Jump to content

User:Rkadchitre/Books/Knowledge23

From Wikipedia, the free encyclopedia


Knowledge

[edit]
2014 Russian hacker password theft
2G
32-bit computing
3G
64-bit computing
Aaron Swartz
Accelerometer
Address Resolution Protocol
AdMob
Adobe Flash
AdSense
Advanced Network and Services
Ajax (programming)
ALGOL
Amancio Ortega Gaona
Amazon.com
Amplitude modulation
Android (operating system)
Android Lollipop
Android software development
Android Wear
Anonymous (group)
Antivirus software
AOL
Apache HBase
Apache License
APL (programming language)
App Inventor for Android
App Store (iOS)
Apple Inc.
Arcade game
ARM architecture
ASCII
ASP.NET
ASP.NET MVC Framework
Asynchronous Transfer Mode
Audio forensics
Authentication
Autopsy (software)
Backdoor (computing)
Backdoor (computing)
Base64
Base64
BASIC
BASIC
Bernard Arnault
Bill & Melinda Gates Foundation
Bill Gates
Bjarne Stroustrup
BlackBerry 10
Bloodstain pattern analysis
Blu-ray Disc
BlueHat
BlueHat
Body identification
Botnet
Branch (computer science)
Browser Object Model
Browser security
Buffer over-read
Buffer overflow
Business magnate
C (programming language)
C (programming language)
C++
CAN bus
Capsa
Carlos Slim
Carna botnet
Cascading Style Sheets
Cell relay
Cellular frequencies
Censorship
CERN
CERT Coordination Center
Chaos Computer Club
Chief executive officer
Chrome OS
Chromecast
Chromecast
Chroot
Circuit switching
Clickjacking
CNN
Cocoa Touch
Cocoa Touch
Code injection
Common Vulnerabilities and Exposures
Common Vulnerabilities and Exposures
Comparison of C Sharp and Java
Comparison of cryptographic hash functions
Comparison of layout engines (HTML5)
Comparison of layout engines (HTML5)
Comparison of programming languages
Comparison of programming languages
Comparison of programming languages (array)
Comparison of programming languages (array)
Comparison of programming languages (basic instructions)
Comparison of programming languages (basic instructions)
Comparison of programming languages (strings)
Comparison of programming languages (strings)
Comparison of programming languages (syntax)
Comparison of programming languages (syntax)
Compiler
Compiler
Computer crime
Computer crime
Computer forensics
Computer forensics
Computer network
Computer network
Computer security
Computer security
Computer virus
Computer virus
Computer worm
Computer worm
Confused deputy problem
Confused deputy problem
Connection-oriented communication
Connection-oriented communication
Connectionless communication
Connectionless communication
Control flow
Control flow
Core network
Core network
Cracking of wireless networks
Cracking of wireless networks
Crimeware
Crimeware
Cross-platform
Cross-platform
Cross-site request forgery
Cross-site request forgery
Cross-site scripting
Cross-site scripting
Cross-zone scripting
Cross-zone scripting
Cryptanalysis
Cryptographic hash function
Cryptovirology
Cult of the Dead Cow
CVSS
CVSS
Cyber spying
Cyber Storm Exercise
Cyberterrorism
Cyberwarfare
Dangling pointer
Data corruption
Data Execution Prevention
Data integrity
Data validation
Database forensics
Decocidio
DEF CON
DEF CON
Defensive programming
Denial-of-service attack
Dennis Ritchie
Dennis Ritchie
Derp (hacker group)
Detection of fire accelerants
Device driver
Device driver
Digital rights management
Digital subscriber line
Direct manipulation interface
Direct manipulation interface
Directory traversal attack
DNA profiling
DNA profiling
DNS hijacking
DNS hijacking
DNS spoofing
Document Object Model
Domain Name System
DoubleClick
Dual mode mobile
Dual SIM
Dual SIM
Dynamic Host Configuration Protocol
EarthLink
Eavesdropping
Email injection
Encapsulation (networking)
End-to-end principle
Endianness
Enhanced Data Rates for GSM Evolution
Ericsson
Ericsson
Ethernet
Evaluation strategy
Evaluation strategy
Exclusive or
Exclusive or
Executable
Executable
Exploit (computer security)
Exploit (computer security)
F Sharp (programming language)
