Search results
Jump to navigation
Jump to search
- ...http://www.eweek.com/c/a/Security/Strider-HoneyMonkey-Trawling-for-Windows-Exploits|newspaper=eWeek|date=19 May 2005}}</ref><ref name=TheARegistrerHoneyMonkey> ...icrosoft Research in 2005. With honeymonkeys it is possible to find open [[security hole]]s that are not yet publicly known but are being exploited by attacker ...5 KB (715 words) - 08:44, 27 May 2025
- ...10-protocol-bugs.pdf |archive-date=2011-11-26 |access-date=2012-01-26}}." Security Bugs in Protocols are Really Bad!</ref> ...01/04/19/exploit_devastates_winnt_2k_security/ Exploit devastates WinNT/2K security]." ''[[The Register]]'' online edition, April 19, 2001. Retrieved August 2 ...5 KB (756 words) - 11:56, 9 July 2024
- ...pollution" and "session modification") is a method to [[Exploit (computer security)|exploit]] insufficient input validation within a server application. Typic ...e server environment, which is possible if the attacker and victim share a web host. ...7 KB (968 words) - 09:39, 13 February 2025
- ...method or piece of code that takes advantage of [[Vulnerability (computer security)|vulnerabilities]] in [[software]], [[Application software|applications]], Exploits are designed to identify flaws, bypass security measures, gain unauthorized access to systems, take control of systems, ins ...18 KB (2,506 words) - 03:46, 10 November 2025
- {{Short description|Computer security exploitation}} In [[computer security]], a '''drive-by download''' is the unintended [[download]] of [[software]] ...8 KB (1,207 words) - 16:01, 24 May 2025
- ...the_Secure_Shell_The_Definitive_Guide |url-status=live }}</ref><ref>{{Cite web |title=Secure Shell Protocol – Everything you need to know |url=https://dev ...December 2021 |archive-date=2023-11-11|archive-url=https://web.archive.org/web/20231111073414/https://www.geeksforgeeks.org/difference-between-bind-shell- ...6 KB (777 words) - 07:19, 25 June 2025
- ...1_8_20070216.html How Legal Codes Can Hinder Hacker Cases</ref><ref>{{Cite web |title=Home |url=https://education.wsj.com/ |access-date=2023-03-10 |websit ...ttps://web.archive.org/web/20050225010955/http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx MS03-026] [[Remote procedure call|RPC]] [[Distribute ...6 KB (839 words) - 17:00, 29 December 2024
- ...attacks are particularly effective against computers that lack up-to-date security patches. Alternatively, some spoofed URLs are crafted for satirical purpose ...sites, as they typically do not [[Exploit (computer security)|exploit]] [[web browser]] vulnerabilities. ...10 KB (1,434 words) - 08:31, 7 January 2025
- {{short description|Computer security testing tool}} ...ate=2024-05-23|archive-date=2023-08-03|archive-url=https://web.archive.org/web/20230803154255/https://www.oreilly.com/library/view/metasploit/978159327288 ...17 KB (2,222 words) - 17:11, 2 June 2025
- ...the browser against session hijacking attacks |journal=Journal of Computer Security |volume=23 |issue=4 |pages=509–537 |doi=10.3233/jcs-150529 |issn=1875-8924 ...HTTP 1.0/1.1 servers, and how they are related to make them a 'permanent' security problem. It does make a good reference for the article.}} ...17 KB (2,481 words) - 05:54, 31 May 2025
- {{Short description|Security issue for web applications}}{{Use mdy dates|date=June 2019}}{{Redirect|XSS}} ...tatus=live| archive-date=25 June 2008| archive-url=https://web.archive.org/web/20080625065121/https://eval.symantec.com/mktginfo/enterprise/white_papers/b ...32 KB (4,609 words) - 21:38, 25 May 2025
- {{Short description|Capability that can be built into web servers and web clients}} ...client]]s to improve transfer speed and bandwidth utilization.<ref>{{cite web|url=http://www.microsoft.com/technet/prodtechnol/WindowsServer2003/Library/ ...17 KB (2,411 words) - 05:55, 18 May 2025
- ...Microsoft | access-date=21 June 2010 | archive-url=https://web.archive.org/web/20100606063535/http://www.microsoft.com/licensing/existing-customers/produc ...], pioneered the sale of Microsoft volume licenses in this way.<ref>{{Cite web | title=Second-Hand Software Licences for Sale (And They're Legal) | url=ht ...14 KB (1,996 words) - 01:36, 9 May 2025
- ...often used where [[high availability]], [[safety]], or [[computer security|security]] is needed. ...the subset of defensive programming concerned with [[computer security]]. Security is the concern, not necessarily safety or availability (the [[software]] ma ...14 KB (2,001 words) - 07:41, 29 October 2025
- {{short description|Suite of Microsoft security protocols for authentication, integrity, and confidentiality}} ...T (New Technology) LAN Manager''' ('''NTLM''') is a suite of [[Microsoft]] security protocols intended to provide authentication, integrity, and confidentialit ...29 KB (4,194 words) - 17:14, 6 January 2025
- ...virc.net/doc/doc_dcc_connection.html |website=kvric.net}}</ref><ref>{{Cite web|url=https://www.irchelp.org/protocol/ctcpspec.html|title=IRCHelp.org — The | chapter = IRC Networks and Security ...19 KB (3,133 words) - 05:56, 6 June 2024
- ...level (using a kernel-level packet filter such as [[iptables]]<ref>{{cite web ...curing access to remote network daemons has not been widely adopted by the security community, it has been actively used in many [[rootkit]]s even before year ...14 KB (2,132 words) - 20:53, 15 January 2025
- ...s based on credentials stored on the laptop including [[MAC address]]es, [[web cookie]]s, [[cryptographic key]]s and stored [[password]]s. ...breaches-are-on-the-rise-but-preventable/ |date=2013-03-11 }} Druva, 2012. Web. 15 August 2012.</ref> ...15 KB (2,061 words) - 13:37, 23 April 2025
- ...ecurity/adaptive-security-appliance-asa-software/index.html Cisco Adaptive Security Appliance] ([[Cisco ASA]]), that inherited many of the PIX features, and in ...but has reached end of support status as of September 26, 2007.<ref>{{cite web |url=http://www.cisco.com/c/en/us/support/interfaces-modules/catalyst-6500- ...15 KB (2,212 words) - 16:27, 10 May 2025
- {{short description|Software exploits combining attacks against different vulnerabilities}} ...ty (computing)|vulnerabilities]]. Blended threats can be any software that exploits techniques to attack and propagate threats, for example [[computer worm|wor ...17 KB (2,343 words) - 07:38, 4 September 2024