With software, this word usually denotes non-documented access which allows manufacturers (or third parties) to access users’ software or data from the outside. There is also malware which is able to open a back door. This allows criminals to access a computer and then use it for their own ends, e. g. to join a bot net.
Data back-up, where electronic information (data) is copied to an external storage medium (e. g. an external hard drive). Back-ups are generally run at regular intervals. There is a distinction between an incremental back-up, where only changes since the last back-up are saved, and complete back-ups.
This is the smallest information unit in electronic data processing, equivalent to a yes/no decision or 0/1 in a digital data record.
This is a standard for wireless communication inside a small range. Bluetooth uses the freely available ISM (Industrial Scientific Medical) network, which works at 2.45 GHz. Transmission power is up to 1 MBit per second, with a range of up to 100 meters.
Bot nets are networks usually made up of several millions of computers which are interconnected after being infected with malware. Illegal bot net operators usually install bots without owners’ knowledge on their computers and use the computer resources for their purposes, such as distributed DDoS attacks or sending spam mails. Most bots can be monitored via a communication channel by a bot net operator and can receive commands. In case of any potential infection, the Anti Bot Net Advice Centre can help.
Distributed Denial of Service
A special computer program to display websites on the World Wide Web (WWW) or of data and documents in general. The most important browsers used on the Internet are Microsoft Explorer or Microsoft Edge, Mozilla Firefox, Google Chrome and Apple Safari.
World Wide Web
Participate in one of our «eBanking – but secure!» courses (in GERMAN, FRENCH and ITALIAN language only) and learn how the «5 steps for your security» can protect you when e-banking!
information / registration
Copyright © 2019 – All rights reserved. Lucerne School of Information Technologies