Ad Blocker
An ad blocker is a program that is installed on user's web browsers to block any pop-up or otherwise intrusive ad generated by a web page. Ad blockers can be easily disabled by a user if the use of a pop-up from a webpage is necessary.
Adware
Adware is a type of malware that’s designed to show intrusive advertisements to a user while they browse the internet. Adware is typically installed unwittingly by a user when it’s bundled with other software being downloaded.
Antivirus Software
Antivirus software, sometimes abbreviated to AV software, is a program that finds, removes, and protects against malware.
Bot
Internet bots are applications that complete automated tasks that would take a substantial amount of time to complete if done manually. When designed to be malware, bots are designed to gain control of your system and access personal details.
Browser Console
A browser console is a tool typically used by web developers that logs and identifies errors that may occur on a webpage when you visit it.
Cache
A web browser's cache is a folder full of temporary files that are stored on a user's computer for a website's easy access. Rather than having to go out to the Internet to pull the information, your browser can just load the file locally, thus speeding up your browsing experience. It is possible to clear a browser's cache.
Contained Files
When Intrusta locates a threat or suspicious file on your computer, the file is pulled from your computer's environment and isolated by Intrusta so it can no longer do damage. These files, that are isolated, but not yet deleted, are known as contained files.
Cookies
Cookies are tiny data files that are stored in your web browser. They’re designed to make web browsing a breeze by helping you create your online shopping cart or offering to auto-fill your name on forms. It is possible to clear a browser's cookies.
Cryptocurrency
Cryptocurrency is a type of virtual currency. Each transaction is ensured with strong cryptography, making the currency extremely hard to track and trace back to a particular user.
Desktop Shortcut
A desktop shortcut is an icon that lives on your computer's desktop to provide quick and easy access to programs on your computer. A desktop shortcut is typically represented with the program's icon. With Intrusta, a shortcut will be placed on your desktop during installation.
Encryption
Encryption is a process during which information is coded so that only those who are intended to can decode and access the information.
Firewall
A firewall is a part of a network security system that monitors incoming and outgoing network activity on a user's computer. A firewall is designed to block potentially harmful incoming activity. Having a firewall active does not limit your outgoing activity.
Firmware
Firmware is simple software that's embedded into hardware to make it run and execute tasks. Firmware cannot be removed from a device, but does sometimes need to be updated.
Full Scan
Running a Full Scan with Intrusta will scan every single file on your device. The time it takes a Full Scan to complete will vary depending on how many files are on your computer.
Installer
An installer is a piece of software that is designed to install an application on a user's computer.
Keylogger
A keylogger is a piece of malware, often classified as spyware, that once installed records and logs every keystroke made on a user's keyboard. Keyloggers are often used to gain fraudulent access to user's login credentials for sensitive and important accounts.
Malware
Malware, short for malicious software, is a term used to describe computer programs that are designed to purposefully cause harm to a computer, server or network.
Operating System
An operating system is a software that supports a computer's basic functionality. For Windows, this may be Windows 8 or 10. For a Mac, this may be macOS 10.12 Sierra or macOS 10.14 Mojave.
Password Manager
A password manager is an application that is designed to securely store and encrypt your passwords. Password managers are extremely helpful when using complex and secure passwords, as the user doesn't have to worry about remembering their complex passwords themselves.
Phishing
Phishing is a fraudulent practice where data, email messages, or web pages are made to look legitimate but are designed to steal a user's information by tricking them into sending back or entering their personal information, such as a password.
Potentially Unwanted Program
A potentially unwanted program, or PUA for short, is a program that users may have unknowingly consented to downloading, but don't actually want on their computer. Because PUAs are often downloaded with user's unwitting consent, they are not always classified as malware by antivirus softwares, and can sometimes go undetected in a scan of your computer.
Ransomware
Ransomware is a type of malware in which data on an infected device is locked, typically by encryption, and payment is demanded for access to the ransomed data to be returned to the user. Unlike other types of malware that operate undetected, a user is likely to be notified that they’ve been infected and given instructions on how to recover their data from the attack.
Remote Access
You may hear remote access used in two different ways.
Remote Access Support
When a user is experiencing an issue with their computer or with an application, Support Teams will sometimes provide remote access support to better understand, diagnose, and solve an issue. When granting a Support Team member remote access to a user's computer, the Support Team member is able to share a user's screen as well as use their cursor to control a user's computer.
Remote Access Malware
Remote access malware runs in the same vein as remote access support, but is used for very different purposes. Remote access malware, once installed on a device, can be used by a cyber criminal to control a device and used maliciously to exploit the user, as well as the capabilities of their device.
Rootkit
A rootkit is a set of tools that are designed to covertly install software on a user's computer.
Smart Scan
Running a Smart Scan with Intrusta will scan the folders that are most likely to contain suspicious files, your Downloads and Documents folders.
Spam
The term spam is often used to refer to unwanted content that is shown or sent to you. This could be intrusive ads being shown on your desktop, or email messages about products you're not interested in or are a scam.
Spyware
Spyware is a type of malware that installs itself on a device and covertly monitors your browsing habits, internet usage, and computer usage.
Trojan
A Trojan, also known as a Trojan Horse, is a piece of malware that is disguised as a useful or otherwise harmless program to convince users to download the malware on to their computer. Once on their computer, the Trojan can cause damage in several ways.
System Logs
When you use Intrusta, the application maintains a log of scans, errors, and viruses found. If you are having issues with your Intrusta app, you may be asked by a member of our Support Team to retrieve the Intrusta system logs to send to Support so that they can further diagnose your issue(s). The logs do not contain any sensitive information and are safe to email and upload to Intrusta Support.
Two-Factor Authentication
Two-factor authentication is a security measure that user's can take in addition to their password to keep their accounts secure when logging in. Often times, using two-factor authentication will require a user to know their password, and also be able to complete an additional task, such as receiving a verification code via a trusted phone number, or confirming their sign on via email.
Virtual Currency
Virtual currency is a type of digital money that is decentralized and unregulated. The currency is issued by developers and used within specific communities that will accept the given currency as payment.
Virus
A virus is a piece of code that is designed to replicate itself and cause harm to a user's device. "Virus" is typically a catch-all term for unwanted software. So, malware and all of it's variants could fall within this term.
VPN
A virtual private network, or VPN for short, is a privacy tool used to keep network data private across public networks. A VPN encrypts user's data, from end to end, making it extremely difficult, if not impossible, for the user to be identified or tracked from their network traffic.
Web Browser
A web browser is a program that is designed to let a user access the World Wide Web by navigating to specific URLs. Examples of web browsers are Google Chrome, Safari, Microsoft Edge, and Opera.
Windows Defender
Windows Defender is a basic antivirus tool that is built into most Windows operating systems.
Comments
0 comments
Article is closed for comments.