1.DDoS– Distributed Denial of Service attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look likeit’s coming from multiple IPS. Amplification of power in the attack CLOUD occur.
2.VPS– Virtual Private server
3.SE– Social Engineering
4.HTTP– Hypertext Transfer Protocol. The fundamental of data communication for the WWW
5.SSH– Secure Shell, used to connect to VPS
6.FTP– File Transfer Protocol, used for transferring files over an FTP server.
7.XSS(CSS)– Cross Site Scripting
8.SKID– Script Kiddie
9.VPN– Virtual Private Network
10.NIX– Unix based OS, usually referred to here when referring to DDoS’in
11.SQL– Structure Qwery Language. It usually goes along with a word after it, such as “SQL INJECTION”
12.FUD– Fully Undectectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.
13.LOIC/HOIC– Tools used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances.
14.TROJAN– A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ulmitate purpose og granting a hacker unauthorized access to a computer.
15.BOTNET– Computers infected by worms or Trojan and taken over by hackers and brought into networks to send spam, more virsuses, or launch denial of service attacks.
16.SQL INJECTION– An SQL injection is a method often used to hack SQL database via a website, and gain admin control of the site.
17.ROOT– Highest Permission Level on a computer, able to modify anything on the system without restriction.
18.WAREZ– Software Piracy
19.RootKit– A powerfull exploit used by malware to conceal all traces that it exists. Ring3 – can be removed easily without booting insafemode. Ring0 – very hard to remove anad rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safemode.
20.IP Grabber– A link that grabs someone’s IP when they visit it.
21.WORM– Software designed to spread malware with little to no human interaction.
22.PHREAK– Phone freaks. Hackers who hack phone cell for free calling.
23.BOT– A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocol to await malicious instruction.
24.DOX – Personal information about someone on the internet usually contains real name, address, phone number, SSN, credit card number, etc.
25.KeyLogger– A software program that records all KeyStrokes on a computer’s KeyBoard, used as a surveillance tool or covertly as spyware.