Browse PAS - RAS
-
- pass phrase - A passphrase is a string of characters longer than the ...
- passive FTP - Passive FTP (sometimes referred to as PASV FTP because ...
- passive reconnaissance - Passive reconnaissance is an atte...
- passphrase - A passphrase is a string of characters longer than the us...
- password - A password is an unspaced sequence of characters used to dete...
- password chaos - Identity chaos (sometimes called password chaos) ...
- password cracker - A password cracker is an application program ...
- password cracking - A password cracker is an application progra...
- password synchronization - Password synchronization is a...
- pastebin - A pastebin is a Web application that allows users to upload a...
- PASV FTP - Passive FTP (sometimes referred to as PASV FTP because it inv...
- Payment Card Industry Data Security Standard
- PCI DSS - The Payment Card Industry Data Security Standard (PCI DSS) is a...
- PCI DSS (Payment Card Industry Data Security St...
- PCI-CISP - CISP (Cardholder Information Security Program) and PCI (Payme...
- PE_KRIZ - Discovered in the fall of 1999, the Kriz virus (known more form...
- PEAP - PEAP (Protected Extensible Authentication Protocol) is a version of E...
- PEAP (Protected Extensible Authentication Proto...
- pen test - Penetration testing (also called pen testing) is a tool for t...
- pen test (penetration testing) - Penetration testi...
- penetration testing - Penetration testing (also called pen te...
- perimeter - A network perimeter is the boundary between the private and...
- Personal Data Privacy - Consumer privacy, also known as cus...
- personal firewall - A personal firewall (sometimes called a des...
- personal firewall (desktop firewall) - A per...
- PGP - Pretty Good Privacy (PGP) is a popular program used to encrypt and decr...
- pharming - Pharming is a scamming practice in which malicious code is in...
- Phishing season (quiz) - Ah, the festive season! Carolers ...
- phlashing - Phlashing is a permanent denial of service (PDoS) attack th...
- phreak - A phreak is someone who breaks into the telephone network illegal...
- phreaking - A phreak is someone who breaks into the telephone network i...
- PIN lock - The PIN lock is an authentication measure for mobile phones t...
- ping of death - On the Internet, ping of death is a denial of servi...
- ping sweep - A ping sweep (also known as an ICMP sweep) is a basic net...
- ping sweep (ICMP sweep) - A ping sweep (also known as an ...
- piracy - Software piracy is the illegal copying, distribution, or use of s...
- pirate - Software piracy is the illegal copying, distribution, or use of s...
- pirating - Software piracy is the illegal copying, distribution, or use ...
- PKCS - The Public-Key Cryptography Standards (PKCS) are a set of intervendor...
- PKI - A PKI (public key infrastructure) enables users of a basically unsecure...
- PKI (public key infrastructure) - A PKI (public k...
- plaintext - In cryptography, plaintext is ordinary readable text before...
- Podcast: What is a zero-day exploit? - In th...
- Point to Point Tunneling Protocol - Point-to-Po...
- Point-to-Point Tunneling Protocol - Point-to-Po...
- Point-to-Point Tunneling Protocol (PPTP)
- policy server - A policy server is a security component of a policy...
- policy-based management - Policy-based management is an a...
- POLP - The principle of least privilege (POLP) is the practice of limiting a...
- polynomial versus nondeterministic polynomial
- port forwarding - Tunneling is the transmission of data intended ...
- port knocking - Port knocking is an authentication method used by n...
- port mirroring - Port mirroring, also known as a roving analysis p...
- port mirroring (roving analysis port) - Por...
- port scan - A port scan is a series of messages sent by someone attempt...
- potentially unwanted program - A PUP (potentially un...
- PPTP - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of commun...
- presence awareness - Presence technology is a type of applicat...
- presence technology - Presence technology is a type of applic...
- pretexting - Pretexting is a form of social engineering in which one i...
- Pretty Good Privacy - Pretty Good Privacy (PGP) is a popular ...
- Pretty Good Privacy (PGP) - Pretty Good Privacy (PGP) i...
- principle of least privilege - The principle of leas...
- principle of least privilege (POLP) - The pri...
- privacy - On the Internet, privacy, a major concern of users, can be divi...
- private cloud - Private cloud (also called internal cloud) is a mar...
- private cloud (internal cloud or corporate cloud)
- private key - In cryptography, a private or secret key is an encrypti...
- private key (secret key) - In cryptography, a private or...
- privilege - In the administration of a multi-user computer system, a pr...
- privilege bracketing - Privilege bracketing is the practice ...
- privilege escalation attack - A privilege escalation ...
- privileges - In the administration of a multi-user computer system, a ...
- profile - In a Windows environment, a user profile is a record of user-sp...
- promiscuous mode - In a network, promiscuous mode allows a netwo...
- Protected Extensible Authentication Protocol
- proxy hacking - Proxy hacking, also known as proxy hijacking, is an...
- pseudonymous profile - A pseudonymous profile is a collectio...
- public key - In cryptography, a public key is a value provided by some...
- public key certificate - A public key certificate is a dig...
- public key cryptography - Asymmetric cryptography is cryp...
- Public Key Cryptography Standards - The Public-...
- public key infrastructure - A PKI (public key infrastru...
- public-key cryptography - Asymmetric cryptography is cryp...
- Public-Key Cryptography Standards - The Public-...
- Public-Key Cryptography Standards (PKCS)
- pulsing zombie - A pulsing zombie is a computer whose security has...
- PUP - A PUP (potentially unwanted program) is a program that may be unwanted,...
- PUP (potentially unwanted program) - A PUP (po...
- Pwn2Own - Pwn2Own is an annual hacking competition sponsored by security ...
- Quiz: Authentication Methods - There are quite a few...
- Quiz: Conficker worm - Test yourself. A WhatIs.com tech voca...
- Quiz: Cryptography - OK, boys and girls! Do you have your secr...
- Quiz: Security Attacks - Test yourself. A WhatIs.com tech ...
- Quiz: Security Awareness for End Users
- Quiz: Security Basics - Test yourself. A WhatIs.com tech vo...
- RACF - RACF (Resource Access Control Facility) is the IBM security managemen...
- RADIUS - Remote Authentication Dial-In User Service (RADIUS) is a client/s...
- RADIUS (Remote Authentication Dial-In User Serv...