UseFull Links
About
Accessbility
Help
Privacy & Terms
Internet Resource Channel
Internet Routing Channel
Internet Rights Council
Internet Relay Chat
ISDN‘ stand For :
It is a collection of data that is stored electronically as a series of records in a table.
It is a prepared application that takes advantage of a known weakness.
It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
It is a small piece of text stored on a users computer by a web browser for maintaining the state. What we are talking about?
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs
It is a tool used to quickly check computers on a network for known weaknesses.
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
It is also called the brain of the computer, is responsible for processing data.