Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.

Accessing a computer over a network. Can be handy but also opens security holes if not set up right.

Audio from multiple speakers positioned around you. 5.1, 7.1, Dolby Atmos are popular setups.

A digital fingerprint of some data. Used to verify that files haven’t been tampered with.

Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!

A profile for logging into a system. Can be an administrator (full control) or standard user (limited).

A self-replicating virus that spreads over networks without needing to piggyback on another program.

A normal account for day-to-day use. Can’t accidentally (or purposely!) mess up the system.

Copying audio or video data from one format to another, like CD tracks to MP3 files.

Malware that spies on your computer activity, collecting personal data to send to hackers.