KeywordsIDKeywordNotesWikipediaLink
1EditorialAn article that expresses the opinion of the editor, editorial board, or publisher.http://en.wikipedia.org/wiki/Editorial
2LettersLetter to the editor, sent to 2600 about issues of concern to the readers.http://en.wikipedia.org/wiki/Letters_to_the_editor
3VirusComputer virus, a computer program that can copy itself and infect a computer without permission or knowledge of the user.http://en.wikipedia.org/wiki/Computer_virus
4ExploitA piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.http://en.wikipedia.org/wiki/Exploit_(computer_security)
5HackA clever or quick fix to a computer program problem, or to a clumsy or inelegant solution to a problem. The term is also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable. The general media also uses this term to describe the act of illegally breaking into a computer, better described as cracking.http://en.wikipedia.org/wiki/Hack_(technology)
6PhreakingA slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems.http://en.wikipedia.org/wiki/Phreaking
7TorThe Onion Router (anonymity network) http://www.torproject.org/http://en.wikipedia.org/wiki/Tor_(anonymity_network)
8Pen TestingPenetration testing, a method of evaluating the security of a computer system or network by simulating an attack by a malicious user.http://en.wikipedia.org/wiki/Pen_testing
9RippingThe process of copying audio or video content to a hard disk or other media.http://en.wikipedia.org/wiki/Ripping
10MP3MPEG-1 Audio Layer 3, a digital audio encoding format using a form of lossy data compression.http://en.wikipedia.org/wiki/Mp3
11SEOSearch engine optimization is the process of improving the volume and quality of traffic to a web site from search engines via "natural" ("organic" or "algorithmic") search results.http://en.wikipedia.org/wiki/Search_engine_optimization
12HackerspaceA hackerspace or hackspace (from Hacker and Space) is a real (as opposed to virtual) place where people with common interests, usually in science, technology, or digital or electronic art can meet, socialise and collaborate.http://en.wikipedia.org/wiki/Hackerspace
13FictionThe telling of stories which aren't real.http://en.wikipedia.org/wiki/Fiction
14Port ScanningSearching network host(s) for open port(s).http://en.wikipedia.org/wiki/Port_scanning
15OS fingerprintingProcess of determining the operating system (OS)/server software used by a remote system.http://en.wikipedia.org/wiki/OS_fingerprinting
16Remote ScriptingA technology which allows scripts running inside a browser to exchange information with a server.http://en.wikipedia.org/wiki/Remote_Scripting
17ScriptingA programming language that controls a software application.http://en.wikipedia.org/wiki/Scripting
18DisguiseTo alter the appearance or hide the identity of someone/thing.NULL
19CellphoneAlso called a mobile phone and handphone, is an electronic device used for mobile telecommunications (mobile telephony, text messaging or data transmission) over a cellular network of specialized base stations known as cell sites.http://en.wikipedia.org/wiki/Mobile_phone
20ForensicsA branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.http://en.wikipedia.org/wiki/Computer_forensics
21WEPWired Equivalent Privacy is a deprecated algorithm to secure IEEE 802.11 wireless networks.http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy
22Wireless NetworksRefers to any type of computer network that is wireless, typically using radio waves.http://en.wikipedia.org/wiki/Wireless_networks
23DNSDomain Name System, Internet system to translate names into IP addresses.http://en.wikipedia.org/wiki/Domain_Name_System
24FirewallHardware/software designed to prevent unauthorized electronic access to a networked computer system.http://en.wikipedia.org/wiki/Firewall
25GoogleAn American public corporation, earning revenue from advertising related to its Internet search, e-mail, online mapping, office productivity, social networking, and video sharing services. They also track people's internet use and blatantly disregard personal privacy!http://en.wikipedia.org/wiki/Google
26800 numberA special telephone number, in that the called party is charged the cost of the calls by the telephone carrier, instead of the calling party.http://en.wikipedia.org/wiki/800_numbers
27CyberspaceThe online world of computer networks and especially the Internet.http://en.wikipedia.org/wiki/Cyberspace
28MusicThe art of ordering tones or sounds in succession, in combination, and in temporal relationships to produce a composition having unity and continuity.http://en.wikipedia.org/wiki/Music
29NetworkA group of interconnected computers.http://en.wikipedia.org/wiki/Computer_network
