Converts signals between analog (like cable or phone lines) and digital (like Ethernet). The bridge between your home network and the internet.

Unsolicited bulk messages, usually email. Most inboxes filter spam out automatically.

Connects multiple wired devices on a network so they can talk to each other.

Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.

A virtual endpoint for network communication. Different services use specific port numbers, like 80.

Malware disguised as legitimate software. Named after the famed Trojan Horse.

Defines which part of an IP address identifies the network and which part identifies the device.

Malware that spreads by copying itself, like a biological virus. Evolved into more advanced forms:

A self-replicating virus that spreads over networks without needing to piggyback on another program.

Malware that spies on your computer activity, collecting personal data to send to hackers.