User:Rkadchitre/Books/Knowledge23
Appearance
![]() | The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
![]() | You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
| This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
Knowledge
[edit]- 2014 Russian hacker password theft
- 2G
- 32-bit computing
- 3G
- 64-bit computing
- Aaron Swartz
- Accelerometer
- Address Resolution Protocol
- AdMob
- Adobe Flash
- AdSense
- Advanced Network and Services
- Ajax (programming)
- ALGOL
- Amancio Ortega Gaona
- Amazon.com
- Amplitude modulation
- Android (operating system)
- Android Lollipop
- Android software development
- Android Wear
- Anonymous (group)
- Antivirus software
- AOL
- Apache HBase
- Apache License
- APL (programming language)
- App Inventor for Android
- App Store (iOS)
- Apple Inc.
- Arcade game
- ARM architecture
- ASCII
- ASP.NET
- ASP.NET MVC Framework
- Asynchronous Transfer Mode
- Audio forensics
- Authentication
- Autopsy (software)
- Backdoor (computing)
- Backdoor (computing)
- Base64
- Base64
- BASIC
- BASIC
- Bernard Arnault
- Bill & Melinda Gates Foundation
- Bill Gates
- Bjarne Stroustrup
- BlackBerry 10
- Bloodstain pattern analysis
- Blu-ray Disc
- BlueHat
- BlueHat
- Body identification
- Botnet
- Branch (computer science)
- Browser Object Model
- Browser security
- Buffer over-read
- Buffer overflow
- Business magnate
- C (programming language)
- C (programming language)
- C++
- CAN bus
- Capsa
- Carlos Slim
- Carna botnet
- Cascading Style Sheets
- Cell relay
- Cellular frequencies
- Censorship
- CERN
- CERT Coordination Center
- Chaos Computer Club
- Chief executive officer
- Chrome OS
- Chromecast
- Chromecast
- Chroot
- Circuit switching
- Clickjacking
- CNN
- Cocoa Touch
- Cocoa Touch
- Code injection
- Common Vulnerabilities and Exposures
- Common Vulnerabilities and Exposures
- Comparison of C Sharp and Java
- Comparison of cryptographic hash functions
- Comparison of layout engines (HTML5)
- Comparison of layout engines (HTML5)
- Comparison of programming languages
- Comparison of programming languages
- Comparison of programming languages (array)
- Comparison of programming languages (array)
- Comparison of programming languages (basic instructions)
- Comparison of programming languages (basic instructions)
- Comparison of programming languages (strings)
- Comparison of programming languages (strings)
- Comparison of programming languages (syntax)
- Comparison of programming languages (syntax)
- Compiler
- Compiler
- Computer crime
- Computer crime
- Computer forensics
- Computer forensics
- Computer network
- Computer network
- Computer security
- Computer security
- Computer virus
- Computer virus
- Computer worm
- Computer worm
- Confused deputy problem
- Confused deputy problem
- Connection-oriented communication
- Connection-oriented communication
- Connectionless communication
- Connectionless communication
- Control flow
- Control flow
- Core network
- Core network
- Cracking of wireless networks
- Cracking of wireless networks
- Crimeware
- Crimeware
- Cross-platform
- Cross-platform
- Cross-site request forgery
- Cross-site request forgery
- Cross-site scripting
- Cross-site scripting
- Cross-zone scripting
- Cross-zone scripting
- Cryptanalysis
- Cryptographic hash function
