Browse TRU - ZOL
-
- trusted computing - Trusted computing is a broad term that refe...
- trusted computing base - The trusted computing base (TCB) ...
- trusted computing base (TCB) - The trusted computing...
- trusted platform module - A trusted platform module (TPM)...
- trusted platform module (TPM) - A trusted platform ...
- tunnel - Tunneling is the transmission of data intended for use only withi...
- tunneling or port forwarding - Tunneling is the tran...
- Turtle Firewall - Turtle Firewall is an open source firewall prog...
- two-factor authentication - Two-factor authentication i...
- two-way authentication - Mutual authentication, also calle...
- Twofish - Twofish is an encryption algorithm based on an earlier algorith...
- type I error - False rejection, also called a type I error, is a mis...
- type II error - False acceptance, also called a type II error, is a...
- typeprint analysis - Typeprint analysis is a technology in whi...
- unified threat management - Unified threat management (...
- unified threat management (UTM) - Unified threat ...
- URL poisoning - URL poisoning, also known as location poisoning, is...
- URL poisoning (location poisoning) - URL poiso...
- user profile - In a Windows environment, a user profile is a record ...
- user-interface redressing - Clickjacking (also known as...
- UTM - Unified threat management (UTM) refers to a comprehensive security prod...
- validity period - A cryptoperiod (sometimes called a key lifetime...
- vam - SPIT (spam over Internet telephony), sometimes known as vam (voice or V...
- van Eck phreaking - Van Eck phreaking is a form of eavesdroppin...
- VBS.SST - The Anna Kournikova VBS.SST computer virus, informally known as...
- virtual honeynet - A honeynet is a network set up with intention...
- virtual local area network�hopping - VLAN hopp...
- virtual machine escape - What is virtual machine escape?Vi...
- virtual patching - Virtual patching is the quick development and...
- virus - In computers, a virus is a program or programming code that replica...
- virus hoax - A virus hoax is a false warning about a computer virus.
- vishing - Vishing is an electronic fraud tactic in which individuals are ...
- vishing (voice or VoIP phishing) - Vishing is an...
- VLAN hopping - VLAN hopping (virtual local area network hopping) is ...
- VLAN hopping (virtual local area network hopping)
- voice logger - A voice logger is a device or program used to record ...
- Voice over IP Security Alliance - VOIPSA (Voice o...
- Voice Over Misconfigured Internet Telephones
- voice phishing - Vishing is an electronic fraud tactic in which in...
- voice spam - SPIT (spam over Internet telephony), sometimes known as v...
- voiceprint - A voiceprint is a set of measurable characteristics of a ...
- VoIP phishing - Vishing is an electronic fraud tactic in which indi...
- VoIP security threats - As VoIP becomes increasingly preval...
- VoIP spam - SPIT (spam over Internet telephony), sometimes known as vam...
- VOIPSA - VOIPSA (Voice over IP Security Alliance) is a cross-industry coal...
- VOIPSA (Voice over IP Security Alliance)
- voluntary botnet - A voluntary botnet is a distributed network o...
- vomit - Vomit (spelled all lower-case) is a Unix software utility that take...
- vulnerability analysis - Vulnerability analysis, also know...
- vulnerability analysis (vulnerability assessment)
- vulnerability assessment - Vulnerability analysis, also ...
- vulnerability disclosure - Vulnerability disclosure is t...
- vulnerability scanner - A vulnerability scanner is a progra...
- W32 Duqu - Duqu is a remote access Trojan (RAT) that is designed to stea...
- W32.Duqu - Duqu is a remote access Trojan (RAT) that is designed to stea...
- W32.Kriz - Discovered in the fall of 1999, the Kriz virus (known more fo...
- W32.Kriz virus - Discovered in the fall of 1999, the Kriz virus (k...
- W32.Kriz.dr - Discovered in the fall of 1999, the Kriz virus (known m...
- WAFS - Wide-area file services (WAFS) is a storage technology that makes it ...
- war dialer - A war dialer is a computer program used to identify the p...
- war dialing - A war dialer is a computer program used to identify the...
- war driving - War driving, also called access point mapping, is the a...
- war driving (access point mapping) - War drivi...
- wardriving - War driving, also called access point mapping, is the act...
- watermark - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek...
- weak password - A strong password is one that is designed to be har...
- WEP - Wired Equivalent Privacy (WEP) is a security protocol, specified in the...
- What is spyware? - In general, spyware is any technology that ai...
- white hat - White hat describes a hacker (or, if you prefer, cracker) w...
- Wi Fi - Wi-Fi is the popular term for a high-frequency wireless local area ...
- Wi Fi Protected Access - Wi-Fi Protected Access (WPA) is t...
- Wi-Fi - Wi-Fi is the popular term for a high-frequency wireless local area ...
- Wi-Fi (wireless fidelity) - Wi-Fi is the popular term f...
- Wi-Fi Protected Access - Wi-Fi Protected Access (WPA) is t...
- Wi-Fi Protected Access (WPA) - Wi-Fi Protected Acces...
- wide area file services - Wide-area file services (WAFS) ...
- wide-area file services - Wide-area file services (WAFS) ...
- wide-area file services (WAFS) - Wide-area file se...
- Wiegand - Wiegand is the trade name for a technology used in card readers...
- WiFi - Wi-Fi is the popular term for a high-frequency wireless local area ne...
- Wingate - Wingate is a product that allows people on a small home network...
- winnowing - Chaffing and winnowing are dual components of a privacy-enh...
- WinNuke - A "blue bomb" (also known as "WinNuke") is a technique for caus...
- wipe - Wipe, in a computing context, means to erase all data on a hard drive...
- Wired Equivalent Privacy - Wired Equivalent Privacy (WEP...
- Wired Equivalent Privacy (WEP) - Wired Equivalent ...
- wireless fidelity - Wi-Fi is the popular term for a high-freque...
- Wireless Transport Layer Security - Wireless Tr...
- Wireless Transport Layer Security (WTLS)
- wiretap Trojan - A wiretap Trojan is a program that surreptitiousl...
- wolf - In biometric verification, a goat is a system end-user who is refused...
- worm - In a computer, a worm is a self-replicating virus that does not alter...
- WPA - Wi-Fi Protected Access (WPA) is the latest security standard for users ...
- WTLS - Wireless Transport Layer Security (WTLS) is the security level for Wi...
- X-ray body scanning - Backscatter body scanning is an X-ray-b...
- XTACACS - TACACS (Terminal Access Controller Access Control System) is an...
- Zbot - Zeus, also known as Zbot, is a malware toolkit that allows a cybercri...
- zero day - A zero-day exploit is one that takes advantage of a security ...
- zero-day exploit - A zero-day exploit is one that takes advantag...
- Zeus Trojan - Zeus, also known as Zbot, is a malware toolkit that all...
- Zeus Trojan (Zbot) - Zeus, also known as Zbot, is a malware to...