SMTP
Definition: Simple Mail Transfer Protocol, or SMTP, is used to send email. The SMTP protocol provides a common language for different servers to send and receive email messages. The default TCP/IP port for the SMTP protocol is port 25. Also […]
Definition: Simple Mail Transfer Protocol, or SMTP, is used to send email. The SMTP protocol provides a common language for different servers to send and receive email messages. The default TCP/IP port for the SMTP protocol is port 25. Also […]
Definition: Script kiddie is a derogatory term used by hackers or crackers to describe novice hackers. The term is derived from the fact that these novice hackers tend to rely on existing scripts, tools and exploits to create their attacks.
Definition: A rootkit is a set of tools and utilities that a hacker can use to maintain access once they have hacked a system. The rootkit tools allow them to seek out usernames and passwords, launch attacks against remote systems,
Definition: A proxy server acts as a middleman between your internal and external networks. It serves the dual roles of speeding up access to the Internet as well as providing a layer of protection for the internal network. Clients send
Definition: A protocol is a set of rules or agreed upon guidelines for communication. When communicating it is important to agree on how to do so. If one party speaks French and one German the communications will most likely fail.
Definition: Port has a dual definition in computers. There are various ports on the computer itself: ports to plug in your mouse, keyboard, USB devices, printer, monitor, etc. The kind of ports that are more relevant to information security however
Definition: A port scan is a method used by hackers to determine what ports are open or in use on a system or network. By using various tools a hacker can send data to TCP or UDP ports one at
Definition: Phishing is a type of attack aimed at obtaining a user’s personal or confidential information. It typically involves some sort of spam email designed to lure a user to a spoofed web site. Also Known As: Phishing Attack, Phishing
Definition: Pharming is similar to phishing in that it aims to collect personal and confidential user information which can be used for identity theft and other malicious purposes. Pharming relies on making unauthorized changes to DNS entries which result in
Definition: A patch is like a bandaid. As a company finds bugs and defects in their software they know that they need to fix them when they release the next version of the application. However, some bugs make the current