Terminologies of Hacking?! (Part 2)
If you didn't check first part of story then click here to read it first.
9. Cracker
A cracker is software that changes software so that cracked software accesses undesirable functions, especially copy protection functions.
10. Denial of service attack(DoS)
DoS (denial of service) attack is a malicious attempt to prevent users from using server or network resources (usually a service that temporarily suspends or interrupts hosts connected to the Internet).
11. Exploit Kit
Exploit Toolkit is a software system designed to operate on a Web server, identifies the software vulnerability of the client machine that communicates, uploads malicious code to the client using the vulnerability discovered Run it.
12. Exploit
Vulnerabilities are software, a lot of data, a series of commands that exploit vulnerabilities and vulnerabilities that threaten the security of computers and network systems.
13. Firewall
A firewall is a filter that is designed to allow unnecessary intruders to be outside the computer system or network and to enable secure communication between systems within the firewall and users.
14. Keystroke Logging
A key logging is the process of tracking keys pressed on a computer (and touch screen to use). This is just a computer / man / machine interface map. A gray hat or black hat hacker used to login ID and password. Keyboard recorders are typically distributed to devices using Trojans that are sent using phishing email.
15. Logic Bomb
If certain conditions are met, safe viruses in the system cause malicious behavior. The most common version is the time bomb.
16. Malware
Malware is a generic term used to refer to various forms of hostile or intrusive software, including computer viruses, worms, Trojans, Ransomware, spyware, adware, scareware, and other malicious programs It is a basic term.
This is not enough. I'll explain more terms later so wait for part 3 stay tuned.
Join us on Facebook Click Here :)
Comments
Post a Comment