Network Chico Computer Consulting home pageNetwork Chico security terms glossary

Network Chico Domains

Start Your Domain Name Search Here!
Enter a Domain Name:
www.

Network Chico Domains

Domain names, transfers, web hosting, email, SSL and more.

www.ChicoDomains.com

Network Chico proudly accepts VISA cards Network Chico proudly accepts MasterCard Network Chico proudly accepts Discover cards Network Chico proudly accepts American Express cards

Search Network Chico:

Network Chico Domains Hosts web hosting solutions, servers, web sites Network Chico Domains is your one stop shop for all your domain name registration needs including transfers, bulk handling and more. Network Chico Domains offers SSL, EV SSL secure certificates, certified domains, verification, vetting Network Chico Domains offers free email with every domain name purchase Network Chico Domains cares about the privacy of its customers and you'll love the selection of privacy options available for your new domain name. Network Chico Domains has a variety of ecommerce solutions to fit your business needs Network Chico Domains makes it easy to add a quick shopping cart to your new website. Network Chico Domains makes it easy for you to create your own web site tonight! Network Chico Domains offers web tracking, statistics, marketing tools and more for monitoring and promoting your new domain name and website.
Home About Contact Resources Security Services Support Linux Mac OS Windows Search Site map Help

NetChico
Network Chico
Network Chico Domains
Reseller Programs
 Secure Login to the new and improved Network Chico Domains Account Manager
 Secure Login to your Network Chico Reseller Account
Jobs Chico
Jobs Chico CA
Jobs Chico CA.com
Shop NetChico
About Network Chico
Domains Account Manager
FAQ
Links
Reseller Accounts
Billing
Domains Shopping Cart
Reseller Shopping Cart
Contact Network Chico
New Domains Account
Domains Account Manager
Domains Email Support
Mailing List
Computer Consulting Forums
Send email online
Site referral
Twitter
Computer Services
Consulting
Content Management
Custom built PCs
Custom Logo Service
Recycling
Remote Data Backups Service
Special offer
A+ Certified IT Technician designation
Internet Chico Computer Web Hosting Custom Website Design Domain Name Appraisals Domain Keywording Domain Name Forums Domain Transfers Backorder Domains Email Hosting Free hosting guide Getting started guides Legal agreements Merchant accounts Online Photo Album Hottest Reseller Program Reseller Programs SSL Certificates Hosting Private Registration Deluxe Registration Protected Registration Quick Shopping Cart Forwarding & Masking Business Registration Certified Domain Internationalized Domains Search Engine Visibility WebSite Builder Help Center Reseller Help Center SecurePaynet .me  GoHTTPS Computer Security Anti-virus security Current threats Email security Firewall security Intrusion prevention Network security Password security Registry security Secure Windows PC Privacy Security terms Server security Spyware security Web browser cookies Wi-fi security Internet Resources NetChico Links Directory Link partners Open directory WhoIs Client Support Area Articles Freeware Glossary Domains Support Linux Linux FAQ Linux history Linux news Linux