G-M
Gnutella
Program designed to allow people to "share" audio
and video files with each other over a distributed network.
See
Napster.
Hacker
Slang name given to someone extremely knowledgeable about
computers. Pejorative in some circles—but not here. See
Cracker.
Hacking
The process of examining and experimenting with something, such
as the telephone system or a computer, in order to find out how it works.
Hacking often occurs without the owner's knowledge or
permission.
Hacktivism
Form of protest that uses computer skills, mostly focusing on
website defacing, to spread a message. See
Web site defacing.
Hate
group
An organization or collection of people who advocate violence and
discrimination against another group of people. Usually motivated by religious
or racial differences.
Heuristic
analysis
Sometimes called rule-based or artificial intelligence analysis,
it uses intelligent guesswork, which more often than not finds the solution
faster than a standard algorithm. Antivirus programs use heuristic analysis to
examine a file, and based on typical virus characteristics, make an educated
guess as to whether a file is infected or not.
Hex
editor
A program that can directly examine and modify the contents of a
file or disk.
Honeypot
A phony target used to tempt hackers. Often used to keep hackers
logged on to a system long enough to trace their location, or to lure a hacker
into a harmless part of a network so that he or she can't get out and cause
real damage . Also called a goat file.
ICQ
Popular instant messaging program.
Identity
theft
Passing yourself off as another person
electronically.
Information
warfare
Popular term to describe hacking on an individual, commercial,
and international level.
Integrity
checker
A program that examines each file and calculates a numeric result
based on that file's size, time, and date stamp. If the integrity checker
notices that the file's size, time, or
date has changed, it assumes the file may have been infected by a virus or
modified by a hacker. See
Checksum.
Intrusion-detection
system
Program designed to detect the presence of a hacker who has
already penetrated a system. Often abbreviated as
IDS.
IRC
(Internet Relay Chat) A loosely structured network where people
can type and send messages to each other in real time.
Java
Cross-platform programming language used to create web page
applets and full-blown applications.
Keystroke
recorder
A program that records keystrokes and/or mouse clicks on a
computer, usually without the user's knowledge.
Linux
A free version of Unix designed for personal computers. Although
Linux can be copied and distributed without restriction, many companies sell
their own versions of Linux that include technical support, software, or other
value-added services.
Logic
bomb
A type of program, often buried within another program, that is
set to go off on a certain date or by a specific event, erasing data or
crashing the computer. Logic bombs are often inserted by disgruntled
programmers willing to sabotage their own programs to get back at their
employers.
Macro
virus
A virus written using the macro programming language of a
particular program. The most common macro viruses are written in WordBasic or
Visual Basic for Applications, although a few macro viruses have been written
in the macro programming language for WordPerfect and Lotus 1-2-3.
See
Visual Basic for
Applications.
Master Boot
Record
(MBR) The information stored on a hard disk that tells the
computer how the hard disk is partitioned. Most hard disks have only one
partition but can usually be divided into as many as four
partitions.
Michelangelo
virus
A virus that made headlines in all the major newspapers worldwide
in 1992. The Michelangelo virus isn't as common as many other
viruses.
MP3
Acronym that stands for Moving Picture Experts Group (MPEG) Audio
Layer- 3, a file compression format for storing digital audio.
See Napster and Gnutella.
Multipartite
virus
A type of virus that can infect both files and boot
sectors.
Mutation
engine
A programming tool kit designed to help virus writers create
polymorphic viruses, which can modify themselves to avoid detection by
antivirus scanners. See
Polymorphic virus.