30ISPInternet service provider - a company which offers their customers access to the Internet.http://en.wikipedia.org/wiki/ISP
31LinuxA Unix-like computer operating system family which uses the Linux kernel and the GNU system utilities and libraries.http://en.wikipedia.org/wiki/Linux
32Social EngineeringThe art of manipulating people into performing actions or divulging confidential information.http://en.wikipedia.org/wiki/Social_engineering_(security)
33HistoryA record or narrative description of past events.http://en.wikipedia.org/wiki/History
34Security ToolsComputer programs useful for maintaining/assessing security on computers and networks.http://sectools.org/
35Mind-BodyThe interrelationship between physical and mental health.http://en.wikipedia.org/wiki/Mind-body_connection
36GraffitiImages or lettering scratched, scrawled, painted or marked in any manner on property.http://en.wikipedia.org/wiki/Graffiti
37Lock PickingThe art of unlocking a lock by analyzing and manipulating the components of the lock device, without the original key.http://en.wikipedia.org/wiki/Lock_Picking
38HoneypotA trap set to detect or deflect attempts at unauthorized use of information systems.http://en.wikipedia.org/wiki/Honeypot_(computing)
39Password CrackingThe process of discovering the plaintext of an encrypted computer password.http://en.wikipedia.org/wiki/Password_cracking
40JavascriptA scripting language widely used for client-side web development.http://en.wikipedia.org/wiki/Javascript
41Computer SecurityThe protection of information from theft or corruption, or the preservation of availability.http://en.wikipedia.org/wiki/Computer_Security
42VoIPVoice Over Internet Protocol - the transmission technologies for delivery of voice communications over the Internet.http://en.wikipedia.org/wiki/Voip
43TelecommunicationsThe assisted transmission of signals over a distance for the purpose of communication.http://en.wikipedia.org/wiki/Telecommunications
44PasswordsA secret word or string of characters that is used for authentication, to prove identity or gain access to a resource.http://en.wikipedia.org/wiki/Passwords
45RFIDRadio-Frequency IDentification - an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.http://en.wikipedia.org/wiki/Rfid
46BarcodeA bar code is an optical machine-readable representation of data.http://en.wikipedia.org/wiki/Barcode
47April Fools' DayA day marked by the commission of hoaxes and other practical jokes of varying sophistication on friends, family members, enemies and neighbors.http://en.wikipedia.org/wiki/April_Fools%27_Day
48PrivacyThe ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.http://en.wikipedia.org/wiki/Privacy
49ProxyA computer system or an application program that services the requests of its clients by forwarding requests to other servers.http://en.wikipedia.org/wiki/Proxy_server
50StackingA gang signal made with the hands.http://en.wikipedia.org/wiki/Gang_signal
51AliasAn assumed name (pseudonym).NULL
52SurveillanceMonitoring the behavior of people, objects or processes.http://en.wikipedia.org/wiki/Surveillance
53WikipediaThe free encyclopedia that anyone can edit.http://en.wikipedia.org/wiki/Wikipedia
54WarezRefers primarily to copyrighted works traded in violation of copyright law.http://en.wikipedia.org/wiki/Warez
55DarknetA private virtual network where users connect only to people they trust.http://en.wikipedia.org/wiki/Darknet_(file_sharing)
56Satellite TV/radioTelevision/radio delivered by the means of communications satellites.http://en.wikipedia.org/wiki/Satellite_television http://en.wikipedia.org/wiki/Satellite_radio
57EncryptionThe process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.http://en.wikipedia.org/wiki/Encryption
58Electronic VotingIs a term encompassing several different types of voting, embracing both electronic means of casting a vote and electronic means of counting votes.http://en.wikipedia.org/wiki/Electronic_voting
59FacebookA popular, free-access social networking website.http://en.wikipedia.org/wiki/Facebook
60PaypalAn e-commerce business allowing payments and money transfers to be made through the Internet. They are a bunch of crooks whose service sucks!http://en.wikipedia.org/wiki/Paypal
61DRMDigital rights management - technologies which provide access control for digital media.http://en.wikipedia.org/wiki/Digital_rights_management
62DrugsAny chemical substance that, when absorbed into the body of a living organism, alters normal bodily function.http://en.wikipedia.org/wiki/Drugs
63IDSIntrusion Detection System - software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network.http://en.wikipedia.org/wiki/Intrusion_detection_system
64Web FilteringSoftware designed and optimized for controlling what content is permitted to a reader.http://en.wikipedia.org/wiki/Web_filtering
