Mi biblioteca
Mi biblioteca

Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Glosario

A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z


B

Back-door a computer program which allows an authorised system access or receipt of a privileged function (working mode). Back-doors are often used to compromise the system`s security settings. They do not infect files but modify registry keys.

Background - a task executed by a system imperceptibly for a user. Such tasks acquire lower priority. Some malicious programs act in the background performing its actions in invisible for a user mode

Batch file - an executable file containing operating system instructions. It usually has a .bat extension and is designed as a text file, every line of which is an operating system command. It is executed by a command processor.

BEC (Business E-mail Compromises, también CEO fraud, Whaling) — es una opción de estafa cuando los delincuentes intercambian mensajes con directivos de empresas supuestamente en nombre de sus contratistas reales. Su objetivo es persuadir a los directivos de empresas para que los mismos transfieran dinero con requisitos falsificados a la cuenta de los delincuentes o hacerles revelar los datos privados sobre las transacciones o el personal.

Boot virus size. Boot virus head size means a virus body length placed to a boot sector of a diskette or MBR. Boot virus tail size means a virus body length placed into an empty space of a diskette or a hard disk (such sectors are marked as error sectors).

Bug - any incidental program error both syntactic and semantic.