• a prepared application that takes advantage of a known weakness.

  • a tool used to quickly check computers on a network for known weaknesses.

  • an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

  • a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access


an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

New Questions
New Blog Post
Network Questions