language:
Find link is a tool written by Edward Betts.Longer titles found: Computer security compromised by hardware failure (view), Computer security conference (view), Computer security incident management (view), Computer security model (view), Computer security policy (view), Computer security software (view), White hat (computer security) (view), Vulnerability (computer security) (view), Exploit (computer security) (view), Sandbox (computer security) (view), Full disclosure (computer security) (view), Black hat (computer security) (view), List of computer security certifications (view), Threat (computer security) (view), Logjam (computer security) (view), Shoulder surfing (computer security) (view), Blue team (computer security) (view), Asset (computer security) (view)
searching for Computer security 220 found (3334 total)
alternate case: computer security
Impermium
(225 words)
[view diff]
no match in snippet
view article
find links to article
Impermium was a cyber-security startup company based in Redwood City, California, which provided anti-spam and account protection services for InternetGoogle hacking (838 words) [view diff] no match in snippet view article find links to article
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configurationMandiant (1,345 words) [view diff] case mismatch in snippet view article find links to article
2016. Perlroth, Nicole; Sanger, David (January 2, 2014). "FireEye Computer Security Firm Acquires Mandiant". The New York Times. Archived from the originalRiskIQ (306 words) [view diff] no match in snippet view article find links to article
RiskIQ, Inc. was a cyber security company that was based in San Francisco, California. It provided cloud-based software as a service (SaaS) for organizationsParrot OS (708 words) [view diff] no match in snippet view article find links to article
Parrot OS is a Linux distribution based on Debian with a focus on security, privacy, and development. Parrot is based on Debian's "stable" branch, withCheck Point (1,461 words) [view diff] no match in snippet view article find links to article
Check Point Software Technologies Ltd. is an Israeli multinational provider of software and combined hardware and software products for IT security, includingInternet police (1,012 words) [view diff] no match in snippet view article find links to article
Internet police is a generic term for police and government agencies, departments and other organizations in charge of policing the Internet in a numberWinlogon (1,050 words) [view diff] no match in snippet view article find links to article
Winlogon (Windows Logon) is the component of Microsoft Windows operating systems that is responsible for handling the secure attention sequence, loadingFederal Information Processing Standards (879 words) [view diff] exact match in snippet view article find links to article
and contractors. FIPS standards establish requirements for ensuring computer security and interoperability, and are intended for cases in which suitableFederal Information Processing Standards (879 words) [view diff] exact match in snippet view article find links to article
and contractors. FIPS standards establish requirements for ensuring computer security and interoperability, and are intended for cases in which suitableWinlogon (1,050 words) [view diff] no match in snippet view article find links to article
Winlogon (Windows Logon) is the component of Microsoft Windows operating systems that is responsible for handling the secure attention sequence, loadingEmployee monitoring software (795 words) [view diff] no match in snippet view article find links to article
Employee monitoring software, also known as bossware or tattleware, is a means of employee monitoring, and allows company administrators to monitor andHardware security module (1,557 words) [view diff] no match in snippet view article find links to article
A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), and performs encryptionDepartment of Telecommunications (525 words) [view diff] no match in snippet view article find links to article
The Department of Telecommunications, abbreviated to DoT, is a department of the Ministry of Communications of the executive branch of the Government ofMicrosoft Digital Crimes Unit (1,242 words) [view diff] no match in snippet view article find links to article
The Microsoft Digital Crimes Unit (DCU) is a Microsoft sponsored team of international legal and internet security experts employing the latest tools andNational Disaster Management Authority (India) (1,050 words) [view diff] no match in snippet view article
National Disaster Management Authority (India), abbreviated as NDMA, is an apex Body of Government of India, with a mandate to lay down policies for disasterNational Security Agency (24,752 words) [view diff] exact match in snippet view article find links to article
DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer securityIEEE 802.10 (182 words) [view diff] no match in snippet view article find links to article
IEEE 802.10 is a former standard for security functions that could be used in both local area networks and metropolitan area networks based on IEEE 802Null character (926 words) [view diff] no match in snippet view article find links to article
The null character is a control character with the value zero. Many character sets include a code point for a null character – including Unicode (UniversalDarktrace (1,260 words) [view diff] no match in snippet view article find links to article
Darktrace Holdings Ltd is a British cyber security company, established in 2013 and headquartered in Cambridge, United Kingdom with further global officeGoogle Security Operations (329 words) [view diff] no match in snippet view article find links to article
Google Security Operations (a.k.a. Google SecOps), formerly Google Chronicle Security Operations, is a cybersecurity company which is part of the GoogleL0pht (2,062 words) [view diff] case mismatch in snippet view article find links to article
famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’. The second character in its name was originally aSecure file transfer program (91 words) [view diff] no match in snippet view article find links to article
sftp is a command-line interface client program to transfer files using the SSH File Transfer Protocol (SFTP), which runs inside the encrypted Secure ShellPluggable Authentication Module (421 words) [view diff] no match in snippet view article find links to article
