pursuitmag.com

Website:http://www.pursuitmag.com
Upvotes received2
Downvotes received3
Karma:-2 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (59)

1

2 Thumbs up   1 Thumbs down

Crapflooding


the practice of disrupting online media such as discussion websites or Usenet newsgroups with nonsensical, inane, and/or repetitive postings (flooding with crap) in order to make it difficult for othe [..]
Source: pursuitmag.com

2

0 Thumbs up   0 Thumbs down

Address munging


the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations who send unsolicited bulk e-mail address.
Source: pursuitmag.com

3

0 Thumbs up   0 Thumbs down

Adware


or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the applic [..]
Source: pursuitmag.com

4

0 Thumbs up   0 Thumbs down

Backdoor


in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to [..]
Source: pursuitmag.com

5

0 Thumbs up   0 Thumbs down

Backscatter (also known as outscatter


a side-effect of e-mail spam, viruses and worms, where email servers receiving spam and other mail send bounce messages to an innocent party. This occurs because the original message’s envelope sender [..]
Source: pursuitmag.com

6

0 Thumbs up   0 Thumbs down

black hat


the villain or bad guy, especially in a western movie in which such a character would wear a black hat in contrast to the hero’s white hat. The phrase is often used figuratively, especially in computi [..]
Source: pursuitmag.com

7

0 Thumbs up   0 Thumbs down

bluebugging


a form of bluetooth attack. A Bluebug program allows the user to “take control” of the victim’s phone. Not only can they make calls, they can send messages, essentially do anything the phone can do. T [..]
Source: pursuitmag.com

8

0 Thumbs up   0 Thumbs down

bluejacking


the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,
Source: pursuitmag.com

9

0 Thumbs up   0 Thumbs down

bluesnarfing


the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails [..]
Source: pursuitmag.com

10

0 Thumbs up   0 Thumbs down

Botnet


a jargon term for a collection of software robots, or bots, that run autonomously and automatically. They run on groups of zombie computers controlled remotely.
Source: pursuitmag.com


To view all 59 definitions, please sign in.