Uid
Abbreviation for user ID (username identification). In NFS, the UID (also spelled UID) is the user ID of the file owner.
Loopholes
A vulnerability is a security flaw in the system that can cause intruders to get information and cause incorrect access.
Virus
A virus is software that can infect your system and hide itself in existing programs, systems, or documents. Once an infected project is executed, the virus code is activated and sends itself to other programs in the system. Infected projects also replicate the virus to other projects.
Vpn
A Virtual private network (VPN) is a private network that is configured on a public network. Public operators have built many VPNs over the years, which are a dedicated internal or external network to customers, but are actually sharing the backbone with other customers. Many VPNs have been built based on X.25, switched 56, Frame Relay, and ATM. The current trend is to build VPNs on the Internet. VPN uses access control and encryption to protect privacy in a public environment.
Windows NT Registry Vulnerability
This type of vulnerability allows an attacker to remotely access the registry of a Windows NT machine. You can check Windows NT Remote Access Service (RAS), Local Security Authority (LSA), automatic logon, registry file associations that can be changed, DCOM permissions, IP forwarding, and a variety of missing patches.
Windows NT User Vulnerability
This type of vulnerability allows users to retrieve Windows NT user accounts and passwords by checking for guessing passwords, lost passwords, password histories, unsafe policies, logoff settings, and locking settings to achieve the purpose of accessing the system.
SYN Package
The first packet of a TCP connection, a very small packet of data. SYN attacks include a large number of such packages that cannot be processed effectively because they appear to come from sites that do not actually exist. Each machine's cheat pack takes a few seconds to attempt to give up the normal response.
FILE-type viruses
Of the thousands of known viruses, most are of a file type, such as Friday the 13th (black Friday) virus. The mechanism of virus infection is to attach itself to other files, and the host file is primarily an executable file with an EXE or COM extension. Such viruses can modify the host code, insert its own code into any location in the file, disrupt the normal execution of the program at some point so that the virus code is preempted before the legitimate program.