- Cryptovirology
- Cult of the Dead Cow
- CVSS
- CVSS
- Cyber spying
- Cyber Storm Exercise
- Cyberterrorism
- Cyberwarfare
- Dangling pointer
- Data corruption
- Data Execution Prevention
- Data integrity
- Data validation
- Database forensics
- Decocidio
- DEF CON
- DEF CON
- Defensive programming
- Denial-of-service attack
- Dennis Ritchie
- Dennis Ritchie
- Derp (hacker group)
- Detection of fire accelerants
- Device driver
- Device driver
- Digital rights management
- Digital subscriber line
- Direct manipulation interface
- Direct manipulation interface
- Directory traversal attack
- DNA profiling
- DNA profiling
- DNS hijacking
- DNS hijacking
- DNS spoofing
- Document Object Model
- Domain Name System
- DoubleClick
- Dual mode mobile
- Dual SIM
- Dual SIM
- Dynamic Host Configuration Protocol
- EarthLink
- Eavesdropping
- Email injection
- Encapsulation (networking)
- End-to-end principle
- Endianness
- Enhanced Data Rates for GSM Evolution
- Ericsson
- Ericsson
- Ethernet
- Evaluation strategy
- Evaluation strategy
- Exclusive or
- Exclusive or
- Executable
- Executable
- Exploit (computer security)
- Exploit (computer security)
- F Sharp (programming language)
- F Sharp (programming language)
- Fiddler (software)
- Fiddler (software)
- File system
- File system
- File Transfer Protocol
- File Transfer Protocol
- Fingerprint
- Fingerprint
- Fire investigation
- Fire investigation
- Firefox
- Firefox
- Firefox OS
- Firefox OS
- Firewall (computing)
- Firewall (computing)
- Flame (malware)
- Flame (malware)
- Flowchart
- Flowchart
- Forbes
- Forbes
- Forensic archaeology
- Forensic archaeology
- Forensic arts
- Forensic arts
- Forensic chemistry
- Forensic chemistry
- Forensic data analysis
- Forensic data analysis
- Forensic engineering
- Forensic engineering
- Forensic science
- Forensic science
- Forensic video analysis
- Forensic video analysis
- Fortran
- Fortran
- Fortune (magazine)
- Fortune (magazine)
- Framing (World Wide Web)
- Framing (World Wide Web)
- FreeBSD jail
- FreeBSD jail
- Freedom of information
- Freedom of information
- Frequency modulation
- Frequency modulation
- FTP bounce attack
- FTP bounce attack
- Functional programming
- Functional programming
- General Packet Radio Service
- General Packet Radio Service
- Germany
- Germany
- GetAdmin
- GetAdmin
- Global Internet usage
- Global Internet usage
- Global kOS
- Global kOS
- Global Positioning System
- Global Positioning System
- GlobalHell
- GlobalHell
- Gmail
- Gmail
- Go (programming language)
- Go (programming language)
- Goatse Security
- Goatse Security
- Google Analytics
- Google Analytics
- Google Apps for Work
- Google Apps for Work
- Google Chrome
- Google Chrome
- Google Doodle
- Google Doodle
- Google Energy
- Google Energy
- Google Nexus
- Google Nexus
- Google Play
- Google Play
- Google Search Appliance
- Google Search Appliance
- Google TV
- Google TV
- Google Voice
- Google Voice
- Google Wallet
- Google Wallet
- Google.org
- Google.org
- Goto
- Goto
- Grey hat
- Grey hat
- GSM
- GSM
- Gyroscope
- Gyroscope
- Hack (programming language)
- Hack (programming language)
- Hacker (computer security)
- Hacker (computer security)
- Hacker (hobbyist)
- Hacker (hobbyist)
- Hacker (programmer subculture)
- Hacker (programmer subculture)