F Sharp (programming language)
Facebook
Facebook
Fiddler (software)
Fiddler (software)
File system
File system
File Transfer Protocol
File Transfer Protocol
Fingerprint
Fingerprint
Fire investigation
Fire investigation
Firefox
Firefox
Firefox OS
Firefox OS
Firewall (computing)
Firewall (computing)
Flame (malware)
Flame (malware)
Flowchart
Flowchart
Forbes
Forbes
Forensic archaeology
Forensic archaeology
Forensic arts
Forensic arts
Forensic chemistry
Forensic chemistry
Forensic data analysis
Forensic data analysis
Forensic engineering
Forensic engineering
Forensic science
Forensic science
Forensic video analysis
Forensic video analysis
Fortran
Fortran
Fortune (magazine)
Fortune (magazine)
Framing (World Wide Web)
Framing (World Wide Web)
FreeBSD jail
FreeBSD jail
Freedom of information
Freedom of information
Frequency modulation
Frequency modulation
FTP bounce attack
FTP bounce attack
Functional programming
Functional programming
General Packet Radio Service
General Packet Radio Service
Germany
Germany
GetAdmin
GetAdmin
Global Internet usage
Global Internet usage
Global kOS
Global kOS
Global Positioning System
Global Positioning System
GlobalHell
GlobalHell
Gmail
Gmail
Go (programming language)
Go (programming language)
Goatse Security
Goatse Security
Google
Google
Google Analytics
Google Analytics
Google Apps for Work
Google Apps for Work
Google Chrome
Google Chrome
Google Doodle
Google Doodle
Google Energy
Google Energy
Google Nexus
Google Nexus
Google Play
Google Play
Google Search Appliance
Google Search Appliance
Google TV
Google TV
Google Voice
Google Voice
Google Wallet
Google Wallet
Google.org
Google.org
Goto
Goto
Grey hat
Grey hat
GSM
GSM
Gyroscope
Gyroscope
Hack (programming language)
Hack (programming language)
Hacker (computer security)
Hacker (computer security)
Hacker (hobbyist)
Hacker (hobbyist)
Hacker (programmer subculture)
Hacker (programmer subculture)
Hacker (term)
Hacker (term)
Hacker ethic
Hacker ethic
Hacker Manifesto
Hacker Manifesto
Hacking of consumer electronics
Hacking of consumer electronics
Hacktivism
Hacktivism
Hackweiser
Hackweiser
Haptic technology
Haptic technology
Hash function
Hash function
Haskell
Haskell
Header (computing)
Header (computing)
Hexadecimal
Hexadecimal
High Speed Packet Access
High Speed Packet Access
High-bandwidth Digital Content Protection
High-bandwidth Digital Content Protection
High-definition television
High-level programming language
High-level programming language
High-Speed Downlink Packet Access
High-Speed Downlink Packet Access
Home network
Home network
Honker Union
Honker Union
HTC
HTC
HTC Dream
HTC Dream
HTML
HTML
HTML attribute
HTML attribute
HTML element
HTML element
HTML scripting
HTML scripting
HTTP cookie
HTTP cookie
HTTP Debugger
HTTP Debugger
HTTP header injection
HTTP header injection
HTTP response splitting
HTTP response splitting
Hyperlink
Hyperlink
Hypertext Transfer Protocol
Hypertext Transfer Protocol
IBM
IBM
ICANN
ICANN
Identity theft
Identity theft
IEEE P1906.1
IEEE P1906.1
Illegal number
Illegal number
Index Corporation
Index Corporation
India
India
Information Processing Language
Information Processing Language
Input/output
Input/output
Instant messaging
Instant messaging
Integer overflow
Integer overflow
Integrated Services Digital Network
Integrated Services Digital Network
Intel
Intel
Intelligence Quotient (IQ) and Browser Usage
Intelligence Quotient (IQ) and Browser Usage
International Mobile Station Equipment Identity
International Mobile Station Equipment Identity
Internet Architecture Board
Internet Architecture Board
Internet area network
Internet area network
Internet Assigned Numbers Authority
Internet Assigned Numbers Authority
Internet Control Message Protocol
Internet Control Message Protocol
Internet Engineering Task Force
Internet Engineering Task Force
Internet Explorer
Internet Explorer
Internet Explorer 6
Internet Explorer 6
Internet Explorer 9
