text stringlengths 11 320k | source stringlengths 26 161 |
|---|---|
Upgradingis the process of replacing a product with a newer version of the same product. Incomputingandconsumer electronics, anupgradeis generally a replacement ofhardware,softwareorfirmwarewith a newer or better version, in order to bring the system up to date or to improve its characteristics.
Examples of common har... | https://en.wikipedia.org/wiki/Upgrade |
Connascenceis a software design metric introduced by Meilir Page-Jones that quantifies the degree and type of dependency between software components, evaluating their strength (difficulty of change) and locality (proximity in the codebase). It can be categorized as static (analyzable at compile-time) or dynamic (detect... | https://en.wikipedia.org/wiki/Connascence_(computer_science) |
Inphysics,two objects are saidto be coupled when they are interacting with each other. Inclassical mechanics, coupling is a connection between twooscillatingsystems, such aspendulumsconnected by a spring. The connection affects the oscillatory pattern of both objects. Inparticle physics,two particles are coupledif they... | https://en.wikipedia.org/wiki/Coupling_(physics) |
Incompiler theory,dead-code elimination(DCE,dead-code removal,dead-code stripping, ordead-code strip) is acompiler optimizationto removedead code(code that does not affect the program results). Removing such code has several benefits: it shrinksprogramsize, an important consideration in some contexts, it reduces resour... | https://en.wikipedia.org/wiki/Dead_code_elimination |
Dependency hellis acolloquial termfor the frustration of some software users who have installedsoftware packageswhich havedependencieson specificversionsof other software packages.[1]
The dependency issue arises when several packages have dependencies on the samesharedpackages or libraries, but they depend on differen... | https://en.wikipedia.org/wiki/Dependency_hell |
Efferent couplingis acouplingmetricinsoftware development. It measures the number ofdata typesaclassknows about.
This includesinheritance, interface implementation, parameter types, variable types, andexceptions.
This has also been referred to byRobert C. Martinas the Fan-out stability metric which in his book Clean ... | https://en.wikipedia.org/wiki/Efferent_coupling |
Insoftware engineering,inversion of control(IoC) is a design principle in which custom-written portions of acomputer programreceive theflow of controlfrom an external source (e.g. aframework). The term "inversion" is historical: asoftware architecturewith this design "inverts" control as compared toprocedural programmi... | https://en.wikipedia.org/wiki/Inversion_of_control |
This is a list of terms found inobject-oriented programming. | https://en.wikipedia.org/wiki/List_of_object-oriented_programming_terms |
Incomputingandsystems design, aloosely coupledsystem is one
Components in a loosely coupled system can be replaced with alternative implementations that provide the same services. Components in a loosely coupled system are less constrained to the same platform,language,operating system, or build environment.
If syste... | https://en.wikipedia.org/wiki/Loose_coupling |
Insoftware development,Makeis acommand-line interfacesoftware toolthat performs actions ordered by configureddependenciesas defined in aconfiguration filecalled amakefile. It is commonly used forbuild automationtobuildexecutable code(such as aprogramorlibrary) fromsource code. But, not limited to building, Make can per... | https://en.wikipedia.org/wiki/Make_(software) |
Incomputer science,static program analysis(also known asstatic analysisorstatic simulation) is theanalysisof computer programs performed without executing them, in contrast withdynamic program analysis, which is performed on programs during their execution in the integrated environment.[1][2]
The term is usually appli... | https://en.wikipedia.org/wiki/Static_code_analysis |
Attack treesare conceptual diagrams showing how an asset, or target, might be attacked.[1]Attack trees have been used in a variety of applications. In the field of information technology, they have been used to describethreats on computer systemsand possibleattacksto realize those threats. However, their use is not re... | https://en.wikipedia.org/wiki/Attack_tree |
AnHTTPS Bicycle Attackrefers to a method of discoveringpasswordlength onpacketsencrypted withTLS/SSL protocols.[1]In preparation for a bicycle attack, the attacker must load the target page to compute the sizes of headers in the request made by a given web browser to theserver. Once the attacker intercepts andbrowser f... | https://en.wikipedia.org/wiki/Bicycle_attack |
Completely Automated Public Turing Test to tell Computers and Humans Apart(CAPTCHA) (/ˈkæp.tʃə/KAP-chə) is a type ofchallenge–responseturing testused incomputingto determine whether the user is human in order to deter bot attacks and spam.[1]
The term was coined in 2003 byLuis von Ahn,Manuel Blum, Nicholas J. Hopper, ... | https://en.wikipedia.org/wiki/CAPTCHA |
TheCenter for Internet Security(CIS) is a US501(c)(3)nonprofit organization,[2]formed in October 2000.[1]Its mission statement professes that the function of CIS is to " help people, businesses, and governments protect themselves against pervasivecyber threats."
