June 2007

  • spam cocktail (or anti-spam cocktail)

    A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam. The use of multiple mechanisms increases the accuracy...

  • session replay

    Session replay is a scheme a cracker uses to masquerade as an authorized user on an interactive Web site... (Continued)

  • RADIUS (Remote Authentication Dial-In User Service)

    Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users an...

  • shadow password file

    In the Linux operating system, a shadow password file is a system file in which encryption user password are stored so that they aren't available to people who try to break into the system.

  • private key (secret key)

    In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages.

  • promiscuous mode

    In a network, promiscuous mode allows a network device to intercept and read each network packet that arrives in its entirety. This mode of operation is sometimes given to a network snoop server t...

  • public key certificate

    A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.

  • salt

    In password protection, salt is a random string of data used to modify a password hash.

  • NCSA

    NCSA at the University of Illinois in Urbana, Illinois is the home of the first Web browser that had a graphical user interface.

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that pr...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.

  • mail bomb

    A mail bomb is the sending of a massive amount of e-mail to a specific person or system.

  • Joe job

    A Joe job is an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source.

  • masquerade

    In general, a masquerade is a disguise.

  • logon (or login)

    In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.

  • Kerberos

    Kerberos is a secure method for authenticating a request for a service in a computer network.

  • live capture

    Live capture is the act or method of gathering biometric data from an individual while the individual is physically present.

  • munging

    Munging is the deliberate alteration of an e-mail address on a Web page to hide the address from spambot programs that scour the Internet for e-mail addresses.

  • IP spoofing (IP address forgery or a host file hijack)

    IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network. T...

  • identity chaos (password chaos)

    Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.