Terminologies of Hacking?! (Part 3)
If you haven't read first two parts of this story then go and read them first then check it out.
Click Here for first part
Click Here For second part
Click Here for first part
Click Here For second part
17. Master Program
The master program is usually a black hat hacker used to perform denial of service attacks and spam attacks and remotely transfer commands to an infected zombie unattended program.
18. Phishing
Phishing is an e-mail fraud method in which perpetrators send legitimate e-mails to collect personal information and financial information from recipients.
19. Phreaker
A phreaker is usually considered a hacker of the original computer illegally breaking into the telephone network for placing a long distance call or making a phone call for free.
20. Rootkit
Rootkit is a stealth-type software that hides the existence of specific processes and programs in an ordinary detection method and permits permanent access to the computer. Normally it is malicious software.
21. Shrink Wrap Code
A Shrink Wrap code attack is an act of exploiting holes in unpatched or poorly configured software.
22. Social Engineering
Social engineering means deceiving the acquisition of confidential information such as credit card details, user name, password and so on. Read More...
23. Spam
A Spam is simply an unsolicited email, also known as junk email, sent to a large number of recipients without their consent.
24. Spoofing
Spoofing is a method of unauthorized access to a computer that sends a message to the computer indicating an IP address from an intruder's trusted host.
Still this is not end I'll do next part of this topic in which I'll cover all remaining topics so stay tuned.
Join us on Facebook Click Here :)
Comments
Post a Comment