Basic Computer Terms Explained
Please read the terms below, takes some notes if you have to and try to keep everything straight.
1.) Registry - this is the brain of a windows computer without this your computer WOULD NOT FUNCTION AT ALL. It determines what programs start, what data they start with and when they start, the registry is not something to take lightly and should not be messed with by any one lacking knowledge on the subject.
2.) Remote Administration Tool (RAT) - this is a program that hackers use to gain access into computers, there are several legitimate RAT's on the market such as team viewer. A RAT allows a hacker to do pretty much anything he would like to your computer, from stealing your files and taking videos with your webcam of you, to annoying you by playing music from his hard drive to your computer speakers.
3.) Keylogger - a keylogger does exactly what it sounds like it does. It logs all the keys pushed on the keyboard of an infected computer. That information is then mailed or transferred to another computer were a hacker, or hackers, goes over it looking for important data, like usernames and passwords, to either sell or use personally.
4.) IP Address - IP means internet protocol should be an important number to you granted a hacker can't do much with it to a point but it's almost like giving out your address to a random person. To view your IP address go to http://whatismyip.com then go here http://www.ip-adress.com/ip_tracer/ and see what data it displays for your IP address and you will see how vital it can be to protect it.
5.) Port - this can either be physical or virtual. A physical port is all those opening on your computer such as a USB slot or a printer or mouse connection. A virtual port are things that are used on the internet such as for sending emails and transferring files or opening web pages. Some virtual port examples include: 21, 23, 80, 25, 80, 79, and 110.
6.) HTML - is the basic language that creates web pages just like the one your on now every web page is coded in some form or another using HTML code.
7.) Proxy - there are several types of proxies ranging from HTTP proxies to SOCKSv5 proxies they change a hacker or computer users IP address to a different number, there are millions of publicly available proxy IP addresses. An example site is here http://www.ip-adress.com/proxy_list/ this allows a user a level of anonymity in browsing the web.
8.) Operating system - this is the actual system inside the computer that is installed in the factory before it shipping some examples are Windows XP, Windows Vista and Windows7.
9.) Programming Language - programming languages are what is used to make the thousands of available computer software programs. Along with things like exploits and even to code how hardware interacts with software. Some examples of these languages are C, C++, Perl, Ruby, and Visual Basic.
10.) Hardware - hardware in computer speak pertains to things such as printers, mice, keyboards, and the cards inside your computer such as sound and video cards .
11.) Software - is usually referring to actual programs and virtual data like applications that end in .exe these are called executable files on windows and run programs such as Internet Explorer or Firefox.
12.) Command Prompt - A simple command line interface in windows that allows things such as telnet and email spoofing it can be accessed via start > run > and typing CMD.
13.) Email spoofing - is when an attacker fakes where an email originated by using either software or a freely available website to trick a victim into opening the email and using the files or links attached to it.
14.) Phishing - is the creation of an ILLEGAL fake log in page to steal a users information such as on Facebook or MySpace a fake log in page would be created to remotely harvest a users log in name and password so the hacker could then later gain access to the account.
15.) BruteForcing - is when an attacker attempts to use a list or lists of common user names and passwords to attack a website to gain access via another persons account, thus using "brute force" to get into an account. This technique is mostly used on XXX sites, vulnerable bank sites, and other vulnerable sites that an attacker wants access to.
1.) Registry - this is the brain of a windows computer without this your computer WOULD NOT FUNCTION AT ALL. It determines what programs start, what data they start with and when they start, the registry is not something to take lightly and should not be messed with by any one lacking knowledge on the subject.
2.) Remote Administration Tool (RAT) - this is a program that hackers use to gain access into computers, there are several legitimate RAT's on the market such as team viewer. A RAT allows a hacker to do pretty much anything he would like to your computer, from stealing your files and taking videos with your webcam of you, to annoying you by playing music from his hard drive to your computer speakers.
3.) Keylogger - a keylogger does exactly what it sounds like it does. It logs all the keys pushed on the keyboard of an infected computer. That information is then mailed or transferred to another computer were a hacker, or hackers, goes over it looking for important data, like usernames and passwords, to either sell or use personally.
4.) IP Address - IP means internet protocol should be an important number to you granted a hacker can't do much with it to a point but it's almost like giving out your address to a random person. To view your IP address go to http://whatismyip.com then go here http://www.ip-adress.com/ip_tracer/ and see what data it displays for your IP address and you will see how vital it can be to protect it.
5.) Port - this can either be physical or virtual. A physical port is all those opening on your computer such as a USB slot or a printer or mouse connection. A virtual port are things that are used on the internet such as for sending emails and transferring files or opening web pages. Some virtual port examples include: 21, 23, 80, 25, 80, 79, and 110.
6.) HTML - is the basic language that creates web pages just like the one your on now every web page is coded in some form or another using HTML code.
7.) Proxy - there are several types of proxies ranging from HTTP proxies to SOCKSv5 proxies they change a hacker or computer users IP address to a different number, there are millions of publicly available proxy IP addresses. An example site is here http://www.ip-adress.com/proxy_list/ this allows a user a level of anonymity in browsing the web.
8.) Operating system - this is the actual system inside the computer that is installed in the factory before it shipping some examples are Windows XP, Windows Vista and Windows7.
9.) Programming Language - programming languages are what is used to make the thousands of available computer software programs. Along with things like exploits and even to code how hardware interacts with software. Some examples of these languages are C, C++, Perl, Ruby, and Visual Basic.
10.) Hardware - hardware in computer speak pertains to things such as printers, mice, keyboards, and the cards inside your computer such as sound and video cards .
11.) Software - is usually referring to actual programs and virtual data like applications that end in .exe these are called executable files on windows and run programs such as Internet Explorer or Firefox.
12.) Command Prompt - A simple command line interface in windows that allows things such as telnet and email spoofing it can be accessed via start > run > and typing CMD.
13.) Email spoofing - is when an attacker fakes where an email originated by using either software or a freely available website to trick a victim into opening the email and using the files or links attached to it.
14.) Phishing - is the creation of an ILLEGAL fake log in page to steal a users information such as on Facebook or MySpace a fake log in page would be created to remotely harvest a users log in name and password so the hacker could then later gain access to the account.
15.) BruteForcing - is when an attacker attempts to use a list or lists of common user names and passwords to attack a website to gain access via another persons account, thus using "brute force" to get into an account. This technique is mostly used on XXX sites, vulnerable bank sites, and other vulnerable sites that an attacker wants access to.