1EditorialAn article that expresses the opinion of the editor, editorial board, or publisher.
2LettersLetter to the editor, sent to 2600 about issues of concern to the readers.
3VirusComputer virus, a computer program that can copy itself and infect a computer without permission or knowledge of the user.
4ExploitA piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.
5HackA clever or quick fix to a computer program problem, or to a clumsy or inelegant solution to a problem. The term is also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable. The general media also uses this term to describe the act of illegally breaking into a computer, better described as cracking.
6PhreakingA slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems.
7TorThe Onion Router (anonymity network)
8Pen TestingPenetration testing, a method of evaluating the security of a computer system or network by simulating an attack by a malicious user.
9RippingThe process of copying audio or video content to a hard disk or other media.
10MP3MPEG-1 Audio Layer 3, a digital audio encoding format using a form of lossy data compression.
11SEOSearch engine optimization is the process of improving the volume and quality of traffic to a web site from search engines via "natural" ("organic" or "algorithmic") search results.
12HackerspaceA hackerspace or hackspace (from Hacker and Space) is a real (as opposed to virtual) place where people with common interests, usually in science, technology, or digital or electronic art can meet, socialise and collaborate.
13FictionThe telling of stories which aren't real.
14Port ScanningSearching network host(s) for open port(s).
15OS fingerprintingProcess of determining the operating system (OS)/server software used by a remote system.
16Remote ScriptingA technology which allows scripts running inside a browser to exchange information with a server.
17ScriptingA programming language that controls a software application.
18DisguiseTo alter the appearance or hide the identity of someone/thing.NULL
19CellphoneAlso called a mobile phone and handphone, is an electronic device used for mobile telecommunications (mobile telephony, text messaging or data transmission) over a cellular network of specialized base stations known as cell sites.
20ForensicsA branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.
21WEPWired Equivalent Privacy is a deprecated algorithm to secure IEEE 802.11 wireless networks.
22Wireless NetworksRefers to any type of computer network that is wireless, typically using radio waves.
23DNSDomain Name System, Internet system to translate names into IP addresses.
24FirewallHardware/software designed to prevent unauthorized electronic access to a networked computer system.
25GoogleAn American public corporation, earning revenue from advertising related to its Internet search, e-mail, online mapping, office productivity, social networking, and video sharing services. They also track people's internet use and blatantly disregard personal privacy!
26800 numberA special telephone number, in that the called party is charged the cost of the calls by the telephone carrier, instead of the calling party.
27CyberspaceThe online world of computer networks and especially the Internet.
28MusicThe art of ordering tones or sounds in succession, in combination, and in temporal relationships to produce a composition having unity and continuity.
29NetworkA group of interconnected computers.
30ISPInternet service provider - a company which offers their customers access to the Internet.
31LinuxA Unix-like computer operating system family which uses the Linux kernel and the GNU system utilities and libraries.
32Social EngineeringThe art of manipulating people into performing actions or divulging confidential information.
33HistoryA record or narrative description of past events.
34Security ToolsComputer programs useful for maintaining/assessing security on computers and networks.
35Mind-BodyThe interrelationship between physical and mental health.
36GraffitiImages or lettering scratched, scrawled, painted or marked in any manner on property.
37Lock PickingThe art of unlocking a lock by analyzing and manipulating the components of the lock device, without the original key.
38HoneypotA trap set to detect or deflect attempts at unauthorized use of information systems.
39Password CrackingThe process of discovering the plaintext of an encrypted computer password.
40JavascriptA scripting language widely used for client-side web development.
41Computer SecurityThe protection of information from theft or corruption, or the preservation of availability.
42VoIPVoice Over Internet Protocol - the transmission technologies for delivery of voice communications over the Internet.
43TelecommunicationsThe assisted transmission of signals over a distance for the purpose of communication.
44PasswordsA secret word or string of characters that is used for authentication, to prove identity or gain access to a resource.
45RFIDRadio-Frequency IDentification - an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.
46BarcodeA bar code is an optical machine-readable representation of data.
47April Fools' DayA day marked by the commission of hoaxes and other practical jokes of varying sophistication on friends, family members, enemies and neighbors.
48PrivacyThe ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.
49ProxyA computer system or an application program that services the requests of its clients by forwarding requests to other servers.
50StackingA gang signal made with the hands.
51AliasAn assumed name (pseudonym).NULL
52SurveillanceMonitoring the behavior of people, objects or processes.
53WikipediaThe free encyclopedia that anyone can edit.
54WarezRefers primarily to copyrighted works traded in violation of copyright law.
55DarknetA private virtual network where users connect only to people they trust.
56Satellite TV/radioTelevision/radio delivered by the means of communications satellites.
57EncryptionThe process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
58Electronic VotingIs a term encompassing several different types of voting, embracing both electronic means of casting a vote and electronic means of counting votes.
59FacebookA popular, free-access social networking website.
60PaypalAn e-commerce business allowing payments and money transfers to be made through the Internet. They are a bunch of crooks whose service sucks!
61DRMDigital rights management - technologies which provide access control for digital media.
62DrugsAny chemical substance that, when absorbed into the body of a living organism, alters normal bodily function.
