• June 05, 2007 05 Jun'07

    war dialer

    A war dialer is a computer program used to identify the phone numbers that can successfully make a connection with a computer modem.  Continue Reading

  • June 05, 2007 05 Jun'07

    snoop server

    A snoop server is a server that uses a packet sniffer program to capture network traffic for analysis.  Continue Reading

  • June 05, 2007 05 Jun'07

    white hat

    White hat describes a hacker (or, if you prefer, cracker) who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix ...  Continue Reading

  • June 05, 2007 05 Jun'07

    snooping

    Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual ...  Continue Reading

  • June 05, 2007 05 Jun'07

    phreaking

    A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.  Continue Reading

  • June 05, 2007 05 Jun'07

    phreak

    A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.  Continue Reading

  • June 05, 2007 05 Jun'07

    pharming

    Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.  Continue Reading

  • June 05, 2007 05 Jun'07

    global spy network

    Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications.  Continue Reading

  • June 05, 2007 05 Jun'07

    hacktivist

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.  Continue Reading

  • June 05, 2007 05 Jun'07

    Google scanning

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close