Too Fast For You
An acronym (from Greek: -acro = sharp, pointed; -onym = name) in its pure form denotes a combination of letters (usually from an abbreviation) which can be used and pronounced as a word. For the sake of clarity and readability, this definition is not always followed within the 2 lists on this page.
A method of displaying unwanted, unsolicited advertising on your computer. It usually is in the form of malicious code.
Short for application, an "app" is a program designed to operate within a mobile system. They can be considered "add-ons" for mobile devices like smartphones and tablets. Two of the most popular operating systems, Apple's iOS and Google's Android, have an increasingly sizable roster of free and paid apps available to users.
Access to a protected system using a password can be described as going through the front door. Organizations can build "backdoors" into their systems, however, so that developers can bypass authentication and dive right into the program. Backdoors are usually secret, but may be exploited by hackers if they are revealed or discovered.
Sort for Weblog - A personal journal recorded on a website. Blogs are updated frequently and usually grouped by subject (e.g. politics, computers, religion, news, culture, et.al.). Often allowing commenting in response to the entries.
Botnets, or zombie armies, are networks of computers controlled by an attacker. Having control over hundreds or thousands of computers lets bad actors perform certain types of cyberattacks, such as a DDoS (see below). Buying thousands of computers wouldn't be economical, however, so hackers deploy malware to infect random computers that are connected to the internet. If your computer gets infected, your machine might be stealthily performing a hacker's bidding in the background without you ever noticing.
By The Way
The Children’s Internet Protection Act (CIPA) of 2000 requires public schools and libraries receiving federal e-rate funds to use a portion of those funds to filter their internet access. They must filter out obscenity on library computer terminals used by adults and both obscenity and harmful-to-minors materials on terminals used by minor children. CIPA was upheld by the u.s. supreme court as constitutional in June 2003.
|Communications Decency Act of 1996||
This was a part of the Telecommunications Act of 1996. It was the U.S. Congress' first attempt to protect children on the Internet from pornography. The act prohibited knowingly sending or displaying “indecent” material to minors through the computer, defined as: “any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms of patently offensive as measured by contemporary community standards, sexual or excretory activities or organs.”
The ACLU immediately challenged the act with a law suit and was blocked by a lower court. A year later the U.S. Supreme Court struck down the indecency provisions in the historical case of Reno v. ACLU (1997). The Supreme Court held that a law that places a “burden on adult speech is unacceptable if less restrictive alternatives would be at least as effective in achieving” the same goal. The court did, however, reaffirmed the application of obscenity and child pornography laws in cyberspace—an important victory for the protection of children online.
The Child Online Protection Act (COPA) of 1998 was an effort by the U.S. Congress to modify the CDA in response to the Supreme Court’s decision in Reno v. ACLU. The law sought to make it a crime for commercial websites to make pornographic material that is “harmful to minors” available to juveniles. The purpose of COPA was to protect children from instant access to pornographic “teaser images” on porn syndicate web pages, by requiring pornographers to take credit card numbers, adult verification numbers, or access codes to restrict children’s access to pornographic material and to allow access to this material for consenting adults only. Despite the critical need for measures to protect children from accessing harmful materials, the law was immediately challenged and blocked by lower courts, and has become the subject of an epic legal battle, still raging today. The permanent injunction against the enforcement of COPA remains in effect today. The government has not announced whether it will appeal the case to the U.S. Supreme Court for a third time.
The Children’s Online Privacy Protection Act of 1998, which went into effect in April 2000, requires websites that market to children under the age of 13 to get “verifiable parental consent” before allowing children access to their sites. The Federal Trade commission (FTC), which is responsible for enforcing COPPA, adopted a sliding scale approach to obtaining parental consent. The sliding scale approach allows website operators to use a mix of methods to comply with the law, including print-and-fax forms, follow-up phone calls and e-mails, and credit card authorizations.
is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.
Is copyright infringement a federal crime?
the words "hacking" and "hacker" in mainstream parlance have come to subsume the words "cracking" and "cracker," and that's misleading. Hackers are tinkerers; they're not necessarily bad guys. Crackers are malicious.
Willful and repeated harm inflicted through the use of computers,
cell phones, and other electronic devices.
Any Internet-related illegal activity.
the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
The dark web is made up of sites that are not indexed by Google and are only accessible through specialty networks such as Tor (see below). Often, the dark web is used by website operators who want to remain anonymous. Everything on the dark web is on the deep web, but not everything on the deep web is on the dark web.
|Denial of Service Attacks||
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.