security Linux tips Mac OS Mac OS security Mac maintenance tips Mac OS news Mac OS key combinations Windows Windows news Windows security Windows startup items Windows tips and tricks News Domains News Announcements Netchico compute News archive Search engine optimization Search engine submission Manual submission Site map Tech connection Computers plus more Network Operations Fun facts Product name generator Help Blogs: Define Domain Hosting Blog Define Domain Name Hosting Define Hosting Blog Domain Names Define Hostname Domains and Hosting Blog GoHTTPS Blog Web Hosting Soon Blog Domain Host Soon Reseller Blog Unlimited Reseller Hosting Reseller Hosting Soon Domain Reseller Program Web Server Soon South Virginia Street Reno Information Domains: Calendar .INFO domains 420 Evans Free Hosting Apache Linux Free Hosting Audacity Unlimited Free Hosting Best Mailing Lists CA Chico WebSite Tonight® Chico Computer Repair Chico Computers Chico DNS Chico Domain Names Chico Domains Chico Hosting Chico Hosts Chico Internet Domain Country Code Domains Chico ISP Free Hosting Chico Linux Dedicated Servers Chico Name Registration Chico PC Service Network Chico Reseller Program Site Surveys Chico Web Hosting & Servers Computer Products Systemax Custom PC's Computer Consulting CA Computer Repair Chico DNS dot DNS Web Systems Free Hosting Domain Names Available Domain Names Registration & Hosting Domain Reseller Store Dot Com Shop Eccles Securities Free Hosting File Cabinets Future Risk Consulting Host Chico Free Hosting Hosting Chico Internet Chico Free Hosting ISP Chico Free Hosting Linux Chico Network 4 PHP Free Hosting Network Chico Free Hosting Network Chico Domains Data Center NetChico Domain NetChico Domains Network Chico Domains Email Product Catalog Network Chico Domains Hosting Dedicated Servers Register Domains Transfer Domains Bulk Registration Network Chico Reseller Program Network Chico Domains SSL Custon Website Design Network Chico Domains Web Host Network Chico Domains Web Hosting NetMynX Free Hosting PHP MySQL Network Chico Reseller Program Network Chico Domains Network Computer Consulting Night Vision Central Nurse Hosting Office Supplies OurChico Free Hosting PDA and Handheld Pop-up Blocking Printers and Supplies Registration Web Domain Reno Computer Service Reseller Domains RFID Reseller Account Shop NetChico Free Hosting TNCC Free Hosting Turnkey Domain Reseller Turnkey Hosting Reseller Turnkey Web Hosting Reseller Virtual Private Networking Web Chico Free Hosting Web Hosting Chico Free Hosting Web Hosting Consultant Web Hosting Consulting Web Hosting Soon Free Hosting WiFi Central Wild Horse Prop XXX Domains(adult content) XXX TLD(adult content) Audacity X(adult content)
prog_id= 1ncd.com Network Chico Domains Domain Search DomainsNC.com Domains Network Network Domains Best Fax Machines Chico Computer Repair Chico PC Service Computer Chico Computer Consulting CA Computer Repair Chico Computers Chico Define Domain Hosting Define Domain Name Define Hosting Define Hostname Domain Names and Hosting Free Social Space Go HTTPS Hosting IP Address Hosting IP Addresses Hosting IP Dedicated Reseller Hosting Introvert .biz Resell Domains Reseller Agreement Reseller Programs Reseller Soon SecurePayNet Chico SmartSpace® VOIP