65MultibootThe act of installing multiple operating systems on a computer, and being able to choose which one to boot.http://en.wikipedia.org/wiki/Multiboot
66Net NeutralityA network that is free of restrictions on content, sites, or platforms, on the kinds of equipment that may be attached, and on the modes of communication allowed, as well as one where communication is not unreasonably degraded by other communication streams.http://en.wikipedia.org/wiki/Net_Neutrality
67ElectionA decision-making process by which a population chooses an individual to hold formal office.http://en.wikipedia.org/wiki/Election
68craigslistA central network of online communities, featuring free online classified advertisements and forums on various topics.http://en.wikipedia.org/wiki/CraigsList
69AnonymityThe quality or state of being anonymous; anonymousness.http://en.wikipedia.org/wiki/Anonymity
70Dumpster DivingThe practice of sifting through commercial or residential trash to find items that have been discarded by their owners, but which may be useful to the Dumpster diver.http://en.wikipedia.org/wiki/Dumpster_Diving
71Quantum computingA device for computation that makes direct use of quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data.http://en.wikipedia.org/wiki/Quantum_computing
72NewsThe reporting of current information on television and radio, and in newspapers and magazines.http://en.wikipedia.org/wiki/News
73Business Intelligence(BI) refers to skills, knowledge, technologies, applications, quality, risks, security issues and practices used to help a business to acquire a better understanding of the market behavior and business context.http://en.wikipedia.org/wiki/Business_Intelligence
74Computer ProgrammingThe process of writing, testing, debugging/troubleshooting, and maintaining the source code of computer programs.http://en.wikipedia.org/wiki/Computer_Programming
75File SharingThe providing and receiving of digital files over a network, usually following the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users.http://en.wikipedia.org/wiki/File_Sharing
762600The Hacker Quarterly magazine.http://en.wikipedia.org/wiki/2600:_The_Hacker_Quarterly
77Bit BucketJargon for where lost computerized data has gone - used here as a miscellaneous category.http://en.wikipedia.org/wiki/Bit_bucket
78SSHSecure Shell is a network protocol that allows data to be exchanged using a secure channel between two networked devices.http://en.wikipedia.org/wiki/Secure_Shell
79ObfuscationDeliberately obfuscate code to conceal its purpose, to deter reverse engineering, or as a puzzle or recreational challenge for readers.http://en.wikipedia.org/wiki/Obfuscation
80InternetA global system of interconnected computer networks that interchange data by packet switching using the standardized Internet Protocol Suite (TCP/IP).http://en.wikipedia.org/wiki/Internet
81Help DeskAn information and assistance resource that troubleshoots problems with computers or similar products.http://en.wikipedia.org/wiki/Help_Desk
82iPodA brand of portable media players designed and marketed by Apple Inc.http://en.wikipedia.org/wiki/IPod
83Access ControlThe ability to permit or deny the use of a particular resource by a particular entity.http://en.wikipedia.org/wiki/Access_Control
84Application SoftwareAny tool that functions and is operated by means of a computer, with the purpose of supporting or improving the software user's work.http://en.wikipedia.org/wiki/Application_software
85TLSTansport Layer Security Protocol and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security and data integrity for communications over TCP/IP networks such as the Internet.http://en.wikipedia.org/wiki/Transport_Layer_Security
86SSLSecure Sockets Layer - see TLS - Transport Layer Security.http://en.wikipedia.org/wiki/Transport_Layer_Security
87Man-in-the-middleA form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker.http://en.wikipedia.org/wiki/Man-in-the-middle
88LawA system of rules, enforced through a set of institutions, used as an instrument to underpin civil obedience, politics, economics and society.http://en.wikipedia.org/wiki/Law
89RFRadio frequency - a frequency or rate of oscillation within the range of about 3 Hz to 300 GHz.http://en.wikipedia.org/wiki/Radio_frequency
90ATMAutomated teller machine is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller.http://en.wikipedia.org/wiki/Automated_teller_machine
91WPAWi-Fi Protected Access is a certification program administered by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks.http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
92CommunicationThe process to impart information from a sender to a receiver with the use of a medium.http://en.wikipedia.org/wiki/Communication
