Search results

Jump to navigation Jump to search
Results 1 – 21 of 422
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...computing)|vulnerability]] in [[computer software]] that may be used for [[security exploit]]s.<ref name=hacking>{{cite book|title=Hacking: the art of exploita {{security-software-stub}} ...
    1 KB (138 words) - 02:39, 24 November 2022
  • '''Network Chemistry''' was a [[Wi-Fi]] security [[startup company|startup]] based in [[Redwood City, California]]. The firm ...ity product; and RFprotect Mobile, a portable tool for analyzing [[network security]]. The final product was RFprotect Scanner, a wired-side [[rogue access po ...
    2 KB (229 words) - 00:50, 12 February 2023
  • ...tactics to infiltrate a [[computer]] user's environment. A mixed [[Threat (computer)|threat]] attack might include an infected file that comes in by way of [[S [[Nimda]] and [[Code Red (computer worm)|Code Red]] are examples of computer worms that utilized mixed threat attacks.<ref name = "TrendMicro"/> ...
    2 KB (268 words) - 05:19, 22 June 2025
  • *[[Exploit (computer security)]] *[[Exploits River]], the longest river on the island of Newfoundland ...
    775 bytes (94 words) - 17:45, 3 May 2025
  • ...efore ostensibly avoiding fallout from erroneous code that unintentionally exploits more privilege than is merited. It is an example of the use of [[principle ...istinguished from [[privilege separation]], which is a much more effective security measure that separates the privileged parts of the system from its unprivil ...
    1 KB (207 words) - 11:41, 17 March 2025
  • {{Short description|Process of increasing the security of a system}} In [[computer security]], '''hardening''' is usually the process of securing a system by reducing ...
    3 KB (339 words) - 06:55, 29 August 2024
  • ...re code is currently being delivered in at least seven [[Exploit (computer security)|exploit]]s, including threats aimed at [[Microsoft]]'s [[Microsoft Data Ac * Infecting the visitor's computer with a [[Trojan horse (computing)|Trojan]] by exploiting numerous vulnerabi ...
    2 KB (332 words) - 21:51, 16 July 2023
  • ...arget Identification]], an AMD technology for mitigating computer security exploits; * [[Branch Target Injection]] or Spectre variant 2, a security vulnerability ...
    1 KB (137 words) - 19:49, 27 September 2023
  • |title=A Practical Introduction to Enterprise Network and Security Management |title=CSE 380 Computer Operating Systems ...
    3 KB (389 words) - 06:20, 20 October 2024
  • ...itle=Proceedings of the 11th ACM conference on Computer and communications security |chapter=Pong-cache poisoning in GUESS |date=2004 |pages=98–109 |doi=10.114 [[Category:Computer security exploits]] ...
    3 KB (390 words) - 03:50, 26 May 2025
  • ...http://www.eweek.com/c/a/Security/Strider-HoneyMonkey-Trawling-for-Windows-Exploits|newspaper=eWeek|date=19 May 2005}}</ref><ref name=TheARegistrerHoneyMonkey> ...icrosoft Research in 2005. With honeymonkeys it is possible to find open [[security hole]]s that are not yet publicly known but are being exploited by attacker ...
    5 KB (715 words) - 08:44, 27 May 2025
  • ...security-journalist-steve-gold-dies/article/392210/ "Respected Information Security Journalist Steve Gold Dies"], ''SC Magazine'', 13 January 2015</ref> ...acking archive at TNMOC |url=https://www.tnmoc.org/news-releases/2016/5/18/computer-hacking-archive-at-tnmoc |website=The National Museum of Computing |date=18 ...
    3 KB (428 words) - 14:37, 13 July 2024
  • {{Short description|Unix-based computer security tool}} ...s://medium.com/logistimo-engineering-blog/a-way-to-detect-the-rootkits-and-exploits-in-centos-rhel-5b125a8d6a25 |access-date=2024-07-04 |website=medium.com}}</ ...
    4 KB (473 words) - 08:42, 7 May 2025
  • {{Short description|Information security website}} | type = [[Computer security]] ...
    7 KB (906 words) - 03:49, 12 January 2025
  • {{Short description|Computer hacking technique}} ...d=115601361 |issn=0013-5194|url-access=subscription }}</ref> in [[computer security]] is a type of hacking technique related to [[Man-in-the-middle attack|man- ...
    3 KB (414 words) - 18:19, 25 May 2025
  • ...to trick the target into providing the answer to its own challenge.<ref>''Computer Networks'' by [[Andrew S. Tanenbaum]], 4th edition, {{ISBN|0-13-038488-7}}, ...<ref>[[Ross J. Anderson]]: <cite>[http://www.cl.cam.ac.uk/~rja14/book.html Security Engineering: A Guide to Building Dependable Distributed Systems]</cite>, 1s ...
    3 KB (420 words) - 08:16, 8 September 2024
  • [[Category:Unix security-related software]] [[Category:Computer security exploits]] ...
    2 KB (226 words) - 16:17, 5 July 2024
  • ...s responsible for a significant share of the [[Exploit (computer security)|exploits]] on the [[bugtraq]] mailing list. ...nded, and quickly grew to 6 people, which first met in 1999 at the [[Chaos Computer Club|CCC]] Camp near Berlin. ...
    8 KB (1,075 words) - 20:35, 16 June 2025
  • The '''Voyager worm''' is a [[computer worm]] that exploits a SQL injection flaw (CVE-2004-0637) that was posted on the [[Internet]] on ...ting a private link to the database.<ref>{{cite web| publisher=Application Security Inc.| url=http://www.appsecinc.com/resources/alerts/oracle/2006-01A.shtml | ...
    2 KB (317 words) - 18:12, 2 January 2025
  • {{Short description|Computer security exploit}} ...kiy, and A. Herrigel. The Watermark Copy Attack. Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, Volume 3971, pages 371-379. San ...
    3 KB (427 words) - 15:03, 22 January 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)