Cybersecurity from A to Z

Often we get asked to breakdown cybersecurity information using more lay-man’s terms. FixMeStick is designed to be an easy-to-use solution, so we don’t want you to have to jump through hoops to understand things. That’s why we created this handy glossary of terms.

Think we missed something? Leave it in the comments below so we can add it!


Adware – Any piece of software or application that displays advertisements on your computer.

AdBlocker – A piece of software designed to prevent advertisements from appearing on a web page.

Antivirus – A security program designed to monitor a system for malicious software.


BIOS – Basic Input/Output System – is the program a personal computer’s microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer’s operating system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer.

BOOT – The boot menu is a menu accessible when a computer is first starting up. It can contain a number of different device options to boot to, including CDs, DVDs, flash drive, or hard drives, and a LAN (network)

Broadband – Allows users to access the Internet and its related services at higher speeds

Bug – A bug refers to an error, fault or flaw in a computer program that may cause it to unexpectedly quit or behave in an unintended manner.


Cloud storage –  The cloud refers to storing and accessing data and program over the Internet instead of them saved on your computer’s hard drive.

Cookies – A small text file (up to 4KB) created by a website that is stored in the user’s computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the website to recognize you and keep track of your preferences.

Cyberattack – An attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm



Encryption – The process of converting information or data into a code, especially to prevent unauthorized access.

Ethernet Cable – One of the most common types of network cables used for wired networks.


Firewall – A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.



Hard Disk Drive (HDD) – This is what stores all your data. It houses the hard disk, where all your files and folders are physically located.


Identity cloning – also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver’s license numbers, in order to impersonate someone else.




LAN – A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.


Malware – Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, rootkit, ransomware and spyware/adware.



Operating System – An operating system (OS) is a software program that enables the computer hardware to communicate and operate with the computer software.


Phishing – A form of fraud in which an attacker masquerades as a reputable entity or person through email or other communication channels.

Private Browser – An internet mode where all the privacy features of the Web browser are activated without having to manually set them individually, such as setting cookies to off and clearing the browsing history. When using private browsing mode none of this data is stored.

Proxy Server – A computer system or router that functions as a relay between client and server. It helps prevent an attacker from invading a private network and is one of several tools used to build a firewall.



Ransomware – An umbrella term for a group of viruses that holds valuable information hostage– either by encrypting your data so that it is unreadable or by totally locking you out of your computer. FixMeTip: we recommend never paying after a ransomware attack, here’s why.

Rootkit – A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over a computer or other system.


Search engine – A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.

Spam – A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.

Spoof – The act of disguising a communication from an unknown source as being from a known, trusted source. Email spoofing is one of the best known spoofs.

Spyware – A form of malware that monitors user activities and reports them to an external third party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics.

Solid-State Drive – An SSD is a type of mass storage device similar to a hard disk drive (HDD). It supports reading and writing data and maintains stored data in a permanent state even without power.

System Restore – A feature in Windows. It allows users to restore their computers to a previous state without losing personal data files.


Trojan Horse – A form of malware where a malicious payload is imbedded inside of a benign host file. The victim is tricked into believing that the only file being retrieved is the viewable benign host. However, when the victim uses the host file, the malicious payload is automatically deposited onto their computer system.

Two-Factor Authentication – Proving identity using two authentication factors usually considered stronger than any single factor authentication. A form of multi-factor authentication.



VPN (Virtual Private Network) – Programming that creates a safe and encrypted connection over a less secure network, such as the public internet.

Virus – A virus is typically designed to damage or destroy data, but different viruses implement their attack at different rates, speeds or targets.


Worm – A computer worm is a self-replicating malware that duplicates itself to spread to uninfected computers.





  1. Brian Mclean -

    hi i purchased a fixme stick software i am brian e mclean i paid for it with my td bank card i put the software on a older fixme stick i cleaned the three computers i have and it worked and it did not work again could you send me a link or a way i can correct this thankyou have great day.

