K
keystroke logging: A legitimate way for software developers to under-
stand what is happening as they write code. This technique is also used
to track a user’s activities online to either monitor or spy on (depend-
ing on motivations) what users type and which sites they visit. This
type of program can also be downloaded onto your computer without
your knowledge by a cybercriminal, who then can gain information
about your online activities and even steal your account numbers and
passwords.
L
location application: A program that enables you to locate anybody
logged onto the Internet physically using a variety of devices (such as a
cell phone).
M
malware: Malicious software. This includes any type of harmful code
(Trojans, worms, spyware, adware, and so on) that infiltrates a com-
puter without the user’s consent. Malware is designed to damage a
computer, collect information, or allow the computer to be taken over
and used remotely to send spam.
Multimedia Messaging Services (MMS): A method for sending mes-
sages that may include audio, video, or images from mobile phones.
mobile computing: Use of a portable device that provides computer
functions and can usually connect to the Internet when such access is
available.
351
Glossary ...............................................................................
24_457450-bgloss.qxp 2/26/09 11:08 PM Page 351