UseFull Links
About
Accessbility
Help
Privacy & Terms
International standard digital network
Integrated service data network
International service digital network
International service data network
It is a collection of data that is stored electronically as a series of records in a table.
It is a prepared application that takes advantage of a known weakness.
It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
It is a small piece of text stored on a users computer by a web browser for maintaining the state. What we are talking about?
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs
It is a tool used to quickly check computers on a network for known weaknesses.
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
It is also called the brain of the computer, is responsible for processing data.
It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.