Requires human intervention to spread. It attaches itself to a "host" file (like an .exe or a Word doc). When a user opens that file, the virus hitches a ride and infects the system.
what is VIRUS
Encrypts all traffic leaving the browser. Great for working on public Wi-Fi (like at a coffee shop).
what is Browser VPN
After $X$ failed attempts, the account is disabled. This prevents Brute Force attacks (guessing every combination).
what is Account Lockout
Short, sturdy vertical posts designed to prevent vehicles from ramming into a building.
what is Bollards
the first boss that you meant to fight.
who is the eye of Cthulhu
Deception at its finest. It looks like something useful (a "Free Antivirus" or a "Cool Game") but contains a hidden malicious payload. Once you let it in, it opens a "backdoor" for the attacker.
what is Trojan Horse
Not just for convenience; they prevent browsers from loading scripts from known malicious ad servers.
what is AD-blocker
Never leave a "free pass" account active.
what is Disabling Guest Accounts
A plastic screen overlay that makes the monitor appear black when viewed from an angle. Essential for preventing "shoulder surfing" in public areas.
what is Privacy Filters
what game do people call 2D mincraft
terraria
Silently monitors user activity—web browsing, emails, and sensitive data—and beams it back to the attacker.
what is spyware
Tools like NoScript allow you to disable JavaScript by default. While this breaks many sites, it is the ultimate "hardening" move because most browser-based exploits rely on malicious scripts.
what is Script Management
A 20-character "passphrase" (e.g., Purple-Elephant-Dances-Quickly-7!) is much harder for a computer to crack than a complex 8-character password.
what is Length
Small physical inserts that plug into a USB port and require a special key to remove. This prevents people from plugging in malicious "Rubber Ducky" drives.
what is USB Locks
this boss is summoned by using a mechanical skull
who is skeletron prime
The most dangerous "hidden" threat. It replaces core system files and hides deep within the OS Kernel or BIOS. Because it lives underneath the OS, the OS itself (and often your Antivirus) can't see it.
what is Rootkit
Malware that modifies your browser settings without permission. Common signs include your homepage changing to a random search engine or constant pop-up ads.
what is Browser Hijacking
A system-level security feature that prevents code from running in "non-executable" memory regions, stopping many viruses in their tracks
what is Data Execution Prevention
A "technician" in a high-vis vest carrying a ladder and a clipboard can walk past most receptionists without being questioned. Always check IDs.
what is Social Engineering
this creature has a 1/4 chance to spawn on the edge of the world
what is foxsparks
A virus’s smarter, faster cousin. It is self-replicating and doesn't need a host file or a human. It crawls across the network through vulnerabilities, jumping from one PC to the next automatically.
what is WORM
Acts as an intermediary. The browser sends the request to the proxy, and the proxy fetches the site. This hides the user's internal IP address and allows the company to filter content.
what is Proxy Server
Mixing uppercase, lowercase, numbers, and symbols.
what is Complexity
A small room with two sets of interlocking doors. The second door won't open until the first one is closed and the person is verified. This prevents Tailgating (someone following a cleared person through a door).
what is Mantraps
this boss only spawns in the snow biome during a blizzard when your by self
who is Deerclops