Common Technical Abbreviations


1.DDoS Distributed Denial of Service attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look likeit’s coming from multiple IPS. Amplification of power in the attack CLOUD occur.

2.VPS Virtual Private server

3.SE Social Engineering

4.HTTP– Hypertext Transfer Protocol. The fundamental of data communication for the WWW

5.SSHSecure Shell, used to connect to VPS

6.FTP– File Transfer Protocol, used for transferring files over an FTP server.

7.XSS(CSS)Cross Site Scripting

8.SKIDScript Kiddie

9.VPNVirtual Private Network

10.NIXUnix based OS, usually referred to here when referring  to DDoS’in

11.SQL– Structure Qwery Language. It usually goes along with a word after it, such as “SQL INJECTION”

12.FUDFully Undectectable, can be used in many terms. Generally in combination with crypters, or  when trying to infect someone.

13.LOIC/HOICTools used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances.

14.TROJANA Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ulmitate purpose og granting a hacker unauthorized access to a computer.

15.BOTNET– Computers infected by worms or Trojan and taken over by hackers and brought into networks to send spam, more virsuses, or launch denial of service attacks.

16.SQL INJECTION– An SQL injection is a method often used to hack SQL database via a website, and gain admin control of the site.

17.ROOTHighest Permission Level on a computer, able to modify anything on the system without restriction.

18.WAREZSoftware Piracy

19.RootKit– A powerfull  exploit used by  malware to conceal all traces that it exists. Ring3 – can be removed easily without booting insafemode. Ring0 – very hard to remove anad rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safemode.

20.IP GrabberA link that grabs someone’s IP when they visit it.

21.WORM– Software designed to spread malware with little to no human interaction.

22.PHREAKPhone freaks. Hackers  who hack phone cell  for free calling.


23.BOTA piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocol to await malicious instruction.

24.DOX – Personal information about someone on the internet usually contains real name, address, phone number, SSN, credit card number, etc.

25.KeyLoggerA software program that records all KeyStrokes on a computer’s KeyBoard, used as a surveillance tool or covertly as spyware.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s