Glossary

Glossary

This glossary describes terms used in Threat Discovery Appliance documentation.

Glossary of Terms

Term

Definition

Active

This refers to the device currently in use.

ActiveUpdate

ActiveUpdate is a function common to many Trend Micro products. Connected to the Trend Micro update website, ActiveUpdate provides up-to-date downloads of virus pattern files, scan engines, program, and other Trend Micro component files through the Internet or the Trend Micro Total Solution CD.

ActiveX

A type of open software architecture that implements object linking and embedding, enabling some of the standard interfaces, such as downloading of web pages.

ActiveX malicious code

An ActiveX control is a component object embedded in a web page which runs automatically when viewing the page. ActiveX controls allow web developers to create interactive, dynamic web pages with broad functionality such as HouseCall, Trend Micro's free online scanner.

Hackers, virus writers, and others who want to cause mischief or worse may use ActiveX malicious code as a vehicle to attack the system. Change the browser's security settings to "high" so that these ActiveX controls do not execute.

Address

Refers to a networking address (see IP address) or an email address, which is the string of characters that specify the source or destination of an email message.

Administrator

Refers to “system administrator"—the person in an organization who is responsible for activities such as setting up new hardware and software, allocating user names and passwords, monitoring disk space and other IT resources, performing back ups, and managing network security.

Administrator account

A user name and password that has administrator-level privileges.

Administrator email address

The address used by the administrator of your Trend Micro product to manage notifications and alerts.

Adware

Advertising-supported software in which advertising banners display while the program is running. See also Spyware.

Alert

A message intended to inform a system's users or administrators about a change in the operating conditions of that system or about some kind of error condition.

Antivirus

Computer programs designed to detect and clean computer viruses.

Archive

A single file containing one or (usually) more separate files plus information to allow them to be extracted (separated) by a suitable program, such as a .zip file.

Attachment

A file attached to (sent with) an email message.

Authentication

The verification of the identity of a person or a process. Authentication ensures that the system delivers the digital data transmissions to the intended receiver. Authentication also assures the receiver of the integrity of the message and its source (where or whom it came from).

The simplest form of authentication requires a user name and password to gain access to a particular account. Other authentication protocols are secret-key encryption, such as the Data Encryption Standard (DES) algorithm, or public-key systems using digital signatures.

Also see public-key encryption and digital signature.

Boot sector

A sector is a designated portion of a disk (the physical device from which the computer reads and writes the data on). The boot sector contains the data used by your computer to load and initialize the computer’s operating system.

Boot sector virus

A boot sector virus is a virus targeted at the boot sector (the operating system) of a computer. Computer systems are most vulnerable to attack by boot sector viruses when you boot the system with an infected disk from the floppy drive - the boot attempt does not have to be successful for the virus to infect the hard drive.

Also, there are a few viruses that can infect the boot sector from executable programs. These are multi-partite viruses and they are relatively rare. Once the system is infected, the boot sector virus will attempt to infect every disk accessed by that computer. In general, most antivirus software can successfully remove boot sector viruses.

Bridge

A device that forwards traffic between network segments based on data link layer information. These segments have a common network layer address.

Browser

A program that allows a person to read hypertext, such as Internet Explorer. The browser gives some means of viewing the contents of nodes (or "pages") and of navigating from one node to another. A browser acts as a client to a remote web server.

Cache

A small fast memory, holding recently accessed data, designed to speed up subsequent access to the same data. The term is most often applied to processor-memory access, but also applies to a local copy of data accessible over a network.

COM file infector

An executable program with a .com file extension. Also see DOS virus.

Compressed file

A single file containing one or more separate files plus information for extraction by a suitable program, such as WinZip.

Configuration

Selecting options for how your Trend Micro product will function, for example, selecting whether to quarantine or delete a virus-infected email message.

Cookie

A mechanism for storing information about an Internet user, such as name, preferences, and interests, which is stored in your web browser for later use. The next time you access a website for which your browser has a cookie, your browser sends the cookie to the web server, which the web server can then use to present you with customized web pages. For example, you might enter a website that welcomes you by name.

Daemon

A program not explicitly invoked, but lays dormant waiting for some condition(s) to occur. The perpetrator of the condition need not be aware that a daemon is lurking.