Internet Explorer 9
Internet layer
Internet layer
Internet Message Access Protocol
Internet Message Access Protocol
Internet privacy
Internet privacy
Internet Protocol
Internet Protocol
Internet protocol suite
Internet protocol suite
Internet Relay Chat
Internet Relay Chat
Internet Society
Internet Society
Internet traffic
Internet traffic
Internetworking
Internetworking
Interrupt
Interrupt
Intrusion detection system
Intrusion detection system
Intrusion prevention system
Intrusion prevention system
IOS
IOS
IOS jailbreaking
IOS jailbreaking
IP forwarding algorithm
IP forwarding algorithm
IPhone
IPhone
IPsec
IPsec
IPv4
IPv4
IPv6
IPv6
Jabber.org
Jabber.org
Japan
Japan
Java (programming language)
Java (programming language)
JavaScript
JavaScript
Kernel (operating system)
Kernel (operating system)
Key stretching
Key stretching
Keyhole, Inc
Keyhole, Inc
Keystroke logging
Keystroke logging
L0pht
L0pht
Lakshmi Mittal
Lakshmi Mittal
Larry Ellison
Larry Ellison
Larry Page
Larry Page
Latitude
Latitude
Legal aspects of computing
Legal aspects of computing
Level Seven (hacking group)
Level Seven (hacking group)
Life (magazine)
Life (magazine)
Lightweight Directory Access Protocol
Lightweight Directory Access Protocol
Like button
Like button
Line number
Line number
Linker (computing)
Linker (computing)
Linux
Linux
Linux kernel
Linux kernel
Lisp (programming language)
Lisp (programming language)
List of computer criminals
List of computer criminals
List of countries by IPv4 address allocation
List of countries by IPv4 address allocation
List of countries by number of broadband Internet subscriptions
List of countries by number of broadband Internet subscriptions
List of countries by number of Internet hosts
List of countries by number of Internet hosts
List of educational programming languages
List of educational programming languages
List of Google hoaxes and easter eggs
List of Google hoaxes and easter eggs
List of IP protocol numbers
List of IP protocol numbers
List of programming language researchers
List of programming language researchers
LiveCode
LiveCode
Local shared object
Local shared object
Logical conjunction
Logical conjunction
Logical disjunction
Logical disjunction
Logical reasoning
Logical reasoning
Logtalk
Logtalk
Longitude
Longitude
LulzSec
LulzSec
Luxembourg
Luxembourg
Lynis
Lynis
Mac OS
Mac OS
Machine code
Machine code
Malware
Malware
Man-in-the-browser
Man-in-the-browser
Markup language
Markup language
Massachusetts Institute of Technology
Massachusetts Institute of Technology
Masters of Deception
Masters of Deception
Mathematica
Mathematica
Mathematical beauty
Mathematical beauty
Mathematical game
Mathematical game
Mathematical model
Mathematical model
MATLAB
MATLAB
MD5
MD5
Md5sum
Md5sum
Media access control
Media access control
Memory management
Memory management
Memory safety
Memory safety
Merit Network
Merit Network
Metasploit Project
Metasploit Project
Metropolitan area network
Metropolitan area network
Microsoft
Microsoft
Microsoft Windows
Microsoft Windows
Milw0rm
Milw0rm
Mobile app
Mobile app
Mobile device forensics
Mobile device forensics
Mobile secure gateway
Mobile secure gateway
MPEG-2
Mukesh Ambani
Mukesh Ambani
Multimedia Messaging Service
Multimedia Messaging Service
Mutator method
Mutator method
Myspace
Myspace
MySQL
MySQL
Near field communication
Near field communication
Negation
Negation
Nessus (software)
Netscape
Network access point
Network access point
Network Crack Program Hacker Group
Network forensics
Network packet
Network packet
Network security
Network security
Newbie
Next-generation network
Nikto Web Scanner
Nmap
Nokia
Objective-C
Online banking
Open Handset Alliance
Open Shortest Path First
Open source
Open standard
Open standard
OpenDNS
OpenVAS
Opera (web browser)
Operating system
Oracle Database
Orthogonal frequency-division multiple access
Orthogonality
Orthography
OS X Mavericks
Outline of the Internet
P.H.I.R.M.