63IDSIntrusion Detection System - software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network.
64Web FilteringSoftware designed and optimized for controlling what content is permitted to a reader.
65MultibootThe act of installing multiple operating systems on a computer, and being able to choose which one to boot.
66Net NeutralityA network that is free of restrictions on content, sites, or platforms, on the kinds of equipment that may be attached, and on the modes of communication allowed, as well as one where communication is not unreasonably degraded by other communication streams.
67ElectionA decision-making process by which a population chooses an individual to hold formal office.
68craigslistA central network of online communities, featuring free online classified advertisements and forums on various topics.
69AnonymityThe quality or state of being anonymous; anonymousness.
70Dumpster DivingThe practice of sifting through commercial or residential trash to find items that have been discarded by their owners, but which may be useful to the Dumpster diver.
71Quantum computingA device for computation that makes direct use of quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data.
72NewsThe reporting of current information on television and radio, and in newspapers and magazines.
73Business Intelligence(BI) refers to skills, knowledge, technologies, applications, quality, risks, security issues and practices used to help a business to acquire a better understanding of the market behavior and business context.
74Computer ProgrammingThe process of writing, testing, debugging/troubleshooting, and maintaining the source code of computer programs.
75File SharingThe providing and receiving of digital files over a network, usually following the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users.
762600The Hacker Quarterly magazine.
77Bit BucketJargon for where lost computerized data has gone - used here as a miscellaneous category.
78SSHSecure Shell is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
79ObfuscationDeliberately obfuscate code to conceal its purpose, to deter reverse engineering, or as a puzzle or recreational challenge for readers.
80InternetA global system of interconnected computer networks that interchange data by packet switching using the standardized Internet Protocol Suite (TCP/IP).
81Help DeskAn information and assistance resource that troubleshoots problems with computers or similar products.
82iPodA brand of portable media players designed and marketed by Apple Inc.
83Access ControlThe ability to permit or deny the use of a particular resource by a particular entity.
84Application SoftwareAny tool that functions and is operated by means of a computer, with the purpose of supporting or improving the software user's work.
85TLSTansport Layer Security Protocol and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security and data integrity for communications over TCP/IP networks such as the Internet.
86SSLSecure Sockets Layer - see TLS - Transport Layer Security.
87Man-in-the-middleA form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker.
88LawA system of rules, enforced through a set of institutions, used as an instrument to underpin civil obedience, politics, economics and society.
89RFRadio frequency - a frequency or rate of oscillation within the range of about 3 Hz to 300 GHz.
90ATMAutomated teller machine is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller.
91WPAWi-Fi Protected Access is a certification program administered by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks.
92CommunicationThe process to impart information from a sender to a receiver with the use of a medium.
93TechnologyUsage and knowledge of tools and crafts, and how it affects an animal species' ability to control and adapt to its environment.
94HacktivismThe use of computers and computer networks as a means of protest to promote political ends or the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends.
95Identity TheftA term used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits.
96PoliticsThe process by which groups of people make decisions.
97Cross-site Scripting(XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.
99HackerOne who discovers and implements a hack.
100Caller IDA telephone service, available on POTS lines, that transmits a caller's number to the called party's telephone equipment during the ringing signal, or when the call is being set up but before the call is answered.
101Physical SecurityMeasures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media.
102SpywareComputer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
103SteganographyThe art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message, a form of security through obscurity.
104MAC addressMedia Access Control address is a quasi-unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification.
105Remote accessRefers to remote desktop, remote terminal (like telnet) or any type of remote application (including remote browser).
106TCP/IPTransmission Control Protocol (TCP) and/or Internet Protocol (IP), the set of communications protocols used for the Internet and other similar networks.
107AIMAOL Instant Messenger (AIM) is an instant messaging and presence computer program which uses the proprietary OSCAR instant messaging protocol and the TOC protocol to allow registered users to communicate in real time.
108IP phoneUses Voice over IP technologies to allow telephone calls to be made over an IP network.
109WAPWireless Application Protocol is an open international standard for application layer network communications in a wireless communication environment.
110SpamThe abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately.
111Magnetic stripe cardA type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.
112LocksmithingThe science and art of making and defeating locks.
113Copyright infringementThe unauthorized use of material that is covered by copyright law, in a manner that violates one of the copyright owner's exclusive rights.
114Hacker HappeningsConferences or events of interest to hackers.NULL
115Certificate AuthorityA certificate authority or certification authority (CA) is an entity that issues digital certificates for use by other parties.
116RPCRemote procedure call, a network protocol that allows a computer program running on one host to cause code to be executed on another host.
117Video game consoleAn interactive entertainment computer or electronic device that produces a video display signal which can be used with a display device (a television, monitor, etc.) to display a video game.
118DoSDenial-of-service attack is an attempt to make a computer resource unavailable to its intended users.
119BiometricsMethods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.
120Keystroke loggingOften called keylogging, is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
121DHCPDynamic Host Configuration Protocol is a network application protocol used by devices (DHCP clients) to obtain configuration information for operation in an Internet Protocol network.