A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programmingSaferNet (185 words) [view diff] no match in snippet view article find links to article
SaferNet is a Brazilian non-governmental organization that combats Internet crime in partnership with the Federal Public Ministry. It facilitates anonymousCryptographic primitive (819 words) [view diff] exact match in snippet view article find links to article
algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hashNational Security Council (India) (1,257 words) [view diff] no match in snippet view article
The National Security Council (NSC) (IAST: Rāṣṭrīya Surakṣā Pariṣad) of India is an executive government body tasked with advising the prime Minister ofPort scanner (2,535 words) [view diff] case mismatch in snippet view article find links to article
SANS. Retrieved 2009-05-08. Cukier, Michel (2005). "Quantifying Computer Security" (PDF). University of Maryland. Archived from the original (PDF) onRoss J. Anderson (1,523 words) [view diff] exact match in snippet view article find links to article
and designed the stream cipher Pike. Anderson always campaigned for computer security to be studied in a wider social context. Many of his writings emphasisedKerio Technologies (658 words) [view diff] no match in snippet view article find links to article
Kerio Technologies, Inc. is a former technology company specializing in collaboration software and unified threat management for small and medium organizationsDoxing (4,349 words) [view diff] no match in snippet view article find links to article
Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet andBNC (software) (684 words) [view diff] no match in snippet view article
A BNC (short for Bounced Network Connection) is a piece of software that is used to relay traffic and connections in computer networks, much like a proxyRadia Perlman (2,494 words) [view diff] no match in snippet view article find links to article
Radia Joy Perlman (/ˈreɪdiə/; born December 18, 1951) is an American computer programmer and network engineer. She is a major figure in assembling theOperation: Bot Roast (338 words) [view diff] no match in snippet view article find links to article
Operation: Bot Roast is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers throughLinux PAM (325 words) [view diff] no match in snippet view article find links to article
Linux Pluggable Authentication Modules (PAM) is a suite of libraries that allow a Linux system administrator to configure methods to authenticate usersSpecial Communications Service of Russia (553 words) [view diff] no match in snippet view article find links to article
The Special Communications and Information Service of the Federal Protective Service of the Russian Federation (Spetssvyaz, Spetssvyaz; Russian: СлужбаCCNA (420 words) [view diff] no match in snippet view article find links to article
CCNA (Cisco Certified Network Associate) is an entry-level information technology (IT) certification offered by Cisco Systems. CCNA certification is widelyRunas (559 words) [view diff] no match in snippet view article find links to article
In computing, runas (a compound word, from “run as”) is a command in the Microsoft Windows line of operating systems that allows a user to run specificIntego (490 words) [view diff] no match in snippet view article find links to article
Intego is a Mac and Windows security software company founded in 1997 by Jean-Paul Florencio and Laurent Marteau. The company creates Internet securityNational Technical Research Organisation (1,573 words) [view diff] no match in snippet view article find links to article
The National Technical Research Organisation (NTRO) is a technical intelligence agency of India. It was set up in 2004. The agency reports to the NationalLavasoft (972 words) [view diff] case mismatch in snippet view article find links to article
November 9, 2010. "Page 3 - Ad-Aware Pro Anniversary Edition Review: Computer Security Articles at". Brighthub.com. May 4, 2010. Retrieved November 9, 2010Sudo (1,766 words) [view diff] no match in snippet view article find links to article
sudo (/suːduː/) is a shell command on Unix-like operating systems that enables a user to run a program with the security privileges of another user, byScooby-Doo and the Cyber Chase (1,347 words) [view diff] no match in snippet view article find links to article
Scooby-Doo and the Cyber Chase is a 2001 American direct-to-video animated science fiction comedy mystery film, and the fourth in a series of direct-to-videoRole-based access control (2,300 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563. Sandhu, R., Coyne, E.J., Feinstein, H.L. andLeonard Adleman (832 words) [view diff] no match in snippet view article find links to article
Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he receivedFred Teeven (849 words) [view diff] no match in snippet view article find links to article
Fredrik "Fred" Teeven (born 5 August 1958) is a Dutch jurist, bus driver and former politician and prosecutor. A member of the People's Party for FreedomNessus (software) (161 words) [view diff] exact match in snippet view article
Computer security softwareTiny Encryption Algorithm (1,189 words) [view diff] no match in snippet view article find links to article
In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few linesComputer forensics (2,451 words) [view diff] no match in snippet view article find links to article
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digitalS/MIME (1,501 words) [view diff] no match in snippet view article find links to article
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public-key encryption and signing of MIME data. S/MIME is on an IETF standardsGreat Cannon (612 words) [view diff] no match in snippet view article find links to article
The Great Cannon of China is an Internet attack tool that is used by the government of the People's Republic of China to launch distributed denial-of-serviceISACA (1,052 words) [view diff] no match in snippet view article find links to article
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the InformationSCSK (366 words) [view diff] no match in snippet view article find links to article
SCSK Corporation (株式会社SCSK, Kabushiki-gaisha Esu-Shī-Esu-Kei) is a Japanese information technology company headquartered in Tokyo, Japan, offering IT servicesIEC 60870-6 (1,896 words) [view diff] no match in snippet view article find links to article
IEC 60870 part 6 in electrical engineering and power system automation, is one of the IEC 60870 set of standards which define systems used for telecontrolRalph Merkle (1,180 words) [view diff] no match in snippet view article find links to article