The organization is headquartered inEast Greenbush, New ... | https://en.wikipedia.org/wiki/Center_for_Internet_Security |
Cloud computing securityor, more simply,cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure ofcloud computing. It is a sub-domain ofcomputer security,network securityand, more broa... | https://en.wikipedia.org/wiki/Cloud_computing_security |
The term "on-demand scan" refers to the possibility of performing a manual scan (by the user) on the entire computer/device, while "on-access scan" refers to the ability of a product to automatically scan every file at its creation or subsequent modification.
The term "CloudAV" refers to the ability of a product to au... | https://en.wikipedia.org/wiki/Comparison_of_antivirus_software |
Content Disarm & Reconstruction(CDR) is acomputer securitytechnology for removing potentiallymalicious codefrom files. Unlikemalware analysis, CDR technology does not determine or detect malware's functionality but removes all file components that are not approved within the system's definitions and policies.[1]
It is... | https://en.wikipedia.org/wiki/Content_Disarm_%26_Reconstruction |
Content Security Policy(CSP) is acomputer securitystandard introduced to preventcross-site scripting(XSS),clickjackingand othercode injectionattacks resulting from execution of malicious content in the trustedweb pagecontext.[1]It is a Candidate Recommendation of theW3Cworking group on Web Application Security,[2]widel... | https://en.wikipedia.org/wiki/Content_Security_Policy |
Incomputer securityacountermeasureis an action,device, procedure, or technique that reduces athreat,vulnerability, orattack, eliminating or preventing it by minimizing theharmit can cause. It can also include discovering and reporting vunerabilities so that corrective action can be taken.
The definition is given inIET... | https://en.wikipedia.org/wiki/Countermeasure_(computer) |
Cyber insuranceis a specialtyinsuranceproduct intended to protect businesses from Internet-basedrisks, and more generally from risks relating toinformation technologyinfrastructure and activities. Risks of this nature are typically excluded from traditionalcommercial general liabilitypolicies or at least are not speci... | https://en.wikipedia.org/wiki/Cyber_insurance |
Computer security(alsocybersecurity,digital security, orinformation technology (IT) security) is a subdiscipline within the field ofinformation security. It consists of the protection ofcomputer software,systemsandnetworksfromthreatsthat can lead to unauthorized information disclosure, theft or damage tohardware,softwa... | https://en.wikipedia.org/wiki/Cyber_self-defense |
Cyberbiosecurityis an emerging field at the intersection ofcybersecurityandbiosecurity.[1][2][3]The objective of cyberbiosecurity has been described as addressing "the potential for or actual malicious destruction, misuse, or exploitation of valuable information, processes, and material at the interface of the life sci... | https://en.wikipedia.org/wiki/Cyberbiosecurity |
This is alist of cybersecurity information technologies.Cybersecurityconcerns all technologies that store, manipulate, or move computerdata, such ascomputers,data networks, and all devices connected to or included in said networks, such asroutersandswitches. Allinformation technologydevices and facilities need to be se... | https://en.wikipedia.org/wiki/Cybersecurity_information_technology_list |
Incomputer security, "dancing pigs" is a term or problem that explains computer users' attitudes towards computer security. It states that users will continue to pick an amusing graphic even if they receive a warning from security software that it is potentially dangerous.[1]In other words, users choose their primary d... | https://en.wikipedia.org/wiki/Dancing_pigs |
Data securityordata protectionmeans protectingdigital data, such as those in adatabase, from destructive forces and from the unwanted actions of unauthorized users,[1]such as acyberattackor adata breach.[2]
Disk encryptionrefers toencryptiontechnology that encrypts data on ahard disk drive. Disk encryption typically ... | https://en.wikipedia.org/wiki/Data_security |
In computing,defense strategyis a concept and practice used by computer designers, users, and IT personnel to reducecomputer securityrisks.[1]
Boundary protection employs security measures and devices to prevent unauthorized access to computer systems (referred to as controlling the system border). The approach is bas... | https://en.wikipedia.org/wiki/Defense_strategy_(computing) |
Fault toleranceis the ability of asystemto maintain proper operation despite failures or faults in one or more of its components. This capability is essential forhigh-availability,mission-critical, or evenlife-critical systems.