Default

A value that pre-populates a field in the management console interface. A default value that represents a logical choice and provided for convenience. Use default values as-is, or change them.

Denial of Service (DoS) attack

Group-addressed email messages with large attachments that clog your network resources to the point where messaging service is noticeably slow or even stopped.

Dialer

A type of Trojan that, when executed, connects the user's system to a pay-per-call location in which the unsuspecting user is billed for the call without his or her knowledge.

Digital signature

Extra data appended to a message which identifies and authenticates the sender and message data using a technique called public-key encryption. Also see public-key encryption and authentication.

Directory

A node, which is part of the structure on a hierarchical computer file system. A directory typically contains other nodes, folders, or files. For example, C:\Windows is the Windows directory in the C drive.

Directory path

The subsequent layers within a directory where a file can be found, for example, the directory path for the ISVW for SMB Quarantine directory is:
C:\Programs\Trend Micro\ISVW\Quarantine

Disclaimer

A statement appended to the beginning or end of an email message that states certain terms of legality and confidentiality regarding the message.

DNS

Domain Name System—A general-purpose data query service chiefly used in the Internet for translating host names into IP addresses.

DNS resolution

When a DNS client requests host name and address data from a DNS server, the process is called resolution. Basic DNS configuration results in a server that performs default resolution. For example, a remote server queries another server for data in a computer in the current zone. Client software in the remote server queries the resolver, which answers the request from its database files.

(Administrative) domain

A group of computers sharing a common database and security policy.

Domain name

The full name of a system, consisting of its local host name and its domain name, for example, tellsitall.com. A domain name should be sufficient to determine a unique Internet address for any host in the Internet. This process, called "name resolution", uses the Domain Name System (DNS).

DOS virus

Also referred to as “COM” and “EXE file infectors.” DOS viruses infect DOS executable programs- files that have the extensions *.COM or *.EXE. Unless they have overwritten or inadvertently destroyed part of the original program's code, most DOS viruses try to replicate and spread by infecting other host programs.

Download (verb)

To transfer data or code from one computer to another. Downloading often refers to transfer from a larger "host" system (especially a server or mainframe) to a smaller "client" system.

Dropper

Droppers are programs that serve as delivery mechanisms to carry and drop viruses, Trojans, or worms into a system.

Dynamic Host Configuration Protocol (DHCP)

A protocol for assigning dynamic IP addresses to devices in a network. With dynamic addressing, a device can have a different IP address everytime it connects to the network. In some systems, the device’s IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses.

Encryption

Encryption is the process of changing data into a form that only the intended receiver can read. To decipher the message, the receiver of the encrypted data must have the proper decryption key. In traditional encryption schemes, the sender, and the receiver use the same key to encrypt and decrypt data. Public-key encryption schemes use two keys: a public key, which anyone may use, and a corresponding private key, possessed only by the person who created it. With this method, anyone may send a message encrypted with the owner's public key, but only the owner has the private key necessary to decrypt it. PGP (Pretty Good Privacy) and DES (Data Encryption Standard) are two of the most popular public-key encryption schemes.

Ethernet

A local area network (LAN) technology invented at the Xerox Corporation, Palo Alto Research Center. Ethernet is a best-effort delivery system that uses CSMA/CD technology. A variety of cable schemes can run over the Ethernet, including thick coaxial, thin coaxial, twisted pair, and fiber optic cable. Ethernet is a standard for connecting computers into a local area network. The most common form of Ethernet is the 10BaseT, which denotes a peak transmission speed of 10 Mbps using copper twisted-pair cable.

Executable file

A binary file containing a program in computer language which is ready to be executed (run).

EXE file infector

An executable program with an .exe file extension. Also see DOS virus.

False positive

An email message that was "caught" by the spam filter and identified as spam, but is actually not spam.

FAQ

Frequently Asked Questions—A list of questions and answers about a specific topic.

File

An element of data, such as an email message or HTTP download.

File-infecting virus

File-infecting viruses infect executable programs (generally, files that have extensions of .com or .exe). Most such viruses simply try to replicate and spread by infecting other host programs, but some inadvertently destroy the program they infect by overwriting a portion of the original code. Some of these viruses are very destructive and attempts to format the hard drive at a pre-determined time or perform some other malicious action.