Free hosting php mysql Free hosting php ftp Free hosting mysql Free web hosting mysql

ICANN My Account What's New Reseller Program About Us FAQ Support: 480-624-2500Logout

Network Chico security terms glossary

| @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |

Search the security terms glossary:

Welcome to the Network Chico computer security terms glossary.

=S=

Search Hijacker: Any software that resets your browser's settings to point to other sites when you perform a search. Hijacks may reroute your info and address requests through an unseen site, capturing that info. In such hijacks, your browser may behave normally, but be slower. Search results when such a hijacker is running will sometimes differ from non-hijacked results.

Simplicity: The amount of effort required to exploit a vulnerability. Some attacks against systems can be more difficult to exploit than others. Some exploits merely require inputting a command string, while others involve compiling code and executing the resulting program under an explicit set of conditions. For example:

  • 1, 2, 3 Complex: Detailed computer security knowledge and experience is required, and exploit techniques are difficult to obtain or execute
  • 4, 5, 6, 7 Simple: General computer security knowledge is required, and exploit techniques are easily obtained and executed
  • 8, 9, 10 Extremely Simple: Unskilled attackers can easily obtain and execute exploit techniques. Typically, compiled binaries or GUI exploit tools are readily available

Slack Space: In more general usage, slack space is the disk space 'wasted' by the difference between a file's real size and the minimum storage unit of the file system storing it. For example, on a FAT32 file system under Windows 9x, disk cluster size may be 4KB (4096 bytes). What this means is that regardless of their actual sizes, all files from 1 to 4096 bytes will remove 4096 bytes of free disk space from the drive as the file system cannot allocate drive space in units smaller than a cluster. Thus, if you created ten one byte files, despite having only stored ten bytes of data, you will have used 40960 bytes of disk space. In a sense this is a waste of 40950 bytes of disk space, which is said to be 'slack space'. (There are solutions to this 'problem' of wasting disk space, such as sub-block allocation methods and the like, and these are employed in more advanced file systems.) An important thing to be aware of is that few popular operating systems overwrite this unused space between the end of a file and the end of the last cluster the file occupies. Thus, pieces of 'inert' virus code can be found in various kinds of 'slack space'. Whilst this is unlikely to be seen when scanning files, such code may be detected in memory and incorrectly reported as an active infection once the contents of (cluster-sized) disk buffers are copied elsewhere (see Ghost Positive for an example with boot sectors). There are, however, other kinds of slack space that can be of more significance to virus writers. For example, the internal format of Win32 portable executables (the PE format) is section based, with files consisting of a header and one or more sections containing code, data resources and the like. Each section, including the header, is 'padded out' to the nearest whole multiple of the file alignment size (which is specified in the header). This arrangement means that PE files can contain sections that do not completely fill the last section assigned to them in the file, just as the final cluster assigned to a file may not be filled. Some viruses have taken advantage of this section slack space, perhaps most notably CIH (see also Multiple Cavity Infector).

Slow Infector: Most resident viruses attempt to maximize their hit rate by infecting at least the commonly used programs on a system. Some go so far as to attempt to infect all possible targets (see Fast Infector). However, infecting many targets tends to increase the likelihood of being detected so some resident viruses only infect files as they are modified or created. This beats integrity checking methods, as the addition of a new file or modification of an existing one reported by an integrity checker would normally be expected so the user will ignore the reported change, assuming it to be entirely due to (legitimate) reasons for the file's creation or modification. An early example is the Darth Vader virus. A related, though different, technique for reducing the likelihood of detection is that of the sparse infector.

Slow Mailer: A slow mailer is a virus that distributes itself from victim machines via e-mail but not in the 'explosive' manner attributed to mass mailers. Ska (aka Happy99) and Kak are classic examples of slow mailers, respectively sending itself once to each addressee the victim sends e-mail to or embedding itself in all outgoing HTML messages the victim sends. Despite the mass mailers such as Melissa and LoveLetter hogging the media spotlight, Ska and Kak are also excellent examples of how slow mailers 'last the distance'. For example, several sources of prevalence statistics show roughly twice as many Kak incidents in 2000 as LoveLetter incidents, with the explosive nature of LoveLetter - then the most prevalent virus in history - seen in the fact that most LoveLetter incidents were recorded in a single month (May). Slow mailers often have the '@m' suffix to their names, making the additional threat they may pose readily identifiable to the informed.

Slow Polymorphism: A term occasionally applied to polymorphic viruses that only morph their code 'occasionally' rather than each time they replicate, as is more common. This is an 'anti-antivirus research' technique.

Sneakernet: The network of inter-personal contacts that existed before ethernet made LANs commonplace and long before the Internet as we know it today existed. The name is a play on 'sneaker' and 'ethernet' and refers to the sharing patterns seen when data files and programs were mainly distributed and copied between workmates, other professional colleagues and friends via diskette. As all diskettes have boot sectors and most PCs will attempt to boot from a diskette left in a floppy drive, boot sector infectors were the most prevalent viruses when sneakernet was the predominant sharing mechanism.

Sniffer: A wiretap that eavesdrops on computer networks. The attacker must be between the sender and the receiver in order to sniff traffic. This is easy in corporations using shared media. Sniffers are frequently used as part of automated programs to sift information off the wire, such as clear-text passwords, and sometimes password hashes (to be cracked).

Social Engineering:

  1. There are two main ways to obtain technical or administrative information about a computer system. The first is from the machines and systems themselves and the second is from the administrators and users of the machines. Surreptitious or unauthorized attempts to obtain such system information are known as hacking or cracking if the attempt involves obtaining the information from the machines and as social engineering if they involve manipulating or 'tricking' a person into divulging the information.
  2. By extension of the previous meaning, the term social engineering is often used to describe the 'tricks' used by mass mailing viruses to entice recipients messages with viral attachments to run (or 'view') those attachments.

