Malicious Codes and Secure Environments
Across
- 2. The "directory tree" or list of folders where a file is located.
- 5. The software that enables virtualization by creating an interface between the VM and host hardware.
- 7. The built-in SuperUser account in Linux that has all administrative privileges.
- 9. The physical computer that runs a virtual machine.
- 10. A Potentially Unwanted Program that often comes bundled with freeware.
- 11. A graphical interface that uses pictures and menus for commands.
- 12. A program that blocks access to files or a device until a ransom is paid.
- 14. A text-based interface used to operate a computer.
- 15. A Virtual Machine, which is a guest computer running inside a host computer.
- 17. Unsolicited commercial email, also known as electronic junk mail.
- 18. A security barrier created by separating software from hardware, often using virtualization.
- 19. Software that displays unwanted advertisements like pop-ups or banners.
Down
- 1. A type of spyware that records a user's keystrokes.
- 3. The text-based command window in a CLI, also known as a shell or command prompt.
- 4. Technology that allows one computer to run multiple operating systems at the same time.
- 6. A symbol, like $ or >, indicating the computer is ready for a command.
- 8. A command that allows a user to run another command with administrator or "SuperUser" privileges.
- 13. Software that secretly gathers user data and sends it to a third party.
- 16. Malicious software designed to harm a computer.