- Hacker (term)
- Hacker (term)
- Hacker ethic
- Hacker ethic
- Hacker Manifesto
- Hacker Manifesto
- Hacking of consumer electronics
- Hacking of consumer electronics
- Hacktivism
- Hacktivism
- Hackweiser
- Hackweiser
- Haptic technology
- Haptic technology
- Hash function
- Hash function
- Haskell
- Haskell
- Header (computing)
- Header (computing)
- Hexadecimal
- Hexadecimal
- High Speed Packet Access
- High Speed Packet Access
- High-bandwidth Digital Content Protection
- High-bandwidth Digital Content Protection
- High-definition television
- High-level programming language
- High-level programming language
- High-Speed Downlink Packet Access
- High-Speed Downlink Packet Access
- Home network
- Home network
- Honker Union
- Honker Union
- HTC
- HTC
- HTC Dream
- HTC Dream
- HTML
- HTML
- HTML attribute
- HTML attribute
- HTML element
- HTML element
- HTML scripting
- HTML scripting
- HTTP cookie
- HTTP cookie
- HTTP Debugger
- HTTP Debugger
- HTTP header injection
- HTTP header injection
- HTTP response splitting
- HTTP response splitting
- Hyperlink
- Hyperlink
- Hypertext Transfer Protocol
- Hypertext Transfer Protocol
- IBM
- IBM
- ICANN
- ICANN
- Identity theft
- Identity theft
- IEEE P1906.1
- IEEE P1906.1
- Illegal number
- Illegal number
- Index Corporation
- Index Corporation
- India
- India
- Information Processing Language
- Information Processing Language
- Input/output
- Input/output
- Instant messaging
- Instant messaging
- Integer overflow
- Integer overflow
- Integrated Services Digital Network
- Integrated Services Digital Network
- Intel
- Intel
- Intelligence Quotient (IQ) and Browser Usage
- Intelligence Quotient (IQ) and Browser Usage
- International Mobile Station Equipment Identity
- International Mobile Station Equipment Identity
- Internet Architecture Board
- Internet Architecture Board
- Internet area network
- Internet area network
- Internet Assigned Numbers Authority
- Internet Assigned Numbers Authority
- Internet Control Message Protocol
- Internet Control Message Protocol
- Internet Engineering Task Force
- Internet Engineering Task Force
- Internet Explorer
- Internet Explorer
- Internet Explorer 6
- Internet Explorer 6
- Internet Explorer 9
- Internet Explorer 9
- Internet layer
- Internet layer
- Internet Message Access Protocol
- Internet Message Access Protocol
- Internet privacy
- Internet privacy
- Internet Protocol
- Internet Protocol
- Internet protocol suite
- Internet protocol suite
- Internet Relay Chat
- Internet Relay Chat
- Internet Society
- Internet Society
- Internet traffic
- Internet traffic
- Internetworking
- Internetworking
- Interrupt
- Interrupt
- Intrusion detection system
- Intrusion detection system
- Intrusion prevention system
- Intrusion prevention system
- IOS
- IOS
- IOS jailbreaking
- IOS jailbreaking
- IP forwarding algorithm
- IP forwarding algorithm
- IPhone
- IPhone
- IPsec
- IPsec
- IPv4
- IPv4
- IPv6
- IPv6
- Jabber.org
- Jabber.org
- Japan
- Japan
- Java (programming language)
- Java (programming language)
- JavaScript
- JavaScript
- Kernel (operating system)
- Kernel (operating system)
- Key stretching
- Key stretching
- Keyhole, Inc
- Keyhole, Inc
- Keystroke logging
- Keystroke logging
- L0pht
- L0pht
- Lakshmi Mittal
- Lakshmi Mittal
- Larry Ellison
