An Internet scam in which corrupt parties "phish" (pronounced "fish") for your personal information by attempting to lure you to click on a link in an email. You will then be directed to what looks like an official web site, where you'll be encouraged to enter personal information. The fake web site appears as though it is that of a real company (with which you might have a relationship) but it is merely a means to steal information.


A pop-up is a small window or mini-Web page that "pops up" on your monitor when you visit a web site or click a link that activates it. Pop-ups are best known for displaying advertising on web sites, but they are also used to present photo enlargements (when you click on a thumbnail photo), or as small control panels conveniently separated from a main page. You can close a pop-up by clicking a button or link word; some are programmed to close after a set number of seconds or minutes. A pop-up is essentially the same as any other web page except that it usually appears in a much smaller format and contains only content -- no tool panels, status bar, etc.

Proxy Server

A proxy server is a kind of server (a computer that delivers or "serves" information to other computers). The proxy links the user (often the Web browser on your personal computer, or a computer in a network or group) and another main server. The proxy can store information, so that if more than one user requests the same data, it delivers it, eliminating the need to tie up the main server. The proxy can also filter transmissions, and is often used in workplace networks to screen out unwanted communications.

Point-to-Point Protocol (PPP)

PPP is the standard for the Internet data transfer technology known as serial communications. Its predecessor, SLIP (Serial Line Internet Protocol), was less stable and had fewer functions. PPP defines how your modem connection exchanges packets of data with other systems on the Internet; it can also compress data and detect errors in the transmission.

Portable Document Format (PDF)

A format for computer documents that allows them to be viewed and printed with a wide variety of software packages. The format was developed by Adobe Systems and requires that you have the company's Adobe Acrobat Reader software -- available for free.

Post Office Protocol (POP)

One of two forms of technology that allow your computer to retrieve email messages from the Internet or a network of computers. The other, newer protocol is IMAP (Instant Message Access Protocol). Outbound messages are sent with SMTP (Simple Message Transport Protocol).

Port 25, Port 25 Blocking

Port 25 blocking prevents spammers from sending masses of unauthorized junk email. Port 25 is the port, or connection, on your computer through which most outgoing emails must pass.

A few things to keep in mind so that you are not lured into a scam:

  • Always be suspicious of any email that asks for personal account information, such as your username, password, account number or any other personal data. Just because it looks like it came from an authentic source, doesn't mean that it did.
  • Be aware that we at Frontier never ask customers for password information via email.
  • Also, Frontier will never ask for billing or payment information via email.
  • Always ensure that you're using a secure server when submitting credit card information online. To make sure you're using a secure server, check the beginning of the web address in your browser's address bar—it should be https:// rather than just http://.
  • Contact your bank or credit card company if you think you may have replied to a fraudulent email with sensitive personal information.

You can find more information on "phishing" by visiting:


Web sites that are commonly fooled by scammers include: