portmanteau | zarażenie | |
malicious | złośliwy | |
to infiltrate | infiltrować | |
without the owner's informed consent | bez świadomej zgody właściciela | |
hostile | wrogi, złośliwy | |
intruisive | niepożądany | |
unfamiliar | niezaznajomiony | |
based on the intent of the creator | na podstawie intencji twórcy | |
harmless | nieszkodliwe | |
merely | irytujące | |
perpetrator | sprawca | |
widespread | szerokorozprzestrzenione | |
chieflt | głównie | |
strictly | przede wszystkim | |
malicious | złośliwy | |
exploitation | eksploatacja | |
strictly | wyłącznie | |
unsolicited | dobrowolny | |
spread | rozprzestrzeniać się | |
exploiting | wykorzystywać | |
uncommon | nie jest rzadkim | |
for the manner | w sposób | |
payload | instrukcje | |
commonly | typowo | |
to serve | aby służyć | |
longer-term | jeszcze dłużej | |
conceal | ukrywać | |
directly | bezpośrednio | |
concealment | procedura ukrywania | |
prank | żart | |
software | oprogramowanie | |
bypass | obchodzić | |
authenticate | uznać, uwierzytelniać | |
hostile | wrogi | |
broadband | szerokopasmowy | |
software | In the laboratory our scientists use specialized ..... to solve mathematical problems. | |
prank | What is the best ..... you have ever played on anyone? | |
perpetrator | The ...... of that awful crime was sentenced to death. | |
infiltrate | A police officer managed to get into and ..... the gang of arms dealers. | |
hostile | The reporter found himself in the middle of the ..... crowd of Anti-Muslims protestors. | |
bypass | Is there a way to ..... the official procedures? | |
authenticate | The gun expert ..... the rifle as real 19th century Winchester. | |
concealed | The microphone was ..... in a vase. | |
peer-to-peer | A software engineer measured traffic through the ports used by well-known ..... networks. | |
broadband | Our government promised to install ..... internet in every single household | |
backdoor | an undocumented way of gaining access to a program, online service or an entire computer system | |
payload | the term used to describe the malicious activity that is the result of an activated computer virus | |
rootkit | a type of malicious software that is activated each time your system boots up | |
cracker | someone who breaks into someone else's computer system | |
code | a set of symbols for representing something (for example ASCII) | |
portmanteau | a word or morpheme whose form and meaning are derived from blending two or more distinct forms | |
trojan | a destructive program that masquerades as a being application, unlike viruses, they do not replicate | |
worm | a program or algorithm that replicates itself over a computer network & performs malicious actions | |
cyberdefense | defense against internet attack | |
hacktivism | combination of words "hack(er)" and "activism" | |
mainframe | computer used by large companies for critical operations like financial transaction processing | |
bot | a program used on the Internet that performs a repetitive function such as post messagetomultiplegro | |
botnet | a collection of software robots or bots linked and cooperating with each other | |
Denial of Service | a kind of cyber attack which results in unavailability of service | |
the specter | widmo | |
hype | szum medialny | |
properly assess | właściwie ocenić | |
varying | różnica | |
struggle | borykać się | |
disruption | zakłócenie | |
harassment | niepokojenie | |
testimony | świadectwo | |
to be in a state | być w stanie | |
originating | pochodzący | |
considered | uznane | |
maze | labirynt | |
officials | władze | |
troop | oddział wojska | |
aviation | lotnicze | |
affilation | przynależność | |
effort | wysiłek | |
strictly for-profit category of malware | rodzaj malware wyłącznie dla zysku | |
packaged with user-installed software | pakowane w oprogramowanie instalowane przez użytkownika | |
defeating the intentions of attackers | niezgodnie z intencjami atakujących | |
hidden from the user | ukryte przed użytkownikiem | |