SOCKS Proxy: Socks (or "SOCKS") is an IETF standard protocol for TCP/IP-based networking applications. A proxy server (a server that sits between a client application and a real server) can use SOCKS to accept requests from clients so that they can be forwarded across the Internet. Socks uses sockets to represent and keep track of individual connections. SOCKS proxy servers are widespread, and used legitimately for improving system performance, caching web pages and filtering client requests. Unfortunately, SOCKS proxy servers can also be used for undermining system security; attackers can hide their IP address by "bouncing" their requests off a victim’s computer with an open SOCKS proxy.

SPAM Tool: Any software designed to extract email addresses from web sites and other sources, remove ""dangerous"" or ""illegal"" addresses, and/or efficiently send unsolicited (and perhaps untraceable) mail to these addresses.

Sparse Infector: Although not an approach to beat integrity checking, like slow infection methods, sparse infection is also an approach to reduce the chances of early detection. The main idea is to replicate only occasionally; for example, only infecting one in every 100 programs that are executed. Another approach a sparse infector may take to deciding which files to infect is to only target files that meet certain criteria such as having a size divisible by a particular value or with a creation date of a certain day of the month and so on.

Spoofer: To spoof is to forge your identity. Attackers use spoofers to forge their IP address (IP spoofing). The most common use of spoofing today is smurf and fraggle attacks. These attacks use spoofed packets against amplifiers in order to overload the victim's connection. This is done by sending a single packet to a broadcast address with the victim as the source address. All the machines within the broadcast domain then respond back to the victim, overloading the victim's Internet connection. Since smurfing accounts for more than half the traffic on some backbones, ISPs are starting to take spoofing seriously and have started implementing measures within their routers that verify valid source addresses before passing the packets.

Spyware Cookie: Any cookie that is shared among two or more unrelated sites for the purpose of gathering and sharing private user information. See also the Network Chico browser cookie page.

Spyware or Spy Ware: A program that gathers information and can be 'silently' installed and run in 'stealth' mode. This kind of software is used to gather information from a user's machine, such as recorded keystrokes (passwords), a list of websites visited by the user, applications installed on the machine, the version of operating system, registry settings, etc.

SR-1: Service Release 1. A Service Release is an incremental update and/or bug-fix version of an application, similar to the better-known term Service Pack (or SP). SR-1 is usually of significance in antivirus issues when talking about Word 97 SR-1, as this release introduced some subtle changes to Word's VBA environment that had implications for the replication mechanisms of most Word macro viruses written prior to its release. (See also Class Infector.)

Stealth Virus: Aside from infecting seldom (see Slow Infector and Sparse Infector), some viruses take other steps to make themselves difficult to detect. For example, stealth boot viruses intercept attempts to read the boot sector (where they reside) and return copies of the original boot sector so it is seen as it was prior to infection - the first PC virus, Brain, is an example of this. More sophisticated boot sector stealth also intercepts write functions, preventing the viral code being overwritten and perhaps redirecting such writes to the 'safe' copy of the original boot sector. Stealth file infectors typically hide any file size increases they are responsible for when a file's properties are read from the disk - Number of the Beast and Frodo were early examples. Macro viruses have also attempted many stealth techniques, such as replacing the standard list of macros with a list from which the virus' macros are missing, and preventing users from accessing the Visual Basic Editor. For their stealth functions to work, a virus must be 'resident'.
With executable viruses, this residency means the virus' modifications go undetected by antivirus programs as well as preventing the user from noticing changes (such as in file sizes and the like). However, with macro viruses, such stealth mechanisms only help prevent the user noticing or reporting changes because virus scanners look directly at the document files containing the viruses and are not dependent on internal functions of Word - the only functions a macro virus can usurp - in order to detect these viruses. In general, to counter stealth mechanisms you must be able to re-establish a 'clean' environment. With boot and program stealth, restarting from a clean system is necessary to ensure there is no possibility of the normal system functions being interfered with. With stealth macro viruses a clean user environment is needed. This can be attained by assuring that all global templates and other code resources that may be loaded during the host application's startup phase, and as a result of loading a (potentially) infected document, do not get a chance to run.

