June 2007 | Archive by Month | SearchSecurity.com | Page 6

June 2007

  • spam cocktail (or anti-spam cocktail)

    A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam. The use of multiple mechanisms increases the accuracy...

  • RADIUS (Remote Authentication Dial-In User Service)

    Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users an...

  • private key (secret key)

    In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages.

  • public key certificate

    A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.

  • shadow password file

    In the Linux operating system, a shadow password file is a system file in which encryption user password are stored so that they aren't available to people who try to break into the system.

  • salt

    In password protection, salt is a random string of data used to modify a password hash.

  • promiscuous mode

    In a network, promiscuous mode allows a network device to intercept and read each network packet that arrives in its entirety. This mode of operation is sometimes given to a network snoop server t...

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that pr...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.

  • NCSA

    NCSA at the University of Illinois in Urbana, Illinois is the home of the first Web browser that had a graphical user interface.

  • munging

    Munging is the deliberate alteration of an e-mail address on a Web page to hide the address from spambot programs that scour the Internet for e-mail addresses.

  • logon (or login)

    In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.

  • Kerberos

    Kerberos is a secure method for authenticating a request for a service in a computer network.

  • Joe job

    A Joe job is an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source.

  • live capture

    Live capture is the act or method of gathering biometric data from an individual while the individual is physically present.

  • mail bomb

    A mail bomb is the sending of a massive amount of e-mail to a specific person or system.

  • masquerade

    In general, a masquerade is a disguise.

  • IP spoofing (IP address forgery or a host file hijack)

    IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network. T...

  • HDCP (High-bandwidth Digital Content Protection)

    HDCP (High-bandwidth Digital Content Protection) is a specified method from Intel for protecting copyrighted digital entertainment content that uses the Digital Video Interface (DVI) by encrypting ...

  • federated identity management (FIM)

    Federated Identity Management (FIM) is an arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all ente...