n
(computer science) an object that describes the security context of a process or thread, such as the user's identity and privileges.
n
(computing) segmentation fault
n
(cryptography, physics) The person or system that sends a message to another person or system conventionally known as Bob.
adj
(computing) Working to combat or defend against bots, especially malicious or disruptive ones.
adj
Serving to counteract bugs (surveillance devices).
adj
(computer security) Designed or intended to combat or eliminate malware on a computer system.
n
(computing theory) A message in a distributed system whose purpose is to cancel out another specific message sent previously.
adj
(computer security) Preventing replay attacks.
adj
(computer security) Designed or intended to combat or eliminate spyware on a computer system
n
(computing) The programmed retrieval of words from a document for use in building an index
n
(cryptocurrencies) A place where private keys are stored away from the Internet to prevent them from being stolen.
adj
Having or supporting connections, especially when through technology such as networking software or a transportation network.
n
A software or hardware mechanism designed to prevent copying.
n
A software license that follows this philosophy.
v
(Internet slang, uncommon) To copy and paste data from one website to another, usually text.
n
(computing, networking) login data
n
(computing) An act of crossposting.
n
(web development, computer security) A secret value added to a web form by the server and sent back by the user as part of a POST request, used to prevent cross-site request forgeries by making sure that the user sending the POST request has actually loaded the form.
n
(computing) A method for creating passwords and similar cryptographic variables using ordinary dice to generate random numbers which are then mapped to words in a list.
v
(computing) To change the contents of a file, website, etc.
n
(computing theory) A performance-degrading usage pattern where the size of units in a cache means that the system may reload entire units even when it is not necessary.
n
Synonym of autocomplete (when used to search for something)
n
Alternative form of find as you type [Synonym of autocomplete (when used to search for something)]
n
(computing) The disclosure of all security flaws in a product.
n
A release of software which is good enough to be made available outside the originating company, to the general public.
n
(computing) A feature of a system or a program that works in the way it is documented but is counter-intuitive and almost invites mistake or non-function.
n
(computing) A program or algorithm that randomly adds characters to data in order to change its hash sum, typically to get around spam filters.
v
(transitive, Internet) To supply (somebody) with a hyperlink; to direct by means of a link.
n
Something that is linked to; the target of a link.
v
(computing) To gain access to a computer system, usually by providing a previously agreed upon username and password.
v
To visit a Web site; construed with to.
n
The collaborative design of things, especially of open source software, through use of publicly shared design information.
n
(espionage) Information that is in the public domain and available to everybody.
n
(informal, computing) A programmer who works only on open source programs.
adj
(espionage) Relying on publicly available information (open sources).
n
(computing) A person who overclocks a computer.
v
(Internet) To use too many hyperlinks.
adj
Protected by a passcode.
n
Leet spelling of password. [A word used to gain admittance or to gain access to information; watchword.]
n
A word used to gain admittance or to gain access to information; watchword.
n
(computing) A technique employed to protect passwords stored in a database by attaching a string of 32 or more characters and then hashing them.
adj
Resembling or characteristic of a password.
n
(marketing) A marketing strategy in which a maker of computer software or hardware repeatedly launches early versions of new products as a product development feedback method.
n
(web development) A philosophy where a website's functionality is enhanced by JavaScript, rather than wholly reliant on JavaScript.
n
(cryptography, cryptocurrencies) A form of cryptographic zero-knowledge proof.
n
(computing) An instance of a security token associated with a resource (such as a file).
n
(computing) Abbreviation of password. [A word used to gain admittance or to gain access to information; watchword.]
n
(computing) Short for password. [A word used to gain admittance or to gain access to information; watchword.]
n
(computing) The word or phrase that a user searches for, e.g. in a search engine.
n
(security, computing) Relying on a secure design to defend against attacks.
n
(computer security) An entity capable of being authenticated by a computer system or network.
n
A list of words which store all the information needed to recover a cryptocurrency wallet.
n
(computing, cryptography) The use of self-signed security certificates.
n
(computing) Alternative form of soft link [(computing) Synonym of symbolic link]
adv
(computing, slang, humorous, rare) In terms of software.
adj
(software) Whose source code can be viewed, and in some cases modified, but which itself is not open-source.
n
(informal, computing) A programmer, a coder, someone who works with source code.
n
(computing) A program and protocol for securely logging in to and running programs on remote machines across a network, with encryption to protect the transferred information and authentication to ensure that the remote machine is the one desired.
n
A form of copyleft where all derived works inherit the copyleft licence.
n
(computing, copyright law) The creation of a system that incorporates software under the terms of a copyleft software license, but uses hardware to prevent users from running modified versions of the software on that hardware.
v
(computing, transitive) (of a hardware system) To use software under the terms of a copyleft software license, but at the same time to impose a hardware limitations to prevent users from running the modified versions of this software on that hardware, which should be allowed under the terms of the same license.
n
(Internet, on imageboards) The hash code of a password, used for signing posts anonymously.
n
(computing, rare) A combination of username and password.
n
(software) a method of database searching that produces an instantly refreshed list of results as the user enters each character of the term.
n
(computing) software that monitors text input to chatrooms etc, deleting or modifying offensive language
n
(computing) A piece of software that has the same function as another.
Note: Concept clusters like the one above are an experimental OneLook
feature. We've grouped words and phrases into thousands of clusters
based on a statistical analysis of how they are used in writing. Some
of the words and concepts may be vulgar or offensive. The names of the
clusters were written automatically and may not precisely describe
every word within the cluster; furthermore, the clusters may be
missing some entries that you'd normally associate with their
names. Click on a word to look it up on OneLook.
Our daily word games Threepeat and Compound Your Joy are going strong. Bookmark and enjoy!
Today's secret word is 10 letters and means "Practical approaches prioritizing results, efficiency." Can you find it?