Solutions| Latest Update
Spyware A general term used for describing software that imposes upon a user's privacy
or security
Adware A software program that delivers advertising content in a manner that is
unexpected and unwanted by the user
Keylogger A small hardware device or a program that monitors each keystroke a user
types on the computer's keyboard
Botnet When hundreds, thousands, or even tens of thousands of zombie computers are
under the control of an attacker
Zombie An infected computer with a program that will allow the attacker to remotely
control it
Cross-Site Scripting Injecting scripts into a Web application server
SQL Injection Targets SQL servers by injecting commands
Structured Query Language Used to manipulate data stored in relational database
, Drive-by download Client computer compromised simply by viewing a Web page
Header manipulation HTTP header contains fields that characterize data being transmitted
First-party cookie Cookie created by Web site user is currently visiting
Third party cookie Site advertisers place a cookie to record user preferences
Session cookie Stored in RAM and expires when browser is closed
Persistent cookie Recorded on computer's hard drive
Does not expire when browser closes
Secure cookie Used only when browser visits server over secure connection
Always encrypted
Flash cookie Uses more memory than traditional cookie
Cannot be deleted through browser configuration settings
Session hijacking Attacker attempts to impersonate user by stealing or guessing session
token