Word of The Day

Fri
27
May
Dennis Faas's picture

Session Hijacking

In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system. For example, when a user logs in to a web ... site, the user's PC is tagged with a session key using a browser cookie (a cookie is a small file stored on the users PC that the browser reads). Any time the user requires access to a restricted area of a website (usually requiring login), the session key is extracted from the users' PC and compared to the key stored on the web server. If valid, the ... (view more)

Fri
18
Feb
Dennis Faas's picture

Denial Of Service Attack (DoS)

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may ... vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name ... (view more)

Wed
29
Dec
Dennis Faas's picture

Solid-State Drive (SSD)

A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data. SSDs are distinguished from traditional hard disk drives (HDDs), which are electromechanical devices containing spinning disks and movable read ... / write heads. SSDs, in contrast, use microchips which retain data in non-volatile memory chips and contain no moving parts. Solid State Drive (SSD) Compared to a Hard Disk Drive (HDD) Today's solid state hard drives are considerably faster than a standard (spinning) hard drive. For example: read / write speeds on a standard HDD are roughly 40-60 ... (view more)

Wed
20
Oct
Dennis Faas's picture

Crimeware

Crimeware is a class of malware designed specifically to automate cybercrime. The term was coined by Peter Cassidy, Secretary General of the Anti- Phishing Working Group to distinguish it from other kinds of malevolent programs. Crimeware: ... Definition Crimeware is a form of malicious software. It is distinct from spyware, adware, and malware. Crimeware is designed through social engineering or technical stealth to perpetrate identity theft. Once an identity is stolen, it is used to access a computer user's online accounts at financial services companies and online retailers for the purpose of ... (view more)

Wed
22
Sep
Dennis Faas's picture

Chipset

In computing, the term "chipset" is commonly used to refer to a set of specialized chips on a computer's motherboard (or "main board"), and even expansion cards. North and South Bridges of a Mainboard Based on Intel Pentium-class microprocessors, ... the term chipset often refers to a specific pair of chips on the motherboard: the northbridge and the southbridge. The northbridge links the CPU (Central Processing Unit) to very high-speed devices, especially main memory and graphics controllers, and the southbridge connects to lower-speed peripheral buses (such as PCI or ISA). In many modern ... (view more)

Wed
08
Sep
Dennis Faas's picture

Scareware

Scareware comprises several classes of scam software with malicious payloads, or of limited or no benefit, that are sold to consumers via certain unethical marketing practices. The selling approach uses social engineering to cause shock, anxiety, or ... the perception of a threat, generally directed at an unsuspecting user. Some forms of spyware and adware also use scareware tactics. Scareware and Fake Antivirus A tactic frequently used by criminals involves convincing users that a virus has infected their computer, then suggesting that they download (and pay for) fake antivirus software to ... (view more)

Wed
18
Aug
Dennis Faas's picture

User Account Control (UAC)

User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more refined version also present in Windows 7 and Windows Server 2008 R2. The UAC ... aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system. User Account Control (UAC ... (view more)

Wed
11
Aug
Dennis Faas's picture

Kernel

In computing, the kernel is the central component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware level. The kernel's responsibilities include managing the system's ... resources (the communication between hardware and software components). Usually as a basic component of an operating system, a kernel can provide the lowest-level abstraction layer for the resources (especially processors and input / output devices) that application software must control to perform its function. Kernel Basic Facilities The kernel's primary ... (view more)

Tue
10
Aug
Dennis Faas's picture

Data Mining

Data mining is the process of extracting patterns from data. Data mining is becoming an increasingly important tool to transform otherwise abstract data into useable information. It is commonly used in a wide range of profiling practices, such as ... marketing, surveillance, fraud detection and scientific discovery. Data mining can be used to uncover patterns in data but is often carried out only on samples of data. The mining process will be ineffective if the samples are not a good representation of the larger body of data. Data mining cannot discover patterns that may be present in the larger ... (view more)

Tue
03
Aug
Dennis Faas's picture

Phishing

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic ... communication. Phishing is typically carried out by email or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Recent ... (view more)

Pages

Subscribe to RSS - Word of The Day