computer virus
Viruses
a program that is designed to harm a computer by deleting data, ruining files, etc., and that can be spread secretly from one computer to another
Worms
a standalone malware computer program that replicates itself in order to spread to other computers
Logic bomb
...A computer virus that remains hidden until it is triggered when certain specific conditions are met
Anti-virus software
...Antivirus software is a type of utility used for scanning and removing viruses from your computer
Animate
...The act, process, or result of imparting life, interest, spirit, motion, or activity
Adware
...is any software package which automatically renders advertisements in order to generate revenue for its author
Spyware
is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
Instant messenger
Instant messaging is a type of online chat which offers real-time text transmission over the Internet. A LAN messenger operates in a similar way over a local area network
Firewall
a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set.
Spoofing
a mocking imitation of someone or something, usually light and good-humored; lampoon or parody
skype
have a spoken conversation with (someone) over the Internet using the software application Skype, frequently also viewing by webcam.
Trojan horse
is a hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer
Malware
short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems