Recently Updated Pages
Application Level Encryption
A form of database encryption where the program that's used to create and manage the stored data ...
Column Level Encryption
A form of database encryption that allows the database administrator to encrypt each column or se...
Cryptominer
A malware program that uses the resources of a system to mine cryptocurrency for the attacker.
Ransomware
A malware program that forces the victim to either send a form of payment in order to decrypt the...
Spyware
A type of malware that's designed to collect information about the victim who's system got infect...
Keylogger
A type of malware that logs every keystroke a user makes and sends it back to the attacker. This ...
Trojan Horse
A type of malware that provides an attacker remote access to an infected system. This program is ...
Virus
A self-replicating type of malware that often mimic or attach to legitimate programs and hide ins...
Master File Table
A database that stores information about all files and directories in the NTFS file system. It al...
Principle of Least Privilege
This principle states that users should only have enough permissions to do their job effectively,...
Zero Day Attack
A type of network attack where the attacker exploits a vulnerability previously unknown to the ne...
MAC Spoofing
A type of network attack where the attacker scans the network for valid MAC addresses, matches th...
Insider Attack
A type of network attack where an active or former employee of an organization still has access t...
Brute Force Attack
A password attack method where the attacker attempts to guess the password through trial and erro...
SQL Injection
A type of web server attack where the injects malicious SQL code into an input field in order to ...
Cross site Scripting
A type of web server attack where the attacker exploits misconfigured input fields, inputting mal...
Liquid Crystal Display Monitor
A type of monitor that produces image by moving liquid crystals that block or allow light to pass...
Extended File System
Extended File System: a file system originally designed for the Silicon Graphics IRIX OS, but sup...
Cyclic Redundancy Check
A form of error-correcting code that's used to detect accidental changes or corruption in digital...
Long Term Evolution
An extension of the 3G cellular network technology. It increased downlink/uplink speeds to 100/50...