Glossary

pensandoIn view of the avalanche of technical terms related to the world of social networks and the Internet, we will try to make a glossary that will allow us to become familiar with them, using the
clearest possible language.

Of course it is open to continuous updating, so we invite our readers to propose new technicalities to be included in the list.

Blog
It is a periodically updated website that chronologically compiles texts or articles of one or more authors, the most recent appearing first, where the author always retains the freedom to leave what he deems appropriate. This English term blog or weblog comes from the words web and log (‘log’ in English = diary).

Bluedating
Use Bluetooth devices to connect or find a partner. Unlike toothing is done with people who have previously registered in the same contact service.

Blueplace
Where to find other users of a blue-dating service.

Cyberbullying
Also known as cyber bullying. Use of telematic means (Internet, mobile telephony and video games mainly online) to exert psychological harassment between equals. It is not strictly sexual harassment or abuse or cases involving adults.

Grooming
Set of strategies that an adult develops to gain the trust of the child through the Internet with the ultimate purpose of obtaining concessions of a sexual nature.

Computer worm
Also called IWorm for its apocope in English, I of the Internet, Worm of worm, is a malware that has the property to duplicate itself. Unlike a virus, a worm does not need to alter program files; it resides in memory and duplicates itself. Worms almost always cause problems on the network (even if it’s simply consuming bandwidth), while viruses always infect or corrupt attacking computer files. It is common to detect the presence of worms in a system when, due to its uncontrolled replication, the resources of the system are consumed to the point that the ordinary tasks of the system are too slow or simply can not be executed.

Hacker
Term used to define a person with great knowledge in computer science and telecommunications and who uses them with an objective that can or to be evil or illegal. The action of using their knowledge is called hacking.
The term “hacker” usually has a derogatory or negative connotation, as it relates to illegal tasks. It is more appropriate to call hackers to those hackers who perform evil actions with their knowledge.

Hoax
A hoax or false news is an attempt to make a group of people believe that something false is real. In Castilian the term was popularized mainly when referring to massive deceits by electronic means especially Internet.

Key-logger
A key-logger, derived from English: key and logger, is a type of software or a specific hardware device that is responsible for recording the keystrokes that are made on the keyboard, then memorize them in a file or send them to Through the internet. It is often used as malware, allowing other users to access important passwords, such as a credit card number, or other private information that you want to obtain.

Malware
Malicious software, also called bad-ware, malicious software or malicious software is a type of software that aims to infiltrate or damage a computer without the consent of its owner. The term malware includes viruses, worms, Trojans, and other small programs such as rootkits, spyware, intrusive adware and other malicious and undesirable software.

Microblogging
It is a type of service that allows its users to send and post brief messages, usually text only. The options for sending messages vary from websites, through SMS, instant messaging or applications on purpose. These updates are displayed on the user’s profile page, and are also sent immediately to other users who have chosen the option to receive them. The originating user can restrict sending these messages only to members of their circle of friends, or allow their access to all users, which is the default option. Twitter is currently the most widespread social microblogging network in the world.

Pederasty Online
Pedophiles use the Internet to exchange images and videos with content related to child abuse. Spreading, even owning such files on any device is criminal. Any user who accidentally finds an image or has any news of it, should report immediately, otherwise it could be related to one of these networks of pederasty.

Phishing
Attempting to acquire confidential information fraudulently (such as a password or detailed information about credit cards or other banking information).

Ramsonware
Modality of malware or malware that is installed on our device and blocks your access. “Ransom”, a word that comes from English, means “rescue” and perfectly defines the procedure followed by this type of virus. If our computer is infected by a ransomware will be blocked, showing us a screen that will force us to pay a ransom if we want to use it again. The message that appears makes us believe that we have violated some legal norm and unless we pay a sum of money as a ransom, we will not recover it again.

Scam
Is used familiarly to refer to a network of corruption. Today is also used to define fraud attempts through an email or fraudulent pages. Generally, it is intended to defraud financially through deception by presenting an alleged donation to receive or a lottery prize that is accessed prior to sending money.
In order not to be affected by these threats, people should avoid accessing information whose source is not reliable. A good practice is the removal of all types of unsolicited mail to avoid the scam.

Sexting
Sending sexual content (usually photographs and / or videos) usually created by the sender himself, to other people through computers or mobile phones.

Sextorsión
A form of sexual exploitation in which a person is blackmailed by means of a naked image of himself that has been shared through the Internet through sexting. The victim is subsequently coerced into having sexual relations with the blackmailer, to produce pornography or other actions.

Spam
It is junk or junk SMS unsolicited messages, usually of the type advertising, sent in large numbers that somehow harms the recipient.

Spoofing
Use of phishing techniques usually with malicious or research uses. There are different types depending on the technology to which we refer, such as IP spoofing (perhaps the best known), ARP spoofing, DNS spoofing, Web spoofing or e-mail spoofing, although in general can be included within spoofing any technology Network likely to suffer from identity theft.

Impersonation
It occurs when one person pretends to be another, for example in social networks, or as the author of an email. It is usually done to cause some kind of damage to the person supplanted, such as eliminating their contacts or the entire account itself, or put it in situations committed by insulting or publishing something offensive. To avoid this you have to be very careful with the passwords. We should not supplant anyone and if we detect that someone does, we must denounce it, as it is considered a crime.

Toothing
Practice using communications between mobile phones, tablets or other portable devices, using Bluetooth, to connect with strangers.

Trojan
Trojan horse is a malicious software that is presented to the user as an apparently legitimate and harmless program but when executed it causes damage. The term Trojan comes from the history of the Trojan horse mentioned in Homer’s Odyssey. Trojans can perform different tasks, but in most cases create a backdoor that allows remote administration to an unauthorized user. A Trojan is not strictly a computer virus, and the main difference is that Trojans do not spread the infection to other systems by themselves.

Computer virus
It is a malware that aims to alter the normal operation of the computer, without the permission or knowledge of the user. They can intentionally destroy data stored on a computer, although there are also other more harmless, which are characterized only by being annoying. It auto-executes and spreads by inserting copies of itself into another program or document. A computer virus is attached to a program or file in a way that can spread, infecting computers as it travels from one computer to another.