• June 04, 2007 04 Jun'07

    promiscuous mode

    In a network, promiscuous mode allows a network device to intercept and read each network packet that arrives in its entirety. This mode of operation is sometimes given to a network snoop server that captures and saves all packets for analysis (for...  Continue Reading

  • June 04, 2007 04 Jun'07

    session replay

    Session replay is a scheme a cracker uses to masquerade as an authorized user on an interactive Web site... (Continued)  Continue Reading

  • June 04, 2007 04 Jun'07

    spam cocktail (or anti-spam cocktail)

    A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam. The use of multiple mechanisms increases the accuracy of spam identification and reduces the number of ...  Continue Reading

  • June 04, 2007 04 Jun'07


    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a ...  Continue Reading

  • June 04, 2007 04 Jun'07


    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.  Continue Reading

  • June 04, 2007 04 Jun'07


    NCSA at the University of Illinois in Urbana, Illinois is the home of the first Web browser that had a graphical user interface.  Continue Reading

  • June 04, 2007 04 Jun'07

    logon (or login)

    In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.  Continue Reading

  • June 04, 2007 04 Jun'07

    mail bomb

    A mail bomb is the sending of a massive amount of e-mail to a specific person or system.  Continue Reading

  • June 04, 2007 04 Jun'07

    Joe job

    A Joe job is an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source.  Continue Reading

  • June 04, 2007 04 Jun'07

    live capture

    Live capture is the act or method of gathering biometric data from an individual while the individual is physically present.  Continue Reading

  • June 04, 2007 04 Jun'07


    Munging is the deliberate alteration of an e-mail address on a Web page to hide the address from spambot programs that scour the Internet for e-mail addresses.  Continue Reading

  • June 04, 2007 04 Jun'07


    In general, a masquerade is a disguise.  Continue Reading

  • June 04, 2007 04 Jun'07


    In the study of DNA, footprinting is the method used to identify the nucleic acid sequence that binds with proteins.  Continue Reading

  • June 04, 2007 04 Jun'07

    IP spoofing (IP address forgery or a host file hijack)

    IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network. The hijacker obtains the IP address of a legitimate ...  Continue Reading

  • June 04, 2007 04 Jun'07

    federated identity management (FIM)

    Federated Identity Management (FIM) is an arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group... (Continued)  Continue Reading

  • June 04, 2007 04 Jun'07

    graphical password or graphical user authentication (GUA)

    A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).  Continue Reading

  • June 04, 2007 04 Jun'07

    HDCP (High-bandwidth Digital Content Protection)

    HDCP (High-bandwidth Digital Content Protection) is a specified method from Intel for protecting copyrighted digital entertainment content that uses the Digital Video Interface (DVI) by encrypting its transmission between the video source and the ...  Continue Reading

  • June 04, 2007 04 Jun'07

    identity chaos (password chaos)

    Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.  Continue Reading

  • June 04, 2007 04 Jun'07

    cipher block chaining (CBC)

    Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block).  Continue Reading

  • June 04, 2007 04 Jun'07

    cache cramming

    Cache cramming is a method of tricking a computer into running Java code it would not ordinarily run.  Continue Reading