Scammer's Scam Glossary
Scam's Lexicon
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
D |
Dot-con |
Attractive name kept for a website created for the purpose of scamming people. For example - a fake online bank. |
Dead Bait |
A bait that gives a view to have stopped permanently. For example the scammer's email address no longer works or prolonged silence by the scammer. |
Demurrage |
Used to describe surcharges or fees that accumulate over time on an item that has been in storage for a prolonged period without being used. Scammers often say that demurrages have been imposed by banks and security companies on valuable consignments stored in vaults. |
Don Juan |
A scammer who preys on the passionate desires of women all the way through chat-sites and email. |
Domain |
A section of Internet space, point toward by the purpose or kind of information it comprises of; existing domains include ".com" for marketable sites, ".gov" for legislative ones, and ".org" for non-commercial organizations. |
Download |
To photocopy files from one PC to other; to examine a website or other web stuff with a browser. |
Drive-by Download |
Software that set in on your computer without your acquaintance when you visit confident websites. To stay away from drive-by downloads; make certain to keep informed your working system and Web browser on a regular basis. |
Dialup/dial in connection |
frequently referred to as merely a "dialup", a dialup connection is the major method that a spammer ties up to the Internet, typically by using a few unsuspecting ISP. It is termed as a dialup for the reason that the link is completed over the telephone lines, and the spammer has the necessity to dialup the ISP to make a link. |
Denial of Service (DoS) Attack |
Where a hacker send add-on or other strange or extreme traffic in an effort to bring down email systems. |
Dicitionary Attack |
A plan that bombards a mail server with millions of alphabetically made email addresses in the anticipation that a few addresses will be presumed appropriately. This method is also used to crack passwords. |
Directory Harvest Attack (DHA) |
When a spammer bombards a area with thousands of generated email addresses in an effort to gather valid email addresses from an association |
Domain Name System Block Lists (DNSBL) |
saleable lists of set of connections that either permits the spammers to use their send spam, or have not taken act to put off spammers from exploitation of their systems. |
Denial of Service (DoS) Attack |
Where a hacker send add-on or other strange or extreme traffic in an effort to bring down email systems. |
Dictionary Attack |
A plan that bombards a mail server with millions of alphabetically made email addresses in the anticipation that a few addresses will be presumed appropriately. This method is also used to crack passwords. |
Directory Harvest Attack (DHA) |
When a spammer bombards a area with thousands of generated email addresses in an effort to gather valid email addresses from an association |
Domain Name System Block Lists (DNSBL) |
saleable lists of set of connections that either permits the spammers to use their send spam, or have not taken act to put off spammers from exploitation of their systems. |