  2. Veljko Radenic -


  3. Linda -

    Hi Veljko, glad you like our glossary, feel free to check our blog often as we publish new articles each week!

  4. Linda -

    Hi Brian! Click here for a detailed guide on how to use your FixMeStick. We’ve also followed-up with you by email to better assist you.

  5. Don Calder -

    Typo? In the explanation of the term Spyware, I believe “their” should be “third”.

  6. C. Starratt -

    Your definition of ransomware is woefully incomplete. There is no mention of the malicious encryption of your computer’s files coupled with a demand for payment in bitcoin (usually) for a decryption key that may or may not be sent after you’ve paid up. What is there makes it sound as banal as regular spyware.

  7. Linda -

    Thanks, Don! Looks like we did make a typo there and it has just been corrected!

  8. Linda -

    Great catch! Looks like we made a mistake there but we have since added the correct definition for Ransomware. Thank you for pointing that out!

  9. Ralph Russell -

    I ran FIXMESTICK recently..the 1st time it ran for 12 hours,and had restarted 1 time..was in the calculating mode for the last 2 hours,I manually shut down,used the computer several times the following day without any noticeable issues,connected FIXMESTICK at night and it ran for 11 hours and I had 1 threat that had a bug symbol .The 3 previous 3 full scans were completed in less than 6 hours,do you have any explanations of what might be causinh this ??

  10. Cynthia M -

    I have not been able to find my 16 digit key code. how can I obtain this for my fix me stick?

  11. Anonymous -

    Can you put this in plain English for someone like me who is NOT computer savvy.

  12. Barbara -

    I would use my Fixmestick more often but if it has something that I need to remove at the end then I cannot get on internet and I always have to call my internet provider to get me back on. Most of the stuff it tells me for it to fix have to do with proxy server which I do not understand because I do not know the inner workings of the computer. I have the stick for lifetime but afraid of always getting booted out of internet. Sometimes I run it and just leave whatever it wants to fix alone.

  13. Michael Marks -

    Thank you Fixmestick for any knowledge that your or the company in general is able to furnish to the public, I understand that if I or anyone else has questions or inquiries that they will be answered or an attempt will be considered or made to answering them, correct?

    Thanks again,

  14. Linda -

    Hi Cynthia, you do not need a 16 digit code to run the FixMeStick. If you have any other question about this, please contact us at and we’ll get back to you!

  15. Linda -

    Hi Robert, thank you for these ideas! We’ll be adding new terms to this cybersecurity blog post as well as consider the ones you have suggested for future updates.

  16. Linda -

    Hi Michael, if you have any quetions the best way to reach us would be to send an email to and we’ll assist you from there! If you’d like to contact an agent in real time, please follow these instructions:

    1. Go to during our operating hours (10 AM to 6 PM, EST, Mondays to Saturdays). You can do this using a smartphone, tablet, or your computer.
    2. Click on the orange ‘Support’ button at the bottom right corner, followed by ‘Live Chat’.
    3. Type in your name or email, followed by a brief message.
    4. Click on the “Start Chat” button.

  17. Keegan Anfield -

    Hi Laura! FixMeStick doesn’t install anything so you don’t have to take off the old one. You can use your new one and you’ll be good to go. We recommend running it about once a month. If you have any questions, let us know.

  18. lucy mcnemar -

    I brought the fix me stick the life time one .why is reed asking about removing the old fix me I have buy a new one

  19. Linda -

    Hi Lucy, I checked your email address and there is only one FixMeStick registered to it. The FixMeStick should be good to use. If you run into any problems using it, please email and we’ll assist you from there!

  20. Karen -

    does this work on device with unauthorized remote network access

  21. Linda -

    Hi Karen, if you need to bypass any applications in your Windows system, we recommend running FixMeStick from a computer’s boot menu (aka. via the manual boot method). Click here to see how.

Leave Comment

Your email address will not be published.