Technology - Hackers
Hacker's use a lot of jargon in an effort to be trendy or cool. Much of it means nothing other than to the
hacker’s community themselves. Hackers are a crazy bunch often misunderstood and their hackers jargon merely
serves to keep their retorict amongst themselves never to be shared with the wider community.
Hacker’s jargon is also evolving to cover newly created techniques for busting code or web site for
example. Most people see hackers as an innocuous bunch of sados until they become adversely affecetd themselves by
the hackers exploits such as a defaced web site or corrupted computer system through email.
Understanding the hacker’s jargon may go someway to understanding their thinking &
methodology. Some hackers see themselves as ‘white knights’ of cyber space seeking out week public unsecure
systems. Others see hackers as nothing other than thieves or malicious raiders seeking glory or self gratification
at others expense.
Whatever your view point, our hackers jargon section will certainly entertain.
Hacker Jargon.
File Extension
The three-letter code at the end of a file name that tells you what kind of file it is. Double extensions are
often used to conceal viruses.
Firewall
Software application and/or Hardware, which prevents unauthorised access to your computer from the Internet and
prevents unauthorised programs sending information from your computer.
Hackers
A term used to define an individual(s) who attempts to gain unauthorised access to computer systems for the
purpose of stealing and/or corrupting data.
Keystroke Loggers
Software that captures the keys pressed on your computer keyboard and sends a log of these to the hacker via the
Internet. Used to capture your passwords and often included in Trojans.
Phishing
The use of 'spoofed' e-mails and fraudulent websites which are designed to trick recipients into divulging
personal financial data such as credit card numbers, account usernames and PINs/passwords.
Spyware
Software installed as part of another application which is designed to monitor and report back on activity on a
computer. Often installed without the users knowledge. May also be called scumware, adware or malware.
Trojans
An apparently harmless program that contains malicious code designed to give control of your computer to a
hacker. Can be used to record keystrokes (see keystroke logger) and delete files or even view your screen
contents.
Viruses
Software disguised as something else that can cause damage to data and systems. Often spread as email
attachments or files hidden in disks.
Virus Definition Files
The list of known viruses that anti-virus software searches for on your computer or incoming files and emails.
In order for anti-virus software to work effectively it is vital that you should keep your virus definition files
as up to date as possible.
Worm
Similar to viruses in that they are programs that are often designed to interfere with the computers they
infect. They don’t attach themselves to files or other programs but spread automatically across networks of
computers.
ADD YOUR OWN JARGON TO THIS SECTION:-
|