Archive for the ‘Glossary’ Category

RootkitRootKit term historically come from the world of Unix, where this term is a set of tools that a hacker installs them on a compromised computer after the initial access. This is usually hacking tools (sniffers, scanners) and Trojans, replacing the basic utilities Unix. RootKit allows a hacker to gain a foothold in the compromised system and conceal their activities.

In Windows, a RootKit is considered a program that penetrates into the system and hooks system functions, or shall replace the system libraries. Intercepting and modifying low-level API functions in the first place such a program can effectively hide its presence in the system, protecting it from detection by antivirus software and user. In addition, many RootKit can mask the presence of any system described in its configuration of processes, folders and files on a disk, registry keys. Many RootKit installed in your system drivers and services (which of course, are also “invisible”). (more…)

Hypertext Transfer Protocol SecureHTTPS (Hypertext Transfer Protocol Secure) – an extended version of the protocol HTTP, created by encrypting data sent between the Web-site and Web-browser, as well as the authentication server and the client. A modified version of HTTP (see the Hyper Text Transfer Protocol), which provides data protection (encryption of data in transit over the network, a digital signature to verify the sender’s information.) Server with protectors allows you to narrow the list of persons entitled to access to confidential information. An increasing number of commercial Web sites use these tools on their Web-servers.

HTTPS is not a separate protocol. This is a normal HTTP, running over an encrypted transport mechanisms SSL and TLS. It provides protection against attacks based on listening to the network connection – from snifferskih attacks and attacks such as man-in-the-middle, provided that the funds will be used encrypt and server certificate is checked, and trust him. (more…)