Fault tolerance specifically refers to a system's capability to handle faults without any d... | https://en.wikipedia.org/wiki/Fault_tolerance |
Human–computer interaction(HCI) is the process through which people operate and engage with computer systems. Research in HCI covers the design and the use ofcomputer technology, which focuses on theinterfacesbetween people (users) andcomputers. HCI researchers observe the ways humans interact with computers and design... | https://en.wikipedia.org/wiki/Human%E2%80%93computer_interaction_(security) |
Identity and access management(IAMorIdAM) orIdentity management(IdM), is a framework of policies and technologies to ensure that the right users (that are part of theecosystemconnected to or within an enterprise) have the appropriate access to technology resources. IAM systems fall under the overarching umbrellas ofIT ... | https://en.wikipedia.org/wiki/Identity_management |
Information security awarenessis an evolving part ofinformation securitythat focuses on raising consciousness regarding potential risks of the rapidly evolving forms ofinformationand the rapidly evolving threats to that information which target human behavior. As threats have matured and information has increased in v... | https://en.wikipedia.org/wiki/Information_security_awareness |
Internet privacyinvolves the right or mandate of personalprivacyconcerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via theInternet.[1][2]Internet privacy is a subset ofdata privacy. Privacy concerns have been articulated from the beginnings of large-scale ... | https://en.wikipedia.org/wiki/Internet_privacy |
Internet safety, also known asonline safety,cyber safetyandelectronic safety(e-safety), refers to the policies, practices and processes that reduce the harm to people that are enabled by the (mis)use of information technology.
As the number of internet users continues to grow worldwide,[1]Internet, governments, and or... | https://en.wikipedia.org/wiki/Internet_safety |
Internet securityis a branch ofcomputer security. It encompasses theInternet,browser security, web site security,[1]andnetwork securityas it applies to otherapplicationsoroperating systemsas a whole. Its objective is to establish rules and measures to use against attacks over the Internet.[2]The Internet is an inherent... | https://en.wikipedia.org/wiki/Internet_security |
Information security standards(alsocyber security standards[1]) are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment.[2]This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, appl... | https://en.wikipedia.org/wiki/IT_security_standards |
Many countries around the world maintain military units that are specifically trained to operate in acyberwarfareenvironment. In several cases these units act also as the nationalcomputer emergency response teamfor civiliancybersecuritythreats.
