access.
the ability to read, write or alter data; there can be varying degrees or levels; one can grant access by permissions; see your browser’s Help for how to grant permissions to websites to different levels of access to your computer
accounts
relations,, usually formal, established for some service between parties
address
a location designation; examples, a webpage : http://www.competivittechnology.org; an email: websitemaster@actonline.org ; an directory: c:\programs\browsers\aSafeOne\
ads
abbr.. for advertisement
advertiser
entity seeking to sell something through a display; for example, a single business with a display on a webpage; or, a group of companies acting with an ad agency to present displays on a webpage.
anagrams
to re-arrange, esp. to form new words or phrases from existing ones such as’ ‘Rome and ‘more’
associated
to be a part of; when said of advertisers, it generally means that they share information; for example, data stored in cookies
bit
a small part of; in computer terms, either character of a two character language; consider a language that uses just 0 and 1 as characters, where the 0’s and 1’s turn off / on switches, the more bits the more complexity can be expressed; a 128-bit message would have a chance to be more complex than a 40-bit message; that’s why 128-bit encryption is better than say 40-bit encryption
broken
has been opened; 1) when said of a secret message (an encryption), the message has been cracked and any further messaging using the same encryption is also likely to be broken; 2) when said of computer programs, the program in some way (usually fatal) does not work
browser
software used to explore or navigate; when called a web browser it is used to explore the internet; popular web browser examples: Netscape Navigator [tm] and Internet Explorer[tm]; others also exist such as Opera [tm]; they can be stand alone such as the products named or incorporated into other software; a browser is sometimes called client-side software as the user is considered a client of the entity that is serving the client with a server computer running server-side software; web browsers with a particular encryption capability call Secure Socket Layer (SSL) are sometimes called SSL browsers
bugged
to have been deliberately overheard, esp. with a listening device at a distance
certificate
certification
approval or identification; 1) when dealing security, an entity grants certificates to those that pass their criteria for security and identifies the bearer; 2) when dealing with privacy, the certificate identifies the bearer; in both cases a granting entity is known as a Certificate Authority and is usually a private company; also see digital signature
character
a letter number or symbol
click
action usually performed with the mouse on a screen control such as an underlined item (a link), a button or checkbox; however, today a click can be performed in many ways such a by voice command
client
when speaking of the web, one who visits a site with a web browser, the browser or the computer where the browser runs ; thus, a “client user” would be one uses say the web browser; related phrases: “client-side” (the guess side that is served webpages) as opposed to “server-side” (the host side that serves up the webpages)
close
to exit a window; under MS Windows 95 and above, one way to exit a window is to click the X in the upper right hand corner of most windows
control
to command; screen displays can have controls such as dropdown list boxes, buttons and other such objects
cookie
cookies
text files that are usually created by websites on a client’s (user’s) hard drive enabling the site that created it to store information; the client user has full access to cookies; the client can for example block open rename and delete cookies
decoding
decryption
to make readable; to remove the encryption (cipher); to decipher; to turn to plaintext
dumb
implying the lack of a programmed in intelligence
e-mail
E-mail
email
electronic mail
encrypt
encrypted
encryption
to write a message in such a way that others cannot read it without having the proper decryption method; to encypher
free
as used on the web by marketers, often means you have to endure advertising to get something else that may be of value such as free internet service; but, can also be used as a ploy to gather personal information or value from you in some other form
FTC
United States Federal Trade Commission
history
when referring to web browsers, the record of sites visited
homepage
the preferred introductory point to a website
HTML
HyperTextMarkUpLanguage
principle language used to present webpages in a web browser; however, today HTML is used in other applications such as email.
