The glossary below contains many of the terms you will find in common use throughout our website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.
A technique that hackers use to find the weaknesses of a computer or network. While this technique is not an attack in reality, hackers use it to detect which ports are open on a computer. Based on the open ports information, unauthorized access can be gained. IT professionals also use this technique as a tool to discover and correct security holes.
Follow us for all the latest news, tips and updates.