Welcome back...!🎉
Hello again Friends...
💣first of all, I would like to thank you all for giving me such good support. I am back with the post that I mentioned in my previous post(link-https://technicalsj14.blogspot.com/2020/07/welcome-friends.html). So let's start with today's topic "hacking terminologies".
" Hacking Terminologies "
In the world of hacking several terms are common which you should know.These terminologies are:
⏩ Attack: An attack is an action that is done on a system to get its access and extract sensitive data.
⏩ Back door: A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.
⏩ Brute force attack: A brute force attack is an automated and the simplest kind of method to gain access to a system or websites. It tries different combination of usernames and passwords until it gets in.
⏩ Adware: An adware is software designed to force pre-chosen ads to display on your system.
⏩ Exploit: Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.
⏩ Malware: Malware is a term used for computer viruses, worms, Trojan horses, ransomware, spyware and other malicious programs.
⏩ Phishing: Phishing is an e-mail fraud method in which the hacker sends spam-looking e-mails to the target to gather personal and financial information from recipients.
⏩ Spyware: Spyware is software that aims to gather information about a person or organization or that asserts control over a computer without consumer's knowledge.
⏩ Spoofing: Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.
⏩ Threat: A threat is a possible danger that can exploit an existing bug or vulnerability to compromise the security of a computer or network system.
⏩ Vulnerability: A vulnerability is a weakness which allows a hacker to attack on the security of a computer or a network system.
⏩ Worms: A worm is a self-replicating virus that does not alter files but resides in active memory and duplicates.
⏩ Trojan: A Trojan, or Trojan Horse, is a malicious program which looks as a valid program, making it difficult to distinguish from programs that are designed with intent of destroying files, steal passwords or other information.
⏩ Virus: A virus is a malicious program or a piece of code which is capable of copying itself has effect of corrupting a system or destroying the data.
⏩ SQL Injection: SQL Injection is an SQL code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.
⏩ Rootkit: Rootkit is a malicious software designed to hide the existence of certain processes or programs from normal methods of detection.