Thursday, May 24, 2018

Important terms in the field of HACKING - PART 2

  Unknown       Thursday, May 24, 2018


♻️ Rootkit − Rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.

♻️Shrink Wrap code − A Shrink Wrap code attack is an act of exploiting holes in unpatched or poorly configured software.

♻️Social engineering − Social engineering implies deceiving someone with the purpose of acquiring sensitive and personal information, like credit card details or user names and passwords.

♻️Spam − A Spam is simply an
unsolicited email, also known as junk email, sent to a large number of recipients without their consent.

♻️Spoofing − Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

♻️Spyware − Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

♻️SQL Injection − SQL injection is an SQL code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

♻️Threat − A threat is a possible danger that can exploit an existing bug or vulnerability to compromise the security of a computer or network system.

♻️Trojan − A Trojan, or Trojan Horse, is a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there designed with an intention to destroy files, alter information, steal passwords or other information.

♻️Virus − A virus is a malicious program or a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

♻️Vulnerability − A vulnerability is a weakness which allows a hacker to compromise the security of a computer or network system.

♻️Worms − A worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.

♻️Cross-site Scripting − Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users.

♻️Zombie Drone − A Zombie Drone is defined as a hi-jacked computer that is being used anonymously as a soldier or 'drone' for malicious activity, for example, distributing unwanted spam e-mails.
logoblog

Thanks for reading Important terms in the field of HACKING - PART 2

Previous
« Prev Post