-->

Top 10 most common terms which are used in hacking

hacking terminologies


Top 10 most common terms which are used in hacking 

Top common hacking terms which are mainly used in hacking 

Adware:
Adware is computer code designed to force pre-chosen ads to show on your system.

Attack:
An attack is associate action that's done on a system to induce its access and extract sensitive information.

Back door:
A back door, or door, may be a hidden entry to a computing machine or computer code that bypasses security measures, like logins and countersign protections.

Bot:
A bot may be a program that automates associate action in order that it are often done repeatedly at a way higher rate for a additional sustained amount than a human operator might have it off. as an example, sending hypertext transfer protocol, FTP or Telnet at a better rate or occupation script to make objects at a better rate.

A botnet:
A botnet, also called zombie army, may be a cluster of computers controlled while not their owners’ data. Botnets are used to send spam or create denial of service attacks.

Buffer Overflow:
Buffer Overflow may be a flaw that happens once additional information is written to a block of memory, or buffer, than the buffer is allotted to carry.

Clone phishing:
Clone phishing is that the modification of associate existing, legitimate email with a false link to trick the recipient into providing personal info.

Cracker:
A cracker is one WHO modifies the computer code to access the options that square measure considered undesirable by the person cracking the computer code, particularly copy protection options.

Denial of service attack (DoS):
A denial of service (DoS) attack may be a malicious plan to create a server or a network resource unavailable  to users, sometimes by quickly interrupting or suspending the services of a number connected to the net.

Exploit Kit:
Associate exploit kit is software designed to run on internet servers, with the aim of characteristic computer code vulnerabilities in client machines human activity with it and exploiting discovered vulnerabilities to transfer and execute malicious code on the client.


NEXT ARTICLE Next Post
PREVIOUS ARTICLE Previous Post
NEXT ARTICLE Next Post
PREVIOUS ARTICLE Previous Post