 |
itsc.cuhk.edu.hk
Woonplaats: | 1 | Upvotes received | 0 |
Downvotes received | 0 |
Karma: | 0 (upvotes-downvotes) |
|
0 earned Badges No badges were found
Definitions (44)
1 |
0
0
adware
Adware is software that displays advertising banners while the program is running. A lot of adware is also spyware.
Meaning awaits approval from a moderator |
2 |
0
0
anti-antivirus virus
A virus that attacks, disables, or avoids infecting specific anti-virus software. Also called a retrovirus.
Meaning awaits approval from a moderator |
3 |
0
0
door
door is a general term for a malicious program that listens for commands on a certain network port. Most backdoors consist of a client component and a server component. The client resides on the intruder's remote computer, and the server resides on the infected system. When a connection between client and server is established, the remote intr [..]
Meaning awaits approval from a moderator |
4 |
0
0
botnet
A botnet is a network of zombie computers under the remote control of a master.
Meaning awaits approval from a moderator |
5 |
0
0
brute force attack
Brute force attack is a technique used to break an encryption or authentication system by trying all possibilities.
Meaning awaits approval from a moderator |
6 |
0
0
certification authority
In cryptography, a certificate authority or certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. CAs are characteristic of many public key infrastructure (PKI) schemes. There are many commercial CAs that charge for their services. Institutions and government [..]
Meaning awaits approval from a moderator |
7 |
0
0
code injection attack
An attack technique to introduce code into a computer program or system to form an unexpected action. The attack is usually accomplished by taking advantage of an un-enforced or loosely implemented input validation process.
Meaning awaits approval from a moderator |
8 |
0
0
companion virus
A virus that creates a new program with the same file name as an existing program, but in a different place or with a different file type, so that typing the program's name on the command line causes the virus program to be executed instead of the original program.
Meaning awaits approval from a moderator |
9 |
0
0
data driven attack
A form of attack encoded in innocuous-seeming data which is then executed by a user or software to enforce the attack.
Meaning awaits approval from a moderator |
10 |
0
0
denial of service
A prevention of the use of information resources either intentionally or unintentionally, which affects the availability of the information resources. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding.
Meaning awaits approval from a moderator |
To view all 44 definitions, please sign in.