Hacker's & Programmer Dictionary
Are you new to the realm of hacking & Programming ?
Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.
*The list is in alphabetical order for convenience!*
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
π DDoS = Distributed Denial of Service
π DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.
π FTP =File Transfer Protocol. Used for transferring files over an FTP server.
π FUD = Fully Undetectable.
π Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.
π HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.
π IRC = Internet Relay Chat. Transmiting text messages in real time between online users.
π JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.
π Malware =Malicious Software.
π Nix = Unix based operating system, usually refered to here when refering to DoS'ing.
π POP3 =This is the most popular protocol for picking up e-mail from a server.
π R.A.T = Remote Administration Tool.
π SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)
π SE = Social Engineering.
π Skid =Script Kid/Script Kiddie.
π SMTP =A TCP/IP protocol used in sending and receiving e-mail.
π SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."
π SSH =Secure Shell, used to connect to Virtual Private Servers.
π TCP = Transmission Control Protocol, creates connections and exchanges packets of data.
π UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.
π VPN =Virtual Private Network.
π VPS =Virtual Private Server.
π XSS (CSS) = Cross Site Scripting.
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
Words
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
π Algorithm = A series of steps specifying which actions to take in which order.
π ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.
π Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.
π Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.
π Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)
π Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
π Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.
π Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
π Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
π Cracker = A specific type of hacker who decrypts passwords
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
✌
I hope Now You Know Word's !
✌
✌
I hope Now You Know Word's !
✌
0 comments:
Post a Comment