[35]
Inter-service
Army
Navy
Air Force
General Staff Department of th... | https://en.wikipedia.org/wiki/List_of_cyber_warfare_forces |
Open securityis the use ofopen sourcephilosophies and methodologies to approachcomputer securityand otherinformation securitychallenges.[1]Traditional application security is based on the premise that any application or service (whether it ismalwareor desirable) relies onsecurity through obscurity.[2]
Open source appr... | https://en.wikipedia.org/wiki/Open_security |
The followingoutlineis provided as an overview of and topical guide to computer security:
Computer security(alsocybersecurity,digital security, orinformation technology (IT) security) is a subdiscipline within the field ofinformation security. It consists of the protection ofcomputer software,systemsandnetworksfromthr... | https://en.wikipedia.org/wiki/Outline_of_computer_security |
TheOpen Worldwide Application Security Project(formerly Open Web Application Security Project[7]) (OWASP) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields ofIoT, system software andweb application security.[8][9][10]The OWASP provides fr... | https://en.wikipedia.org/wiki/OWASP |
Physical information securityis the intersection or common ground betweenphysical securityandinformation security. It primarily concerns the protection of tangible information-related assets such as computer systems and storage media against physical, real-world threats such as unauthorized physical access, theft, fir... | https://en.wikipedia.org/wiki/Physical_information_security |
Privacy software, also calledprivacy platform,[1][2]issoftwarebuilt to protect theprivacyof its users. The software typically works in conjunction withInternetusage to control or limit the amount of information made available to third parties. The software can applyencryptionor filtering of various kinds.
Privacy soft... | https://en.wikipedia.org/wiki/Privacy_software |
Security engineeringis the process of incorporatingsecurity controlsinto aninformation systemso that the controls become an integral part of the system's operational capabilities.[1]It is similar to other systems engineering activities in that its primary motivation is to support the delivery of engineering solutions t... | https://en.wikipedia.org/wiki/Security_engineering |
Insecurity engineering,security through obscurityis the practice of concealing the details or mechanisms of a system to enhance its security. This approach relies on the principle ofhiding something in plain sight, akin to a magician'ssleight of handor the use ofcamouflage. It diverges from traditional security methods... | https://en.wikipedia.org/wiki/Security_through_obscurity |
Asoftware-defined perimeter(SDP), sometimes referred to as ablack cloud, is a method of enhancing computer security. The SDP framework was developed by theCloud Security Allianceto control access to resources based on identity. In an SDP, connectivity follows a need-to-know model, where both device posture and identity... | https://en.wikipedia.org/wiki/Software-defined_perimeter |
Incomputer security,arbitrary code execution(ACE) is an attacker's ability to run any commands or code of the attacker's choice on a target machine or in a targetprocess.[1]Anarbitrary code executionvulnerabilityis a security flaw insoftwareor hardware allowing arbitrary code execution. A program that is designed to ex... | https://en.wikipedia.org/wiki/Arbitrary_code_execution |
Afile inclusion vulnerabilityis a type ofwebvulnerabilitythat is most commonly found to affectweb applicationsthat rely on a scriptingrun time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is execu... | https://en.wikipedia.org/wiki/File_inclusion_vulnerability |
Return-oriented programming(ROP) is acomputer security exploittechnique that allows an attacker to execute code in the presence of security defenses[1][2]such asexecutable-space protectionandcode signing.[3]
In this technique, an attacker gains control of thecall stackto hijack programcontrol flowand then executes car... | https://en.wikipedia.org/wiki/Gadget_(machine_instruction_sequence) |
Prompt injectionis acybersecurityexploit in which adversaries craft inputs that appear legitimate but are designed to cause unintended behavior inmachine learning models, particularlylarge language models(LLMs). This attack takes advantage of the model's inability to distinguish between developer-defined prompts and us... | https://en.wikipedia.org/wiki/Prompt_injection |
Shellshock, also known asBashdoor,[1]is a family ofsecurity bugs[2]in theUnixBashshell, the first of which was disclosed on 24 September 2014. Shellshock could enable an attacker to cause Bash toexecute arbitrary commandsand gain unauthorized access[3]to many Internet-facing services, such as web servers, that use Bash... | https://en.wikipedia.org/wiki/Shellshock_(software_bug) |
In computing,SQL injectionis acode injectiontechnique used toattackdata-driven applications, in which maliciousSQLstatements are inserted into an entry field for execution (e.g. to dump thedatabasecontents to the attacker).[1][2]SQL injection must exploit asecurity vulnerabilityin an application's software, for example... | https://en.wikipedia.org/wiki/SQL_injection |
Anillegal opcode, also called anunimplemented operation,[1]unintended opcode[2]orundocumented instruction, is aninstructionto aCPUthat is not mentioned in any official documentation released by the CPU's designer or manufacturer, which nevertheless has an effect. Illegal opcodes were common on older CPUs designed durin... | https://en.wikipedia.org/wiki/Unintended_instructions |
This is a list of the origins of computer-related terms or terms used in the computing world (i.e., alist of computer termetymologies). It relates to bothcomputer hardwareandcomputer software.
