n
(computing) A bot (automated software agent) that displays advertisements.
n
(Internet slang, uncommon) An Internet meme involving novice users being tricked into closing applications.
n
(computing) software that disrupts the activity of viruses etc. that try to block the activity of a computer.
n
(Internet) An activist who fights spam (unsolicited commercial e-mail).
adj
(computer security) Countering spoofing.
n
A Usenet control message, generated automatically, that cancels a previously posted message.
n
(Internet, computer security) A malicious hacker who controls a botnet.
n
(Internet, computer security) A malicious hacker who controls a botnet.
n
(Internet) One who operates a bot (automated software process).
n
(Internet) An account or server (as with IRC and FTP) that invisibly redirects requests to another, used for anonymity or vanity.
n
(computer security, Internet) The process of hacking (or attempting to hack) a webcam for illegal purposes, such as voyeurism.
n
(computer security) A breach of a computer or network's rules such that an unauthorized disclosure or loss of sensitive information may have occurred, or the unauthorized disclosure or loss itself.
v
(transitive, intransitive, Internet slang) To flood a user's screen, mailbox, etc. with large amounts of worthless text.
n
A computer program that performs cryptomining, especially one installed as malware.
n
(computing, Internet) A data kidnapping attack studied in the field of cryptovirology, in which malware encrypts user data and asks for payment in exchange for the decryption key.
n
A breach in the security of a computer system.
n
Any worthless material supplied by or relating to computers.
n
(dated) A computer hacker; one who breaks into computer systems.
n
computer hacking; the act of breaking into computer systems
n
Breaking into a computer system, especially by means of a network.
n
A person who breaks into a computer system without permission, especially remotely by means of a network connection.
n
The act of breaking into a computer system without permission, especially remotely by means of a network connection.
n
(rare, informal) Worthless material on the Internet.
n
Sabotage of computer systems; destructive hacking.
n
(law) An action of connecting to a private computer system without permission.
n
(law) Vandalism carried out by means of computer technology, as for example the defacement of a website.
n
Computer hardware or software used as a weapon in cyberwarfare.
n
sabotage of computer systems or networks
n
(rare) One who sabotages computer systems or networks.
n
(Internet security) Alternative spelling of DDOS [(Internet) A distributed denial-of-service attack, one that originates from many different (geographically and network topographically) sources, on a network of networks such as the Internet.]
n
(Internet) A denial-of-service attack.
n
(Internet) A person or bot that carries out a dictionary attack
n
A malicious software program used in cyberwarfare.
n
(Internet) The (often repeated) cancellation and reregistration of a domain name so as to exploit the grace period to display advertisements on the domain while not paying for it.
n
Someone who downloads files from the Internet.
v
(Internet, transitive, US) To subject a website to a high volume of requests, such that the server stops responding.
n
(computing, slang, derogatory) An undesirable or misimplemented feature (software capability).
n
A person who engages in filesharing
n
(computer security) The software that monitors traffic in and out of a private network or a personal computer and allows or blocks such traffic depending on its perceived threat.
n
(Internet) The practice of promoting a political agenda by hacking, especially by defacing or disabling websites.
n
Alternative form of hacktivism [(Internet) The practice of promoting a political agenda by hacking, especially by defacing or disabling websites.]
v
(Internet) To read someone's message or messages and not give any response, particularly on an instant messaging application where a user can see whether or not their interlocutor has read their message.
n
(Internet, file sharing) One who downloads a torrent.
n
(Internet, neologism) The malicious practice of tricking users of a social networking website into "liking" something they did not intend to like.
n
(Internet slang, derogatory) spam posted by or on behalf of a mainstream organization
n
(computing) Internet advertising whose real intention is to deliver malware to the viewer's computer.
n
(Internet) A person who enforces the rules of a discussion forum by deleting posts, banning users, etc.
n
(Internet marketing) A measure used by marketers as an indication of how many people "view" or "open" the electronic mail they send out.
v
(transitive, Internet) To send a private message to (a user on IRC).
n
(Internet) The transmission of a user's search terms from a search engine to the site in the search results that the user chooses to visit; regarded as a privacy risk.
n
Identity theft committed through a malicious link contained within a text message.
v
(transitive, intransitive, computing, Internet) To post the same text repeatedly with disruptive effect; to flood.
n
(SEO) The inclusion of deliberately misleading terms on a website in order to manipulate its ranking in a search engine.
n
(computing, Internet) Someone who sends spam.
n
(slang, derogatory) One who sends spam; a spammer.
n
(Internet, slang) One who spamvertises.
n
The practice of sending spam email, or of posting similar material on a wiki, blog or notice board, in order to attract search engines to a site.
n
(Internet) A type of unsolicited e-mail (spam) that specifically advertises a product.
n
(Internet) Phishing against a small group of selected targets who are more likely to be attracted.
n
One who sends spim (unsolicited instant messages).
n
(Internet) Abbreviation of spam over Internet telephony.
n
(Internet) A fake blog, usually reusing content from other sources in order to generate link spam.
n
(informal, marketing) Advertisements, particularly in social media, misleadingly styled or presented similarly to non-advertising content such as editorials or magazine articles.
n
(Internet) The disruptive act of posting a flood of articles to a newsgroup, the article headers having been falsified so as to make the articles appear to have been posted by people other than the true poster.
n
(computing, informal) Synonym of creepware
v
(Internet) To carry out an attack of this kind.
n
(Internet) The act of taking over an e-mail list or discussion thread with a subject unrelated to the original posting.
n
(computer security) An entity that is responsible for a cyberattack.
n
(Internet) a type of software which spreads misinformation
v
(Internet) To send a message to all operators on an Internet Relay Chat server.
Note: Concept clusters like the one above are an experimental OneLook
feature. We've grouped words and phrases into thousands of clusters
based on a statistical analysis of how they are used in writing. Some
of the words and concepts may be vulgar or offensive. The names of the
clusters were written automatically and may not precisely describe
every word within the cluster; furthermore, the clusters may be
missing some entries that you'd normally associate with their
names. Click on a word to look it up on OneLook.
Our daily word games Threepeat and Compound Your Joy are going strong. Bookmark and enjoy!
Today's secret word is 10 letters and means "Practical approaches prioritizing results, efficiency." Can you find it?