- malicious hacking
- злонамеренные действия хакеров
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Hacking tool — A hacking tool is a program designed to assist with hacking, or a legitimate utility that can also be used for hacking. Examples Examples include Nmap, Nessus, John the Ripper, SuperScan, p0f, and Winzapper. [ [http://www.teckh.com/?p=143 Top 15… … Wikipedia
Google hacking — is a term that refers to the art of creating complex search engine queries in order to filter through large amounts of search results for information related to computer security. In its malicious format it can be used to detect websites that are … Wikipedia
chief hacking officer — n. The person in a corporation who is responsible for testing systems and programs to see if they are vulnerable to attacks by malicious hackers. Example Citation: According to Dittrich, organizations should consider purchasing insurance to cover … New words
Hacker motives — Why do Hackers Hack? This is a question asked repeatedly by average consumers and users of computers and computer technology. Through years of study and research, the answers have become more clear. Just like every act committed by a criminal,… … Wikipedia
Erik Bloodaxe (hacker) — Chris Goggans, who used the name Erik Bloodaxe in honor of the Viking king Eric I of Norway, is a founding member of the Legion of Doom group, and a former editor of Phrack Magazine. Loyd Blankenship, aka The Mentor, described Goggans/Bloodaxe as … Wikipedia
Black hat — For other uses, see Black hat (disambiguation). A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero s white hat, especially in black and… … Wikipedia
neurosecurity — n. Security practices and protocols related to neural interfaces that enable a person to control computers and other machines using thoughts. Example Citations: Despite the risks, Kohno said, most new devices aren t created with security in mind … New words
Swarming (military) — Swarming is a behavior in which autonomous, or semi autonomous, units of action attack an enemy from several different directions and then regroup. Pulsing , where the units shift the point of attack, is a necessary part of swarming. Swarming is… … Wikipedia
FBI Buffalo Field Office — The FBI Buffalo Field Office is the Federal Bureau of Investigation field office in Buffalo, New York, one of 56 field offices in the United States. The Buffalo Field Office is responsible for the Western New York region. Its jurisdiction is the… … Wikipedia
Technical intelligence — In a pure military context, Technical Intelligence (TECHINT) is intelligence about weapons and equipment used by the armed forces of foreign nations (often referred to as foreign materiel).The related term, scientific and technical intelligence,… … Wikipedia
Law enforcement in Australia — is served by police, sheriffs and bailiffs under the control of state, territory and the Federal governments. A number of state, territory and federal agencies also administer a wide variety of legislation related to white collar crime.The police … Wikipedia