In many cases, you can successfully remove a file-infecting virus from the infected file. However, if the virus has overwritten part of the program's code, the original file will be unrecoverable

File type

The kind of data stored in a file. Most operating systems use the file name extension to determine the file type. The file type used to select an appropriate icon to represent the file in a user interface, and the correct application with which to view, edit, run, or print the file.

File name extension

The portion of a file name (such as .dll or .xml) which indicates the kind of data stored in the file. Apart from informing the user what type of content the file holds, file name extensions are typically used to decide which program to launch when a file is run.

Firewall

A gateway computer with special security precautions in it, used to service outside network (especially Internet) connections and dial-in lines.

FPGA

Field Programmable Gate Array - a programmable integrated circuit.

FTP

A client-server protocol which allows a user on one computer to transfer files to and from another computer over a TCP/IP network. Also refers to the client program the user executes to transfer files.

Gateway

An interface between an information source and a web server.

Grayware

A category of software that may be legitimate, unwanted, or malicious. Unlike threats such as viruses, worms, and Trojans, grayware does not infect, replicate, or destroy data, but it may violate your privacy. Examples of grayware include spyware, adware, and remote access tools.

Hacker

See virus writer.

Hard disk (or hard drive)

One or more rigid magnetic disks rotating about a central axle with associated read/write heads and electronics, used to read and write hard disks or floppy disks, and to store data. Most hard disks are permanently connected to the drive (fixed disks) though there are also removable disks.

Heuristic rule-based scanning

Scanning network traffic, using a logical analysis of properties that reduces or limits the search for solutions.

HTML virus

A virus targeted at Hyper Text Markup Language (HTML), the authoring language used to create information in a web page. The virus resides in a web page and downloads through a user’s browser.

HTTP

Hypertext Transfer Protocol—The client-server TCP/IP protocol used in the World Wide Web for the exchange of HTML documents. It conventionally uses port 80.

HTTPS

Hypertext Transfer Protocol Secure—A variant of HTTP used for handling secure transactions.

HouseCall

A free virus scanning and cleaning product from Trend Micro. HouseCall can detect and clean viruses found in your hard drive, but HouseCall does not provide real-time protection. In other words, HouseCall can help you to discover and clean up an existing problem, but will not prevent future ones, nor will HouseCall protect against worms, or mass-mailing programs. For preventive protection, you need Trend Micro security products.

Image

Refers to the Trend Micro Threat Discovery firmware or program file.

Image file

A file containing data representing a two-dimensional scene, in other words, a picture. These files are real world images taken using a digital camera, or generated by the computer using graphics software.

IntelliScan

IntelliScan is a Trend Micro scanning technology that optimizes performance by examining file headers using true file type recognition, and scanning only file types known to potentially harbor malicious code. True file type recognition helps identify malicious code disguised by a harmless extension name.

Internet

A client-server hypertext information retrieval system, based on a series of networks connected with routers. The Internet is a modern information system and a widely accepted medium for advertising, online sales, and services, as well as university and many other research networks. The World Wide Web is the most familiar aspect of the Internet.

IP

Internet Protocol—See IP address.

IP address

Internet address for a device in a network, typically expressed using dot notation such as 123.123.123.123.

IP gateway

Also called a router, a gateway is a program or a special-purpose device that transfers IP datagrams from one network to another before reaching the final destination.

IT

Information technology, to include hardware, software, networking, telecommunications, and user support.

Java file

Java is a general-purpose programming language developed by Sun Microsystems. A Java file contains Java code. Java supports programming for the Internet in the form of platform-independent Java "applets." (An applet is a program written in Java programming language that can be included in an HTML page. When you use a Java-technology enabled browser to view a page that contains an applet, the applet transfers its code to your system and the browser’s Java Virtual Machine executes the applet.)

Java malicious code

Virus code written or embedded in Java. Also see Java file.

JavaScript virus

JavaScript is a simple programming language developed by Netscape that allows web developers to add dynamic content to HTML pages displayed in a browser using scripts.

A JavaScript virus is a virus that targets scripts in the HTML code. This enables the virus to reside in web pages and download to a user’s desktop through the user’s browser.

Also see VBscript virus.

Joke program

An executable program that is annoying or causes users undue alarm. Unlike viruses, joke programs do not self-propagate. However, you should still remove these from your system.