IE4
IE5
Internet Explore major release versions 4 and 5 of the Microsoft Corporation; IE5.1 would be indicate a minor release (1) of major release (5)
impostor
entity, a website or email sender attempting to pose as some other entity; using secure browsers and email programs, authenticate entities by certificates or digital ID
infected
infections
indicates a computer virus present
Internet Service Provider
ISP
service that provides access to the internet (the word wide web, the web, the net)
junk email
junk mail
spam or unwanted email; usually from an advertiser; but, can be more harmful with attachments files that are really viruses; replying to such mail in anyway confirms your email address; displayed in html email programs, some spam may have images (perhaps invisible) that report back to the sender the id of cookies sent earlier; this in turn allows the sender to match email address with the otherwise anonymous cookies; to combat this, users can 1) switch to non-html mode before viewing suspected spam, 2) delete suspected spam, 3) disable their modem before viewing suspected spam; new email programs might warn users of this spam trick
key
keys
a means of opening; for example, a password is a key to an account; a public-key and a private-key are used in asymetric cryptograhic systems (encryption systems)
latest
the most recent as in the most recent version of some software: the latest release
liability
the amount you are responsible for when speaking about credit cards
loading
to take on or in; just as one might load a laundry machine, a program might load in data; just as one might put things on a truck (up-load) or take things off the truck (down-load), one might upload files to a server computer or download files from a server computer
media
portable information storage such as disks, CD’s, tapes
mother’s maiden name
mother’s name before first marriage
mouse
computer pointing device
MS
Microsoft Corporation
net
often internet; sometimes any network in general
norm-referenced
referenced against a known, norm or standard; to normalize
off-line
not on a computer network; rarely, not on any computer; in seminars with computer geeks, it means at a time when the speaker is not speaking to everyone
online
on-line
see off-line
opt-out
optionally get out of such as a banner advertiser’s program where cookies are placed on the user’s computer when the user visits one of the banner adverting agency’s associates
password
passwords
used to log-in to a system, a key to an account such as an email account or an internet account; a password is different than a ‘user name’; passwords are typically blanked out while typing, but user names are not
policy
privacy, security or information affirmations
policy wizard
software for generating privacy, security or information policies for websites; ones based on the W3C Platform for Policy Preferences provide a industry standard base for priacy policy — good for consumers and business
postal
often refers to a ‘real world’ street address
preference
as pertains to cookies, user’s likes such as screen properties (such as size, color), browser, items on the screen, places to go, etc.
privacy
out of the view of others; implies some form of security to keep it private, but security must be expressly used to insure privacy; privacy policies make claims to insure privacy of information
program
programs
often refers to computer programs, but can refer to such things as advertising campaigns as in ‘a banner ad program
protocol
a set of communication rules
real
often used in opposition to the virtual world of on-line or internet experiences
remailers
sometimes referred to as cyberpunk utilities or anonymous mailers, these are services (often free) that promise to hide the sender’s email address from the receiver; remailers are often just individuals that come and go; programs automate the process, but there is no guarantee
S/MIME
Secure Multipurpose Internet Mail Exchange
protocol for secure email exchange
safe
definitely a relative term for secure; nothing is perfectly safe; things are relatively safer than other things where safety can be defined in terms of numbers; for example, credit cards transactions on the internet are safer than non-internet credit card transaction where the percentage of fraudulent credit card transactions on the internet is less than elsewhere
scripts
a set of instructions; there are script languages such as JavaScript and VBScript that are used to go beyond the capabilities of the HyperText MarkUp Language (HTML)
seal, privacy
a sign, emblem or marking indicating a website’s membership to an organization that professes to impose privacy standards on its members
secure
secured
security
the establishment, enforcement or uses of some kind of protection, chiefly against an outside force attempting entry
SET
Secure Electronic Transfer
protocol for exchange credit card information over networks
shut-down
to completely turn off as of a computer; rarely it means to unplug; when it does mean to unplug a distinction should be drawn along the lines of power-down vs. shut-down; shut-down mean an entire procedure such as first turn off computer than turn off monitor, etc. indicated by a phrase such as “shut-down system”
signature, digital
used with email to identify sender; see certificates
smart
implies some form of self contained programmed intelligence
spam
see junk email
SSL
Secure Socket Layer
a means for securely surfing the web; websites that support the protocol have an address that starts with “https://” instead of just “http://”; browsers that support the protocol are here referred to as SSL browsers and they generally also support SET
SSN
Social Security Number
a number assigned by the U. S. government to individuals and considered valuable personal information; a key to identity theft
surfing
to explore the internet with a web browser
Verisign
a certificate authority
visit
visits
to go to a website with a web browser
Win9x/2000
Microsoft Windows 95 / 98 or 2000 operating system
write-up
an article in a magazine or newspaper