User Manual

Table Of Contents
browsers can present multimedia information, including sound and video,
though they require plug-ins for some formats.
Brute Force Attack
Password guessing attack used to break into a computer system by
entering possible password combinations, mostly starting with the
easiest-to-guess password.
Command line
In a command line interface, the user types commands in the space
provided directly on the screen using command language.
Cookie
Within the internet industry, cookies are described as small files
containing information about individual computers that can be analyzed
and used by advertisers to track your online interests and tastes. In this
realm, cookie technology is still being developed and the intention is to
target ads directly to what you've said your interests are. It's a
double-edge sword for many people because on one hand, it's efficient
and pertinent as you only see ads about what you're interested in. On
the other hand, it involves actually "tracking" and "following" where you
go and what you click. Understandably so, there is a debate over privacy
and many people feel offended by the notion that they are viewed as a
"SKU number" (you know, the bar code on the back of packages that
gets scanned at the grocery check-out line). While this viewpoint may
be extreme, in some cases it is accurate.
Cyberbullying
When peers or strangers are committing abusive acts against children
on purpose to physically hurt them. To damage emotionally, the
assaulters are sending mean messages or unflattering photos, thus
making their victims isolate from others or feel frustrated.
Dictionary Attack
Password guessing attacks used to break into a computer system by
entering a combination of common words to generate potential
passwords. The same method is used to guess decryption keys of
encrypted messages or documents. Dictionary attacks succeed because
many people incline to choose short and single words passwords that
are easy to be guessed.
Glossary 305
Bitdefender Total Security