aktiwiteit 1, bl 22 internet terminology/ terminologie

Post on 02-Jan-2016

227 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Aktiwiteit 1, bl 22

Internet Terminology/ terminologie

Phishing: Poging om sensitiewe en privaat inligting soos wagwoorde, kredietkaart besonderhede, rekeningnommers, ens. te bekom

deur voor te gee die boodskap kom van 'n betroubare bron.

e-pos en kitsboodskappe (sms) word gebruik

Kjuitgespreek soos Eng

visvang: fishing

Spam

• the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients./ groot hoeveelheid advertensies of promosiemateriaal (gemorspos) wat ontvanger nie noodwendig wil hê nie.

• Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender./ persoon wat dit stuur betaal min daarvoor, maar dis die ontvanger wat die materiaal moet aflaai, wat die meeste betaal.

Inbox flooded with spam

Spelling mistake – one of the

indicators that it is spam

Cookies

• a piece of text stored on a user's computer by the web browser (internet explorer)/ teksdeeltjie wat deur webblaaier op gebruiker se rekenaar gestoor word

Cookies continued/ vervolg• to enable website to open quicker when user

accesses the site again./ om die webblad gouer oop te maak wanneer die gebruiker dit weer besoek

• Usually harmless, but can contain malicious software/ gewoonlik skadeloos, maar kan soms gevaarlike programmatuur bevat

• Use disk clean up to remove once a month/ vee een keer ‘n maand skoon deur disk cleanup

Voorstelling van Firewall

• is a type of malicious software that can be installed on computers and collects little bits of information about users without their knowledge

• and secretly monitors the user's computing habits• The presence of spyware is hidden and can be difficult to detect. • Spyware is secretly installed on the user's personal computer.• It collects information such as Internet surfing habits and sites that

have been visited• Can interfere with user control of the computer for example

installing additional software and redirecting Web browser activity. • Spyware can change computer settings, resulting in slow connection

speeds, different home pages, and/or loss of Internet or functionality of other programs.

Spyware

SpywareThis popup

usually contains the spyware and is installed when user

clicks on link.

Keyloggers• Keystroke

logging (often called keylogging) is the action of tracking the keys struck on a keyboard,

• in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

Keylogging in action

Wireless key logging receiver

Proxy server

• A proxy server is a server that acts as an intermediary between your computer and other servers.

Pop ups• Pop-up ads or pop-ups are a form of online advertising on

the World Wide Web intended to attract web traffic or capture email addresses.

• Pop-ups are generally new web browser windows to display advertisements.

• A variation on the pop-up window is the pop-under advertisement, which opens a new browser window hidden under the active window.

• Pop-unders do not interrupt the user immediately and are not seen until the covering window is closed, making it more difficult to determine which web site opened them.

Flash

• Adobe Flash (formerly Macromedia Flash) is a multimedia platform

• used to add animation, video, and interactivity to Web pages.

• Flash is frequently used for advertisements and games.

QuickTime

• is a multimedia framework • developed by Apple Inc.• QuickTime is capable of handling various

formats of digital video, picture, sound, panoramic images, and interactivity.

ActiveX• A software module • It enables a program to add functionality by calling ready-made components

that blend in and appear as normal parts of the program. • They are typically used to add user interface functions, such as 3D toolbars,

a notepad, calculator or even a spread sheet.

On the Internet, ActiveX controls can be linked to a Web page and downloaded by a compliant Web browser. Such controls turn Web pages into software as if the program were launched from a server. Like any executable program running in the computer, ActiveX controls can perform any operation on your data. This is why the default configuration in most Web browsers is to prompt the user if an ActiveX control is being requested so the user can decide to download it or not (not always an easy decision).

ActiveX including different kinds of 3D buttons, switches, knobs, sliders, switch sliders, switchknobs and others can be widely applied in many industry HMI applications and Simulation

environments.

top related