Terms related to Hacking
v The creation
of Internet Protocol (IP) packets with a forged source IP address, with the
purpose of concealing the identity of the sender or impersonating another
computing system is called Spoofing.
v The fraudulent practice of
sending emails purporting to be from reputable companies in order to induce
individuals to reveal personal information, such as passwords and credit card
numbers is called Phishing.
v A malware
program that can be used by a black hat cracker to remotely take control of a
system for further attacks like spam emails or Denial of Service attacks,
without a user’s knowledge is called Zombie.
v
A type of
phishing attack where mobile phone users receive text messages containing a Web
site hyper link is called Smishing.
v
The act of
using the telephone in an attempt to scam the user into surrendering private
information that will be used for identity theft. This is known as Vishing.
v A hacker
installs malicious code on a personal computer or server. This code then
redirects clicks you make on a Web site to another fraudulent Web site without
your consent or knowledge. It is known as Pharming.
----------------
उत्तर प्रदेश में आने वाली समस्त सरकारी नौकरियों से सम्बन्धित हर जानकारी को अपने मोबाइल पर पाने के लिए हमारी आधिकारिक एप डाउनलोड करें -
Post a Comment