Skip to content

Online decoded language

If you are not sure to understand what a Modem, Cookie or Firewall means. Take a few minutes and read the following section.
Anti-Spyware Program . Anti-Spyware Programs are designed to protect your computer from spyware (check the definition in ‘S’) and are useful to ensure that your computer and personal details remain secure.

Antivirus Software. Antivirus Software (Antivirus program) are designed to detect known incoming viruses (typically via e-mail) and to prevent them from infecting your PC. New viruses can be distributed very quickly, so make sure that your antivirus program is always running, and is regularly updated – at least weekly -. Some resources of popular virus protection software are McAfee, Symantec (Norton) and Sophos. Private individuals can also download free versions of these programs from Internet.

Backbone. It refers to the major Internet connections network. It consists of a large number of commercial routers, government, academic and other high capacity data are interconnected across countries, continents and oceans of the world. A large corporation that has many locations around the world may have a backbone network that ties all of the locations together, for example, if a server cluster needs to be accessed by different departments of a company that are located at different geographical locations. The pieces of the network connections (for example: Ethernet, wireless) that bring these departments together is often mentioned as network backbone.

Broadband. Broadband is a high-speed method to connect with Internet, faster than a traditional modem. While preserving the Internet connection does not involve additional costs, is good practice to disconnect from Internet when not in use, as this helps reduce risk exposure.

Browsers. A browser is a program that provides a way to view web pages. The most popular are Microsoft ® Internet Explorer, Netscape® Navigator and Mozilla Firefox ®.

CD. CDs are similar to savings accounts in that they are insured and thus virtually risk-free; they are “money in the bank” (CDs are insured by the FDIC for banks or by the NCUA for credit unions). They are different from savings accounts in that the CD has a specific, fixed term (often three months, six months, or one to five years), and, usually, a fixed interest rate. It is intended that the CD be held until maturity, at which time the money may be withdrawn together with the accrued interest. At the time to buy a CDs typically there is a requirement of a minimum deposit amount

Cookies. Cookies are small piece of texts stored on the computer’s hard drive. Cookies generally are not harmful and are used to recognize a user so you can receive a more consistent experience in a particular website. Cookies may contain information about your preferences, allowing customization of a site for your use. (Cathedral Investment Bank uses cookies to personalize your experience on the Institution website.)
• Back to top
D – F
Digital Certificates. Digital Certificates (Digital IDs) are electronic identification cards that helps establish your identity when doing business via Internet. These certificates may be based on a browser called (“Soft Certificates”) or may be integrated into a smart card called (“Hard Token”) and used with special card readers.

Encryption. Encryption converts your data to an encoded form before it is sent over the Internet, preventing unauthorized users to read such information. In Cathedral Investment Bank, we use a 1024-bit SSL encryption, which is the highest in the industry. Recognize a page ‘safe’ when you see ‘https: / /’ prefix to the web address. Also, see a closed padlock symbol in the lower right corner of your browser. (at the top of your new browser).

Filename extensions. A filename extension is simply the last three letters (or numbers) of the full file name. They are often used by the operating system to associate a program with a particular file.

Firewall. A firewall can be hardware or a small program that helps protect your computer and its contents of invaders on the Internet or network. When properly installed, prevents unauthorized traffic to and from your PC. There are many effective programs to choose. Some common commercial examples include Zone Labs, Symantec (Norton), McAfee and Computer Associates. In many cases, there is a commercial software free version, which is free of charge for users’ personal use.
• Back to top
I – P
Identity Theft. Identity theft is a crime in which a fraudster obtains personal key information such as date of birth, bank details, or driver license numbers, to impersonate someone else. The personal information discovered is then used illegally to apply for credit, purchase goods and services, or access to bank accounts Fraudsters often take advantage of the natural inclination of people to choose passwords that are meaningful to them and that are easily guessable (name of children, pet names, addresses, dates of birth).

Keystroke Capturing/Logging. Anything you type on a computer can be captured and stored. Such covert activity can be accomplished through hardware devices connected to your computer or programs running almost invisibly on the machine. The Keystroke logging is often used by fraudsters to capture personal details including passwords. Some recent viruses are capable of installing such programs without the user’s knowledge. The risk of encountering such keystroke loggings is greater on PCs that are shared by a number of users, like those of Internet cafes. Run anti-spyware program might reveal the presence of such programs on your PC. Users can download free anti-spyware programs.

Plug-in. A plug-in is a module of a program that adds specific functions to the browser. For example, Firefox and Internet Explorer plug-ins allow the browsers carry out various types of audio and video messages or view PDF files from the popular Adobe ® Acrobat ®.

Privacy Policies . Currently, many companies are obliged to publish a Privacy Policy to provide customers the details of how the company keeps private information, how this information is shared and why it is collected. A good practice is to read the privacy policy of the company you may have an account or financial dealings. Most Privacy Policies also explain how customers can request to remove your name or particular data from a promotional e-mail list.
• Back to top
Secure Sessions. When entering to Internet Banking is said to be in a “secure session”. SSL technology is used in your Internet Banking session to encrypt information before it leaves your computer, to ensure that nobody else can read it. Depending on the settings in your browser, a popup can be displayed to notify you that will be entering a secure page. Recognize a page ‘safe’ when you see ‘https: / /’ prefix to the web address. Also, see a closed padlock symbol in the lower right corner of your browser.

SSL. Secure Socket Layer (SSL) provides a high level of security for Internet communications. SSL provides an encrypted communications session between your browser and a web server. SSL helps ensure that sensitive information (eg, credit card numbers, account statements and other financial and personal data) that is sent over the Internet between your browser and the web server remains confidential during online transactions.

Security Vulnerabilities. The security holes / worms are faults, defects or programming errors. These can be exploited by unauthorized users to access computer networks or web servers from the Internet. As these vulnerabilities are known, software manufacturers develop ‘patches’, ‘fixes’ or ‘updates’ that you can download to fix the problems.

Time-out Session. This is an automatic disconnection, for security reasons, from any secure session after an inactivity period of the server. This can happen even if you are typing something on a page or on a data field. The event is caused by failure to communicate with our servers, but not by the activity of keyboard or mouse. Our entire Internet banking services has this protection.

Spam. Are often called Spam to messages with unwanted e-mails, offering products and services with questionable benefit. They are available several types of anti-spam programs, although the first line of defense may be your own Internet service provider, many of whom offer spam-filtering services.

Spyware. These are programs / files, which may already reside on your PC. These programs often arrive as hidden components of free software. Spyware monitors web usage and report it to real companies, which can then sell the data collected. The spyware is relatively benign, even in its extreme form may include programs that record keystrokes and conduct virtual spy all activity on your PC.
• Back to top
T – W
Trojan Horse (Caballo de Troya). Any apparent legitimate program that contains the load of another destructive junk. Typically, the second is a virus used by hackers to gain unauthorized access to computer systems.

Virus. A computer program designed to replicate itself also copying to other programs found on a computer. It may be benign but usually has negative impacts, such as encouraging a PC or corrupt your memory and files. Viruses are now mainly spread by e-mail and by file sharing services. Every day new viruses are discovered.

Virus Definition File. This is a file used by antivirus programs to identify specific viruses, worms and Trojan horses. For this reason, you should regularly download the software latest version, or configure your PC program to automatically it back up.

Worm. A malicious program that replicates itself until filling all the storage space on a disk or a network. Such worms can consume computer time, space, and speed when replicating with the malicious intent of encouraging or pull the web servers and disrupt Internet use.