A unique string of bits, or the binary pattern, of a virus. The virus signature is like a fingerprint in that it can be used to detect and identify specific viruses. Anti-virus software uses the virus signature to scan for the presence of malicious code.
The telephone equivalent of phishing. Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit. See “Defend Yourself Against […]
- visitor location register
Abbreviated as VLR, the visitor location register is a database maintained by a cellular service provider used to track users who are roaming in that mobile service provider’s area.
- visual voicemail
Visual voicemail is a feature typically provided by cellular telephone service providers that adds a visual interface to standard voicemail capabilities. With visual voicemail users can quickly view and access a list of their voicemail messages for playback as well as manage their personal greetings and upload messages to a voicemail server using a graphical […]
Meaning all vlogs, vlogosphere is an expression used to describe the “world of video blogs.”
(n.) Short for video blog, it is the term used to describe a blog that includes or consists of video clips. Typically updated daily (or with regular frequency) vlogs often reflect the personality or cause of the author. Also called vog. (v.) To author a video blog. Other forms: vlogger (a person who video blogs).