- Popular Articles -
Rating: ★★★★★
Tags: Malware, Zombie
In computing, a zombie is a computer connected to the internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker.
Rating: ★★★★★
Tags: Scam, Email Scam, Nigerian Prince Scam
An advance-fee scam is a form of fraud and is one of the most common types of confidence tricks. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster claims will be used to obtain the large sum.
Rating: ★★★★★
Tags: Internet Forum, Online Forum
An Internet Forum or Message Board is an online discussion site where people can hold conversations in the form of posted messages or threads.
Rating: ★★★★★
Tags: Online Community, Blog, Social Network
An online community, also called an internet community or web community is a community whose members interact with each other primarily via the internet.
Rating: ★★★★★
Tags: Bin Carding, Scam, Hacking, Cyber Security
BIN Carding, also known as carding, is a type of card fraud involving using a stolen credit card's Bank Identification Number (BIN) to charge and sell prepaid cards.
Rating: ★★★★★
Tags: Bitcoin, Cryptocurrency
Bitcoin is the first decentralized cryptocurrency. Nodes in the peer-to-peer Bitcoin network verify transactions through cryptography and record them in a public distributed ledger, called a blockchain, without central oversight.
Rating: ★★★★★
Tags: Blogs, Blog, Bloggers Code of Conduct
The Blogger's Code of Conduct was proposed by Tim O'Riley for bloggers to adopt a uniform policy for moderation of comments. It was proposed in 2007, in response to controversy involving threats made to blogger Kathy Sierra.
Rating: ★★★★★
Tags: Cloaking, SEO
Cloaking is a search engine optimization (SEO) technique, in which the content presented to the search engine spider is different from the presented to the user's browser.
Rating: ★★★★★
Tags: SEO, Black-Hat
Content Spam techniques involve altering the logical view that a search engine has over the page's contents. They all aim at variants of the vector space model for information retrieval on text collections.
Rating: ★★★★★
Tags: Cryptography, Cryptology
Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.
- Page No - 4 5 6 7 8 9 10 Next