A vulnerability that’s exploited before the software maker knows about it and can fix it.

Features that restrict content and computer use. Handy for protecting kids online.

High Dynamic Range. Heightens a picture’s dynamic range (contrast) for richer, more detailed images.

Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.

Accessing a computer over a network. Can be handy but also opens security holes if not set up right.

Audio from multiple speakers positioned around you. 5.1, 7.1, Dolby Atmos are popular setups.

A digital fingerprint of some data. Used to verify that files haven’t been tampered with.

Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!

Converts signals between analog (like cable or phone lines) and digital (like Ethernet). The bridge between your home network and the internet.

Unsolicited bulk messages, usually email. Most inboxes filter spam out automatically.