Headlines
Loading...

Part 1/2 
This is , if you like do let me know i will make and share 
2nd part 
A    
Algorithm: A series of steps specifying which actions to take in which order.
ANSI Bomb: ANSI.SYS key-remapping commands consist of cryptic-looking ext that specifies, using ANSI numeric codes to redefine keys.
B    
Back Door: Something a hacker leaves behind on a system in order to be able to get back in at a later time.
Binary: A numbering system in which there are only two possible values for each digit:
Black Hat: A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)  
Blue Hat: A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Bot: A piece of malware that connects a computer to an attacker commonly using the HTTP or IRC protocol to await malicious instructions.
Botnet: Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
Buffer Overflow: A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
C    
Cracker: A specific type of hacker who decrypts passwords or breaks software copy protection schemes.
D    
DDoS: Distributed denial of service. Flooding someone's connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter.
Deface: A website deface is an attack on a site that changes the appearance of the site or a certain webpage on the site.
Dictionary Attack: A dictionary attack is an attack in which a cybercriminal can attempt to gain your account password. The attack uses a dictionary file, a simple list of possible passwords, and a program that fills them in. The program just fills in every single possible password on the list, until it has found the correct one. Dictionary files usually contain the most commonly used passwords.
DOX: Personal information about someone on the Internet usually contains the real name, address, phone number, SSN, credit card number, etc.
E    
Encryption: In cryptography, encryption applies mathematical operations to data in order to render it incomprehensible. The only way to read the data is applying the reverse mathematical operations. In technical speak, encryption is applied mathematical algorithms with a key that converts plaintext to ciphertext. Only someone in possession of the key can decrypt the message.
E-Whore: A person who manipulates other people to believe that he/she is a beautiful girl doing cam shows or selling sexual pictures to make money.
Exploit: A way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it.
F    
FUD: Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.
G    
Grey Hat: A hacker is someone who is able to manipulate the inner workings of computers, information, and technology to work in his/her favor.
H    
Hacktivist: A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.
I    
IP Address: On the Internet, your IP address is the unique number that others use to send you traffic.
IP Grabber: A link that grabs someone’s IP when they visit it.
K    
Keylogger: A software program that records all keystrokes on a computer’s keyboard, used as a surveillance tool or covertly as spyware.
L    
Leach: A cultural term in the warez community referring to people who download lots of stuff but never give back to the community.


I am a new member of Google bloggers. I am interested to learning knowledge and spread/share my ideas and knowledge in over the world.

0 Comments:

Our Team

  • Muhammad Ali Master / Computers
  • Muhammad IqbalMaster / Computers
  • Shehbaz iqbalMaster / Computers
  • Zoya iqbalMaster / Computers
  • Junaid iqbalMaster / Computers
  • Shahzad IqbalMaster / Computers
  • Copyrights @ Al-Shehbaz-Iqbal-hacker-group