• Glossary


A malicious computer program designed to insert its code into legitimate programs and to replicate itself after infecting the computer. 
A computer program designed to hide itself deep within the operating system while executing itself. It penetrates and intercepts the operating system functions and therefore masks the presence of any malicious processes, folders and files on disk drive along with its registry entries.
Windows Registry is a hierarchical database, in which the important configuration information is stored in form of keys. Windows continually refers to this information during its operation.
Malicious software designed to gain unauthorized access to sensitive information on user’s computer and also to hack data, spread threat, collect ransom money. Malware includes Viruses, Worms, Trojans, Adware, Spyware, Ransomware etc.
Confidential information:
It includes your online banking account details, passwords, PIN and browser settings etc.
Registry Modification:
An unwanted and unauthorized change (editing/deleting/modifying) in the registry entries that leads to collapse of registry’s normal functioning.
Application/system entries:
While using any application, its entries are created in the registry e.g. application path. These entries remain even after uninstallation of the application. Such unwanted entries consume processor time and speed.
Start-up entries:
Windows registry entries which are referred to by Windows operating system at the time of system booting process are Start-up entries.
Standalone computer program:
A computer program that functions independent of the operating system services and does not necessarily require network connection to carry out its function in the computer system.
Network Bandwidth:
It is the rate of data transferred per second (bits per second or millions of bits per second) through network.
Spyware is a general term used to describe software that performs certain behaviors, generally without appropriately obtaining user’s consent.
Keyloggers covertly capture the hardware inputs such as keyboard key strokes and steals sensitive information such as Online banking details, credit card information, passwords etc.
A Hacker is someone who detects the systems Vulnerabilities and tries to exploit it in a positive or negative way.
Adware or advertising - supported software automatically displays unwanted advertisements in order to generate online revenue for its author. Also it distracts the user during surfing.
In reference to this particular document, an author is the person who writes a computer program code.
Font entries:
Malicious font is a font file which has been designed to trigger a bug in software which reads the font file (MS Office). Such file is malicious only when it opens within the software or editor. The font file is crafted with intend of harming the processing software.
Shared DLLs:
A file cannot open without searching its path in registry. DLL is a specialized file with extension .dll. Some programs when run simultaneously share these DLL files as a resource.
BHO (Browser Helper Objects):
These are customized objects integrated within the browser to enhance the events of browser.