- Larry Ellison
- Larry Page
- Larry Page
- Latitude
- Latitude
- Legal aspects of computing
- Legal aspects of computing
- Level Seven (hacking group)
- Level Seven (hacking group)
- Life (magazine)
- Life (magazine)
- Lightweight Directory Access Protocol
- Lightweight Directory Access Protocol
- Like button
- Like button
- Line number
- Line number
- Linker (computing)
- Linker (computing)
- Linux
- Linux
- Linux kernel
- Linux kernel
- Lisp (programming language)
- Lisp (programming language)
- List of computer criminals
- List of computer criminals
- List of countries by IPv4 address allocation
- List of countries by IPv4 address allocation
- List of countries by number of broadband Internet subscriptions
- List of countries by number of broadband Internet subscriptions
- List of countries by number of Internet hosts
- List of countries by number of Internet hosts
- List of educational programming languages
- List of educational programming languages
- List of Google hoaxes and easter eggs
- List of Google hoaxes and easter eggs
- List of IP protocol numbers
- List of IP protocol numbers
- List of programming language researchers
- List of programming language researchers
- LiveCode
- LiveCode
- Local shared object
- Local shared object
- Logical conjunction
- Logical conjunction
- Logical disjunction
- Logical disjunction
- Logical reasoning
- Logical reasoning
- Logtalk
- Logtalk
- Longitude
- Longitude
- LulzSec
- LulzSec
- Luxembourg
- Luxembourg
- Lynis
- Lynis
- Mac OS
- Mac OS
- Machine code
- Machine code
- Malware
- Malware
- Man-in-the-browser
- Man-in-the-browser
- Markup language
- Markup language
- Massachusetts Institute of Technology
- Massachusetts Institute of Technology
- Masters of Deception
- Masters of Deception
- Mathematica
- Mathematica
- Mathematical beauty
- Mathematical beauty
- Mathematical game
- Mathematical game
- Mathematical model
- Mathematical model
- MATLAB
- MATLAB
- MD5
- MD5
- Md5sum
- Md5sum
- Media access control
- Media access control
- Memory management
- Memory management
- Memory safety
- Memory safety
- Merit Network
- Merit Network
- Metasploit Project
- Metasploit Project
- Metropolitan area network
- Metropolitan area network
- Microsoft
- Microsoft
- Microsoft Windows
- Microsoft Windows
- Milw0rm
- Milw0rm
- Mobile app
- Mobile app
- Mobile device forensics
- Mobile device forensics
- Mobile secure gateway
- Mobile secure gateway
- MPEG-2
- Mukesh Ambani
- Mukesh Ambani
- Multimedia Messaging Service
- Multimedia Messaging Service
- Mutator method
- Mutator method
- Myspace
- Myspace
- MySQL
- MySQL
- Near field communication
- Near field communication
- Negation
- Negation
- Nessus (software)
- Netscape
- Network access point
- Network access point
- Network Crack Program Hacker Group
- Network forensics
- Network packet
- Network packet
- Network security
- Network security
- Newbie
- Next-generation network
- Nikto Web Scanner
- Nmap
- Nokia
- Objective-C
- Online banking
- Open Handset Alliance
- Open Shortest Path First
- Open source
- Open standard
- Open standard
- OpenDNS
- OpenVAS
- Opera (web browser)
- Operating system
- Oracle Database
- Orthogonal frequency-division multiple access
- Orthogonality
- Orthography
- OS X Mavericks
- Outline of the Internet
- P.H.I.R.M.
