idology.com

Website:https://www.idology.com/
Upvotes received3
Downvotes received3
Karma:-1 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (51)

1

1 Thumbs up   2 Thumbs down

Malware


Any software or computer program that is designed to intentionally damage or disable computers or computer systems.  Malware examples are computer viruses, trojan horses, and spyware.
Source: idology.com

2

1 Thumbs up   0 Thumbs down

Dark Web


the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser. People who access and utilize the Dark Web wa [..]
Source: idology.com

3

1 Thumbs up   1 Thumbs down

Friendly Fraud


Friendly fraud, also known as friendly fraud chargeback, is a credit card industry term used to describe a consumer who makes an Internet purchase with his/her own credit card and then issues a charge [..]
Source: idology.com

4

0 Thumbs up   0 Thumbs down

Voice Over Internet Protocol


phone service over the Internet.
Source: idology.com

5

0 Thumbs up   0 Thumbs down

Voice over Internet Protocol


phone service over the Internet.
Source: idology.com

6

0 Thumbs up   0 Thumbs down

voice over Internet Protocol


phone service over the Internet.
Source: idology.com

7

0 Thumbs up   0 Thumbs down

Vishing


This is a variation of phishing in which the criminal fishes for personal information or attempts to install malicious software on a computer through a video file.
Source: idology.com

8

0 Thumbs up   0 Thumbs down

Virus


A computer program that replicates itself to infect computers.  Viruses are typically spread from one computer to another through executable code in an infected file
Source: idology.com

9

0 Thumbs up   0 Thumbs down

tor


free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwide, vol [..]
Source: idology.com

10

0 Thumbs up   0 Thumbs down

Spear phishing


Phishing email that looks as if it came from someone you know.  Typically the email contains a file that when opened will infect your computer with a bot or a key logger or something equally as bad.
Source: idology.com


To view all 51 definitions, please sign in.