Vim means VI IMproved. It was known as Vi IMitation, but there are so many improvements that name change is...
Based on the number of system calls the operating system is requesting, the interface between the operating system and the...
A hyperlink or shorter link is a reference, link, navigation element in an electronic document to other parts of the...
The GNU Compiler Collection is a set of compilers for various programming languages produced by the GNU Project. GCC has...
Cryptographic puzzles are a method of protecting against DoS attacks. The idea behind cryptographic puzzles is the following: for a...
Hijacking performs the act of hijacking packages on the desired route, an attacker thus taking control of one of the...
This type of attack is aimed at obtaining personal information (such as usernames, passwords, credit card details) by impersonating an...
DoS (Denial of Service) or DDoS (Distributed Denial of Service) attacks are a way to make computational resources unavailable to...
A sniffer is a computer program used to monitor and analyze network traffic from one network location to another. A...
SSL (Secure Sockets Layer) is an acronym that is a Netscape web protocol designed to transmit securely private documents over...
A recent technique of fighting network attackers consists of stretching three types of strategies: 1. Baits: creating a unique user...
Root-kits are malicious programs that give Internet attackers unlimited access to a system while hiding their presence at the same...