Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!

Copying audio or video data from one format to another, like CD tracks to MP3 files.

Playing media in real-time as it’s sent over the internet. Services like Spotify and Netflix use streaming.

Malware that encrypts your files and demands payment for the decryption key. Nasty stuff.

Malware that spies on your computer activity, collecting personal data to send to hackers.

A self-replicating virus that spreads over networks without needing to piggyback on another program.

Malware that spreads by copying itself, like a biological virus. Evolved into more advanced forms:

Malware disguised as legitimate software. Named after the famed Trojan Horse.

Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.

Unsolicited bulk messages, usually email. Most inboxes filter spam out automatically.