Ralph C. Merkle (born February 2, 1952) is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, theXTEA (969 words) [view diff] no match in snippet view article find links to article
In cryptography, XTEA (eXtended TEA) is a block cipher designed to correct weaknesses in TEA. The cipher's designers were David Wheeler and Roger NeedhamRon Rivest (1,543 words) [view diff] no match in snippet view article find links to article
Ronald Linn Rivest (/rɪˈvɛst/; born May 6, 1947) is an American cryptographer and computer scientist whose work has spanned the fields of algorithms andAndries Brouwer (621 words) [view diff] no match in snippet view article find links to article
Andries Evert Brouwer (born 1951) is a Dutch mathematician and computer programmer, Professor Emeritus at Eindhoven University of Technology (TU/e). HeClickjacking (2,909 words) [view diff] no match in snippet view article find links to article
Clickjacking (classified as a user interface redress attack or UI redressing) is a malicious technique of tricking a user into clicking on something differentProject Zero (1,496 words) [view diff] no match in snippet view article find links to article
Project Zero is a team of security analysts employed by Google tasked with finding zero-day vulnerabilities. It was announced on 15 July 2014. After findingISC2 (1,014 words) [view diff] case mismatch in snippet view article find links to article
attendance included: Canadian Information Processing Society (CIPS) Computer Security Institute (CSI) Data Processing Management Association Special InterestWebsite defacement (539 words) [view diff] no match in snippet view article find links to article
Website defacement is an attack on a website that changes the visual appearance of a website or a web page. These are typically the work of hackers, whoMitro (467 words) [view diff] no match in snippet view article find links to article
Mitro was a password manager for individuals and teams that securely saved users' logins, and allowed users to log in and share access. On October 6, 2015Network enumeration (348 words) [view diff] no match in snippet view article find links to article
Network enumeration is a computing activity in which usernames and info on groups, shares, and services of networked computers are retrieved. It shouldTrend Micro Internet Security (841 words) [view diff] no match in snippet view article find links to article
Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security programMorgan Kaufmann Publishers (172 words) [view diff] exact match in snippet view article find links to article
graphics, multimedia information and systems, artificial intelligence, computer security, and software engineering. Morgan Kaufmann's audience includes theRobert Tappan Morris (1,442 words) [view diff] case mismatch in snippet view article find links to article
Multics and Unix; and later became the chief scientist at the National Computer Security Center, a division of the National Security Agency (NSA). Morris grewVirus hoax (1,202 words) [view diff] no match in snippet view article find links to article
A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells theDasient (407 words) [view diff] no match in snippet view article find links to article
Dasient was an internet security company headquartered in Sunnyvale, California. It was founded in 2008 and launched its first product in June 2009. DasientMozilla Monitor (466 words) [view diff] no match in snippet view article find links to article
Mozilla Monitor, formerly known as Firefox Monitor, is an online data removal service developed by Mozilla, announced in June 2018, and launched on SeptemberSame-origin policy (2,181 words) [view diff] no match in snippet view article find links to article
In computing, the same-origin policy (SOP) is a concept in the web-app application security model. Under the policy, a web browser permits scripts containedSentry 2020 (141 words) [view diff] no match in snippet view article find links to article
Sentry 2020 is a commercial software program for transparent disk encryption for PCs and PDAs using Microsoft Windows or Windows Mobile. It was developedVyatta (916 words) [view diff] no match in snippet view article find links to article
Vyatta is a software-based virtual router, virtual firewall and VPN product for Internet Protocol networks (IPv4 and IPv6). A free download of Vyatta hasVba32 AntiVirus (255 words) [view diff] no match in snippet view article find links to article
VBA32 (Virus Block Ada 32) is antivirus software from the vendor VirusBlokAda for personal computers running Microsoft Windows. It detects and neutralizesFree Haven Project (928 words) [view diff] no match in snippet view article find links to article
The Free Haven Project was formed in 1999 by a group of Massachusetts Institute of Technology students with the aim to develop a secure, decentralizedRop Gonggrijp (673 words) [view diff] exact match in snippet view article find links to article
[citation needed] After he left XS4ALL, Gonggrijp founded ITSX, a computer security evaluation company, which was bought by Madison Gurkha in 2006.[citationUtimaco Atalla (1,670 words) [view diff] case mismatch in snippet view article find links to article
National Institute of Standards and Technology. 28 October 2010. Computer Security Resource Center (3 December 2002). "FIPS 140-2 Security RequirementsScramdisk (285 words) [view diff] no match in snippet view article find links to article
Scramdisk is a free on-the-fly encryption program for Windows 95, Windows 98, and Windows Me. A non-free version was also available for Windows NT. TheCybersecurity and Infrastructure Security Agency (2,040 words) [view diff] no match in snippet view article find links to article
The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity360 Total Security (418 words) [view diff] no match in snippet view article find links to article
360 Total Security, or its Chinese version, 360 Safeguard (Chinese: 360安全卫士), is an antivirus software developed by Beijing, China-based internet securityThe Cuckoo's Egg (book) (1,122 words) [view diff] no match in snippet view article
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of theDRDO NETRA (853 words) [view diff] no match in snippet view article find links to article
NETRA (NEtworking TRaffic Analysis) is a software network developed by India's Centre for Artificial Intelligence and Robotics (CAIR), a Defence Research360 Total Security (418 words) [view diff] no match in snippet view article find links to article
