wordki.pl - nauka słówek
Malware + Hacktivism
autor: adix280
portmanteauzarażenie
maliciouszłośliwy
to infiltrateinfiltrować
without the owner's informed consentbez świadomej zgody właściciela
hostilewrogi, złośliwy
intruisiveniepożądany
unfamiliarniezaznajomiony
based on the intent of the creatorna podstawie intencji twórcy
harmlessnieszkodliwe
merelyirytujące
perpetratorsprawca
widespreadszerokorozprzestrzenione
chiefltgłównie
strictlyprzede wszystkim
maliciouszłośliwy
exploitationeksploatacja
strictlywyłącznie
unsoliciteddobrowolny
spreadrozprzestrzeniać się
exploitingwykorzystywać
uncommonnie jest rzadkim
for the mannerw sposób
payloadinstrukcje
commonlytypowo
to serveaby służyć
longer-termjeszcze dłużej
concealukrywać
directlybezpośrednio
concealmentprocedura ukrywania
prankżart
softwareoprogramowanie
bypassobchodzić
authenticateuznać, uwierzytelniać
hostilewrogi
broadbandszerokopasmowy
softwareIn the laboratory our scientists use specialized ..... to solve mathematical problems.
prankWhat is the best ..... you have ever played on anyone?
perpetratorThe ...... of that awful crime was sentenced to death.
infiltrateA police officer managed to get into and ..... the gang of arms dealers.
hostileThe reporter found himself in the middle of the ..... crowd of Anti-Muslims protestors.
bypassIs there a way to ..... the official procedures?
authenticateThe gun expert ..... the rifle as real 19th century Winchester.
concealedThe microphone was ..... in a vase.
peer-to-peerA software engineer measured traffic through the ports used by well-known ..... networks.
broadbandOur government promised to install ..... internet in every single household
backdooran undocumented way of gaining access to a program, online service or an entire computer system
payloadthe term used to describe the malicious activity that is the result of an activated computer virus
rootkita type of malicious software that is activated each time your system boots up
crackersomeone who breaks into someone else's computer system
codea set of symbols for representing something (for example ASCII)
portmanteaua word or morpheme whose form and meaning are derived from blending two or more distinct forms
trojana destructive program that masquerades as a being application, unlike viruses, they do not replicate
worma program or algorithm that replicates itself over a computer network & performs malicious actions
cyberdefensedefense against internet attack
hacktivismcombination of words "hack(er)" and "activism"
mainframecomputer used by large companies for critical operations like financial transaction processing
bota program used on the Internet that performs a repetitive function such as post messagetomultiplegro
botneta collection of software robots or bots linked and cooperating with each other
Denial of Servicea kind of cyber attack which results in unavailability of service
the specterwidmo
hypeszum medialny
properly assesswłaściwie ocenić
varyingróżnica
struggleborykać się
disruptionzakłócenie
harassmentniepokojenie
testimonyświadectwo
to be in a statebyć w stanie
originatingpochodzący
considereduznane
mazelabirynt
officialswładze
troopoddział wojska
aviationlotnicze
affilationprzynależność
effortwysiłek
strictly for-profit category of malwarerodzaj malware wyłącznie dla zysku
packaged with user-installed softwarepakowane w oprogramowanie instalowane przez użytkownika
defeating the intentions of attackersniezgodnie z intencjami atakujących
hidden from the userukryte przed użytkownikiem