LIST OF TERMS USED IN THE FIELD OF HACKING
So Adware software designed to force pre-selected ads to display on your system.
Is an action that is done to gain access to the system also to remove sensitive data.
Backdoor or trap door is a hidden entry in a computing device also software that bypasses security measures such as login and password protection.
Boat is a program that automates action so that it is repeated for a more durable period than a human operator. For example, to create high-end objects, send high rates or calling scripts over HTTP, FTP or Telnet.
Bombet, also known as the Zombie Army, is a group to control the computer without the knowledge of its owners. Botnet is used to send spam or to deny service attacks.
Brute Force Attack
Brute Force Attack System or Website is an automated and easy-to-use system. It tries to create different combinations of user names and passwords, unless it is often there.
A buffer overflow buffer is more than allocating a buffer when it is done, or write data is more than a fault storage box.
Stop Phishing An existing, valid email improvement has a wrong link to provide personal information to the recipient.
cracker is the one that can modify software to access unwanted software by skull, especially to protect protected features.
Denial of Service Attacks (DOS)
Disallow of Service (DoS) users, which is usually suspended on the Internet, or suspended services attached to the postponement, users are unavailable to malicious attacks, server or network sources are unavailable.
Deprived of service attack.
A exploit kit is a system designed to run on a software web server, keeping the client machines was designed to identify software vulnerabilities and to run malicious code on the client and run vulnerabilities to exploit exploitation.
The exploitation software takes advantage of a piece, piece or data errors or sensitivities, to order a computer or network to comply with system security.
A filter designed to keep unpredictable intruders away from computer systems or networks, which allows secure communication between systems and users within the firewall.
Keystroke logging is the process of tracking the key pressed on the computer (and the touchscreen point is used). This is just a map of the computer / human interface. It is used by Gray and Black Hat Hackers to record login ID and password. Key glasses are generally kept secret on the device using trojan distributed through phishing email.
The virus is a secret in a system that starts a malicious action when specific conditions are completed. Timebomb is the most common version.
Malware is an umbrella term that is used for various conflicting or degrading software such as computer viruses, worms, trojan horse, resensualveyr, spyware, adware, skevenjrs and other malicious applications.
Master Program The Black Hat Programmer uses zombie drones to broadcast commands on commands, usually for service attacks or spam attacks.
Phishing is an e-mail fraud system in which the offender sends an approved display email in an attempt to collect personal. And financial information from the recipients.
Fractures are regarded as original computer hackers and they have to tap into people. Who illegally break into the telephone network, especially free long phone calls or phone lines.