When it comes to fighting viruses and other forms of infections that can cause damage to your computer or files it helps to know some terminology to keep yourself aware of what to look for when protecting your computer.

Here is a listing of common virus related words and terms that you can learn to help your understanding of how viruses work.

Attachments - Files added to an outgoing email and downloaded with an incoming e-mail

Blended Threat - Combines characteristics of viruses, worms, Trojan Horses, and other malicious code with server and Internet vulnerabilities to spread itself.

Boot Sector Virus – A virus that affects a section of a floppy or hard disk that contains operating system. Each time you start your computer with an infected disk, the virus can spread

Bug - A programming error in a software program that can have unwanted side effects such as security issues.

Client computer - A computer that runs a client program.

Disabled - A status indicating that a program, job, or scan is not available.

Distribution - Measures how quickly a threat is able to spread.

Download - To transfer data from one computer to another. Usually over the internet.

Encrypted Virus - A virus that uses encryption to hide itself from virus scanners.

Exploit - A program or technique that takes advantage of a vulnerability in software to attack its host.

Heuristics - designed to detect previously unknown viruses based on known virus attributes or characteristics.

Hoax – Hoaxes usually arrive in the form of an e-mail designed to tick people into thinking there is some sort of security risk.

Intrusion Detection - A service that monitors system events used to warn about unauthorized system access.

Macro virus - A virus hidden within an application that must be executed in order to execute the virus.

Master Boot Record - The first logical sector on a disk containing the partition table and master boot loader.

Network – A number of computers connected together to share information and hardware.

Payload - The malicious activity that the virus performs to the host.

Payload trigger - The condition that causes the virus to activate its payload.

Phishing - The fraudulent process of attempting to obtain personal information such as usernames, passwords and credit card information by masquerading as someone else or some other company via a fake email, website or other electronic correspondence.

Polymorphic Virus - A virus that can change itself when it replicates to avoid detection.

Port - An interface through which data are sent and received.

Quarantine – A way to isolate files that may contain a virus so that the files cannot be opened or executed.

Threat assessment - The severity rating of a virus.

Trojan Horse – A virus that portrays itself as something other than a virus upon execution.

Upload - To send a file from one computer to another.

Variants - New strains of viruses that use some of the code from other viruses.

Virus - program or code that replicates itself onto other files and can affect many different things such as other program, files, documents etc, and cause various degrees of damage.

Virus Definitions - Software that identifies viruses by checking files against a profile of each known virus.

Worm - A program that makes and distributes copies of itself.

Pin It

Join Us On FaceBook

We Recommend:

Join Us On Twitter

Get insights into the computer industry and regular updates on our site. Click Here

OCT Youtube Channel

New tech tip videos posted on a regular basis. Subscribe today! Click Here



Dont let your files be held for ransom!   ...

Get rid of those pesky backgrounds in your image...

Record your screen with no additional software t...

How long has your computer been running?  ...

Easily compare the differences between 2 spreads...

Data redundancy the cheap and easy way!   ...


Check out these great tools to help your student...

High quality YouTube to MP3 conversions   ...

What's in your wallet?   Ever since Bitco...

Check out this year's top technology trends! &n...

How secure is your business?   One of the...

Dont let your files be held for ransom!   ...


Another reason to keep your devices up to date. If you ...

Try not to get the BlueKeep Blues Once again the Micros...

Are Your Chrome Credentials Secure? Many people like to...

Windows 10 Optional Updates Coming Soon If you can reme...

Is a Virtual Private Network right for you? &nb...

Use Some Cache to Speed Up Chrome If you use the popula...