Portal Home > Knowledgebase > B


Back door
A back door is a feature programmers often build into programs to allow special privileges...
Back orifice
Back Orifice is a program developed and released by The Cult of the Dead Cow (cDc). It is not a...
Backbone
A term that is often used to describe the connections and interconnections that a portion of the...
Backdoor Santas
These are programs that you download off the Internet and contain valid uses. They do though,...
Background scanning
Background scanning is a feature in some anti-virus software to automatically scan files and...
Background task
A background task is a task executed by the system that generally remains invisible to the user....
Backup
n. A backup is a duplicate copy of data made for archiving purposes or for protection against...
Basic Input Output System
This provides the basic instructions for a PC's hardware, and is coded into the computer's ROM...
Bayesian filter
A Bayesian filter is a program that uses Bayesian logic (also called Bayesian analysis) to...
BBL
BBL is computer slang for the phrase "Be Back Later".
Bimodal virus
A bimodal virus infects both boot records and files. It is also called a bipartite virus. Also...
Binary
Binary is the language computers use to represent all data. It is a numeric system that only...
Binary code
This term object code is applied to the compiled instructions contained within an executable...
Binary File
Any file that is not ASCII, or plain text.  The file can be anything from a compiled...
BIOS
BIOS stands for Basic Input/Output System. It is the part of the operating system that identifies...
Bits per Second
Bits per second is the general standard for data transmission speeds.
Blogger
This is a person who keeps a online journal on the web that is usually visible to the public.
Blogging
The act of maintaining a blog (web log).
Blue Screen of Death
This term represents when Windows NT has a problem and it shows you a screen when it...
Boot
To boot a computer is to start (a cold boot) or reset (warm boot) the system so it is ready to...
Boot record
The boot record is the program recorded in the boot sector. This record contains information on...
Boot sector
The boot-sector is an area located on the first track of floppy disks and logical disks that...
Boot sector infector
A boot-sector infector virus places its starting code in the boot sector. When the computer tries...
Bot
Derived from the word Robot, Bots are applications that you run on your  computer that will...
Bot network
A bot network is a network of hijacked zombie computers controlled remotely by a hacker. The...
BRB
BRB is computer slang for the phrase "Be Right Back" and is commonly used on message boards and...
Browser Helper Object
Browser helper objects are plugins to your browser that extend the functionality of it. ...
Browser hijacker
A browser hijacker is a type of spyware that allows the hacker to spy on the infected PC’s...
Browser Hijacking
Browser Hijacking refers to a piece of software that is installed on your computer and that...
Brute-force attack
A brute-force attack is an attack in which each possible key or password is attempted until the...
BSI
See: boot-sector infector.
BTW
BTW is computer slang for the phrase "By the way".
Bug
A bug is an unintentional fault in a program that causes actions that neither the user nor the...
Burn
This is the act of copying data onto a recordable compact disk.  When it is done copying the...
Byte
A Byte is a unit of storage capable of holding a single character.  A byte is made up of 8...

Powered by WHMCompleteSolution