Active X控件 Active X is technology produced by Microsoft that enables different applications to interact easily with each other. 积极X是微软公司生产的技术,使不同的应用程序容易地相互交流。 Forexample, Microsoft Word can be opened in an Internet Explorer browserand specific communications needs to occur between Microsft Word &Internet Explorer. 例如, Microsoft Word可以打开的Internet Explorer浏览器和具体的通信需求,以之间发生Microsft Word中与Internet Explorer中。 Sometimes these communication rules are exploited by malicious applications and they can cause harm to your computer. 有时候,这些通信规则所利用的恶意应用程序,他们可以造成损害您的计算机。
Adware 广告软件 Storage media that are removed from the computer, such as floppy diskettes, tapes, CD-ROM disks. 存储介质是从计算机中删除,如软盘,磁带, CD - ROM光碟磁盘。
Browser Hijackers 浏览器黑客 Browser hijackers are programs that run automatically every time you start your Internet browser. 浏览器黑客的程序自动运行,每次启动您的互联网浏览器。 These hijackers can sometimes control your browser, like Internet Explorer. 这些劫机犯有时可以控制您的浏览器,如Internet Explorer 。 SomeBrowser Helper Objects are really good for expanding your browsercapabilities, but there are others that may not need your permission toinstall and which can be used for malicious purposes like gatheringinfo on your surfing habits. 有些浏览器帮助对象是非常好的,扩大您的浏览器的能力,但也有其他人可能并不需要您的许可,安装和可用于恶意目的,如收集信息在您的上网习惯。 Thiscan cause anything from incompatibility issues to corrupting importantsystem functions making them not only a threat to your security, butalso to your systems stability. 这可能会导致不兼容问题,从腐败的重要制度,以使他们的职能不仅威胁到您的安全,而且对你的系统稳定。
Data Mining 数据挖掘 Data mining is an information extraction activity whose goal is to discover hidden facts contained in databases. 数据挖掘是信息提取的活动,其目标是发现隐藏的事实数据库。 Usinga combination of machine learning, statistical analysis, modelingtechniques, and database technology, data mining finds patterns andsubtle relationships in data and infers rules that allow the predictionof future results. 利用相结合的机器学习,统计分析,建模技术,数据库技术,数据挖掘发现的模式和微妙的关系,数据和推导规则,允许预测将来的结果。 For example: people purchasing wood on the Internet would have painting supplies cross sold to them. 例如:购买木材的人在互联网上有绘画用品交叉销售给他们。 Typicalapplications include market segmentation, customer profiling, frauddetection, evaluation of retail promotions, and credit risk analysis. 典型的应用包括市场细分,客户分析,欺诈检测,评价的零售促销,以及信用风险分析。
Dialers 拨号器 Dialers are a type of software typically used by vendors serving pornography via the Internet. 拨号器是一种常用的软件服务供应商通过互联网从事色情活动。 Oncedialer software is downloaded, the user is disconnected from theirmodem's usual Internet service provider, re-connected to anotherInternet service provider (new dial-up telephone number), and the useris billed at exorbitant rates. 一旦拨号软件下载,用户断开其调制解调器通常的互联网服务提供商,重新连接到另一台Internet服务提供商(新的拨号电话号码) ,用户在高昂的结算利率。 Dialersdo not "spy" on their intended victims, but these malevolent programscan rack up significant long distance phone charges, costing victimstime and money. 拨号不“间谍”他们打算受害者,但这些恶意程序可以机架了大量长途电话费用,成本的受害者时间和金钱。
Drive-By Download 驱动下载 Adrive-by download is a program that is automatically downloaded to yourcomputer, often without your consent or even your knowledge. 开车经过下载一个程序,它会自动下载到电脑后,往往未经您的同意,甚至你的知识。 Unlikea pop-up download, which asks for consent (albeit in a deceitful mannerlikely to lead to a "yes"), a drive-by download is carried outinvisibly to the user. 不同弹出下载,这要求同意(尽管在骗人的方式可能导致“是” ) ,一名驾车进行下载看不见给用户。 They can be initiated by simply visiting a Web site or viewing an HTML email message. 它们可以通过简单的开始访问网站或查看HTML电子邮件消息。 Frequently, a drive-by download is installed along with another application. 通常情况下,开车经过下载安装以及其他应用程序。
Keyloggers 键盘记录器 Programs that capture and record your every keystroke, including personal information and passwords. 程序,捕捉和记录您的每个按键,包括个人信息和密码。 Keyloggers are applications designed to monitor computer activity to various degrees. 键盘记录器是应用计算机设计,监测活动的不同程度。 Theseprograms can capture virtually everything you do on your computerincluding recording of all keystrokes, emails, chat room dialogue, websites visited, and programs run. 这些程序可以捕获几乎所有您在您的计算机上,包括记录所有击键,电子邮件,聊天室对话,网站访问,以及运行的程序。 System monitors usually run in the background so that you do not know that you are being monitored. 系统监视通常在后台运行,这样你不知道你是被监视着。 The information gathered by the system monitor is stored on your computer in an encrypted log file for later retrieval. 收集到的资料,系统监控存储在您的计算机在加密的日志文件为日后检索。 Some programs are capable of emailing the log files to another location. 一些程序能够通过电子邮件发送的日志文件到另一个位置。
