-
1 несанкционированное проникновение в сеть
Security: network hackingУниверсальный русско-английский словарь > несанкционированное проникновение в сеть
-
2 несанкционированная попытка доступа
Network technologies: hackingУниверсальный русско-английский словарь > несанкционированная попытка доступа
См. также в других словарях:
Network Crack Program Hacker (NCPH) Group — Formation 1994 (1994) Type hacker group Location Sichuan Province, China Membership 4 core members, aprox. 10 members ( … Wikipedia
Network detector — Network detectors or network discovery software are computer programs that facilitate detection of wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards.[1] Discovering networks may be done through active as well as passive scanning … Wikipedia
Network enumerating — is a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved. It should not be confused with Network mapping which only retrieves information about which servers are connected to a… … Wikipedia
Network encryption cracking — is the breaching of network encryptions (e.g., WEP, WPA, ...), usually through the use of a special encryption cracking software. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and… … Wikipedia
Hacking tool — A hacking tool is a program designed to assist with hacking, or a legitimate utility that can also be used for hacking. Examples Examples include Nmap, Nessus, John the Ripper, SuperScan, p0f, and Winzapper. [ [http://www.teckh.com/?p=143 Top 15… … Wikipedia
hacking — 1. adjective Short and interrupted, broken, jerky; hacky. A hacking cough. A hacking laugh. A hacking breath. A hacking cry.<!all four listed at Google Books 2. noun a) Unauthorized attempts to bypass the security mechanisms of an information… … Wiktionary
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia
Network Behavior Anomaly Detection — Contents 1 Network Behavior Anomaly Detection (NBAD) 2 Popular Threat Detections within NBAD 3 Commercial NBAD Products 4 External links … Wikipedia
Wireless hacking — In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network. A wireless network can be penetrated in a number of ways. There are methods ranging from those that demand a high level of technological skill… … Wikipedia
Взлом и отключение PlayStation Network — (PSN) успешный несанкционированный доступ, осуществленный в промежуток времени с 17 апреля по 19 апреля 2011 года, к данным Интернет сервисов PlayStation Network и Qriocity, позволивший злоумышленникам завладеть персональными данными… … Википедия
News International phone hacking scandal — Rupert Murdoch, chairman and chief executive officer of News Corporation, the parent company of News International The News International phone hacking scandal is an ongoing controversy involving mainly the News of the World but also other… … Wikipedia