Packet analyzer
Packet loss
Packet switching
Page fault
PageRank
Paging
Pakistan
Pascal (programming language)
Password cracking
Patch (computing)
Path MTU Discovery
Path MTU Discovery
Payload (computing)
Pcap
Peer-to-peer
Penetration test
Perl
Phase modulation
Philanthropy
PHP
PHP
Phreaking
Planner (programming language)
PlayStation 3
PlayStation Jailbreak
Plug-in (computing)
Point-to-Point Protocol
Pointer (computer programming)
Pop-up ad
Post Office Protocol
PreScheme
Privilege escalation
Process management (computing)
Programming language
Programming language theory
Programming languages used in most popular websites
Programming paradigm
Programming style
Proprietary software
Prostate cancer
Protocol (object-oriented programming)
Proximity sensor
Proximity sensor
Pseudocode
Public Interest Registry
Public key certificate
Python (programming language)
Qualcomm
Quickoffice
Race condition
Race condition
Real-time operating system
Real-time Transport Protocol
RedHack
Responsible disclosure
Roman Seleznev
Rooting (Android OS)
Rootkit
Router (computing)
Ruby (programming language)
Ruby on Rails
Rust (programming language)
S60 (software platform)
S60 (software platform)
Salt (cryptography)
Samsung
Samsung
Script kiddie
Secure by design
Secure by design
Secure coding
Secure coding
Secure Shell
Security bug
Sega
Segmentation fault
Selective file dumper
Selective file dumper
Series 40
Series 40
Session fixation
Session fixation
Shared source
Shellcode
Shellcode
Sherlock Holmes
Silicon Valley
Silicon Valley
Simple Mail Transfer Protocol
Simple Mail Transfer Protocol
Singapore
Singapore
Skeleton (computer programming)
Skeleton (computer programming)
SOCKS
SOCKS
Softswitch
Softswitch
Software
Software
Sonic Team
Sonic Team
Sony
Sony
South Korea
South Korea
Spain
Spain
Spoofing attack
Spoofing attack
Spyware
Spyware
SQL injection
Sri Lanka
Stack Overflow
Stack Overflow
Stanford University
Statement (computer science)
Statement (computer science)
Storage area network
Storage area network
String (computer science)
String (computer science)
Strong and weak typing
Structured programming
Structured programming
Style sheet (web development)
Subnetwork
Subnetwork
Sun Microsystems
Superuser
Superuser
Sweden
Swift (programming language)
Switch statement
Switzerland
Switzerland
Symbian
Symbian
Syrian Electronic Army
System programming language
System programming language
Taiwan
Taiwan
TeaMp0isoN
TeaMp0isoN
Technology assessment
Technology assessment
Telnet
TeslaTeam
TESO
Texas Instruments
Texas Instruments signing key controversy
The Atlantic
The Atlantic
The Coroner's Toolkit
The Sleuth Kit
The Unknowns
Tim Berners-Lee
Time of check to time of use
Timeline of computer security hacker history
Timeline of Internet conflicts
TippingPoint
Transmission Control Protocol
Transport Layer Security
Trojan horse (computing)
Tunneling protocol
Type inference
Type system
UGNazi
UMTS frequency bands
Uncontrolled format string
Unicode and HTML
Uniform resource locator
United Arab Emirates
United Kingdom
United States
United States Copyright Office
Universal Mobile Telecommunications System
Unix shell
Unsigned code
USB
User Datagram Protocol
User interface
User operation prohibition
Utility software
Victim blaming
Virtual private network
Visual Basic
Visual Basic (.NET)
Voice over IP
Vulnerability (computing)
Vulnerability assessment
Vulnerability scanner
W-CDMA (UMTS)
W3af
Warren Buffett
Web browser
Web bug
Web colors
Web server
Web storage
Website defacement
White hat (computer security)
Wide area network
Wikipedia
Windows 2000
Windows 7
Windows 8
Windows 8.1
Windows ME
Windows NT 4.0
Windows PowerShell
Windows Registry
Windows Server 2003
Windows Vista
Windows XP
Windows XP editions
X.25
X86
X86-64
Xbox (console) modchips
Xbox 360
XHTML
XMPP
Zero-day attack
Zombie cookie
Windows Store
Windows Fundamentals for Legacy PCs
List of features removed in Windows XP
Criticism of Windows XP
Criticism of Microsoft
Windows 98