UseFull Links
About
Accessbility
Help
Privacy & Terms
Keylogger
Worm
Virus
Cracker
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
It is a small piece of text stored on a users computer by a web browser for maintaining the state. What we are talking about?
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs
It is a tool used to quickly check computers on a network for known weaknesses.
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
It is also called the brain of the computer, is responsible for processing data.
It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
IT stands for
Items such as names and addresses are considered _
IV Generation Computers contain