360 Total Security, or its Chinese version, 360 Safeguard (Chinese: 360安全卫士), is an antivirus software developed by Beijing, China-based internet securityHard copy (562 words) [view diff] no match in snippet view article find links to article
In information handling, the U.S. Federal Standard 1037C (Glossary of Telecommunication Terms) defines a hard copy as a permanent reproduction, or copyOWASP (1,634 words) [view diff] exact match in snippet view article find links to article
Computer security organizationTCP reset attack (1,107 words) [view diff] exact match in snippet view article find links to article
Type of computer security exploitSnort (software) (437 words) [view diff] no match in snippet view article
Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder andRop Gonggrijp (673 words) [view diff] exact match in snippet view article find links to article
[citation needed] After he left XS4ALL, Gonggrijp founded ITSX, a computer security evaluation company, which was bought by Madison Gurkha in 2006.[citationForm grabbing (743 words) [view diff] no match in snippet view article find links to article
Form grabbing is a form of malware that works by retrieving authorization and log-in credentials from a web data form before it is passed over the InternetNational Security Operations Center (383 words) [view diff] no match in snippet view article find links to article
The National Security Operations Center (NSOC) or Directorate K is the part of the United States National Security Agency responsible for current operationsWardriving (1,572 words) [view diff] no match in snippet view article find links to article
Wardriving is the act of searching for Wi-Fi wireless networks as well as cell towers, usually from a moving vehicle, using a laptop or smartphone. SoftwareCylance Pro Cycling (women's team) (319 words) [view diff] exact match in snippet view article
Tour, in 2016. The team's major sponsor, Cylance, was a high-tech computer security firm, and the team was owned by Inspire Sports whose founder, OmerWardialing (831 words) [view diff] exact match in snippet view article find links to article
exploration, and crackers—malicious hackers who specialize in breaching computer security—for guessing user accounts (by capturing voicemail greetings), orTheo de Raadt (1,705 words) [view diff] no match in snippet view article find links to article
Theo de Raadt (/də ˈrɔːt/ də RAWT, Dutch: [ˈteːjoː də ˈraːt]; born May 19, 1968) is a South African-born software engineer who lives in Calgary, CanadaMicrosoft Forefront Threat Management Gateway (1,511 words) [view diff] no match in snippet view article find links to article
Microsoft Forefront Threat Management Gateway (Forefront TMG), formerly known as Microsoft Internet Security and Acceleration Server (ISA Server), is aClifford Stoll (1,082 words) [view diff] no match in snippet view article find links to article
Clifford Paul "Cliff" Stoll (born June 4, 1950) is an American astronomer, author and teacher. He is best known for his investigation in 1986, while workingSplunk (3,957 words) [view diff] no match in snippet view article find links to article
Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generatedVincent Pilette (383 words) [view diff] no match in snippet view article find links to article
Vincent Pilette is an American businessman who is chief executive officer (CEO) of Gen Digital, a Fortune 500 company specializing in consumer cyber safetyNetcraft (646 words) [view diff] no match in snippet view article find links to article
Netcraft is an Internet services company based in London, England. The company provides cybercrime disruption services across a range of industries. NetcraftWOT Services (1,277 words) [view diff] no match in snippet view article find links to article
WOT Services is the developer of MyWOT (also known as WOT and Web of Trust), an online reputation and Internet safety service which shows indicators ofDynamic linker (1,743 words) [view diff] no match in snippet view article find links to article
In computing, a dynamic linker is the part of an operating system that loads and links the shared libraries needed by an executable when it is executedFirewall (film) (1,449 words) [view diff] no match in snippet view article
Firewall is a 2006 action thriller film directed by Richard Loncraine and written by Joe Forte. The film stars Harrison Ford as a banker who is forcedShatter attack (831 words) [view diff] no match in snippet view article find links to article
In computing, a shatter attack is a programming technique employed by hackers on Microsoft Windows operating systems to bypass security restrictions betweenNeed to know (831 words) [view diff] no match in snippet view article find links to article
The term "need to know" (alternatively spelled need-to-know), when used by governments and other organizations (particularly those related to militaryFBI Criminal, Cyber, Response, and Services Branch (419 words) [view diff] no match in snippet view article find links to article
The Criminal, Cyber, Response, and Services Branch (CCRSB) is a service within the Federal Bureau of Investigation (FBI). The CCRSB is responsible forVincent Pilette (383 words) [view diff] no match in snippet view article find links to article
Vincent Pilette is an American businessman who is chief executive officer (CEO) of Gen Digital, a Fortune 500 company specializing in consumer cyber safetyTiger team (758 words) [view diff] case mismatch in snippet view article find links to article
approach to resolving vulnerability cases". Proc. 11th FIRST Conf. Computer Security Incident Handling and Response. Brisbane, Australia: CiteSeerX: 1–2Dynamic linker (1,743 words) [view diff] no match in snippet view article find links to article
In computing, a dynamic linker is the part of an operating system that loads and links the shared libraries needed by an executable when it is executedHector Martin (hacker) (826 words) [view diff] no match in snippet view article
Hector Martin Cantero (born September 9, 1990), also known as marcan, is a Spanish security hacker and former lead developer on the Asahi Linux projectBusKill (1,042 words) [view diff] no match in snippet view article find links to article
BusKill is an open-source hardware and software project that designs computer kill cords to protect the confidentiality of the system's data from physicalAVG Technologies (1,879 words) [view diff] no match in snippet view article find links to article
