Browse Definitions :
Definition

pop-up download (or download pop-up)

A pop-up download (sometimes called a download pop-up ) is a pop-up window that asks the user to download a program to their computer's hard drive. The window may feature a security warning, or some other type of message that is likely to lead to compliance. Often, the pop-up window has no information about the program to be downloaded, and may feature buttons for "download," "yes," or "ok" -- but none for "no" or "cancel." Faced with a pop-up download window, the user may think that the download in question is just a browser plug-in application needed for aspects of a Web site they're visiting, or that the pop-up window was generated by their own computer.

Pop-up downloads often install programs that track online behavior and report it back to a parent company ( spyware ) and programs that use that information to generate specific pop-up advertisements ( adware ). EarthLink, a popular Internet service provider ( ISP ) recently estimated that 40 to 50 percent of their subscribers have such applications running on their computers, usually without the owner's knowledge. Subscribers contacting the ISP to report a problem are often surprised to find that these downloads are the cause.

A less scrupulous variation of automatic installation, called a drive-by download , installs a program on a computer's hard drive without even first generating a pop-up window.

This was last updated in March 2011
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close