Archives - Antivirus Definition


What is File Sharing?

File sharing is the practice of disseminating or providing access to digital media, such as software programs, media (video, audio & images), or documents. File sharing may be achieved in a number of ways. Common methods storing and sharing include manual distribution using removable media, servers on computer networks, links on the web and peer-to-peer […]

What are file sharing services?

Cloud based files syncing and sharing services implement automated file transfers by updating files from a dedicated sharing folder on each user’s networked devices. Files placed in this directory also are usually accessible through a website and mobile app.  Making it easy to share files with other users for viewing or collaboration. Many of these […]

What is Wardriving?

The broadcast range of a wireless access point can make internet connections available outside your home, even as far away as your street. Savvy computer users know this, and some have made a hobby out of driving through cities and neighborhoods with a wireless-equipped computer—sometimes with a powerful antenna— searching for unsecured wireless networks. This […]

What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]

What is Wireless Sniffing?

Many public access points are not secured and the traffic they carry is not encrypted. This can put your sensitive communications or transactions at risk. Because your connection is being transmitted “in the clear,” malicious actors could use sniffing tools to obtain sensitive information such as passwords or credit card numbers. Ensure that all the […]

What is a multi-factor authentication?

Multi-factor authentication (MFA) is a method of confirming a user’s claimed identity in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something the user and only the user knows), possession (something the user and only the user has), and […]