes or gathering your passwords, financial information and more.
‘Spyware’ are programs that monitor your activity or information on your computer and send that information to a remote computer without your knowledge. This could include information about your surfing habits, or even your bank account details!
‘Malware’ means ‘Malicious Software’. This is software that is designed to gain access to a computer and perform unwanted tasks. Malware can cause serious damage including stealing passwords or infecting other machines on your network. Also some malware programs are designed to send information about your web-browsing habits to other third party interests….without your knowledge.
A ‘LAN’ is a ‘Local Area Network’ which is a computer network limited to a small area like an office space. This network can be access by an Ethernet. However wireless LANs are a more popular alternative today.
DNS stands for ‘Domain Name System’ which is a very large database containing information about every website on the internet. Every web site online has an IP address that is its actual internet location, and this number is used to locate the we site within the database. DNS records are basically mapping files that tell the DNS database which IP address each domain is associated with, and how to handle requests sent to each domain.
An ‘Internet Protocol’ address is an exclusive number given to all information technology devices. Think of it as an address like your home address. You need an address so your post can reach you. In the same way a computer needs an address, without it the computer cannot received any information.
‘Universal Resource Locator’, which is another name for your website address.
‘File Transfer Protocol’ – this is a way of moving files between your computer and another computer. You need some software to transfer the files such a Filezilla.
An ‘Application Programming Interface’ is a software-to-software interface. It allows applications to ‘talk‘ to each other. For example, if you see a Twitter feed on a website the interface allowing Twitter to be viewed on that website is an ‘API’.
A ‘Cloud Service’ is a web based service which can host all the software that you need for your business, instead of you having to install it on your computer. It is really a network of computers which are accessed remotely. For example, your Gmail account would be considered a ‘Cloud Service’.
‘Bandwidth’ refers to how much data you can send through a network connection. It is usually measured in bits per second, or ‘bps’. You can think of bandwidth as a motorway with cars travelling on it. The motorway is the network connection and the cars are the data. The wider the motorway, the more cars can travel on it at one time. The same principle applies to computer data – the more bandwidth, the more information that can be transferred within a given amount of time.
The term ‘Firewall’ originally referred to Fireproof Walls that were designed to prevent the spread of fire from one room or building to the next. They were typically made of an inflammable material that would limit the spread of the fire. A ‘Computer Firewall’ limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
A ‘High-Definition Multimedia Interface’ is a digital interface for transmitting audio and video data in a single cable. It is supported by most HDTV’s and related components, such as DVD cable boxes, and video game systems..