93TechnologyUsage and knowledge of tools and crafts, and how it affects an animal species' ability to control and adapt to its environment.http://en.wikipedia.org/wiki/Technology
94HacktivismThe use of computers and computer networks as a means of protest to promote political ends or the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends.http://en.wikipedia.org/wiki/Hacktivism
95Identity TheftA term used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits.http://en.wikipedia.org/wiki/Identity_Theft
96PoliticsThe process by which groups of people make decisions.http://en.wikipedia.org/wiki/Politics
97Cross-site Scripting(XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.http://en.wikipedia.org/wiki/Cross-site_Scripting
99HackerOne who discovers and implements a hack.http://en.wikipedia.org/wiki/Hacker_(programmer_subculture)
100Caller IDA telephone service, available on POTS lines, that transmits a caller's number to the called party's telephone equipment during the ringing signal, or when the call is being set up but before the call is answered.http://en.wikipedia.org/wiki/Caller_id
101Physical SecurityMeasures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media.http://en.wikipedia.org/wiki/Physical_security
102SpywareComputer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.http://en.wikipedia.org/wiki/Spyware
103SteganographyThe art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message, a form of security through obscurity.http://en.wikipedia.org/wiki/Steganography
104MAC addressMedia Access Control address is a quasi-unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification.http://en.wikipedia.org/wiki/MAC_address
105Remote accessRefers to remote desktop, remote terminal (like telnet) or any type of remote application (including remote browser).http://en.wikipedia.org/wiki/Remote_desktop_software
106TCP/IPTransmission Control Protocol (TCP) and/or Internet Protocol (IP), the set of communications protocols used for the Internet and other similar networks.http://en.wikipedia.org/wiki/TCP/IP
107AIMAOL Instant Messenger (AIM) is an instant messaging and presence computer program which uses the proprietary OSCAR instant messaging protocol and the TOC protocol to allow registered users to communicate in real time.http://en.wikipedia.org/wiki/AOL_Instant_Messenger
108IP phoneUses Voice over IP technologies to allow telephone calls to be made over an IP network.http://en.wikipedia.org/wiki/IP_Phone
109WAPWireless Application Protocol is an open international standard for application layer network communications in a wireless communication environment.http://en.wikipedia.org/wiki/Wireless_Application_Protocol
110SpamThe abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately.http://en.wikipedia.org/wiki/Spam_(electronic)
111Magnetic stripe cardA type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.http://en.wikipedia.org/wiki/Magnetic_stripe_card
112LocksmithingThe science and art of making and defeating locks.http://en.wikipedia.org/wiki/Locksmithing
113Copyright infringementThe unauthorized use of material that is covered by copyright law, in a manner that violates one of the copyright owner's exclusive rights.http://en.wikipedia.org/wiki/Copyright_infringement
114Hacker HappeningsConferences or events of interest to hackers.NULL
115Certificate AuthorityA certificate authority or certification authority (CA) is an entity that issues digital certificates for use by other parties.http://en.wikipedia.org/wiki/Certificate_authority
116RPCRemote procedure call, a network protocol that allows a computer program running on one host to cause code to be executed on another host.http://en.wikipedia.org/wiki/Remote_procedure_call
117Video game consoleAn interactive entertainment computer or electronic device that produces a video display signal which can be used with a display device (a television, monitor, etc.) to display a video game.http://en.wikipedia.org/wiki/Video_game_console
118DoSDenial-of-service attack is an attempt to make a computer resource unavailable to its intended users.http://en.wikipedia.org/wiki/DoS
119BiometricsMethods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.http://en.wikipedia.org/wiki/Biometrics
120Keystroke loggingOften called keylogging, is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.http://en.wikipedia.org/wiki/Keystroke_logging
121DHCPDynamic Host Configuration Protocol is a network application protocol used by devices (DHCP clients) to obtain configuration information for operation in an Internet Protocol network.http://en.wikipedia.org/wiki/Dhcp
