sploits

sploits
exploits

Glossary of chat acronyms & text shorthand. 2014.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Core Impact — Infobox Software name = Core Impact developer = Core Security Technologies latest release version = 7.5 latest release date = December, 2007 operating system = Microsoft Windows genre = Security website = [http://www.coresecurity.com/… …   Wikipedia

  • Iomega Zip drive — The Zip drive is a medium capacity removable disk storage system, introduced by Iomega in late 1994. Originally, Zip disks had a capacity of 100 MB, but later versions increased this to first 250 MB and then 750 MB. The format became the most… …   Wikipedia

  • WinNuke — The term WinNuke refers to a remote denial of service attack (DoS) that affected the Microsoft Windows 95, Microsoft Windows NT and Microsoft Windows 3.1x computer operating systems. It is responsible for the famous blue screen of death . The… …   Wikipedia

  • GetAdmin — A computer security utility going by the name GetAdmin was released in early July, 1997. The utility exploited a flaw in the Microsoft Windows NT 4 operating system in order to escalate privileges of an arbitrary specified account. GetAdmin will… …   Wikipedia

  • LAND — A LAND attack is a DoS (Denial of Service) attack that consists of sending a special poison spoofed packet to a computer, causing it to lock up. The security flaw was actually first discovered in 1997 by someone using the alias m3lt , and has… …   Wikipedia

  • Ping of death — A ping of death (abbreviated POD ) is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. A ping is normally 64 bytes in size (or 84 bytes when IP header is considered); many computer… …   Wikipedia

  • Sadistic Exploits — was an American hardcore punk band which existed in the early to mid 1980s. They released an EP titled Freedom in 1982. Inspired by UK anarchists Crass, the Philadelphia based band was formed in late 1980 in Southern New Jersey, during the… …   Wikipedia

  • Teardrop — Eine Teardrop Attacke ist ein Angriff auf einen Computer, der eine bestimmte Eigenschaft des OSI Modells ausnutzt. Der Teardrop Angriff erzeugt eine Reihe von IP Fragmenten mit überlappenden Offset Feldern. Werden diese Fragmente beim… …   Deutsch Wikipedia

  • sploit — noun exploit (program or technique that exploits a vulnerability in other software) Other exploit creators were less careful, turning out garbage sploits that sometimes wouldnt work at all or would even crash a target service most of the time …   Wiktionary

  • sproits — Cumbrian Dictionary ( n sprotyz) shoes, e.g. His sproits gut arl clarty in the field. = His shoes got rather dirty in the field. (Note: Sometimes spelled with an l rather than an r, giving sploits .) …   English dialects glossary

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”