Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

Terms you should know

Discussion in 'Jukwaa la Lugha' started by Invisible, Jun 23, 2008.

  1. Invisible

    Invisible Admin Staff Member

    Jun 23, 2008
    Joined: Feb 11, 2006
    Messages: 9,095
    Likes Received: 130
    Trophy Points: 160
    Adware Advertising that is integrated into software. Adware is often combined with a host application that is provided at no charge as long as the user agrees to accept the adware.

    A blog (short for weblog) is a personal journal that is frequently updated and intended for the general public.

    Cyberbullying is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass or otherwise target another minor.

    Cyberstalking is the use of electronic means to repeatedly engage in the harassment or threatening of another.

    Emoticons are symbols that people sometimes use in e-mails and chat rooms to show what mood a person is in. For example means ‘I am happy' so therefore means ‘I am sad'. There are hundreds of these symbols used online.

    Firewall is either the program or the computer it runs on, usually an Internet gateway server, that protects the resources of one network from users from other networks.

    Flaming is an insulting, angry or otherwise negative remark to or about someone in public.

    Hacker originally, a hacker was a term of respect, used among computer programmers, designers, and engineers. The hacker was one who created original and ingenious programs. Unfortunately, the current popular meaning of the term is used to describe those who break into systems, destroy data, steal copyrighted software, and perform other destructive or illegal acts with computers and networks.

    Harassment occurs when one user continually or deliberately offends another user with actions such as posting comments intended to hurt, offend or conflict with another user's beliefs.

    A profile is the identity a user creates on a social networking site.

    An online predator is someone who uses the anonymous nature of the Internet to find victims and eventually take advantage of them in the real world.

    Phishing is the act of tricking someone into giving them confidential information or tricking them into doing something that they normally wouldn’t do or shouldn’t do. For example: sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

    Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information.

    What does a phishing scam look like?

    As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows.
    They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites.
    The following is an example of what a phishing scam e-mail message might look like.
    Example of a phishing e-mail message, which includes a deceptive URL address that links to a scam Web site

    Spam indiscriminately send unsolicited, unwanted, irrelevant, or inappropriate messages, especially commercial advertising in mass quantities. Noun: electronic "junk mail".

    Spyware Software that sends information about your Web surfing habits to its Web site. Spyware is often installed without the user's knowledge or explicit permission in combination with a free download.

    URL acronym for "Uniform Resource Locator," this is the address of a resource on the Internet. World Wide Web URLs begin with http://

    Virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.

    Those interested on knowing more, please follow this link:-