Hacker - One who infiltrates and explores various computer systems for the sole purpose of expanding their knowledge and satisfying their insatiable thirst for information.
Cracker - A hacker who acts maliciously. Deletes, crashes, implements viruses,etc.
Warez dude - A lowlife techno weenie who sells pirated software (basically people who couldn't quite make it as a hacker).
Eleet or leet - A hacker who's learned just about everything there is to know regarding computers, networks, and security. Many claim to be Eleet, very few are.
Newbie - An amateur hacker.
Lamer - A complete hacker wannabe. The difference between a newbie and a lamer is: A lamer knows a little bit, decides that's enough, and calls himself a hacker.A newbie also knows a little bit, but is humble enough to know that there is a lot more to be learned.
Root - Status on any system that gives the hacker total control of it. Usually,root is the desired end result of any hack.
Root shell - A shell is an interface between you as a user and a particular computer. So a root shell is a shell with root (superuser) privilege to resources on that machine. You can obtain a root shell by either logging into the box as root (assuming you have the password) or by using an exploit program to create a root shell for you.
Protocol - A of rules and guidelines that computers on a network must follow in order for communications to be coordinated, and therefor successful. A protocol defines specifically how data is broken into packets, sent over a wire, and reassembled at the other computer.
Proxy Server - If a company has its own network and its own website, there will be a portion of the network accessible (with a user name and password, of course) by anyone with Internet access. All the HTML files for the company's website will be somewhere on this segment of the network. Then, there will be the portion of the network strictly for business purposes, hidden from the rest of the world. A proxy server separates these two segments. So if you want to access the restricted part of any network, you will need to do it via the proxy server.
Firewall - Sort of like a proxy server, but has no other purpose but to keep unauthorized user out. Even if you have a valid user name and password for a system

0 comments: