• June 05, 2007 05 Jun'07

    Malware: Glossary

    This is a glossary of terms related to malware.  Continue Reading

  • June 05, 2007 05 Jun'07

    Malicious Computer Code: Glossary

    This is a glossary of terms related to malicious computer code.  Continue Reading

  • June 05, 2007 05 Jun'07

    buffer overflow

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.  Continue Reading

  • June 05, 2007 05 Jun'07

    snooping

    Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual ...  Continue Reading

  • June 05, 2007 05 Jun'07

    smurfing

    A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.  Continue Reading

  • June 05, 2007 05 Jun'07

    war dialer

    A war dialer is a computer program used to identify the phone numbers that can successfully make a connection with a computer modem.  Continue Reading

  • June 05, 2007 05 Jun'07

    snoop server

    A snoop server is a server that uses a packet sniffer program to capture network traffic for analysis.  Continue Reading

  • June 05, 2007 05 Jun'07

    white hat

    White hat describes a hacker (or, if you prefer, cracker) who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix ...  Continue Reading

  • June 05, 2007 05 Jun'07

    smurf

    A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.  Continue Reading

  • June 05, 2007 05 Jun'07

    war dialing

    A war dialer is a computer program used to identify the phone numbers that can successfully make a connection with a computer modem.  Continue Reading

  • June 05, 2007 05 Jun'07

    smurf attack

    A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.  Continue Reading

  • June 05, 2007 05 Jun'07

    pharming

    Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.  Continue Reading

  • June 05, 2007 05 Jun'07

    phreak

    A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.  Continue Reading

  • June 05, 2007 05 Jun'07

    phreaking

    A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.  Continue Reading

  • June 05, 2007 05 Jun'07

    Google hacking (Google scanning or Engine hacking)

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet...  Continue Reading

  • June 05, 2007 05 Jun'07

    hijacking

    Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.  Continue Reading

  • June 05, 2007 05 Jun'07

    packet monkey

    On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close