AVG Technologies B.V. is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developedSonicWall (976 words) [view diff] no match in snippet view article find links to article
SonicWall Inc. is an American cybersecurity company that sells a range of Internet appliances primarily directed at content control and network securitySourcefire (1,425 words) [view diff] exact match in snippet view article find links to article
American computer security companyTrusted Computing Group (596 words) [view diff] no match in snippet view article find links to article
The Trusted Computing Group is a group formed in 2003 as the successor to the Trusted Computing Platform Alliance which was previously formed in 1999 toPeter G. Neumann (536 words) [view diff] exact match in snippet view article find links to article
intrusion detection system known as IDES that was a model for later computer security software. Neumann has long served as moderator of RISKS Digest andTrishneet Arora (587 words) [view diff] no match in snippet view article find links to article
Trishneet Arora (born 2 November 1993 in Punjab, India) is the founder and chief executive officer of TAC Security, a cyber security company. He was namedBillboard hacking (1,122 words) [view diff] no match in snippet view article find links to article
Billboard hacking or billboard hijacking is the practice of altering a billboard without the consent of the owner. It may involve physically pasting newBen Laurie (487 words) [view diff] no match in snippet view article find links to article
Ben Laurie is an English software engineer. Laurie wrote Apache-SSL, the basis of most SSL-enabled versions of the Apache HTTP Server. He developed theSecureworks (1,290 words) [view diff] no match in snippet view article find links to article
Secureworks Inc. is an American cybersecurity company. The company has approximately 4,000 customers in more than 50 countries, ranging from Fortune 100Zeek (645 words) [view diff] no match in snippet view article find links to article
Free and open-source software portal Zeek is a free and open-source software network analysis framework. Vern Paxson began development work on Zeek inCheetah Mobile (1,286 words) [view diff] no match in snippet view article find links to article
Cheetah Mobile Inc. (猎豹移动公司) is a Chinese mobile internet company incorporated in the Cayman Islands and headquartered in Beijing. Chen Rui (陈睿 currentKeycloak (498 words) [view diff] no match in snippet view article find links to article
Keycloak is an open-source software product to allow single sign-on with identity and access management aimed at modern applications and services. UntilESET NOD32 (2,231 words) [view diff] no match in snippet view article find links to article
ESET NOD32 Antivirus, commonly known as NOD32, is an antivirus software package made by the Slovak company ESET. ESET NOD32 Antivirus is sold in two editionsVideo Content Protection System (202 words) [view diff] no match in snippet view article find links to article
The Video Content Protection System (VCPS) is a standard for digital rights management, intended to enforce protection or DVD+R/+RW content and relatedVideo Content Protection System (202 words) [view diff] no match in snippet view article find links to article
The Video Content Protection System (VCPS) is a standard for digital rights management, intended to enforce protection or DVD+R/+RW content and relatedESET (2,511 words) [view diff] no match in snippet view article find links to article
ESET, s.r.o., is a software company specializing in cybersecurity, founded in 1992 in Bratislava, Slovakia. ESET's security products are made in EuropeDangling pointer (1,824 words) [view diff] no match in snippet view article find links to article
Dangling pointers and wild pointers in computer programming are pointers that do not point to a valid object of the appropriate type. These are specialGolden Shield Project (3,376 words) [view diff] no match in snippet view article find links to article
The Golden Shield Project (Chinese: 金盾工程; pinyin: jīndùn gōngchéng), also named National Public Security Work Informational Project, is the Chinese nationwideOpenPAM (236 words) [view diff] no match in snippet view article find links to article
Free and open-source software portal OpenPAM is a BSD-licensed implementation of PAM used by FreeBSD, NetBSD, DragonFly BSD and macOS (starting with SnowMichael Burrows (computer scientist) (724 words) [view diff] no match in snippet view article
Michael Burrows, FRS (born 1963) is a British computer scientist, one of the creators of AltaVista, and co-author of the paper that first described theMichael T. Goodrich (309 words) [view diff] no match in snippet view article find links to article
Michael T. Goodrich is a mathematician and computer scientist. He is a distinguished professor of computer science and the former chair of the departmentStrongDM (317 words) [view diff] no match in snippet view article find links to article
StrongDM is an American technology company that develops an infrastructure access platform. In 2024 the company raised a $34,000,000 series C from CapitalAnti-keylogger (1,016 words) [view diff] no match in snippet view article find links to article
An anti-keylogger (or anti–keystroke logger) is a type of software specifically designed for the detection of keystroke logger software; often, such softwareGraham Cluley (981 words) [view diff] exact match in snippet view article find links to article
a daily blog on the latest computer security news, opinion, and advice. Cluley started his career in the computer security industry as a programmer atThe Tor Project (2,158 words) [view diff] no match in snippet view article find links to article
The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, Massachusetts. It is founded by computer scientistsNational Cybersecurity and Communications Integration Center (652 words) [view diff] no match in snippet view article find links to article
The National Cybersecurity and Communications Integration Center (NCCIC) is part of the Cybersecurity Division of the Cybersecurity and InfrastructureWS-Security (1,441 words) [view diff] no match in snippet view article find links to article
Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services. It is a member of the Web service specifications andDr.Web (911 words) [view diff] no match in snippet view article find links to article