Names of many computer terms, especially computer applications, often relate to the function they perform, e.g., acompileris a... | https://en.wikipedia.org/wiki/List_of_computer_term_etymologies |
This is alist of Unixdaemonsthat are found on variousUnix-likeoperating systems. Unix daemons typically have a name ending with ad. | https://en.wikipedia.org/wiki/List_of_Unix_daemons |
Aservice wrapperis acomputer programthatwrapsarbitrary programs thus enabling them to be installed and run asWindows ServicesorUnix daemons, programs that run in thebackground, rather than under the direct control of a user. They are often automatically started atboottime. Arbitrary programs cannot run as services or d... | https://en.wikipedia.org/wiki/Service_wrapper |
Asoftware botis a type ofsoftware agentin the service of software project management and software engineering. A software bot has an identity and potentially personified aspects in order to serve their stakeholders.[1]Software bots often compose software services and provide an alternative user interface, which is some... | https://en.wikipedia.org/wiki/Software_bot |
Aweb service(WS) is either:
In a web service, a web technology such asHTTPis used for transferring machine-readable file formats such asXMLand JSON.
In practice, a web service commonly provides anobject-orientedweb-based interface to a database server, utilized for example by another web server, or by amobile app, th... | https://en.wikipedia.org/wiki/Web_service |
InWindows NToperating systems, aWindows serviceis acomputer programthatoperates in the background.[1]It is similar in concept to aUnixdaemon.[1]A Windows service must conform to the interface rules and protocols of theService Control Manager, the component responsible for managing Windows services. It is the Services a... | https://en.wikipedia.org/wiki/Windows_service |
In software, astack buffer overfloworstack buffer overrunoccurs when a program writes to amemoryaddress on the program'scall stackoutside of the intended data structure, which is usually a fixed-lengthbuffer.[1][2]Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack tha... | https://en.wikipedia.org/wiki/Stack_buffer_overflow |
TheNX bit(no-execute bit) is aprocessorfeature that separates areas of avirtual address space(the memory layout a program uses) into sections for storing data or program instructions. Anoperating systemsupporting the NX bit can mark certain areas of the virtual address space as non-executable, preventing the processor ... | https://en.wikipedia.org/wiki/NX_bit |
Cybercrimeencompasses a wide range of criminal activities that are carried out usingdigital devicesand/ornetworks. It has been variously defined as "a crime committed on a computer network, especially theInternet"; Cybercriminals may exploit vulnerabilities in computer systems and networks to gain unauthorized access,... | https://en.wikipedia.org/wiki/Cybercrime |
Exec Shieldis a project started atRed Hat, Inc in late 2002 with the aim of reducing the risk of worm or other automated remote attacks on Linux systems. The first result of the project was asecuritypatch for theLinux kernelthat emulates anNX bitonx86CPUsthat lack a native NX implementation in hardware. While the Exec ... | https://en.wikipedia.org/wiki/ExecShield |
Incomputer programming, aninteger overflowoccurs when anarithmeticoperation on integers attempts to create a numeric value that is outside of the range that can be represented with a given number of digits – either higher than the maximum or lower than the minimum representable value.
The most common result of an over... | https://en.wikipedia.org/wiki/Integer_overflow |
TheNX bit(no-execute bit) is aprocessorfeature that separates areas of avirtual address space(the memory layout a program uses) into sections for storing data or program instructions. Anoperating systemsupporting the NX bit can mark certain areas of the virtual address space as non-executable, preventing the processor ... | https://en.wikipedia.org/wiki/NX_Bit |
Security-Enhanced Linux(SELinux) is aLinux kernelsecurity modulethat provides a mechanism for supportingaccess controlsecurity policies, includingmandatory access controls(MAC).
