User's Manual

transmits that information in the background to someone else.
Spyware can also gather information about e-mail addresses
and even passwords and credit card numbers.
Spyware's similarity to a Trojan horse is the fact that users
unwittingly install the product when they install something
else. A common way to become a victim of spyware is to
download certain peer-to-peer file swapping products that are
available today.
Aside from the questions of ethics and privacy, spyware steals
from the user by using the computer's memory resources and
also by eating bandwidth as it sends information back to the
spyware's home base via the user's Internet connection. Because
spyware is using memory and system resources, the applications
running in the background can lead to system crashes or general
system instability.
Startup items Any files placed in this folder will open when the computer
starts. For example, a startup screen, a sound file to be played
when the computer first starts, a reminder calendar, or applica-
tion programs can be startup items. Normally, an alias of a file
is placed in this folder rather than the file itself.
System tray Introduced with Windows 95, the system tray is located in the
Windows taskbar (usually at the bottom next to the clock) and
contains miniature icons for easy access to system functions
such as fax, printer, modem, volume, and more. Double click
or right click an icon to view and access the details and controls.
TCP/IP Transmission Control Protocol/Internet Protocol - A set of
networking protocols widely used on the Internet that provides
communications across interconnected networks of computers
with diverse hardware architectures and various operating
systems. TCP/IP includes standards for how computers com-
municate and conventions for connecting networks and routing
traffic.
Trojan A destructive program that masquerades as a benign applica-
tion. Unlike viruses, Trojan horses do not replicate themselves
but they can be just as destructive. One of the most insidious
types of Trojan horse is a program that claims to rid your
computer of viruses but instead introduces viruses onto your
computer.
124
Glossary