Hello this Axeman aka Lucifer Today we are going to see and learn about Hacker's Dictionary.

 

1. Autonomous Systems (AS)

     1.1. A collection of routers under a single administrative authority, using aa common interior Gateway Protocol for routing packets.

 

2.Botnets

    2.1.A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-services attack (DDoS), steal data, send spam, and allows the attacker to access the device and its connection.


3.Domain Name.

      3.1. A series of alphanumeric strings separated by periods (.) that is used to name organizations and computers and addresses on the internet.

 

4.Domain Name System.

      4.1. A general-purpose distributed, replicated, data query service chiefly used on internet for translating hostnames into internet addresses.

 

5.Firewall.

     5.1. A router or computer software that prevents unauthorized access to private data (as on a company's local area network or internet) By outside  computer users (as of the internet).

 

6.Hypertext Transfer Protocol (HTTPS). 

      6.1. A protocol used to request and transmit files, especially webpages and webpage components, over the internet or other computer network.

 

7.Internet Control Message Protocol (ICMP).

      7.1. One of the Internet protocols that allows for the generation of error messages, test packets, and informational messages related to IP.

 

8.Internet Protocol. 

      8.1. A connection less, best-effort packets switching protocol that provides packet routing , fragmentation and re-assembly through the data link layer.

 

9.Internet Service Provider (ISP). 

      9.1. A company that provides other companies or individuals with access to, or presence on, the internet.

 

10.Listening Port. 

      10.1. A center for monitoring electronic communications (as of an enemy).

 

11.Plaintext. 

      11.1 The unencrypted form of an encrypted message.

 

12.Private Network.

       12.1. A network composed of point-to-point leased lines between sites.

 

13.Router. 

       13.1. A device that forwards packets between networks based on network layer information and routing tables, which often constructed by routing protocols.

 

14.Social-Engineering. 

       14.1. Its an art of human-hacking. A type of confidence trick for the purpose of information gathering, fraud, or system access.

 

15.Virtual Resource Network (VPN). 

       15.1.  A network composed of several sub private networks connected through a public network (as of the internet).

       15.2. The network traffic is encrypted in the IP layer so that resource connections among the sub private networks are provided through the insecure public network.

 

 

                                        WARNING -- ONLY FOR EDUCATIONAL PURPOSE. 

                                         YOU ARE SOLE RESPONSIBLE FOR YOUR ACTIONS.

Please follow me on instagram -- INSTAGRAM      <------ Follow this link