- 15,799
Confused by all the technical terms thrown around in the computing world?
Backdoor
Generally refers to something that's installed on the system to allow access at a later time. For example, a Trojan sent to a user could create a back door when executed. Another backdoor could be created if someone, a visiting technician for example, creates a special account with a root/administrator privileges that allow complete control over a network. An expert back door will be difficult to detect and remove, and access will be invisible - it won't be logged.
Buffer Overflow
A classic attack that involves sending more information to a program than it is programmed to receive. For example, a subject heading in an email program may expect a maximum of 300 characters and has allocated enough memory to handle only this amount. If more characters go through, it may crash the system or, in some advanced hacks, may even execute code embedded in the 'overflowed' data. Buffer overflow attacks are only possible in poorly programmed applications and are becoming less common.
Cracker
As controversial as the term 'hacker', it can refer to either an individual who intentionally breaks code or, as in used in this article, a criminal hacker. Hackers and other computer enthusiasts prefer this term, rather than the generic 'hacker' to distinguish themselves from those with malicious intent.
Denial of Service (DoS)
In general terms, a DoS attack renders a system or network incapable of providing service. Thice could include flooding an Iinternet connection, 'bombing' and application such as an email client, or sending TCP/IP packers to a network. There are multiple ways to create a DoS attack, and the lost revenue in network downtime makes this a popular cracking method.
Firewall
A firewall is a piece of hardwards or software that blocks data traffic moving from one network to another. Firewalls are most commonly used to protect a private network (or computer) connected to the Internet. High-end firewalls are highly configurable and require a high-level of expertise to be used effectively. It is an integral part of securing a network.
Hacker
Commonly used to refer to the illegitimate access or manipulation of computer systems, although this definition is controversial. The term arose in the 1970s to refer to people who were highly skilled at using computers. The negative connotation now associateed to hacking is sensationalised and propagated by members of the media who are actually referring to crackers.
IDS (Intrusion Detection System)
Software that detects unauthorised access to a system. Where firewalls merely block openings to a system, an IDS will watch the openings for malicious activity. It can be host-based (HIDS) to monitor activity within a system or network-based (NIDS) to monitor a network traffic.
IP (Internet Protocol) Address
An IP is a unique, 32-bit number given to a computer on a TCP/IP network. An IP address may be static or dynamically assigned (DHCP) each time the computer connects to a network. Both the sender and recipient's IP address are found in every TCP/IP packet, and can even be found in email messages sent from a computer behind a firewall.
MAC (Media Access Control) Address
A unique number founf in all Ethernet network adaptors that works in conjunction with your IP address to ensure traffic reaches the correct recipient. The ability to change a MAC address has huge implications for receiving information that is intended for another computer.
NMAP (Network Mapper)
An NMAP is undoubtedly the most popular and most effective cracking tool for gaining as much information as possible about a target. Among its many features, it can detect operating systems and scan for TCP and UDP ports.
Script Kiddy
A derogatory term used to describe crackers who use pre-made scripts to gain unauthorised access, with little or no knowledge of how they work. Their lack of understanding of what they're doing and sheer stupidy often result in them getting caught, however the damage they can cause should not be underestimated.
Social Engineering
A method that involves hacking people rather than their compters. It is one of the most important, and easier methods of gaining unauthorised access to a computer or network - often saving weeks of fruitless cracking. A common example would be calling a naïve user and, posing as a network administrator or technician, and demanding their password so you can perform a routine password change.
TCP (Transmission Control Protocol)
TCP is the most commonly used transport protocol for transmitting data. It uses strict authentication methods to ensure that packers reach their intended recipient.