List of system security nouns

Source: Internet
Author: User
Tags access

Uid

Abbreviation for user ID (username identification). In NFS, the UID (also spelled UID) is the user ID of the file owner.

Loopholes

A vulnerability is a security flaw in the system that can cause intruders to get information and cause incorrect access.

Virus

A virus is software that can infect your system and hide itself in existing programs, systems, or documents. Once an infected project is executed, the virus code is activated and sends itself to other programs in the system. Infected projects also replicate the virus to other projects.

Vpn

A Virtual private network (VPN) is a private network that is configured on a public network. Public operators have built many VPNs over the years, which are a dedicated internal or external network to customers, but are actually sharing the backbone with other customers. Many VPNs have been built based on X.25, switched 56, Frame Relay, and ATM. The current trend is to build VPNs on the Internet. VPN uses access control and encryption to protect privacy in a public environment.

Windows NT Registry Vulnerability

This type of vulnerability allows an attacker to remotely access the registry of a Windows NT machine. You can check Windows NT Remote Access Service (RAS), Local Security Authority (LSA), automatic logon, registry file associations that can be changed, DCOM permissions, IP forwarding, and a variety of missing patches.

Windows NT User Vulnerability

This type of vulnerability allows users to retrieve Windows NT user accounts and passwords by checking for guessing passwords, lost passwords, password histories, unsafe policies, logoff settings, and locking settings to achieve the purpose of accessing the system.

SYN Package

The first packet of a TCP connection, a very small packet of data. SYN attacks include a large number of such packages that cannot be processed effectively because they appear to come from sites that do not actually exist. Each machine's cheat pack takes a few seconds to attempt to give up the normal response.

FILE-type viruses

Of the thousands of known viruses, most are of a file type, such as Friday the 13th (black Friday) virus. The mechanism of virus infection is to attach itself to other files, and the host file is primarily an executable file with an EXE or COM extension. Such viruses can modify the host code, insert its own code into any location in the file, disrupt the normal execution of the program at some point so that the virus code is preempted before the legitimate program.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.