Computerhelp4all logo Articles AboutTopicsQuizzesComputer Questions & AnswersComputer Terms & DefinitionsActivitiesContact

Page 16 - Medium Articles

Medium Articles 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
What Is A Command-Line Interface

What Is A Command-Line Interface?

Difficulty: Medium

A command-line interface (CLI), also known as a console-user interface, is a type of user interface based on text commands and a simple text-only interface.

What Is A Backup

What Is A Graphical User Interface?

Difficulty: Medium

A graphical user interface (GUI) is a type of user interface based on graphical icons, windows, buttons, dialogue boxes, menu bars, tabs, toolbars, and images.

What Is A Fork Bomb

What Is A Fork Bomb?

Difficulty: Medium

A fork bomb, also known as a rabbit virus, is a type of DoS attack where an existing process is taken and continuously replicated to start new processes.

What Is Webcam Hijacking

What Is Webcam Hijacking?

Difficulty: Medium

Webcam hijacking, also known as camfecting, is the act of activating a user's webcam remotely over the internet and gaining access to it without their permission or knowledge.

What Is ROM

What Is ROM?

Difficulty: Medium

Stands for Read Only Memory. ROM is a form of permanent and non-volatile memory that computers can read but not write to or remove.

What Is Cryptojacking

What Is Cryptojacking?

Difficulty: Medium

Cryptojacking is the unauthorised use of someone else's computing resources to mine cryptocurrency. Cryptojacking malware often installs...

What Is Spoofing

What Is Spoofing?

Difficulty: Medium

Spoofing is the act of pretending to be something or someone else to deceive other users. This is accomplished by disguising the identity of...

What Is An Intrusion Prevention System

What Is An Intrusion Prevention System?

Difficulty: Medium

An intrusion prevention system (IPS), also known as an intrusion detection prevention system is a security system that protects an organisation's network from malicious activity.

What Is The HTML Cite Tag

What Is The HTML <cite> Tag?

Difficulty: Medium

In HTML, the <cite> tag is used to provide a reference or title to a piece of work, like books, paintings, poems, songs, films, etc.

What Is The HTML Iframe Tag

What Is The HTML <iframe> Tag?

Difficulty: Medium

In HTML, the <iframe> tag is used to specify an inline frame within a HTML document, which loads a webpage inside another webpage.

What Is An Internet Troll

What Is An Internet Troll?

Difficulty: Medium

An internet troll is a person online who intentionally causes disruption by posting off-topic, upsetting, controversial, or disturbing content or messages in order to get a reaction out of people.

What Is Clickjacking

What Is Clickjacking?

Difficulty: Medium

Clickjacking, also known as a user interface redress attack, or UI redressing, is the practice of using multiple invisible user interface layers to trick users into clicking....

6 Sites You Should Avoid Linking To

6 Sites You Should Avoid Linking To

Difficulty: Medium

Links to external sites are a useful way of providing more information to your visitors, recommending useful sites and services, and providing a better overall user experience since they add more context to readers.

How To Display The Live Date And Time On A Webpage

How To Display The Live Date And Time On A Webpage?

Difficulty: Medium

Displaying the date and time in real time is a very useful feature on a webpage. Below is an example of the live date and time on a webpage using JavaScript and jQuery along with an image of the output.

What Is Cyberstalking

What Is Cyberstalking?

Difficulty: Medium

Cyberstalking is a form of stalking that happens electronically over the internet or on a mobile phone. The anonymity of online communication has made it easy for cyberstalkers to...

What Is Phreaking

What Is Phreaking?

Difficulty: Medium

Phreaking is the act of exploiting vulnerabilities in telephone systems to gain unauthorised access to restricted telephone services or areas, often to obtain free phone calls.

What Is A Digital Footprint

What Is A Digital Footprint?

Difficulty: Medium

A digital footprint is the traces, trails, and records of activity and data an individual or organisation leaves behind whilst using the internet.

What Is A Watering Hole Attack

What Is A Watering Hole Attack?

Difficulty: Medium

A watering hole attack is a type of cyberattack where the attacker identifies websites that are commonly visited by members of an organisation and infects them with malware.

What Is Email Bankruptcy

What Is Email Bankruptcy?

Difficulty: Medium

Email bankruptcy is the process of wiping out, ignoring all emails older than a specific date, or closing an email account, due to an excessively large amount of email messages.

What Is A Potentially Unwanted Program

What Is A Potentially Unwanted Program?

Difficulty: Medium

A potentially unwanted program, also known as a potentially unwanted application, a PUP, a PUA, or junkware, is a type of program that is not strictly malicious, but may be unwanted for the user.

What Is A Technical Support Scam

What Is A Technical Support Scam?

Difficulty: Medium

A technical support scam, often abbreviated to a tech support scam, is a deceptive activity that uses intentional false positives to convince users that their computers have problems when they actually don't.

What Is A Brute-Force Attack

What Is A Brute-Force Attack?

Difficulty: Medium

A brute-force attack is a type of cyberattack where the attacker repeatedly submits large numbers of passwords in the hope of discovering the correct password.

What Is Ciphertext

What Is Ciphertext?

Difficulty: Medium

Ciphertext is text that has been scrambled into random numbers, letters, and symbols by a cipher in order to make it unreadable if intercepted by anyone.

What Is A CAPTCHA

What Is A CAPTCHA?

Difficulty: Medium

Stands for Completely Automated Public Turing Test To Tell Computers And Humans Apart. A CAPTCHA is a security feature designed to prevent spam or abuse from automated bots.

What Is A Browser Hijacker

What Is A Browser Hijacker?

Difficulty: Medium

A browser hijacker is a type of malware that changes a browser's settings, appearance, theme, or behaviour without the user's permission.

What Is A Botnet

What Is A Botnet?

Difficulty: Medium

A botnet is a network of hijacked computers infected with malware that are controlled by a single attacking party to carry out cyberattacks and other malicious activities, like bringing servers down by DDoS attacks.

What Is Catfishing

What Is Catfishing?

Difficulty: Medium

Catfishing is the process of setting up a fake online profile to deceive other people, most commonly on social networking sites and dating sites.

What Is A Logic Bomb

What Is A Logic Bomb?

Difficulty: Medium

A logic bomb is a piece of malicious code designed to carry out instructions when specific conditions are met. Logic bombs can be inserted into malware.

What Is Decryption

What Is Decryption?

Difficulty: Medium

Decryption is the process of converting encrypted information back into its original plaintext form. It is the opposite of encryption.

What Is A Drive-By Download

What Is A Drive-By Download?

Difficulty: Medium

A drive-by download is a vulnerability which unknowingly downloads and installs things on a computer without the user's permission or knowledge.