122TelemarketingA method of direct marketing in which a salesperson solicits to prospective customers to buy products or services over the phone.http://en.wikipedia.org/wiki/Telemarketing
123Book ReviewA form of literary criticism in which a book is analyzed based on content, style, and merit.http://en.wikipedia.org/wiki/Book_Review
124AppleTalkA proprietary suite of protocols developed by Apple Inc for networking computers.http://en.wikipedia.org/wiki/AppleTalk
125Pirate radioRefers to illegal or unregulated radio transmissions.http://en.wikipedia.org/wiki/Pirate_radio
126Reconnaissance(also scouting) is a military and medical term denoting exploration conducted to gain information.http://en.wikipedia.org/wiki/Reconnaissance
127ARPAddress Resolution Protocol (ARP) is the method for finding a host's link layer (hardware) address when only its Internet Layer (IP) or some other Network Layer address is known.http://en.wikipedia.org/wiki/Address_Resolution_Protocol
128CybercrimeGenerally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.http://en.wikipedia.org/wiki/Cybercrime
129PKIPublic Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates.http://en.wikipedia.org/wiki/Public_key_infrastructure
130Cryptography(or cryptology) is the practice and study of hiding information.http://en.wikipedia.org/wiki/Cryptography
131Big BrotherGeneral term to describe any overly-inquisitive or overly-controlling authority figure or attempts by government to increase surveillance.http://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)
132Hardware specificRefers to a specific piece or pieces of hardware.NULL
133Hacking toolA program/hardware designed to assist with hacking,http://en.wikipedia.org/wiki/Hacking_tool
134emailElectronic mail is a method of exchanging digital messages using a store-and-forward model in which e-mail computer server systems accept, forward, deliver and store messages on behalf of users.http://en.wikipedia.org/wiki/Email
135Software crackingThe modification of software to remove protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware.http://en.wikipedia.org/wiki/Software_cracking
136MischiefA vexatious or annoying action, or, conduct or activity that playfully causes petty annoyance. http://en.wikipedia.org/wiki/Mischief
137Software specificRefers to a specific version or versions of software.NULL
138UNIXA computer operating system originally developed in 1969 by AT&T at Bell Labs. Today's Unix systems are split into various branches, developed over time by AT&T as well as various commercial vendors and non-profit organizations.http://en.wikipedia.org/wiki/Unix
139Movie ReviewThe analysis and evaluation of films.http://en.wikipedia.org/wiki/Movie_review
140War DialingA technique of using a modem to automatically scan a list of telephone numbers for computers, BBS systems and fax machines.http://en.wikipedia.org/wiki/War_dialing
141BBSA Bulletin Board System is a computer system running software that allows users to connect and log in to the system using a terminal program. Once logged in, a user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users, either through electronic mail or in public message boards. http://en.wikipedia.org/wiki/Bulletin_Board_System
142InterviewA conversation between two or more people (the interviewer and the interviewee) where questions are asked by the interviewer to obtain information from the interviewee.http://en.wikipedia.org/wiki/Interview
143Operating SystemAn interface between hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of a computer, that acts as a host for computing applications run on the machine.http://en.wikipedia.org/wiki/Operating_system
144RootkitA software system that consists of one or more programs designed to obscure the fact that a system has been compromised.http://en.wikipedia.org/wiki/Root_kit
145Point of Sale(POS) the hardware and software used for checkouts, the equivalent of an electronic cash register.http://en.wikipedia.org/wiki/Point_of_sale
146Computer WormA self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network).http://en.wikipedia.org/wiki/Computer_worm
147ARPANETAdvanced Research Projects Agency Network, created by the Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense, was the world's first operational packet switching network, and the predecessor of the contemporary global Internet.http://en.wikipedia.org/wiki/Arpanet
148BluetoothA proprietary open wireless technology standard for exchanging data over short distances.http://en.wikipedia.org/wiki/Bluetooth
149PhishingThe criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. https://secure.wikimedia.org/wikipedia/en/wiki/Phishing
150IPv6A version of the Internet Protocol that is designed to succeed Internet Protocol version 4 (IPv4) because it has a vastly larger address space.https://secure.wikimedia.org/wikipedia/en/wiki/Ipv6