SELinux is a set of kernel modifications and user-space tools that have been added to variousLinux distributions. Itsarchitecturestrives to s... | https://en.wikipedia.org/wiki/Security-Enhanced_Linux |
In software, astack overflowoccurs if thecall stackpointer exceeds thestackbound. The call stack may consist of a limited amount ofaddress space, often determined at the start of the program. The size of the call stack depends on many factors, including the programming language, machine architecture, multi-threading, a... | https://en.wikipedia.org/wiki/Stack_overflow |
Incomputingastorage violationis a hardware or softwarefaultthat occurs when ataskattempts to access an area ofcomputer storagewhich it is not permitted to access.
Storage violation can, for instance, consist of reading from, writing to, or freeing storage not owned by the task. A common type of storage violation is k... | https://en.wikipedia.org/wiki/Storage_violation |
From the mid-1980s to September 2003, the inflation-adjusted price of abarrelofcrude oilonNYMEXwas generally under US$25/barrel in 2008 dollars. During 2003, the price rose above $30, reached $60 by 11 August 2005, and peaked at $147.30 in July 2008.[1]Commentators attributed these price increases to multiple factors, ... | https://en.wikipedia.org/wiki/2000s_energy_crisis |
Conflatis aUnited Kingdomrailway term for a short wheelbaseflat wagoncontainer wagon.
British Railwaysused several standard types of wagon. The Conflat A, which could carry one type 'B', or two type 'A', containers, was the most common. It was regularly used to carry AF (frozen food) containers: while the Conflat L, w... | https://en.wikipedia.org/wiki/Conflat |
Container port design processis a set of correlated practices considered duringcontainer portdesign, aiming to transfer general business mission into detailed design documents for future construction and operation.[1]
The design process involves both conceptual design and detailed design.
The source of funding determ... | https://en.wikipedia.org/wiki/Container_terminal_design_process |
Double-stack rail transportis a form ofintermodal freight transportin which railroad cars carry two layers ofintermodal containers. Invented in the United States in 1984, it is now being used for nearly seventy percent ofUnited Statesintermodal shipments. Using double stack technology, a freight train of a given length... | https://en.wikipedia.org/wiki/Double-stack_rail_transport |
Henry Robinson Palmer(1795–1844) was a British civil engineer who designed the world's secondmonorailand the first elevated railway. He is also credited as the inventor of corrugated metal roofing, which is one of the world's major building materials.
A son ofSamuel Palmerand his wife Elizabeth Walker, Henry Robinson ... | https://en.wikipedia.org/wiki/Henry_Robinson_Palmer |
Atwistlockortwist lock, together with matchingcorner castings, as defined in norms including ISO 1161:1984, form a standardized (rotating) connector system, for connecting and securing intermodal, and predominantly ISO-standardinternational shipping containers. The primary uses are to securelystackcontainers, for lock... | https://en.wikipedia.org/wiki/Inter-box_connector |
Anintermodal container, often called ashipping container, or afreight container, (or simply "container") is a large metal crate designed and built forintermodal freight transport, meaning these containers can be used across differentmodes of transport– such as fromshipstotrainstotrucks– without unloading and reloading ... | https://en.wikipedia.org/wiki/Intermodal_container |
This article lists the world's busiestcontainerports(ports withcontainer terminalsthat specialize in handling goods transported inintermodal shipping containers), by total number oftwenty-foot equivalent units(TEUs) transported through the port. The table lists volume in thousands of TEU per year. The vast majority of ... | https://en.wikipedia.org/wiki/List_of_world%27s_busiest_container_ports |
TheLittle Eaton Gangway, officially theDerby Canal Railway, was anarrow gaugeindustrialwagonwayserving theDerby Canal, in England, atLittle EatoninDerbyshire.
