Terminologies of Hacking?! (Part 3)

If you haven't read first two parts of this story then go and read them first then check it out.
Click Here for first part
Click Here For second part

17. Master Program

      The master program is usually a black hat hacker used to perform denial of service attacks and spam attacks and remotely transfer commands to an infected zombie unattended program.

18. Phishing

     Phishing is an e-mail fraud method in which perpetrators send legitimate e-mails to collect personal information and financial information from recipients.

19. Phreaker

    A phreaker is usually considered a hacker of the original computer illegally breaking into the telephone network for placing a long distance call or making a phone call for free.

20. Rootkit

     Rootkit is a stealth-type software that hides the existence of specific processes and programs in an ordinary detection method and permits permanent access to the computer. Normally it is malicious software.

21. Shrink Wrap Code

     A Shrink Wrap code attack is an act of exploiting holes in unpatched or poorly configured software.

22. Social Engineering

     Social engineering means deceiving the acquisition of confidential information such as credit card details, user name, password and so on. Read More...

23. Spam

     A Spam is simply an unsolicited email, also known as junk email, sent to a large number of recipients without their consent.

24. Spoofing

    Spoofing is a method of unauthorized access to a computer that sends a message to the computer indicating an IP address from an intruder's trusted host.

Still this is not end I'll do next part of this topic in which I'll cover all remaining topics so stay tuned.
Join us on Facebook Click Here :)

Comments

Popular Posts