KB

Kilobyte—1024 bytes of memory.

Keylogger

Keyloggers are programs that catch and store all keyboard activity. There are legitimate keylogging programs used by corporations to monitor employees and by parents to monitor their children. However, criminals also use keystroke logs to sort for valuable information such as logon credentials and credit card numbers.

L2 devices

Short for layer 2 devices. These devices refer to the hardware devices connected to the Data Link layer of the OSI model. Switches are examples of L2 devices.

L3 devices

Short for layer 3 devices. These devices refer to the hardware devices connected to the Network layer of the OSI model. Routers are examples of L3 devices.

Liquid Crystal Display (LCD)

A 5x7 dot display LCD on the Threat Discovery Appliance front panel capable of displaying 2x16 character messages.

Link (also called hyperlink)

A reference from some point in one hypertext document to some point in another document or another place in the same document. You can distinguish links because these usually have a different color or style of text, such as underlined blue text. When you activate the link, for example, by clicking it with a mouse, the browser displays the target of the link.

Listening port

A port utilized for client connection requests for data exchange.

Logic bomb

Code surreptitiously inserted into an application or operating system that causes it to perform some destructive or security-compromising activity whenever it meets specified conditions.

Macro

A command used to automate certain functions within an application.

MacroTrap

A Trend Micro utility that performs a rule-based examination of all macro code saved in association with a document. Macro virus code is typically contained in part of the invisible template that travels with many documents (.dot, for example, in Microsoft Word documents). MacroTrap checks the template for signs of a macro virus by seeking out key instructions that perform virus-like activity—instructions such as copying parts of the template to other templates (replication), or instructions to execute potentially harmful commands (destruction).

Macro virus

Often encoded as application macros and included in a document. Unlike other virus types, macro viruses are not specific to an operating system and can spread through email attachments, web downloads, file transfers, and cooperative applications.

Malware (malicious software)

Programming or files developed for the purpose of doing harm, such as viruses, worms, and Trojans.

Management console

The user interface for your Trend Micro product.

Mass mailer (also known as a Worm)

A malicious program that has high damage potential, because it causes large amounts of network traffic.

Mbps

Millions of bits per second—a measure of bandwidth in data communications.

MB

Megabyte—1024 kilobytes of data.

Message

An email message, which includes the message subject in the message header and the message body.

Message body

The content of an email message.

Message size

The number of KB or MB occupied by a message and its attachments.

Message subject

The title or topic of an email message, such as “Third Quarter Results” or “Lunch on Friday.”

Microsoft Office file

Files created with Microsoft Office tools such as Excel or Microsoft Word.

Mirror port

A configured port on a switch used to send a copy of all network packets from a switch port to a network monitoring connection on another switch port.

Mixed threat attack

Complex attacks that take advantage of multiple entry points and vulnerabilities in enterprise networks, such as the “Nimda” or “Code Red” threats.

Multi-partite virus

A virus that has characteristics of both boot sector viruses and file-infecting viruses.

Network Address Translation (NAT)

A standard for translating secure IP addresses to temporary, external, registered IP address from the address pool. This allows Trusted networks with privately assigned IP addresses to have access to the Internet. This also means that you do not have to get a registered IP address for every computer in your network.

NetBIOS (Network Basic Input Output System)

An application program interface (API) that adds functionality such as network capabilities to disk operating system (DOS) basic input/output system (BIOS).

NetScreen Redundancy Protocol (NSRP)

A proprietary protocol that provides configuration and run time object (RTO) redundancy and a device failover mechanism for GateLock units in a high availability (HA) cluster.

Network segment

A section of a network that falls within the bounds of bridges, routers, or switches. Dividing an Ethernet into multiple segments is one of the most common ways of increasing available bandwidth on the LAN. IF segmented correctly, most network traffic remains within a single segment, enjoying the full 10 Mbps bandwidth. Hubs and switches connect each segment to the rest of the LAN.

Network Time Protocol (NTP)

Refers to an Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the millisecond of computer clock times in a network of computers.

Network virus

A type of virus that uses network protocols, such as TCP, FTP, UDP, HTTP, and email protocols to replicate. Network viruses often do not alter system files or modify the boot sectors of hard disks. Instead, they infect the memory of client computers, forcing them to flood the network with traffic, which can cause slowdowns or even complete network failure.