Dr.Web is a software suite developed by Russian anti-malware company Doctor Web. First released in 1992, it became the first anti-virus service in RussiaVern Paxson (240 words) [view diff] no match in snippet view article find links to article
Vern Edward Paxson is a professor of computer science at the University of California, Berkeley. He also leads the Networking and Security Group at theNorton AntiBot (717 words) [view diff] no match in snippet view article find links to article
Norton AntiBot, developed by Symantec, monitored applications for damaging behavior. The application was designed to prevent computers from being hijackedCyber-security regulation (5,483 words) [view diff] case mismatch in snippet view article find links to article
are now held accountable for reporting major security incidents to Computer Security Incident Response Teams (CSIRT). While DSPs are not held to as stringentXXTEA (1,115 words) [view diff] no match in snippet view article find links to article
In cryptography, Corrected Block TEA (often referred to as XXTEA) is a block cipher designed to correct weaknesses in the original Block TEA. XXTEA isF5, Inc. (2,435 words) [view diff] no match in snippet view article find links to article
F5, Inc. is an American technology company specializing in application security, multi-cloud management, online fraud prevention, application deliveryCNIC (Pakistan) (1,733 words) [view diff] no match in snippet view article
The computerised national identity card (CNIC) (Urdu: قومی شناختی کارڈ, romanized: qaumī śanāxtī kārḍ) is an identity card with a 13-digit number availableJohn Draper (3,245 words) [view diff] exact match in snippet view article find links to article
former phone phreak. He is a widely known figure within the hacker and computer security community. He is primarily known as a colorful and unconventionalStakkato (385 words) [view diff] no match in snippet view article find links to article
Philip Gabriel Pettersson, known by the alias Stakkato, is a Swedish hacker and the alleged perpetrator of a worldwide cyber attack known to have occurredInteger overflow (3,206 words) [view diff] no match in snippet view article find links to article
In computer programming, an integer overflow occurs when an arithmetic operation on integers attempts to create a numeric value that is outside of theWindows Live OneCare Safety Scanner (414 words) [view diff] exact match in snippet view article find links to article
provides a virus database, information about online threats, and general computer security documentation and tools. The virus scanner on the Windows Live OneCareCanon IT Solutions (345 words) [view diff] no match in snippet view article find links to article
Canon IT Solutions Inc. (キヤノンITソリューションズ株式会社, Kyanon Ai-Tī Soryūshonzu Kabushiki-gaisha) is a Japanese company headquartered in Tokyo, Japan, that offersFederal Office for Information Security (1,281 words) [view diff] case mismatch in snippet view article find links to article
cryptographic suite. The BSI has a similar role as the following agencies: Computer Security Division (CSD) of Information Technology Laboratory (ITL) of NISTRSA Conference (1,564 words) [view diff] no match in snippet view article find links to article
The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991GoGuardian (1,352 words) [view diff] no match in snippet view article find links to article
GoGuardian is an educational software company founded in 2015 and based in Los Angeles, California. The company's services monitor student activity onlineMan-in-the-browser (1,867 words) [view diff] no match in snippet view article find links to article
Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browserJennifer Seberry (387 words) [view diff] case mismatch in snippet view article find links to article
the Department of Computer Science and director of the Centre for Computer Security Research at the university. Seberry attended Parramatta High SchoolJtest (303 words) [view diff] no match in snippet view article find links to article
Jtest is an automated Java software testing and static analysis product developed by Parasoft. The product includes technology for data-flow analysis,Steve Gibson (computer programmer) (1,555 words) [view diff] no match in snippet view article
Steven M. Gibson (born March 26, 1955) is an American software engineer, security researcher, and IT security proponent. In the early 1980s, he workedXcitium (2,550 words) [view diff] exact match in snippet view article find links to article
the time of the event. For Comodo's lacking response on the issue computer security researcher Moxie Marlinspike called the whole event extremely embarrassingARP spoofing (1,558 words) [view diff] no match in snippet view article find links to article
In computer networking, ARP spoofing (also ARP cache poisoning or ARP poison routing) is a technique by which an attacker sends (spoofed) Address ResolutionList of data-erasing software (184 words) [view diff] no match in snippet view article find links to article
This is a list of utilities for performing data erasure. "BleachBit Features". Retrieved 3 April 2016. "CCleaner Features". Retrieved 3 April 2016. "DBANThe Hacker Crackdown (208 words) [view diff] no match in snippet view article find links to article
The Hacker Crackdown: Law and Disorder on the Electronic Frontier is a work of nonfiction by Bruce Sterling first published in 1992. The book discussesJennifer Seberry (387 words) [view diff] case mismatch in snippet view article find links to article
the Department of Computer Science and director of the Centre for Computer Security Research at the university. Seberry attended Parramatta High SchoolMilw0rm (1,642 words) [view diff] exact match in snippet view article find links to article
seemed to be more interested in political purposes than exposing computer security flaws. It was also reported that milw0rm broke into a Turkish nuclearProxy list (375 words) [view diff] no match in snippet view article find links to article
A proxy list is a list of open HTTP/HTTPS/SOCKS proxy servers all on one website. Proxies allow users to make indirect network connections to other computerGordon Lyon (444 words) [view diff] no match in snippet view article find links to article
Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) is an American network security expert, creator of Nmap and author of books, websites, and technicalHost protected area (567 words) [view diff] no match in snippet view article find links to article
