How can we help?
You can also find more resources in our
Select a category
Something is confusing
Something is broken
I have a suggestion
What is your email?
What is 1 + 3?
Computer Concepts Ch. 7 Sec. E
tracks your activities at any site containing banner ads from that third party
(also called local shared object)is the flash equivalent of a conventional Web cookie.
(or clear GIF) is typically a 1x1 pixel graphic embedded in a Web page or e-mail message.
type of security software designed to identify and nuetralize web bugs, ad-serving cookies, and other spyware.
anonymous proxy service
uses an intermediary, or proxy, server to relay web page requests after masking the originating IP addres
an exploit that redirects users to fake sites by "poisoning" a domain name server with a false IP address
unwanted electronic junk mail about medical products, low cost loans, and fake software upgrades that arrive in you online mailbox
type of utility software that captures unsolidated email messages before they reach your inbox
verify that e-mail messages originate from the internet domain from which they claim to have been sent
e-mail based scam that's designed to persuade you to reveal confidential information such as your bank account number or social security number