Glossary of Internet Terminology

• Linux is a freely distributed open source operating system.
• LAN (Local Area Network) - a local computer for communication between computers. It can be wired or wireless.
• Log file - a file that lists the actions that occurred.
• Macro - a type of program used to eliminate the need to repeatedly repeat the steps of common tasks, such as adding or removing rows and columns, as well as protecting or removing the protection of worksheets.
• Macro virus - A virus that uses macros of common applications, such as spreadsheets and text editors, to implement virus-like behavior.
• Malware - software used or created by hackers to disrupt computer operation, collect confidential information or gain access to private computer systems. Short for "Malware".
• Megabyte - 1000 kilobytes.
• Memory Stick is a removable storage device, usually connected to a computer via USB.
• Money laundering is the process of concealing the source of money obtained illegally by conducting financial transactions or conducting fake business in order to disguise the illegal source.
• A money mule is a person hired by a fraudster to transfer money illegally obtained in one country to another country, usually where the fraudster lives. This term comes from the analogy with drug couriers.
• MP3 is a technology used to store audio files, usually for music or podcasts.
• MP3 player - a device that plays music files in MP3 format.

• Network - the number of computers connected to each other together with the connecting infrastructure.
• Reliability - the ability to prove that a particular person performed an action on a computer or on the Internet, so that it could not be denied later.
• Online backup is a backup method in which data is transferred over the Internet for storage, often referred to as "cloud" backup.
• Open source is a term commonly used to describe computer software that has been developed collaboratively, often by volunteers on a non-profit basis.
• Operating system - the software that ensures the operation of your computer or mobile device.
• Owner - when the computer was hijacked by hackers.
• A lock is a symbol in a web browser that indicates that an encrypted (SSL) connection is used to communicate with a site that has a valid certificate. Usually accompanied by "https" at the beginning of the address bar.
• Pairing - When two Bluetooth-enabled devices are connected to communicate with each other.
• Patch - software update, often associated with increased security.
• PDF (Portable Document Format) is a method of saving a document so that it can be opened and viewed on devices with different operating systems.
• Peer-to-peer network - a network commonly used to exchange music and video files and applications between people over the Internet.
• Penetration testing - legal hacking of a computer system or website with the owner's approval to identify vulnerabilities and search for opportunities to improve their security.
Pharming is an exploit in which attackers disrupt the normal functioning of DNS software that translates domain names on the Internet into addresses. The user enters the correct address, but is redirected to a fake website. The game Lucky Jet is really emotional and exciting, which pleases with its purple graphics and attracts with unprecedented winning. This is where you risk and win. It's all up to you!