The host protected area (HPA) is an area of a hard drive or solid-state drive that is not normally visible to an operating system. It was first introducedNetIQ (551 words) [view diff] no match in snippet view article find links to article
NetIQ is a security software company. In 2023 it was acquired by OpenText. NetIQ was previously based in San Jose, California, with products that provideMark Abene (1,333 words) [view diff] no match in snippet view article find links to article
Mark Abene (born February 23, 1972) is an American information security expert and entrepreneur, originally from New York City. Better known by his pseudonymMydoom (1,627 words) [view diff] exact match in snippet view article find links to article
online crime gangs. Mydoom was named by Craig Schmugar, an employee of computer security firm McAfee and one of the earliest discoverers of the worm. SchmugarThreat model (2,046 words) [view diff] case mismatch in snippet view article find links to article
forth the concept of a "threat tree" in his book, "Fundamentals of Computer Security Technology." The concept of a threat tree was based on decision treeDerek Atkins (113 words) [view diff] exact match in snippet view article find links to article
Derek A Atkins is a computer scientist specializing in computer security. He studied electrical engineering and computer science at the MassachusettsFiresheep (368 words) [view diff] exact match in snippet view article find links to article
details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding FiresheepElcomSoft (594 words) [view diff] exact match in snippet view article find links to article
Since its establishment in 1990, the company has been working on computer security programs, with the main focus on password and system recovery softwareNorwegian Cyber Defence Force (122 words) [view diff] no match in snippet view article find links to article
The Norwegian Cyber Defence Force (Norwegian: Cyberforsvaret) is a branch of the Norwegian Armed Forces responsible for military communications and defensiveEstonian Defence League's Cyber Unit (271 words) [view diff] no match in snippet view article find links to article
The Estonian Defence League’s Cyber Unit (Estonian: Küberkaitseliit, or KKL) is a group of units within certain malevs of the Estonian Defense League establishedThe Circle (2017 film) (2,878 words) [view diff] no match in snippet view article
The Circle is a 2017 American techno-thriller film directed by James Ponsoldt with a screenplay by Ponsoldt and Dave Eggers, based on Eggers's 2013 novelElcomSoft (594 words) [view diff] exact match in snippet view article find links to article
Since its establishment in 1990, the company has been working on computer security programs, with the main focus on password and system recovery softwareTelecom Enforcement Resource and Monitoring (1,068 words) [view diff] no match in snippet view article find links to article
Telecom Enforcement Resource and Monitoring (TERM), formerly known as Vigilance Telecom Monitoring (VTM), is the vigilance and monitoring wing of the IndianSetuid (2,019 words) [view diff] no match in snippet view article find links to article
The Unix and Linux access rights flags setuid and setgid (short for set user identity and set group identity) allow users to run an executable with thePetname (367 words) [view diff] no match in snippet view article find links to article
Petname systems are naming systems that claim to possess all three naming properties of Zooko's triangle - global, secure, and memorable. Software thatImmuniWeb (992 words) [view diff] no match in snippet view article find links to article
ImmuniWeb is a global application security company headquartered in Geneva, Switzerland. ImmuniWeb develops machine learning and AI technologies for SaaS-basedGeneral Dynamics Mission Systems (1,253 words) [view diff] no match in snippet view article find links to article
General Dynamics Mission Systems is a business unit of American defense and aerospace company General Dynamics. General Dynamics Mission Systems integratesNational Cipher Challenge (507 words) [view diff] no match in snippet view article find links to article
The National Cipher Challenge is an annual cryptographic competition organised by the University of Southampton School of Mathematics. Competitors attemptCentre for Development of Telematics (972 words) [view diff] no match in snippet view article find links to article
The Centre for Development of Telematics (C-DOT) is an Indian Government owned telecommunications technology development centre. It was established inEric Corley (583 words) [view diff] no match in snippet view article find links to article
Eric Gordon Corley (born December 16, 1959), also frequently referred to by his pen name of Emmanuel Goldstein, is a figure in the hacker community. HeLondon School of Economics (15,671 words) [view diff] no match in snippet view article find links to article
The London School of Economics and Political Science (LSE), established in 1895, is a public research university in London, England, and a member institutionFactotum (software) (210 words) [view diff] no match in snippet view article
Factotum is a password management and authentication protocol negotiation virtual file system for Plan 9 from Bell Labs. When a program wants to authenticateFBI Cyber Division (742 words) [view diff] no match in snippet view article find links to article
The Cyber Division (CyD) is a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, includingChain of trust (466 words) [view diff] exact match in snippet view article find links to article
In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificateInstitute of Electrical and Electronics Engineers (2,026 words) [view diff] no match in snippet view article find links to article
The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) public charity professional organization for electrical engineeringExpressVPN (2,105 words) [view diff] no match in snippet view article find links to article
ExpressVPN is a company providing online privacy and security solutions, including a virtual private network (VPN) service and a password manager. SinceMicrosoft Forefront (677 words) [view diff] no match in snippet view article find links to article
Microsoft Forefront is a discontinued family of line-of-business security software by Microsoft Corporation. Microsoft Forefront products are designedFred Cohen (355 words) [view diff] case mismatch in snippet view article find links to article
