About Us   Contact Us   Spam Filters   Link to us   Links   
   Spam Filters
   Help for Victims
   Report Abuse
   Prevention Tips
   Abuse News
   Virus Info
   Approved Lists
   Get Listed!
   Press Releases



Backdoor- Backdoor is a name for a trojan horse program which opens security vulnerabilities to the system when executed.

Boot Viruses- either save themselves in disk boot sector, or to the Master Boot Record, or change the pointer to an active boot sector

Coalition Against Unsolicited Commercial E-Mail- (CAUCE) An organization that works against the distribution of unsolicited commercial email (spam) by promoting anti-spam legislation

Denial of service attacks- see
Mail bomb

File Viruses- either infect executables in various ways (parasitic - the most common type of viruses), or create file doubles (companion viruses), or use filesystem specific features (link viruses).

Flame- To send nasty or insulting messages, usually in response to someone's having broken the rules of netiquette.

Harassing e-mail- can take a number of forms.
Mailbombs are one method. Threatening, abusive, obscene or vulgar messages are other examples. Some e-mail Spam may classify as abusive or harassing as well.
Hoaxes- programs that do not directly harm computers, but instead display false messages that harm has been done, or will be done under some circumstances, or warn user about some kind of nonexistent danger. Another form of hoax is false messages about new "uncurable" viruses. These messages are introduced into newsgroups and distributed via e-mail.

Logic bomb- see Trojan Horse

Macro viruses- These infect document files, electronic spreadsheets and databases of several popular software packages.

Mail bomb- massive amounts of email sent to a single system or individual. This is usually done to crash the user's system. Mail bombing is one step beyond flaming and can on many systems result in the cancellation of the bomber's account.

Mail filter- A program that allows a user to sort e-mail messages according to information contained in the header.

Malware- Other harmful programs besides viruses. Trojan horses and Backdoors are examples of Malware.

Netiquette-The rules of etiquette that govern online interaction on the Internet

Network Viruses- use protocols and commands of computer network or email to spread themselves

Signature scanning- used to determine the sender of an e-mail message

Spam-The electronic equivalent of junk mail

Spamming- The sending of the same message indiscriminately by e-mail to large numbers of people. Also the practice of sending copies of a message to many different newsgroups, with no regard to whether the subject matter is appropriate. Sometimes spams are advertisements. Spamming is considered bad netiquette and very unethical because it not only wastes everyone's time, but also costs money. The sender of the messages does not pay the cost.;. it is paid by the sites of the recipient and others on the route.

Trojan horse- Also called a logic bomb, it is often mistaken for a virus. This program appears to be useful and harmless but has harmful side effects such as destroying data or breaking security on the system on which it is run. The side effect is triggered by an event such as the clock reaching a certain date. This program cannot propagate itself, therefore is not a virus.

Unsolicited bulk e-mail- Another name for unsolicited commercial e-mail.

Unsolicited commercial e-mail- Any e-mailed document or documents consisting of advertising material. This is what is often referred to as Spam.

Virus- Boot; File; Macro; Network; A program that infects a computer by attaching itself to another program and propagating itself when that program is executed. A computer can become infected by files downloaded over a network or by the installation of new software or floppy disks that are infected with viruses. Some viruses are only pranks, and perform harmless actions like displaying a screen with a joke message on it. Others can destroy files or wipe out a hard drive.

Worm- A computer program that can make copies of itself, and spreads through connected systems, using up resources in affected computers or causing other damage.
[About Us] [Contact Us] [Support Us] [Link to Us] [Links] [Privacy Notice]

Copyright©  1999-2012 EmailAbuse.org