n
(computing) Alternative spelling of zero-day. [(computing, idiomatic) vulnerability that has been discovered recently, and is yet unpatched or unmitigated; zero-day vulnerability]
n
(computing, slang) A bot within an IRC channel that sends annoying messages to online participants.
n
One who is opposed to hacking (any sense).
n
One who is employed to detect and counter computer hackers.
n
(computer security) A secret means of access to a program or system.
n
(marketing) Synonym of bait and switch
n
(computing, slang) A malicious hacker, one who violates computer security out of maliciousness or for personal gain.
n
(computing) Synonym of black hat
n
Alternative form of botherder [(Internet, computer security) A malicious hacker who controls a botnet.]
n
(computer security) The event when the amount of data sought to be added to a buffer exceeds the size of the buffer; generally resulting in a catastrophic error if this case has not been anticipated.
n
(computer security) Synonym of buffer overflow
n
(music, slang) A hip-hop jam session.
v
(transitive, computing, Internet) To commit a denial-of-service attack against.
n
(by extension, Internet, video games) An action or technique that takes advantage of the conditions of a video game to gain an advantage, or to disadvantage others.
n
(Internet slang) A term used to describe when a user is banned or blocked from accessing their Facebook account, or from posting there.
n
(computing) A technique for testing a computer system by subjecting it to unusual stresses, such as high voltage or temperature, or the deliberate mutation of software code.
n
(Internet) A person whose web pages are misleadingly embedded in another person's site by means of HTML frames.
n
(computing) A sequence of machine code instructions crafted as part of an exploit that attempts to divert execution to a memory location chosen by the attacker.
n
(dated, computing, slang) A hacker on early minicomputers
adj
(computing) That can be hacked or broken into; insecure, vulnerable.
n
(computing) A bot (automated user) designed to hack into a system.
n
(telecommunications) A person who attempts to gain unauthorized access, esp. remotely, to a computer system or network (= computer hacker), or (in earliest use) a telephone network. Later also: a person who gains unauthorized access to another's telephone communications or data; = phone hacker.
n
(computing) Unauthorized attempts to bypass the security mechanisms of an information system or network. See also cracker.
adj
Like a hack; amateurish.
adv
(computing, slang, humorous, rare) In terms of hardware.
v
(computing) To seize control of a networked computer by means of infecting it with a worm or other malware, thereby turning it into a zombie.
n
(computing) A modification to the firmware of an electronic device (typically a mobile phone or tablet) to allow the installation and use of software not officially supported by the device's manufacturer.
n
(computing) Any method of inducing physical harm to a computer or peripheral by software means, especially by inserting invalid values into a control register or by building up harmonic oscillations in a hard disk, etc.
n
(computer security) An executable that is deployed as part of a system but may be co-opted by an attacker to perform harmful actions.
n
(computing) Someone who performs a pentest (a penetration test)
n
(computing, informal) The act of conducting a pen test.
n
The act of intercepting and listening in on telephone calls or voicemail messages without the consent of the parties who are speaking.
n
A hacker or cracker specialized with telephone systems rather than computers.
n
(computer security) The use of an exploit to gain elevated access to resources that are normally protected from an application or user.
n
(computing) Deceitful software pretending to be anti-spyware, but in fact being malicious software itself.
n
(informal, derogatory) A (usually amateur) hacker who compromises files on others' computers or launches attacks on computer systems, using widely distributed computer programs or scripts rather than developing their own.
n
Alternative spelling of script kiddie [(informal, derogatory) A (usually amateur) hacker who compromises files on others' computers or launches attacks on computer systems, using widely distributed computer programs or scripts rather than developing their own.]
n
(computer security) A function that may contain tainted values.
v
(computing, transitive) To carry out a smurf attack against someone.
n
The unofficial use of software to modify the intended behaviour of hardware.
n
(informal, computing) exploit (program or technique that exploits a vulnerability in other software)
n
(computing) A secret method of obtaining access to a program or online system; a backdoor.
n
(computing, informal) A vulnerability (weakness in software etc. that can be maliciously exploited).
n
A communication problem where a person seeking help (for example, from a computing helpdesk) provides misleadingly incomplete information about the source of the problem and thus receives inaccurate or unhelpful suggestions about how to fix it.
adj
(computing, idiomatic) (of exploit, its threat, or attack) benefiting from newly found and yet unpatched or unmitigated flaw in software or hardware; using zero-day vulnerability
Note: Concept clusters like the one above are an experimental OneLook
feature. We've grouped words and phrases into thousands of clusters
based on a statistical analysis of how they are used in writing. Some
of the words and concepts may be vulgar or offensive. The names of the
clusters were written automatically and may not precisely describe
every word within the cluster; furthermore, the clusters may be
missing some entries that you'd normally associate with their
names. Click on a word to look it up on OneLook.
Our daily word games Threepeat and Compound Your Joy are going strong. Bookmark and enjoy!
Today's secret word is 6 letters and means "Not working as originally intended." Can you find it?