Surveillance: Any software designed to use a webcam, microphone, screen capture, or other approaches to monitor and capture information. Some such software will transmit this captured information to a remote source. See also Key Logger.

SYN Flood Attack: In the normal course of a TCP connection, a SYN (TCP connection request) is sent to a target computer. When the target computer receives the SYN, it sends a SYN_RECEIVED message back to the machine that sent the SYN (reading the IP source address of the originating packet). The target computer then waits for the machine that originated the request to send back a SYN_ACK upon receipt of its SYN_RECEIVED message (this SYN-RECEIVED state is saved in a buffer either until the ACK is received or until the request has been waiting for a particular finite period of time and is then purged). When this "three-way" handshake is completed, data can travel freely between the two computers. During a SYN Flood Attack, a SYN is sent to the target computer, however the source IP address is spoofed. The target computer attempts to send its SYN_RECEIVED message back to the originating IP address of the SYN, however, because the address is spoofed, this message will either be sent to an IP address that does not exist or to a computer that did not send the original SYN (and therefore will ignore this message). When this occurs, the target machine may send several more SYN_RECEIVED messages, and wait for a finite time for a SYN_ACK that will never come, storing this information in a buffer. The more of these spoofed packets that are sent to the target computer, the more system resources that are used on the target computer. Once the limit is reached for a given TCP port, the target computer responds by resetting all further connection requests until system resources are freed. The result of this attack is a Denial of Service.

System Boot Sector: A seldom used term denoting the boot sectors at the beginning of disk partitions and other logical drives such as floppies and some other removable drives. This term is used in the glossary to denote the set of boot sectors excluding master boot records.

| @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |


Check out the Network Chico security resources for links to more information.

Windows security at Network Chico Mac OS security at Network Chico Linux security at Network Chico

Additional security pages: | Anti-virus | Browser cookies | Email | Firewall | IPS |

| Network | Passwords | Server | Spyware | Terms | Wireless |

View current Windows security threats from:


  • Network Chico forums The Network Chico forums have sections devoted to Mac OS, Windows and Linux security
  • Network Chico mailing list Your email address will never be sold or given to anyone
  • Search Network Chico Search Network Chico
  • Send Network Chico email online Send Network Chico email via this online form
  • Network Chico site referral Recommend the Network Chico web site to others

  • Network Chico home page About Network Chico Services available from Network Chico Network Chico client support area Network Chico computer security Internet resources at Network Chico Contact Network Chico


    Home About Contact Resources Security Services Support Linux Mac OS Windows Search Site map Help

    Network Chico Domains Hosts web hosting solutions, servers, web sites Network Chico Domains is your one stop shop for all your domain name registration needs including transfers, bulk handling and more. Network Chico Domains offers SSL, EV SSL secure certificates, certified domains, verification, vetting Network Chico Domains offers free email with every domain name purchase Network Chico Domains cares about the privacy of its customers and you'll love the selection of privacy options available for your new domain name. Network Chico Domains has a variety of ecommerce solutions to fit your business needs Network Chico Domains makes it easy to add a quick shopping cart to your new website. Network Chico Domains makes it easy for you to create your own web site tonight! Network Chico Domains offers web tracking, statistics, marketing tools and more for monitoring and promoting your new domain name and website.

    | Chico Domains | Chico Hosts | ChicoISP | ISPChico | Web Hosting Chico | Chico Domain Names | Chico Name Registration |

    | NCD hosting | NCD account | 419585 | Domain Names Registration and Hosting | Free Hosting Hosting | Registration Web Domain |


    1 SecurePaynet.net | Apache Linux Hosting | A SecurePaynet.net | Chico Domains | Chico Hosts | Chico ISP | ISP Chico | Linux Chico | Web Hosting Chico