Notification

(Also see action and target)

A message that is forwarded to one or more of the following:
- system administrator
- sender of a message
- recipient of a message, file download, or file transfer
The purpose of the notification is to communicate that an action took place, or been attempted, such as a virus being detected in an attempted HTTP file download.

Offensive content

Words or phrases in messages or attachments that are considered offensive to others, for example, profanity, sexual harassment, racial harassment, or hate mail.

Open source

Programming code that is available to the general public for use or modification free of charge and without license restrictions.

Operating system

The software which handles tasks such as the interface to peripheral hardware, scheduling tasks, and allocating storage. In this documentation, the term also refers to the software that presents a window system and graphical user interface.

Open System Interconnection (OSI) model

This model defines a networking framework for implementing protocols in seven layers. Passing control from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

Outgoing

Email messages or other data leaving your network, routed out to the Internet.

Packer

A compression tool for executable files.

Partition

A logical portion of a disk. (Also see sector, which is a physical portion of a disk.)

Password cracker

An application program used to recover a lost or forgotten password. An intruder can use these applications to gain unauthorized access to a computer or network resources.

Pattern file (also known as Official Pattern Release)

The pattern file, as referred to as the Official Pattern Release (OPR), is the latest compilation of patterns for identified viruses. Passed a series of critical tests to ensure that you get optimum protection from the latest virus threats. This pattern file is most effective when used with the latest scan engine.

Payload

Payload refers to an action that a virus performs on the infected computer. This can be something relatively harmless, such as displaying messages or ejecting the CD drive, or something destructive, such as deleting the entire hard drive.

Polymorphic virus

A virus that is capable of taking different forms.

POP3

Post Office Protocol, version 3—A messaging protocol that allows a client computer to retrieve electronic mail from a server through a temporary connection, for example, a mobile computer without a permanent network connection.

POP3 server

A server which hosts POP3 email, from which clients in your network will retrieve POP3 messages.

Port

A logical channel or channel endpoint in a communications system, used to distinguish between different logical channels in the same network interface on the same computer. Each application program has a unique port number associated with it.

Port mirroring

Method of monitoring network traffic by copying source port or VLAN specific traffic to a destination port for analysis.

Preconfiguration Console

The console used to preconfigure the device.

Proxy

A process providing a cache of items available on other servers which are presumably slower or more expensive to access.

Proxy server

A World Wide Web server which accepts URLs with a special prefix, used to fetch documents from either a local cache or a remote server, then returns the URL to the requester.

Public-key encryption

An encryption scheme where each person gets a pair of “keys,” called the public key and the private key. The software publishes the public key while keeping the private key a secret. Messages are encrypted using the intended recipient's public key and can only be decrypted using his or her private key. Also see authentication and digital signature.

Purge

To delete all, as in getting rid of old entries in the logs.

Recipient

The person or entity to whom an email message is addressed.

Relay

To convey by means of passing through various other points.

Remote Port Mirroring

An implementation of port mirroring designed to support source ports, source VLANs, and destination ports across different switches.

Removable drive

A removable hardware component or peripheral device of a computer, such as a zip drive.

RJ-45

Resembling a standard phone connector, an RJ-45 connector is twice as wide (with eight wires) and hooks up computers to local area networks (LANs) or phones with multiple lines.

Scan

To examine items in a file in sequence to find those that meet a particular criteria.

Scan engine

The module that performs antivirus scanning and detection in the host product to which it is integrated.

Secure Password Authentication

An authentication process, which can protect communications, using for example, encryption and challenge/response mechanisms.

Secure Socket Layer (SSL)

Secure Socket Layer (SSL), is a protocol designed by Netscape for providing data security layered between application protocols (such as HTTP, Telnet, or FTP) and TCP/IP. This security protocol provides data encryption, server authentication, message integrity, and optional client authentication for a TCP/IP connection.

Sender

The person who is sending an email message to another person or entity.

Server

A program that provides some service to other (client) programs. The connection between client and server is normally by means of message passing, often over a network, and uses some protocol to encode the client's requests and the server's responses. The server may run continuously (as a daemon), waiting for requests to arrive, or it may be invoked by some higher-level daemon which controls a number of specific servers.

Signature

See virus signature.

