Thursday, May 28, 2009













Hacker-someone involved in computer security

Cracker a person who breaks security, encryption, or digital rights managementschemes — a software cracker or password cracker

Exploits:An exploit (from the same word in the French language, meaning "achievement", or "accomplishment") is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitchor vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized)

Trojan Horse:rojan horse, also known as trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files on the user's computer or even watch the user's screen and control the computer

Phishing:In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Zombie:a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared tozombies.Spoofing: fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different sourceSpamming:Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminatelySniffing:a common technique used in websites and web applications in order to determine the web browser a visitor is using, and to serve browser-appropriate content to the visitor.Virus:A virus (from the Latin virus meaning toxin or poison) is a sub-microscopic infectious agent that is unable to grow or reproduce outside a host cell. Viruses infect all types of cellular lifeDenial of Service:can not connect you to the internet Social Engineering:the practice of obtaining confidential information by manipulating usersPhysical Theft:some one taking your computer and using it like them are you

Wednesday, May 27, 2009

 Hacker-someone involved in computer
 security

Cracker a person who breaks security, 
encryption, or digital rights 

Exploits:An exploit (from the same word in the 

French language, meaning "achievement", or "accomplishment") is a piece of software

, a chunk of data, or sequence of commands that take advantage of a bugglitchor vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized)

Trojan Horse:rojan horse, also known as trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files on the user's computer or even watch the user's screen and control the computer

Phishing:In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Zombie:a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared tozombies.

Spoofing: fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source

Spamming:Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately

Sniffing:a common technique used in websites and web applications in order to determine the web browser a visitor is using, and to serve browser-appropriate content to the visitor.

Virus:virus (from the Latin virus meaning toxin or poison) is a sub-microscopic infectious agent that is unable to grow or reproduce outside a host cell. Viruses infect all types of cellular life

Denial of Service:can not connect you to the internet 

Social Engineering:the practice of obtaining confidential information by manipulating users

Physical Theft:some one taking your computer and using it like them are you 

Thursday, May 21, 2009

Monday, May 11, 2009






Good Photos & Still Life

Wednesday, May 6, 2009

Monday, May 4, 2009

Friday, May 1, 2009

SECOND PROJECT NOT DONE