Using the Internet Safely For Seniors

(WallPaper) #1

K


keystroke logging: A legitimate way for software developers to under-
stand what is happening as they write code. This technique is also used
to track a user’s activities online to either monitor or spy on (depend-
ing on motivations) what users type and which sites they visit. This
type of program can also be downloaded onto your computer without
your knowledge by a cybercriminal, who then can gain information
about your online activities and even steal your account numbers and
passwords.

L


location application: A program that enables you to locate anybody
logged onto the Internet physically using a variety of devices (such as a
cell phone).

M


malware: Malicious software. This includes any type of harmful code
(Trojans, worms, spyware, adware, and so on) that infiltrates a com-
puter without the user’s consent. Malware is designed to damage a
computer, collect information, or allow the computer to be taken over
and used remotely to send spam.

Multimedia Messaging Services (MMS): A method for sending mes-
sages that may include audio, video, or images from mobile phones.

mobile computing: Use of a portable device that provides computer
functions and can usually connect to the Internet when such access is
available.

351

Glossary ...............................................................................


24_457450-bgloss.qxp 2/26/09 11:08 PM Page 351

Free download pdf