Here at zyentis.blogspot.com many of my posts I have to define lots of terms so I decided to created an index of all the Tech Definitions I post for reference.

CSC (card security code): Though many companies provide different security procedures, they all work in a similar way of multiple codes associated with one card. For example a visa gift card will have a unique identifier code followed by a CVC/CSC and the expiry date and upon attempting to purchase something all this information is required.



FPGA (field-programmable gate array): by definition a FPGA is a series of processers wired up in sync via a main gate chip that is programmable by the customer.

FPGA PCI Card: an array of processers on a PCI-E card that runs independently from other hardware similar in many ways to graphics card.

VPN(Virtual Private Network): is an Extension of The host network connect over the internet to simulate being the host local group allowing the user to excess locally networked file more commonly to excess the internet through the hosts network.

SEO (Search Engine Optimization): SEO refers to techniques used to get a higher ranking in search engines usually involving placement of keywords.

Black hat SEO: techniques that take advantage of search engine ranking algorithms to give you a higher rank than you deserve.

Aggressive SEO Content: Most commonly by over using keywords in side content to the point it is unreadable by a human too fool search engines bots that this page is filled with valuable content.
Firmware: The original definition being a file usually the operating system of a device stored on read only memory and could not be changed but, in the last couple years the firmware of devices have started to be storage that was writable so updates could be performed.

Custom Firmware(Jailbreak): Because the firmware in newer devices is stored on writable storage it is possible to reprogram or change the operating system to do something that the manufacturer did not desire, which would be the custom Firmware.

A VPN Tunnel: The Path the data take from the user to the host for example if you had a VPN on you home network running bell and you were at a friend’s house using the internet over your VPN the VPN tunnel would be “Friends Modem/Router >> Rogers ISP Servers >> Bell ISP Severs >> Your Modem/Router >> Bell ISP Severs >> The Website Your Connecting To”.
Spam: Unwanted content –usually advertisements– spread over the messaging systems such as YouTube comments and emails.

Blackhat SEO: Malicious and potently illegal procedures to obtain Search Engine Optimization through the use of Spam on forums,emails and social media.

Wordlist (pass list): Is a list of “words” containing letters, numbers and special characters usually of common passwords and dictionary words. There Wordlist range in size from a thousand words to millions of words.

PHP: Server side scripting language that runs before your html or JavaScript on a website, usually but not limited to submitting/gathering information from/to a database. This is the language I used to make my Internet Pass Cracking script in the tutorial below.

External PHP Extension (EPE):  A universal PHP library/script able to run on different server usually with an API to allow for more usage or to counteract incompatibles with server.

Application Programming interface (API):  An interface used to interact with a script or program to modify settings and usage.

Brute Force Break: Performs a trial decryption on the encryption for every possible key. This technique is slow and takes extreme amounts of time. In addition, the bit of the key directly effects the time required to crack.

Cryptographic Break: Is anything faster than brute force, and usually works from understanding how the encryption is encoded, then working backwards from the key but requires advanced math and software coding skills.

PC: A Personal Computer (Not a Server, Workstation or Mac)

Firewall: Hardware or Software running in the background to prevent unauthorized access to your computer from the network.

Antivirus: Scans for viruses and deletes them, that’s it.

Security Suite: Contains an antivirus, firewall and passive protection looking for virus or virus like activity.

Live/Persistent: a mode an operating system can be in where it can be booted from a nonpermanent device on a machine such as a CD or in the case of persistent mode where it takes place on a USB where it can be modified.

Aircrack-ng: software executed in a terminal on Linux to allow users to hack into surrounding wireless networks.

Skid: a person that uses technology like they know how to use it but doesn’t really know how basically a slightly more professional way to say noob.

Encrypted Files: Files converted to data that cannot be easily understood by unauthorized people use algorithms and other processes.

SSL (HTTPS): Acronym for Secure Sockets Layers is a nationally adopted standard security technology used to encrypt online traffic.

Network packets: Data that is split into chunks (packets) sent between your computer and a router containing all the data you receive and send out.

Packet capture: The act of downloading packets to read them as plain text.

Packet Sniffing: The use of software to download and capture many or all packets being transferred over a network, usually to find sensitive data such as passwords and credit card information on public networks.
Categories:
Google Analytics Alternative