
Thursday, May 28, 2009
Cracker a person who breaks security, encryption, or digital rights managementschemes — a software cracker or password cracker
Exploits:An exploit (from the same word in the French language, meaning "achievement", or "accomplishment") is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitchor vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized)
Trojan Horse:rojan horse, also known as trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files on the user's computer or even watch the user's screen and control the computer
Phishing:In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Zombie:a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared tozombies.Spoofing: fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different sourceSpamming:Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminatelySniffing:a common technique used in websites and web applications in order to determine the web browser a visitor is using, and to serve browser-appropriate content to the visitor.Virus:A virus (from the Latin virus meaning toxin or poison) is a sub-microscopic infectious agent that is unable to grow or reproduce outside a host cell. Viruses infect all types of cellular lifeDenial of Service:can not connect you to the internet Social Engineering:the practice of obtaining confidential information by manipulating usersPhysical Theft:some one taking your computer and using it like them are you
Wednesday, May 27, 2009
Exploits:An exploit (from the same word in the
French language, meaning "achievement", or "accomplishment") is a piece of software
, a chunk of data, or sequence of commands that take advantage of a bug, glitchor vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized)
Trojan Horse:rojan horse, also known as trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files on the user's computer or even watch the user's screen and control the computer
Phishing:In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Zombie:a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared tozombies.
Spoofing: fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source
Spamming:Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately
Sniffing:a common technique used in websites and web applications in order to determine the web browser a visitor is using, and to serve browser-appropriate content to the visitor.
Virus:A virus (from the Latin virus meaning toxin or poison) is a sub-microscopic infectious agent that is unable to grow or reproduce outside a host cell. Viruses infect all types of cellular life
Denial of Service:can not connect you to the internet
Social Engineering:the practice of obtaining confidential information by manipulating users
Physical Theft:some one taking your computer and using it like them are you