Access Control List (ACL) A table that maintains a detailed list of permissions or access
rights granted to users or groups with respect to file directory, individual file, or network
access point (AP) A piece of wireless communications hardware that creates a central point
of wireless connectivity.
active attack An attack that can be detected and is therefore said to leave a footprint.
Active Directory (AD) A directory that stores information about resources on the network and provides a means of centrally organizing, managing, and controlling access to those resources.
Address Resolution Protocol (ARP) A TCP/IP protocol used to resolve a node’s physical address from a provided IP address.
agent A software routine that performs designated functions, such as waiting in the background and performing an action when a specified event occurs.
anonymizer A website that allows a user to access other website undetected by a proxy server.
anonymous Having no known name, identity, or source.
anti-Trojan Software specifically designed to help detect and remove Trojans.
antivirus A program that attempts to recognize, prevent, and remove computer viruses and
other malicious software from the computer.
archive A place or collection containing records, documents, or other materials of
auditing Checking a computer system to verify intended programs and reliable data and to
see whether the data is corrupted or displaying inaccurate results.
backdoor A gap in the security of a computer system that’s purposely left open to permit access. Hackers can create backdoors to a system once it has been compromised.
black-box testing Testing a system or network without any knowledge of the internal structure.
banner grabbing A technique that enables a hacker to identify the type of operating system or application running on a target server. A specific request for the banner is often allowed through firewalls because it uses legitimate connection requests such as Telnet.
Black hat A malicious hacker.
buffer A portion of memory available to store data.
buffer overflow A situation where a program writes data beyond the buffer space allocated in memory. This can result in other valid memory being overwritten. Buffer overflows can occur as a consequence of bugs, improper configuration, and lack of bounds checking when receiving program input.
bug A software or hardware error that triggers the malfunction of a particular program.
добавлено через 7 минут
cache A fast storage buffer, such as that found directly on the central processing unit of a computer.
calling procedure A software routine that passes control to a different software routine. When these routines exist on separate computers, the systems often use Remote Procedure Call (RPC) libraries. Also refers to function calls and subroutines.
certificate authority (CA) The organization or program that issues digital certificates.
Common Internet File System/Server Message Block The standard for file sharing used with Microsoft Windows and IBM OS/2 operating systems.
client A system or software process that accesses a remote service on another computer.
countermeasure An action taken to offset another action. Usually a fix for a vulnerability in a system.
covert channel A channel that transfers communication in a nonstandard way, often such that it can’t be easily detected. Too frequently, this form of communication violates the security policy by using a channel in an unintended manner.
cross-site scripting A computer security exploit that is used to execute a malicious script.
daemon A background program that resides on a computer and services requests.
database A collection of data or information that’s organized for easy access and analysis.
decryption The process of converting encrypted data to plain text.
Demilitarized Zone (DMZ) A network area that sits between an organization’s internal network and an external network, usually the Internet. Most publicly available servers such as Web and FTP reside in the DMZ.
digital certificate Credentials that contain personal information such as a name, a public key, an expiration date, and the digital signature of the certificate authority that issued the certificate.
digital signature A hash of a message that has been encrypted with an individual’s private key. It serves as validation of a message’s authenticity.
DNS enumeration Locating DNS records from a DNS server.
domain name A unique name that identifies a company or organization on the Internet.
Domain Name System (DNS) The name resolution system that translates alphabetic
domain names into numeric IP addresses.
encryption The process of encoding information in an attempt to make it secure from
enumeration The creation of a list or inventory of items.
SMILE! tomorrow's going to be worse.
Последний раз редактировалось Apocalypse, 04.06.2009 в 23:47. Причина: Добавлено сообщение
Why the he11 not? Those are terms, the topic's called Hacking Terminologies, all cool.
and all? O_o
Ethernet A frame-based computer networking technology for LANs. It defines wiring and
signaling for the physical layer, frame formats, and protocols for the media access control
(MAC) and data link layer of the OSI model.
exploit A defined procedure or program that takes advantage of a security hole in a
Extended Stack Pointer (ESP) A location identifier used to access parameters passed into a
subroutine as arguments.
Fiber Distributed Data Interface (FDDI) A standard for data transmission in a LAN.
File Allocation Table (FAT) A filesystem used in DOS, Windows, and OS/2. It keeps track of
where data is stored on disk.
firewalking A method to collect information about a remote network protected by a firewall.
Firewalking uses trace route–like IP packet analysis to determine whether a data packet can pass
through the packet-filtering device/firewall from the attacker’s host to the victim’s host.
firewall Rules created to enforce an Access Control List (ACL) and designed to prevent
unauthorized access to or from a private network.
footprinting Gathering information about a target to identify weaknesses.
fragmentation The means of breaking a larger message into smaller chunks for the purpose
of sending or storing the data more efficiently.
FreeBSD A free, open source operating system based on Unix.
File Transfer Protocol SSL A secure form of FTP software in which Secure Sockets
Layer / Transport Layer Security (SSL/TLS) protocols are used to secure the control and
gateway Software or hardware capable of decision-making, which permits or denies access
based on general rules. Firewalls are layer 3 and layer 4 gateways.
GET An HTTP command used to request a file from a web server.
Grey hat A hacker who uses skills for defensive or offensive purposes as necessary.
hacktivism Hacking for a cause.
hash A function that transforms a string of characters into a number known as the
Hierarchical File System (HFS) A filesystem used in Mac OS X. It stores data in a top-tobottom
honeynet An entire virtual network that is presented as a large honeypot.
honeypot A system that is designed to attract probes, attacks, and potential exploits. Because honeypots attract attacks, they can be a liability. However, by having honeypots on the network,you can gain enormous amounts of information about how a malicious hacker, or even a script kiddie, gains access to systems. This information can lead to security improvements and/or help a security professional track down a hacker.
SMILE! tomorrow's going to be worse.
Then everything is fine! Dates required...
its not all, havent time. maybe later i'll post more
speak english is fun
SMILE! tomorrow's going to be worse.
|Здесь присутствуют: 1 (пользователей: 0 , гостей: 1)|