- Packet analyzer
- Packet loss
- Packet switching
- Page fault
- PageRank
- Paging
- Pakistan
- Pascal (programming language)
- Password cracking
- Patch (computing)
- Path MTU Discovery
- Path MTU Discovery
- Payload (computing)
- Pcap
- Peer-to-peer
- Penetration test
- Perl
- Phase modulation
- Philanthropy
- PHP
- PHP
- Phreaking
- Planner (programming language)
- PlayStation 3
- PlayStation Jailbreak
- Plug-in (computing)
- Point-to-Point Protocol
- Pointer (computer programming)
- Pop-up ad
- Post Office Protocol
- PreScheme
- Privilege escalation
- Process management (computing)
- Programming language
- Programming language theory
- Programming languages used in most popular websites
- Programming paradigm
- Programming style
- Proprietary software
- Prostate cancer
- Protocol (object-oriented programming)
- Proximity sensor
- Proximity sensor
- Pseudocode
- Public Interest Registry
- Public key certificate
- Python (programming language)
- Qualcomm
- Quickoffice
- Race condition
- Race condition
- Real-time operating system
- Real-time Transport Protocol
- RedHack
- Responsible disclosure
- Roman Seleznev
- Rooting (Android OS)
- Rootkit
- Router (computing)
- Ruby (programming language)
- Ruby on Rails
- Rust (programming language)
- S60 (software platform)
- S60 (software platform)
- Salt (cryptography)
- Samsung
- Samsung
- Script kiddie
- Secure by design
- Secure by design
- Secure coding
- Secure coding
- Secure Shell
- Security bug
- Sega
- Segmentation fault
- Selective file dumper
- Selective file dumper
- Series 40
- Series 40
- Session fixation
- Session fixation
- Shared source
- Shellcode
- Shellcode
- Sherlock Holmes
- Silicon Valley
- Silicon Valley
- Simple Mail Transfer Protocol
- Simple Mail Transfer Protocol
- Singapore
- Singapore
- Skeleton (computer programming)
- Skeleton (computer programming)
- SOCKS
- SOCKS
- Softswitch
- Softswitch
- Software
- Software
- Sonic Team
- Sonic Team
- Sony
- Sony
- South Korea
- South Korea
- Spain
- Spain
- Spoofing attack
- Spoofing attack
- Spyware
- Spyware
- SQL injection
- Sri Lanka
- Stack Overflow
- Stack Overflow
- Stanford University
- Statement (computer science)
- Statement (computer science)
- Storage area network
- Storage area network
- String (computer science)
- String (computer science)
- Strong and weak typing
- Structured programming
- Structured programming
- Style sheet (web development)
- Subnetwork
- Subnetwork
- Sun Microsystems
- Superuser
- Superuser
- Sweden
- Swift (programming language)
- Switch statement
- Switzerland
- Switzerland
- Symbian
- Symbian
- Syrian Electronic Army
- System programming language
- System programming language
- Taiwan
- Taiwan
- TeaMp0isoN
- TeaMp0isoN
- Technology assessment
- Technology assessment
- Telnet
- TeslaTeam
- TESO
- Texas Instruments
- Texas Instruments signing key controversy
- The Atlantic
- The Atlantic
- The Coroner's Toolkit
- The Sleuth Kit
- The Unknowns
- Tim Berners-Lee
- Time of check to time of use
- Timeline of computer security hacker history
- Timeline of Internet conflicts
- TippingPoint
- Transmission Control Protocol
- Transport Layer Security
- Trojan horse (computing)
- Tunneling protocol
- Type inference
- Type system
- UGNazi
- UMTS frequency bands
- Uncontrolled format string
- Unicode and HTML
- Uniform resource locator
- United Arab Emirates
- United Kingdom
- United States
- United States Copyright Office
- Universal Mobile Telecommunications System
- Unix shell
- Unsigned code
- USB
- User Datagram Protocol
- User interface
- User operation prohibition
- Utility software
- Victim blaming
- Virtual private network
- Visual Basic
- Visual Basic (.NET)
- Voice over IP
- Vulnerability (computing)
- Vulnerability assessment
- Vulnerability scanner
- W-CDMA (UMTS)
- W3af
- Warren Buffett
- Web browser
- Web bug
- Web colors
- Web server
- Web storage
- Website defacement
- White hat (computer security)
- Wide area network
- Wikipedia
- Windows 2000
- Windows 7
- Windows 8
- Windows 8.1
- Windows ME
- Windows NT 4.0
- Windows PowerShell
- Windows Registry
- Windows Server 2003
- Windows Vista
- Windows XP
- Windows XP editions
- X.25
- X86
- X86-64
- Xbox (console) modchips
- Xbox 360
- XHTML
- XMPP
- Zero-day attack
- Zombie cookie
- Windows Store
- Windows Fundamentals for Legacy PCs
- List of features removed in Windows XP
- Criticism of Windows XP
- Criticism of Microsoft
- Windows 98