A
Ad Blocker
Software that prevents advertisements from loading on websites. Blocks banner ads, popup ads, video ads, and tracking scripts. Can significantly improve browsing speed and privacy by preventing ad networks from collecting data.
In practice: Activate Security's ad blocker works at the network level, blocking ads across all apps and browsers on your device, not just one browser.
Antivirus
Software designed to detect, prevent, and remove malicious software (malware). Modern antivirus uses multiple detection methods: signature-based (known threats), heuristic (suspicious behavior), and AI-powered analysis.
In practice: Activate Security includes real-time antivirus protection that scans files as you access them and runs scheduled full-system scans.
Authentication
The process of verifying identity before granting access. Single-factor uses just a password. Multi-factor requires additional verification like codes from your phone or biometric data.
Best practice: Always enable two-factor authentication on important accounts. It prevents 99.9% of automated account takeover attempts.
C
Canvas Fingerprinting
A tracking technique where websites secretly tell your browser to draw an invisible image. The way your specific device draws it creates a unique fingerprint used to track you across websites, even after deleting cookies.
In practice: Activate Security's Anti-Fingerprinting feature blocks canvas fingerprinting attempts and randomizes device characteristics to prevent this type of tracking.
Cookie
Small text files websites store on your device to remember information. Session cookies help sites remember you're logged in. Tracking cookies follow you across websites to build advertising profiles. Third-party cookies let companies track you on sites they don't own.
In practice: Activate Security's cookie scanner identifies and removes tracking cookies while preserving useful session cookies for sites you trust.
Credential Stuffing
When hackers use stolen username/password combinations from one breach to try logging into other websites. Works because people reuse passwords across sites. Automated tools can test millions of credentials per hour.
Defense: Never reuse passwords. Use Activate Security's password vault to generate and store unique passwords for every account.
D
Dark Web
Hidden internet networks requiring special software to access. While it has legitimate privacy uses, it's also where criminals trade stolen data, sell hacking tools, and operate illegal marketplaces. Not accessible through normal web browsers.
In practice: You should never access the dark web yourself. Activate Security's Dark Web Monitor safely scans dark web forums and marketplaces for your stolen information without exposing you to danger.
DNS (Domain Name System)
The internet's phone book that converts website names (like google.com) into IP addresses computers can understand. DNS queries reveal which websites you visit, even when using HTTPS.
In practice: Activate Security's VPN encrypts your DNS queries, preventing your internet provider from seeing which websites you visit.
E
Encryption
Converting readable data into scrambled code that only authorized parties can decode. Like putting your documents in a safe that only opens with your unique combination. Strong encryption is mathematically proven unbreakable.
Types we use: AES-256 for files, TLS for internet traffic, Argon2 for password hashing, RSA for key exchange. Each serves specific security purposes.
End-to-End Encryption (E2EE)
Data is encrypted on your device and only decrypted on the recipient's device. No intermediate servers (including the service provider) can read the content. The gold standard for privacy.
In practice: Your Activate Security password vault uses E2EE. Your passwords are encrypted on your device before syncing. Our servers only store encrypted blobs we cannot decrypt.
F
Fingerprinting (Device/Browser Fingerprinting)
Creating a unique identifier for your device based on its characteristics (screen size, installed fonts, browser version, timezone, etc.). Unlike cookies, you can't delete your fingerprint - it's based on your device's fundamental properties.
In practice: Activate Security's Anti-Fingerprinting feature randomizes device characteristics so websites can't create consistent fingerprints to track you.
M
Malware
Short for "malicious software." Umbrella term for any software designed to harm, exploit, or gain unauthorized access to devices. Includes viruses, trojans, ransomware, spyware, adware, and rootkits.
Protection: Activate Security's antivirus detects and blocks all malware types using AI-powered behavioral analysis plus signature-based detection.
Multi-Factor Authentication (MFA / 2FA)
Requiring two or more verification methods to access an account. Typically: something you know (password) + something you have (phone) + something you are (fingerprint). Even if password is stolen, attacker can't access account without other factors.
Best practice: Enable 2FA on all important accounts. Prevents 99.9% of automated account takeover attempts.
P
Phishing
Fraudulent attempts to trick you into revealing sensitive information by impersonating legitimate companies. Usually via email, but also through text messages (smishing), phone calls (vishing), and fake websites.
In practice: Activate Security's Safe Browsing blocks phishing websites before they load, protecting you even if you click a malicious link.
PII (Personally Identifiable Information)
Any information that can identify a specific individual: name, address, social security number, email, phone number, driver's license, etc. PII is valuable to identity thieves and protected by privacy laws.
In practice: Activate Security's Document Scanner specifically looks for PII in files on your computer and recommends encryption for protection.
V
VPN (Virtual Private Network)
Creates an encrypted tunnel for your internet traffic, hiding your IP address and encrypting data between your device and VPN server. Makes you appear to browse from the VPN server's location instead of your real location.
In practice: Activate Security's VPN hides your browsing from your internet provider, protects you on public WiFi, and lets you browse with privacy. 50+ server locations worldwide.
Virus
Malicious code that replicates itself by inserting copies into other programs or files. Like biological viruses, they spread from device to device through file sharing, email attachments, and infected downloads.
Protection: Real-time virus scanning (like Activate Security's antivirus) catches viruses before they can spread or cause damage.
Z
Zero-Knowledge Architecture
System design where the service provider has zero knowledge of user data. Data is encrypted on user devices with keys the provider never receives. Even if the provider wanted to access data (or was forced to by authorities), they mathematically cannot.
Why we use it: Activate Security's zero-knowledge design means we can honestly say we cannot access your passwords, files, or encrypted data. We don't have the keys, so we can't open the locks.
Zero-Logs Policy
Commitment to not record user activity logs. Particularly important for VPNs - zero-logs means the provider doesn't track which websites you visit, when you connect, or what data you transmit.
Verification: Activate Security's zero-logs policy has been independently audited. We don't log your VPN browsing history, connection times, or IP addresses.
Common Security Acronyms Decoded
2FA - Two-Factor Authentication
AES - Advanced Encryption Standard
API - Application Programming Interface
CCPA - California Consumer Privacy Act
DDoS - Distributed Denial of Service
DNS - Domain Name System
E2EE - End-to-End Encryption
GDPR - General Data Protection Regulation
HSM - Hardware Security Module
IP - Internet Protocol (your device's address)
ISP - Internet Service Provider
MFA - Multi-Factor Authentication
PCI DSS - Payment Card Industry Data Security Standard
VPN - Virtual Private Network
Missing a Term?
If there's a security term you'd like us to explain, let us know and we'll add it to the glossary.
Suggest a Term