    419585 | Chico Domain Names | Chico Name Registration | Domain Names Registration and Hosting | Registration Web Domain | Web Chico

    Chico California | Chico California | Chico California US | Chico California | Dedicated Hosting IP | Domain Reseller Store | GdShop | SecurePaynet Reseller

    Chico Advertising | Chico Cart | Chico Domain | Chico Email | Chico Marketing | Chico Merchant | Chico PR | Chico SSL | Domain Yourselfilly

    Chico Datacenter | Chico Servers | Chico Technology | Macho Web Hosting | Web-Control-Panel | Website Chico | Win Startups

    Computer Consulting Name | Computer Consulting Names | Random Password Generator | Reseller Support Forum | WWW Domains Hosting

    Create It For Me | Custom Create It For Me | Custom Web Site | Custom Web Site Design | Hottest Reseller Program | SSL Support Pack

    Chico Domain Name | Domain Chico | Domains Chico | Domain Name Chico | Domain Names Chico | Domains For Sale

    Domain Tool | Domains Host | Domains Host | Domains Host | Hosting Server | Hosting Server | Reseller Program | Reseller Program

    Domain Secondary | Domain Market Secondary | Domain Name Secondary | Domain Name Secondary Market | Secondary Aftermarket

    Domain Lookup | Domain Name Check | Domain Names Who Is | Domains Email | Domains Reseller | Domains SSL | Reseller Of Hosting

    Computer Consulting | Green Domain Name | Business Registration | Protected Registration | Green Hosting | Green Hosting Technology





    Get the Web Site or Logo you've always wanted for less than you ever imagined!

    NEW! Custom Web Site Design puts the professional design staff to work for you!
    Simply choose a professionally designed template and they'll build an eye-catching Web site just for you, complete with your images and text.

    The "Create it For Me" plan includes up to 5 professionally-built pages, world-class Web hosting, 30 minutes of monthly site updates and more, while the "Custom Create it For Me" plan offers additional pages, plus a custom header and complementary graphics for your Web site.

    And if you need a unique visual identity for your business or group, the Custom Logo Design service will give you a memorable look online and off! Just talk to one of the professional designers and they'll create three custom designs for you to choose from. Visit CustomLogoService.com to learn more.

    Visit Network Chico Domains now to find out how the Custom Web Site Design staff can give your business or organization a sleek, professional look on the Web and off!

    Thanks as always for being a Network Chico Domains customer.




    Network Chico Domains ... "Domains, they're delicious."

     

    Network Chico Domains

    https://www.ncdomains.com/

    "domain yourself silly"

    Domain Yourself Silly .com

    Web Hosting plans from just $5.99/month!


    Need Web Hosting? Get Web Hosting Soon!

    Define Hosting | Host Soon | Hosting Soon | Reseller Hosting Soon | Server Soon
    Define Domain Hosting | Define Domain Name | Define Hostname




    Store Home | Catalog | Shopping Cart | My Account | Help Center | Support | Whois | Legal Agreements | Jobs Chico CA

    Help | Mark Eccles | NetChico | Privacy policy | Search | Shop | Site map | TNCC | 419585 | 420592 | gdshop | free hosting php | free 150 | Reseller Program

    Domain Names | Web Hosting | SSL Certificates | Email Hosting | eCommerce Cart | WebSite Tonight | SmartSpace®

    Create A New Network Chico Domains Customer Account

    Create a New Network Chico Domains Customer Account

    A+ Certified IT Technician Designation

    Domains | Secure Server | Reseller Program Secure Server

    Web Store | Reseller Hosting | Reseller Hosting Soon

    ePaynet.net | SecurePaynet .me | SecurePaynet.net | www.SecurePaynet.net

    Copyright © 2018 by Network Chico Domains/Hosting The Network Chico Company All rights reserved.

    Network Chico proudly accepts VISA cards Network Chico proudly accepts MasterCard Network Chico proudly accepts Discover cards Network Chico proudly accepts American Express cards

    NetChico | Chico | Chico Ca | Chico Hosting | Jobs Chico | Jobs Chico CA