151RoboticsThe engineering science and technology of robots, and their design, manufacture, application, and structural disposition.https://secure.wikimedia.org/wikipedia/en/wiki/Robotics
152GeolocationThe identification of the real-world geographic location of an object, such as a radar, mobile phone or an Internet-connected computer terminal.https://secure.wikimedia.org/wikipedia/en/wiki/Geolocation
153E-BookAn electronic book is a text and image-based publication in digital form produced on, published by, and readable on computers or other digital devices.https://secure.wikimedia.org/wikipedia/en/wiki/E-book
154Electronic MoneyAlso known as e-currency, e-money, electronic cash, electronic currency, digital money, digital cash, digital currency, cyber currency - refers to money or scrip which is only exchanged electronically.https://secure.wikimedia.org/wikipedia/en/wiki/Electronic_money
155Hardware HackingIncludes building, rebuilding, modifying (modding), and creating electronic hardware, either to make it better, faster, to give it added features or to make it do something it was never intended to do.https://secure.wikimedia.org/wikipedia/en/wiki/Hardware_hacking
156CyberwarPolitically motivated hacking to conduct sabotage and espionage, a form of information warfare.https://secure.wikimedia.org/wikipedia/en/wiki/Cyberwar
157Home AutomationCentralized control of lighting, HVAC, appliances, and other systems, to provide improved convenience, comfort, energy efficiency and security.https://en.wikipedia.org/wiki/Home_automation
158VirtualizationVirtualization (or virtualisation) is the simulation of the software and/or hardware upon which other software runs.http://en.wikipedia.org/wiki/Virtualization
159Web Crawler (spider)https://en.wikipedia.org/wiki/Web_crawler
160VPNVirtual Private Networkhttps://en.wikipedia.org/wiki/Vpn
161TwitterAn online social networking service and microblogging service that enables its users to send and read text-based messages of up to 140 characters, known as 'tweets'.https://en.wikipedia.org/wiki/Twitter
162Raspberry PiA credit-card-sized single-board computer developed in the UK by the Raspberry Pi Foundation with the intention of promoting the teaching of basic computer science in schools.https://en.wikipedia.org/wiki/Raspberry_Pi
163BitcoinA cryptocurrency where the creation and transfer of bitcoins is based on an open-source cryptographic protocol that is independent of any central authority.https://en.wikipedia.org/wiki/Bitcoin
164Cloud computingColloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internethttps://en.wikipedia.org/wiki/Cloud_computing
165PivotingUse of a compromised system to attack other systems.https://en.wikipedia.org/wiki/Exploit_%28computer_security%29#Pivoting
166AndroidAn operating system based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which was purchased by Google.https://en.wikipedia.org/wiki/Android_%28operating_system%29
167WardrivingWardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).https://en.wikipedia.org/wiki/Wardriving
168HTML5HTML5 is a core technology markup language of the Internet used for structuring and presenting content for the World Wide Web.https://en.wikipedia.org/wiki/HTML5
169MalwareMalware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systemshttps://en.wikipedia.org/wiki/Malware
170WARCWeb ARChive formathttps://en.wikipedia.org/wiki/Web_ARChive
171MeshnetA mesh network is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.https://en.wikipedia.org/wiki/Meshnet
172Internet LeakAn Internet leak occurs when a party's confidential information is released to the public on the Internet.https://en.wikipedia.org/wiki/Internet_leak
173Historical DocumentHistorical documents are original documents that contain important historical information about a person, place, or event.https://en.wikipedia.org/wiki/Historical_document
174Communications satelliteA communications satellite is an artificial satellite that relays and amplifies radio telecommunications signals via a transponder.https://en.wikipedia.org/wiki/Communications_satellite
175Two-factor authentication.A method of confirming a user's claimed identity by utilizing a combination of two different components (also known as 2FA).https://en.wikipedia.org/wiki/2_factor_authentication
176I2PThe Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer to peer communication.https://en.wikipedia.org/wiki/I2P
177BotnetA number of Internet-connected devices, each of which is running one or more bots.https://en.wikipedia.org/wiki/Botnet
178WhistleblowerA person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public.https://en.wikipedia.org/wiki/Whistleblower