SMTP

Simple Mail Transfer Protocol—A protocol used to transfer electronic mail between computers, usually over Ethernet. It is a server-to-server protocol but uses other protocols to access the messages.

SMTP server

A server that relays email messages to their destinations.

SNMP

Simple Network Management Protocol—A protocol that supports monitoring of devices attached to a network for conditions that merit administrative attention.

SNMP trap

A trap is a programming mechanism that handles errors or other problems on a computer program. An SNMP trap handles errors related to network device monitoring.
See SNMP.

SOCKS4

A protocol that relays transmission control protocol (TCP) sessions at a firewall host to allow application users transparent access across the firewall.

Spam

Unsolicited email messages meant to promote a product or service.

Spyware

Advertising-supported software that typically installs tracking software in your system, capable of sending information about you to another party. The danger is that users cannot control what the collected data is, or how it is used.

Switch

A device that filters and forwards packets between LAN segments.

Total Solution CD

A CD containing the latest product versions and all the patches applied during the previous quarter. The Total Solution CD is available to all Trend Micro Premium Support customers.

Traffic

Data flowing between the Internet and your network, both incoming and outgoing.

Traffic Mirroring

Used on network devices such as switches to send a copy of specific network packets that pass one switch port (or an entire VLAN) to a network monitoring connection on another switch port. This is commonly used for network appliances that require monitoring of network traffic such as Threat Discovery Appliance.

Trojan Horse

A malicious program disguised as something benign. A Trojan is an executable program that does not replicate, but instead, resides in a system to perform malicious acts, such as opening a port for an intruder.

True file type

Used by IntelliScan, a virus scanning technology, to identify the type of information in a file by examining the file headers, regardless of the file name extension.

Trusted domain

A domain from which your Trend Micro product will always accept messages, without considering whether the message is spam. For example, a company called Dominion, Inc. has a subsidiary called Dominion-Japan, Inc. The dominion.com network always accepts messages from dominion-japan.com, without checking for spam, since the messages are from a known and trusted source.

Trusted host

A server allowed to relay mail through your network because they are trusted to act appropriately and not, for example, relay spam through your network.

URL

Universal Resource Locator—A standard way of specifying the location of an object, typically a web page, in the Internet, for example, www.trendmicro.com. The URL maps to an IP address using DNS.

VBscript virus

VBscript (Microsoft Visual Basic scripting language) is a simple programming language that allows web developers to add interactive functionality to HTML pages displayed in a browser. For example, developers might use VBscript to add a “Click Here for More Information” button on a web page.

A VBscript virus is a virus targeted at the scripts in the HTML code. This enables the virus to reside in web pages and download to a user’s desktop through the user’s browser.

Also see JavaScript virus.

Virtual Local Area Network (VLAN)

A logical (rather than physical) grouping of devices that constitute a single broadcast domain. You do not identify VLAN members by their location on a physical subnetwork but through the use of tags in the frame headers of their transmitted data. The IEEE 802.1Q standard describes VLANs more thoroughly.

Virus

A computer virus is a program – a piece of executable code – that has the unique ability to infect. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate.

In addition to replication, some computer viruses share another commonality: a damage routine that delivers the virus payload. While payloads may only display messages or images, they can also destroy files, reformat your hard drive, or cause other damage. Even if the virus does not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance of your computer.

Virus kit

A template of source code for building and executing a virus, available from the Internet.

Virus signature

A virus signature is a unique string of bits that identifies a specific virus. Virus signatures are stored in the Trend Micro virus pattern file. The Trend Micro scan engine compares code in files, such as the body of an email message, or the content of an HTTP download, to the signatures in the pattern file. If the scan engine finds a match, they will detect and act upon the virus (for example, cleaned, deleted, or quarantined) according to your security policy.

Virus writer

Another name for a computer hacker, someone who writes virus code.

Web

The World Wide Web, also called the web or the Internet.

Wildcard

A term used in reference to content filtering, where an asterisk (*) represents any characters. For example, in the expression *ber, this expression can represent barber, number, plumber, timber, and so on. The term originates from card games, in which a specific card, identified as a "wildcard," can be used for any number or suit in the card deck.

Worm

A self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems.

Zip file

A compressed archive (in other words, “zip file") from one or more files using an archiving program such as WinZip.