Malware 恶意软件 Malware is short for malicious software. 恶意软件是短期的恶意软件。 Malware is software designed specifically to disrupt a computer system. 恶意软件的软件,专门破坏计算机系统。 For example, a trojan horse or a virus is considered malware. 例如,一个木马或病毒被认为是恶意软件。 Some advertising software can be malicious in that it can try to re-install itself after you remove it. 一些广告软件可以恶意的,因为它可以尝试重新安装它后,您将其删除。 Basically, it is virus ware. 基本上,它是病毒洁具。
Parasites 寄生虫 Parasitesare programs that get installed on your computer which you never askedfor, which does some type of activity that you didn't intend for it todo. 寄生虫程序获得您的计算机上安装您从未要求,这是某种类型的活动,您不打算这样做。 Almostall the parasites that are currently known are only compatible withWindows, and some only affect the Internet Explorer browser. 几乎所有的寄生虫,目前已知的唯一兼容Windows ,有些只会影响Internet Explorer浏览器。
Real-Time Protection 实时保护 All anti-spyware software will search your computer for certain types of components or applications. 所有的反间谍软件将搜索您的计算机对某些类型的组件或应用程序。 This feature identifies how many different components are searched for when running the Anti-Spyware software. 这一功能可以识别有多少种不同的组成部分是搜查时,运行反间谍软件。 Most anti-spyware component databases are updated on a regular basis. 大多数反间谍组件数据库定期更新。
Registry Entries 注册表项 MicrosoftWindows stores all of your application information in your registrykeys, for example, what software to run, where is the software located,etc. Viruses can manipulate these settings so that applications stoprunning or run when least expected. 微软Windows商店所有对您的申请信息在您的注册表项,例如,软件运行,如果是软件位于等病毒可以操纵这些设置,以便应用程序停止运行或运行时,至少预期。
Rootkits 的Rootkits Rootkits allow hackers to take total control of your computer at the "root" or Administrative level, without being detected. 的Rootkits使黑客完全控制您的计算机上的“根”或行政级别,不被察觉。 A good anti spyware program will detect and eliminate rootkits. 一个很好的反间谍软件程序将检测和消除的rootkit 。
Spyware 间谍软件 Spyware is any application that tracks your online behavior without your knowledge or consent. 间谍软件是任何应用程序,跟踪您的在线行为您不知情或未经您的同意。
Toolbars 工具栏 Toolbars can be downloaded to your web browser to make browsing easier. 工具栏可以被下载到您的网页浏览器,使浏览更加容易。 Examples are Google, Alexa, and Yahoo toolbars. 例子是谷歌灼,雅虎工具栏。 Eventhough these toolbars are very handy to use, these toolbars have theability to track everything you do on the Internet and to pass thatinformation back to the owners of the toolbars. 即使这些工具是非常方便的使用,这些工具能够追踪所有你在互联网上传递的信息提供给业主的工具栏。 Be cautious to read the terms and conditions page before you download any toolbar. 小心阅读的条款和条件页面,然后再下载任何工具栏。
Tracking Cookies 追踪cookies Cookies are small pieces of information that are generated by a web server and stored on your computer for future access. Cookie是一小段信息所产生的Web服务器和存储在您计算机上为今后的访问。 Cookieswere originally implemented to allow you to customize your webexperience, and still continue to serve useful purposes in enabling apersonalized web experience. Cookie的最初实施,让您可以自定义您的Web体验,并仍然继续有用的目的,使个性化的Web体验。 However,some web sites now issue adware cookies, which allow multiple web sitesto store and access cookies that may contain personal information(including surfing habits, user names and passwords, areas of interest,etc.), and then simultaneously share the information it contains withother web sites. 然而,现在一些网站的广告软件的cookie问题,使多个网站,以存储和访问的Cookie可能包含个人信息(包括上网习惯,用户名和密码,感兴趣的领域,等等) ,然后同时分享的信息包含与其他网站。 Thissharing of information allows marketing firms to create a user profilebased on your personal information and sells it to other firms. 这种信息共享允许营销公司,以创建一个用户个人资料的基础上您的个人信息和出售给其他公司。 Adware cookies are almost always installed and accessed without your knowledge or consent. 广告饼干几乎总是安装和使用在您不知情或不同意的。
Trojans 木马 Trojans are malicious programs that appear as harmless or desirable applications. 特洛伊木马是恶意程序显示为无害或可取的应用。 Trojans are designed to cause loss or theft of computer data, and to destroy your system. 木马程序的目的是造成损失或被窃的计算机数据,并破坏您的系统。 Sometrojans, called RATs (Remote Administration Tools), allow an attackerto gain unrestricted access of your computer whenever you are online. 有些木马,所谓的RAT (远端管理工具) ,让黑客不受限制地进入您的计算机时,您是否在线。 Theattacker can perform activities such as file transfers, adding/deletingfiles or programs, and controlling the mouse and keyboard. 攻击者可以执行的活动,如文件传输,添加/删除文件或程序,并控制鼠标和键盘。 Trojans are generally distributed as email attachments or bundled with another software program. 木马程序一般都分布作为电子邮件附件或捆绑其他软件程序。
这下大家清楚了没有 |