Computer Virus Research 1991, A Case for Benevolent Viruses 1991, The Computer Security Encyclopedia - Computer Viruses 1992, A Formal Definition of ComputerNEC (5,607 words) [view diff] no match in snippet view article find links to article
NEC Corporation (日本電気株式会社, Nippon Denki Kabushiki gaisha, an acronym for the Nippon Electric Company) is a Japanese multinational information technologyFred Cohen (355 words) [view diff] case mismatch in snippet view article find links to article
Computer Virus Research 1991, A Case for Benevolent Viruses 1991, The Computer Security Encyclopedia - Computer Viruses 1992, A Formal Definition of ComputerInformation Technology Act, 2000 (3,243 words) [view diff] no match in snippet view article find links to article
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 OctoberDNS hijacking (2,246 words) [view diff] no match in snippet view article find links to article
DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achievedLock screen (1,914 words) [view diff] no match in snippet view article find links to article
A lock screen is a computer user interface element used by various operating systems. They regulate immediate access to a device by requiring the userTrusted Platform Module (6,592 words) [view diff] no match in snippet view article find links to article
A Trusted Platform Module (TPM) is a secure cryptoprocessor that implements the ISO/IEC 11889 standard. Common uses are verifying that the boot processEnpass (470 words) [view diff] no match in snippet view article find links to article
Enpass is a freemium password manager and passkey manager available for MacOS, Windows, iOS, Android and Linux, with browser extensions for all major browsersGTRI Cyber Technology and Information Security Laboratory (200 words) [view diff] no match in snippet view article find links to article
The Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER) is one of eight labs in the Georgia Tech Research InstituteMAC spoofing (1,345 words) [view diff] no match in snippet view article find links to article
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC addressSafeNet (1,252 words) [view diff] no match in snippet view article find links to article
SafeNet, Inc. was an information security company based in Belcamp, Maryland, United States, which was acquired in August 2014 by the French security companyQualys (1,077 words) [view diff] no match in snippet view article find links to article
Qualys, Inc. is an American technology firm based in Foster City, California, specializing in cloud security, compliance and related services. Qualys hasHTTP parameter pollution (284 words) [view diff] no match in snippet view article find links to article
HTTP Parameter Pollution (HPP) is a web application vulnerability exploited by injecting encoded query string delimiters in already existing parametersAllot Ltd. (1,268 words) [view diff] no match in snippet view article find links to article
Allot Ltd., formerly Allot Communications, is an Israeli high-tech company that develops telecommunications software. The company is headquartered in HodSafeInCloud (161 words) [view diff] no match in snippet view article find links to article
SafeInCloud is a proprietary password manager to securely store passwords and other credentials offline and in the cloud. It is similar to Enpass whichDorothy E. Denning (2,203 words) [view diff] exact match in snippet view article find links to article
website. Denning has received over 20 awards for her innovations in computer security. Key contributions are described below. "A Lattice Model of SecureCapsicum (Unix) (332 words) [view diff] no match in snippet view article
Capsicum is an implementation of capability-based security for UNIX and similar systems. Presented at USENIX 2010, the system is part of FreeBSD sinceAvi Rubin (352 words) [view diff] no match in snippet view article find links to article
Aviel David "Avi" Rubin (born November 8, 1967) is an expert in systems and networking security. He is a graduate of the University of Michigan and professorRebecca Bace (935 words) [view diff] exact match in snippet view article find links to article
Rebecca "Becky" Gurley Bace (1955–2017) was an American computer security expert and pioneer in intrusion detection. She spent 12 years at the US NationalBeyondTrust (1,463 words) [view diff] no match in snippet view article find links to article
BeyondTrust (formerly Symark) is an American company that develops, markets, and supports a family of privileged identity management / access managementNetScreen Technologies (576 words) [view diff] no match in snippet view article find links to article
NetScreen Technologies was an American technology company that was acquired by Juniper Networks for US$4 billion stock for stock in 2004. NetScreen TechnologiesMotoko Kusanagi (3,810 words) [view diff] exact match in snippet view article find links to article
without leaving a trace." Classified as "Wizard Class" grey hat, her computer security hacking skills allow her brain–computer interface consciousness toBluesnarfing (859 words) [view diff] no match in snippet view article find links to article
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops,Aladdin Knowledge Systems (635 words) [view diff] no match in snippet view article find links to article
Aladdin Knowledge Systems Ltd. was a company that produced software for digital rights management and Internet security. The company was acquired by SafenetScanSafe (508 words) [view diff] no match in snippet view article find links to article
ScanSafe was a privately held company backed by investors Benchmark Capital and Scale Venture Partners, until its 2009 acquisition by Cisco Systems. TheBS 7799 (491 words) [view diff] no match in snippet view article find links to article
BS 7799 was a British standard "Code of Practice for Information Security Management", first published as such by the British Standards Institution (BSI)Trusteer (1,949 words) [view diff] exact match in snippet view article find links to article
Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. LoonkarACF2 (310 words) [view diff] case mismatch in snippet view article find links to article
of Minnesota. Jeffrey Yost, "The Origin and Early History of the Computer Security Software Products Industry," IEEE Annals of the History of ComputingKeePassXC (342 words) [view diff] no match in snippet view article find links to article
KeePassXC is a free and open-source password manager. It started as a community fork of KeePassX (itself a cross-platform port of KeePass). It is built