In 1792,Benjamin Outramwas asked to prepare plans for a broad canal fromSwarkestoneto Smithy Houses, nearDenby, with a branch at Derby to theErewash CanalatSand... | https://en.wikipedia.org/wiki/Little_Eaton_Gangway |
Multimodal transport(also known ascombined transport) is thetransportationofgoodsunder a single contract, but performed with at least two differentmodes of transport; the carrier is liable (in a legal sense) for the entire carriage, even though it is performed by several different modes of transport (byrail, sea and ro... | https://en.wikipedia.org/wiki/Multimodal_transport |
TheNew York Central Rail Roadintroduced a container system in 1922.[1]
Details include:
This United States rail–related article is astub. You can help Wikipedia byexpanding it. | https://en.wikipedia.org/wiki/NYC_container |
Shipping portalsare websites which allowshippers, consignees and forwarders access to multiple carriers through a single site. Portals provide bookings, track and trace, and documentation, and allow users to communicate with their carriers. In many respects, ashippingportal is to the maritime industry what aglobal dist... | https://en.wikipedia.org/wiki/Shipping_portal |
Stowage plan for container shipsorbay planis the plan and method by which different types ofcontainer vesselsare loaded withcontainersof specific standard sizes. The plans are used to maximize the economy ofshippingand safety on board.
In order to maximize the economy of handling and shipping of containers on a contai... | https://en.wikipedia.org/wiki/Stowage_plan_for_container_ships |
Atank containerortanktaineris anintermodal containerfor the transport ofliquids,gasesandpowdersasbulk cargo. It is built to theISO standards, making it suitable for different modes of transportation; as such, it is also called anISO tank.[1]Both hazardous and non-hazardous products can be transported in tank containers... | https://en.wikipedia.org/wiki/Tanktainer |
The termunit loadrefers to the size of an assemblage into which a number of individual items are combined for ease of storage and handling,[1]for example apalletload represents a unit load which can be moved easily with apallet jackorforklift truck, or a container load represents a unit for shipping purposes. A unit lo... | https://en.wikipedia.org/wiki/Unit_load |
Browser securityis the application ofInternet securitytoweb browsersin order to protectnetworkeddata andcomputer systemsfrom breaches of privacy ormalware. Security exploits ofbrowsersoften useJavaScript, sometimes withcross-site scripting(XSS) with a secondary payload usingAdobe Flash. Security exploits can also take ... | https://en.wikipedia.org/wiki/Browser_security |
Mobile malwareis malicious software that targetsmobile phonesor wireless-enabledPersonal digital assistants(PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increa... | https://en.wikipedia.org/wiki/Mobile_Malware |
Phone hackingis the practice ofexploringamobile device, often usingcomputer exploitsto analyze everything from the lowestmemoryandCPUlevels up to the highestfile systemandprocesslevels. Modernopen sourcetooling has become fairly sophisticated to be able to "hook" into individual functions within any runningappon an unl... | https://en.wikipedia.org/wiki/Phone_hacking |
Wiretapping, also known aswire tappingortelephone tapping, is themonitoringoftelephoneandInternet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wire... | https://en.wikipedia.org/wiki/Telephone_tapping |
Wireless Public Key Infrastructure (WPKI)is a technology that providespublic key infrastructurefunctionality using a mobile Secure Element such as aSIM card.[1][2]It can be used for example fortwo-factor authentication.