122TelemarketingA method of direct marketing in which a salesperson solicits to prospective customers to buy products or services over the phone.
123Book ReviewA form of literary criticism in which a book is analyzed based on content, style, and merit.
124AppleTalkA proprietary suite of protocols developed by Apple Inc for networking computers.
125Pirate radioRefers to illegal or unregulated radio transmissions.
126Reconnaissance(also scouting) is a military and medical term denoting exploration conducted to gain information.
127ARPAddress Resolution Protocol (ARP) is the method for finding a host's link layer (hardware) address when only its Internet Layer (IP) or some other Network Layer address is known.
128CybercrimeGenerally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.
129PKIPublic Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates.
130Cryptography(or cryptology) is the practice and study of hiding information.
131Big BrotherGeneral term to describe any overly-inquisitive or overly-controlling authority figure or attempts by government to increase surveillance.
132Hardware specificRefers to a specific piece or pieces of hardware.NULL
133Hacking toolA program/hardware designed to assist with hacking,
134emailElectronic mail is a method of exchanging digital messages using a store-and-forward model in which e-mail computer server systems accept, forward, deliver and store messages on behalf of users.
135Software crackingThe modification of software to remove protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware.
136MischiefA vexatious or annoying action, or, conduct or activity that playfully causes petty annoyance.
137Software specificRefers to a specific version or versions of software.NULL
138UNIXA computer operating system originally developed in 1969 by AT&T at Bell Labs. Today's Unix systems are split into various branches, developed over time by AT&T as well as various commercial vendors and non-profit organizations.
139Movie ReviewThe analysis and evaluation of films.
140War DialingA technique of using a modem to automatically scan a list of telephone numbers for computers, BBS systems and fax machines.
141BBSA Bulletin Board System is a computer system running software that allows users to connect and log in to the system using a terminal program. Once logged in, a user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users, either through electronic mail or in public message boards.
142InterviewA conversation between two or more people (the interviewer and the interviewee) where questions are asked by the interviewer to obtain information from the interviewee.
143Operating SystemAn interface between hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of a computer, that acts as a host for computing applications run on the machine.
144RootkitA software system that consists of one or more programs designed to obscure the fact that a system has been compromised.
145Point of Sale(POS) the hardware and software used for checkouts, the equivalent of an electronic cash register.
146Computer WormA self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network).
147ARPANETAdvanced Research Projects Agency Network, created by the Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense, was the world's first operational packet switching network, and the predecessor of the contemporary global Internet.
148BluetoothA proprietary open wireless technology standard for exchanging data over short distances.
149PhishingThe criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
150IPv6A version of the Internet Protocol that is designed to succeed Internet Protocol version 4 (IPv4) because it has a vastly larger address space.
151RoboticsThe engineering science and technology of robots, and their design, manufacture, application, and structural disposition.
152GeolocationThe identification of the real-world geographic location of an object, such as a radar, mobile phone or an Internet-connected computer terminal.
153E-BookAn electronic book is a text and image-based publication in digital form produced on, published by, and readable on computers or other digital devices.
154Electronic MoneyAlso known as e-currency, e-money, electronic cash, electronic currency, digital money, digital cash, digital currency, cyber currency - refers to money or scrip which is only exchanged electronically.
155Hardware HackingIncludes building, rebuilding, modifying (modding), and creating electronic hardware, either to make it better, faster, to give it added features or to make it do something it was never intended to do.
156CyberwarPolitically motivated hacking to conduct sabotage and espionage, a form of information warfare.
157Home AutomationCentralized control of lighting, HVAC, appliances, and other systems, to provide improved convenience, comfort, energy efficiency and security.
158VirtualizationVirtualization (or virtualisation) is the simulation of the software and/or hardware upon which other software runs.
159Web Crawler (spider)
160VPNVirtual Private Network
161TwitterAn online social networking service and microblogging service that enables its users to send and read text-based messages of up to 140 characters, known as 'tweets'.
162Raspberry PiA credit-card-sized single-board computer developed in the UK by the Raspberry Pi Foundation with the intention of promoting the teaching of basic computer science in schools.
163BitcoinA cryptocurrency where the creation and transfer of bitcoins is based on an open-source cryptographic protocol that is independent of any central authority.
164Cloud computingColloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet
165PivotingUse of a compromised system to attack other systems.
166AndroidAn operating system based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which was purchased by Google.
167WardrivingWardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).
168HTML5HTML5 is a core technology markup language of the Internet used for structuring and presenting content for the World Wide Web.
169MalwareMalware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems
170WARCWeb ARChive format
171MeshnetA mesh network is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.
172Internet LeakAn Internet leak occurs when a party's confidential information is released to the public on the Internet.
173Historical DocumentHistorical documents are original documents that contain important historical information about a person, place, or event.
174Communications satelliteA communications satellite is an artificial satellite that relays and amplifies radio telecommunications signals via a transponder.
175Two-factor authentication.A method of confirming a user's claimed identity by utilizing a combination of two different components (also known as 2FA).
176I2PThe Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer to peer communication.
177BotnetA number of Internet-connected devices, each of which is running one or more bots.
178WhistleblowerA person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public.