• June 05, 2007 05 Jun'07

    snoop server

    A snoop server is a server that uses a packet sniffer program to capture network traffic for analysis.  Continue Reading

  • June 05, 2007 05 Jun'07

    white hat

    White hat describes a hacker (or, if you prefer, cracker) who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix ...  Continue Reading

  • June 05, 2007 05 Jun'07

    snooping

    Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual ...  Continue Reading

  • June 05, 2007 05 Jun'07

    phreak

    A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.  Continue Reading

  • June 05, 2007 05 Jun'07

    pharming

    Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.  Continue Reading

  • June 05, 2007 05 Jun'07

    hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.  Continue Reading

  • June 05, 2007 05 Jun'07

    Echelon

    Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications.  Continue Reading

  • June 05, 2007 05 Jun'07

    Electrohippies Collective

    The Electrohippies Collective is an international group of hacktivists based in Oxfordshire, England, whose purpose is to express its displeasure with the use of the Internet "as a tool for corporate communications and propaganda.  Continue Reading

  • June 05, 2007 05 Jun'07

    hijacking

    Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.  Continue Reading

  • June 05, 2007 05 Jun'07

    packet monkey

    On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.  Continue Reading

  • June 05, 2007 05 Jun'07

    gray hat (or grey hat)

    Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.  Continue Reading

  • June 05, 2007 05 Jun'07

    Google hacking (Google scanning or Engine hacking)

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet...  Continue Reading

  • June 05, 2007 05 Jun'07

    cookie poisoning

    On the Web, cookie poisoning is the modification of a cookie (personal information in a Web user's computer) by an attacker to gain unauthorized information about the user for purposes such as identity theft.  Continue Reading

  • June 05, 2007 05 Jun'07

    cyberstalking

    Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.  Continue Reading

  • June 05, 2007 05 Jun'07

    cypherpunk

    Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (ciphertext is encrypted text) to preserve privacy.  Continue Reading

  • June 05, 2007 05 Jun'07

    black hat

    Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent.  Continue Reading

  • June 05, 2007 05 Jun'07

    back door

    A back door is a means of access to a computer program that bypasses security mechanisms.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close