top of page
Search
  • comaweng

A hacker's glossary


​BOTNET

A group of compromised computers connected to the internet, which can be used to distribute further attacks, such as DDoS.


COMPUTER VIRUS

A program that attaches itself to a file or program allowing it to spread from one computer to another when opened (unknowingly) by a user.


DAISY CHAINING

To avoid being caused, hackers gain access to one computer, then use it to infiltrate another, and so on.


DISTRIBUTED DENIAL OF SERVICE ATTACKS (DDoS)

An attack that floods the targeted network with so many requests that regular traffic to the site is either slowed or completely interrupted.


EVIL TWINS

A phishing technique where a hacker creates a fake but plausible-looking free public Wi-Fi and uses it to steal data.


HACKTIVISM

Amateur hacking for political protests – Anonymous and LubSec are the most famous examples.


PHISHING

Luring users to reveal personal information by masquerading as a trusted source. ‘Spear-phishing’ is ore individually tailored to the intended target.


SCRIPT KIDDIE

A hacker who does not know how to infiltrate, but uses malicious code written by others to launch attacks.


TROJAN HORSE

A malicious program disguised as something benign, such as a game or antivirus program.


WHITE HAT HACKER

Someone who explores and infiltrates computers and networks intending to improve their security.


WORM

Like a virus, it can spread from computer to computer, but does not attach itself to a file or program, meaning it can proliferate without users doing anything.

10 views0 comments

Recent Posts

See All
bottom of page