exfiltrate
This commit is contained in:
@@ -18,7 +18,7 @@ Free Documentation License".
|
||||
</p>
|
||||
<H2>Generated</H2>
|
||||
<p>
|
||||
This file last generated Friday, 10 March 2017 01:19PM UTC
|
||||
This file last generated Friday, 10 March 2017 01:27PM UTC
|
||||
|
||||
</p>
|
||||
<H2>Glossary</H2>
|
||||
@@ -4529,6 +4529,10 @@ This file last generated Friday, 10 March 2017 01:19PM UTC
|
||||
<p>
|
||||
adj. [from technical books] Used to complete a proof when one doesn't mind a handwave , or to avoid one entirely. The complete phrase is: The proof [or the rest ] is left as an exercise for the reader. This comment has occasionally been attached to unsolved research problems by authors possessed of either an evil sense of humor or a vast faith in the capabilities of their audiences.
|
||||
</p>
|
||||
<H4>exfiltrate</H4>
|
||||
<p>
|
||||
To copy data from a system without authorisation. Typically referring to the obtaining of personal data via Man in The Middle (MiTM) attacks on communications systems or implanted end points.
|
||||
</p>
|
||||
<H4>exploit</H4>
|
||||
<p>1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The Ping O' Death is a famous exploit. </p>
|
||||
|
||||
|
||||
Reference in New Issue
Block a user