• June 05, 2007 05 Jun'07

    global spy network

    Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications.  Continue Reading

  • June 05, 2007 05 Jun'07

    hacktivist

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.  Continue Reading

  • June 05, 2007 05 Jun'07

    grey hat

    Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.  Continue Reading

  • June 05, 2007 05 Jun'07

    gray hat

    Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.  Continue Reading

  • June 05, 2007 05 Jun'07

    search engine hacking

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet...  Continue Reading

  • June 05, 2007 05 Jun'07

    Google hacking

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet...  Continue Reading

  • June 05, 2007 05 Jun'07

    Google hacking (Google scanning or Engine hacking)

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet...  Continue Reading

  • June 05, 2007 05 Jun'07

    hijacking

    Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.  Continue Reading

  • June 05, 2007 05 Jun'07

    hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.  Continue Reading

  • June 05, 2007 05 Jun'07

    gray hat (or grey hat)

    Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.  Continue Reading

  • June 05, 2007 05 Jun'07

    Electrohippies Collective

    The Electrohippies Collective is an international group of hacktivists based in Oxfordshire, England, whose purpose is to express its displeasure with the use of the Internet "as a tool for corporate communications and propaganda.  Continue Reading

  • June 05, 2007 05 Jun'07

    packet monkey

    On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.  Continue Reading

  • June 05, 2007 05 Jun'07

    Echelon

    Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications.  Continue Reading

  • June 05, 2007 05 Jun'07

    cyberstalker

    Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.  Continue Reading

  • June 05, 2007 05 Jun'07

    cypherpunk

    Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (ciphertext is encrypted text) to preserve privacy.  Continue Reading

  • June 05, 2007 05 Jun'07

    cyberstalking

    Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.  Continue Reading

  • June 05, 2007 05 Jun'07

    cookie poisoning

    On the Web, cookie poisoning is the modification of a cookie (personal information in a Web user's computer) by an attacker to gain unauthorized information about the user for purposes such as identity theft.  Continue Reading

  • June 05, 2007 05 Jun'07

    black hat

    Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent.  Continue Reading

  • June 05, 2007 05 Jun'07

    trap door

    A back door is a means of access to a computer program that bypasses security mechanisms.  Continue Reading

  • June 05, 2007 05 Jun'07

    trapdoor

    A back door is a means of access to a computer program that bypasses security mechanisms.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close