A wide variety of non-viral but nevertheless malicious software programs that are typically loaded onto a personal computer without the user's knowledge, via an Internet or network connection. Spyware can steal your personal information, switch your homepage, redirect your Web searches, display annoying ads, slow your PC to a crawl, or even control it remotely. Spyware comes in many shapes and sizes; some forms are simply an annoyance, while others threaten security. Some common types of spyware are: General Spyware, which tracks information about you, your computer, and your surfing habits; Adware, which displays unwanted advertising that can slow your computer to a crawl; Key loggers, which can record every keystroke you make, then steal your passwords and other personal data; Browser Hijackers, which can change your homepage and search results; Remote Access Trojans (RATS), which allow attackers to remotely control your computer. Software programs called firewalls are available to protect against spyware.
The junk mail of the Internet; unwanted mail that comes to your email address. Spammers often use bulk email programs to send out their unsolicited messages to lists of email addresses. Spammers often obtain these addresses without the recipients' knowledge by "harvesting" them from web sites, mailing lists, newsletters, newsgroups, bulletin boards and other sources. Spam content ranges from ads and promotions to consumer scams. Many Internet Service Providers offer a spam filtering service that isolates spam from your legitimate email messages.
A server is the "master computer" that directs traffic between computers that are hooked up to a particular system.
A voice line, account code, fax line, pager, data circuit, or other recurring transmissions of information. Services are grouped together and billed by account.
Summary reports give an overview of your telecommunications usage with totals and averages. View summary reports by clicking the Summary tab in the main navigation bar.
A computing program that enables users to locate information on the World Wide Web. The user types in keywords relating to a particular topic, and the search engine combs through multiple web sites looking for those keywords. It then returns a list of web sites in which those words are used. Currently, three of the most popular search engines are Google,MSN, and Yahoo.
The communications connection or port, on your computer. It sends instructions from your computer to your mouse, your modem and other components. It's also known as the COM or RS-232 port, after the names of the computing technologies it uses. It's called serial because, although it is composed of nine pins and many wires, the computer sends data on only one of these wires and receives data on one other. All the bits of data have to follow one another on the single wire (in a series), as opposed to the parallel port, where eight separate wires transfer the data.
A service can be split between two or more nodes to allocate a shared resource between different departments. You can split services from the Edit Levels page in Setup.
The Secure Socket Layer (SSL) is a commonly used protocol for managing the security of a message transmission on the Internet.
An SSID is a case sensitive, 32-character unique identifier sent over a wireless local-area network (WLAN) when a mobile device tries to connect to the network.
When you are exchanging email on the Internet, SMTP is the computing technology that keeps the process orderly. SMTP allows emails to be sent (outbound) via the Internet or a network of computers. Emails are retrieved on the inbound side by one of two protocols: POP (Post Office Protocol) or the newer IMAP (Instant Message Access Protocol).