This cryptography-related article is astub. You can help Wikipedia byexpanding it. | https://en.wikipedia.org/wiki/Wireless_Public_Key_Infrastructure |
Abotnetis a group ofInternet-connected devices, each of which runs one or morebots. Botnets can be used to performdistributed denial-of-service(DDoS) attacks, steal data,[1]sendspam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software... | https://en.wikipedia.org/wiki/Botnet |
Browser hijackingis a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser. A browser hijacker may replace the existinghome page, error page, orsearch enginewith its own.[1]These are generally used to forcehitsto a particula... | https://en.wikipedia.org/wiki/Browser_hijacking |
Cryptojackingis the act of exploiting acomputerto minecryptocurrencies, often throughwebsites,[1][2][3]against the user's will or while the user is unaware.[4]One notable piece of software used for cryptojacking wasCoinhive, which was used in over two-thirds of cryptojacks before its March 2019 shutdown.[5]The cryptocu... | https://en.wikipedia.org/wiki/Cryptojacking |
Acuckoo's eggis ametaphorforbrood parasitism, where a parasitic bird deposits its egg into a host's nest, which then incubates and feeds the chick that hatches, even at the expense of its own offspring. That original biological meaning has been extended to other uses, including one which referencesspywareand other piec... | https://en.wikipedia.org/wiki/Cuckoo%27s_egg_(metaphor) |
Cyber espionage,cyber spying, orcyber-collectionis the act or practice of obtaining secrets and information without the permission andknowledgeof the holder of the information using methods on the Internet, networks or individual computers through the use ofproxy servers,[1]crackingtechniques andmalicious softwareinclu... | https://en.wikipedia.org/wiki/Cyber_spying |
Domain generation algorithms(DGA) are algorithms seen in various families ofmalwarethat are used to periodically generate a large number ofdomain namesthat can be used as rendezvous points with theircommand and control servers. The large number of potential rendezvous points makes it difficult for law enforcement to ef... | https://en.wikipedia.org/wiki/Domain_generation_algorithm |
Thesocial media platformandsocial networking serviceFacebookhas been affected multiple times over its history by intentionally harmful software. Known asmalware, these pose particular challenges both to users of the platform as well as to the personnel of thetech-companyitself. Fighting the entities that create these i... | https://en.wikipedia.org/wiki/Facebook_malware |
File bindersareutility softwarethat allow a user to "bind" multiple files together, resulting in a single executable. They are commonly used byhackersto insert other programs such asTrojan horsesinto otherwise harmless files, making them more difficult to detect.Malwarebuilders (such askeyloggersor stealers) often incl... | https://en.wikipedia.org/wiki/File_binder |
Identity theft,identity piracyoridentity infringementoccurs when someone uses another's personal identifying information, like their name, identifying number, orcredit card number, without their permission, to commit fraud or other crimes. The termidentity theftwas coined in 1964.[1]Since that time, the definition of i... | https://en.wikipedia.org/wiki/Identity_theft |
Industrial espionage, also known aseconomic espionage,corporate spying, orcorporate espionage, is a form ofespionageconducted forcommercialpurposes instead of purelynational security.[1]
While political espionage is conducted or orchestrated bygovernmentsand is international in scope, industrial or corporate espionage... | https://en.wikipedia.org/wiki/Industrial_espionage |
Linux malwareincludesviruses,Trojans,wormsand other types ofmalwarethat affect theLinuxfamily ofoperating systems. Linux,Unixand otherUnix-likecomputer operating systems are generally regarded as very well-protected against, but not immune to,computer viruses.[1][2]
Like Unix systems, Linux implements amulti-userenvir... | https://en.wikipedia.org/wiki/Linux_malware |
Malvertising(aportmanteauof "malicious software (malware) advertising") is the use ofonline advertisingto spreadmalware.[1]It typically involves injecting malicious or malware-laden advertisements into legitimateonline advertising networksandwebpages.[2]Because advertising content can be inserted into high-profile and ... | https://en.wikipedia.org/wiki/Malvertising |
Point-of-sale malware(POS malware) is usually a type of malicious software (malware) that is used by cybercriminals to targetpoint of sale(POS) andpayment terminalswith the intent to obtaincredit cardanddebit cardinformation, a card'strack 1 or track 2 dataand even theCVV code, by variousman-in-the-middle attacks, that... | https://en.wikipedia.org/wiki/Point-of-sale_malware |
Hacktivism(orhactivism; aportmanteauofhackandactivism), is the use of computer-based techniques such ashackingas a form ofcivil disobedienceto promote a political agenda or social change.[1][2]A form ofInternet activismwith roots inhacker cultureandhacker ethics, its ends are often related tofree speech,human rights, o... | https://en.wikipedia.org/wiki/Hacktivism |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.