exodus
This commit is contained in:
parent
57a932b166
commit
b9dd77bc14
@ -19,7 +19,7 @@ Free Documentation License".
|
|||||||
|
|
||||||
* Generated
|
* Generated
|
||||||
|
|
||||||
This file last generated Tuesday, 16 October 2018 04:11PM UTC
|
This file last generated Tuesday, 16 October 2018 04:16PM UTC
|
||||||
|
|
||||||
* Glossary
|
* Glossary
|
||||||
** (
|
** (
|
||||||
@ -3844,6 +3844,9 @@ adj. [from technical books] Used to complete a proof when one doesn't mind a han
|
|||||||
*** exfiltrate
|
*** exfiltrate
|
||||||
To copy data from a system without authorisation. Typically referring to the obtaining of personal data via Man in The Middle (MiTM) attacks on communications systems or implanted end points.
|
To copy data from a system without authorisation. Typically referring to the obtaining of personal data via Man in The Middle (MiTM) attacks on communications systems or implanted end points.
|
||||||
|
|
||||||
|
*** exodus
|
||||||
|
The movement of a significant number of users out of one system and into another. "There was another Twitter exodus last month"
|
||||||
|
|
||||||
*** exploit
|
*** exploit
|
||||||
1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The Ping O' Death is a famous exploit.
|
1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The Ping O' Death is a famous exploit.
|
||||||
|
|
||||||
|
BIN
docs/jargon.1.gz
BIN
docs/jargon.1.gz
Binary file not shown.
@ -18,7 +18,7 @@ Free Documentation License".
|
|||||||
</p>
|
</p>
|
||||||
<H2>Generated</H2>
|
<H2>Generated</H2>
|
||||||
<p>
|
<p>
|
||||||
This file last generated Tuesday, 16 October 2018 04:11PM UTC
|
This file last generated Tuesday, 16 October 2018 04:16PM UTC
|
||||||
|
|
||||||
</p>
|
</p>
|
||||||
<H2>Glossary</H2>
|
<H2>Glossary</H2>
|
||||||
@ -4553,6 +4553,10 @@ This file last generated Tuesday, 16 October 2018 04:11PM UTC
|
|||||||
<p>
|
<p>
|
||||||
To copy data from a system without authorisation. Typically referring to the obtaining of personal data via Man in The Middle (MiTM) attacks on communications systems or implanted end points.
|
To copy data from a system without authorisation. Typically referring to the obtaining of personal data via Man in The Middle (MiTM) attacks on communications systems or implanted end points.
|
||||||
</p>
|
</p>
|
||||||
|
<H4>exodus</H4>
|
||||||
|
<p>
|
||||||
|
The movement of a significant number of users out of one system and into another. "There was another Twitter exodus last month"
|
||||||
|
</p>
|
||||||
<H4>exploit</H4>
|
<H4>exploit</H4>
|
||||||
<p>1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The Ping O' Death is a famous exploit. </p>
|
<p>1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The Ping O' Death is a famous exploit. </p>
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user