Portal Home > Knowledgebase > H


Hacker
A hacker is a person who creates and modifies computer software and hardware, including computer...
Hard Disk
A Hard Disk is a magnetic disk that the computer stores data on.  Read and write times to...
Hardware Firewall
Is a device to which you connect your computers or network in order to protect them from...
Header
A port or end of a cable.  On a motherboard, the headers are the ports attached directly to...
Heuristic analysis
The word heuristic is derived from the Greek ‘to discover’ and refers to a learning...
HF
Is computer slang for the phrase "Have Fun".
Hijacking
Hijacking is an attack whereby an active, established session is intercepted and used by the...
HKEY_CURRENT_USER
This is a section in the Windows registry that contains configuration information that applies...
HKEY_LOCAL_MACHINE
This is a section in the Windows registry that contains configuration information that applies to...
Hole
A hole is a vulnerability in the design software and/or hardware that allows circumvention of...
Honeypot
A computer or network that is intentially left with common vulnerabilities that a hacker...
Host
Host is a term often used to describe the computer file to which a virus attaches itself. Most...
Hostname
Isthe unique name given to a computer connected to the Internet.  For example, the hostname...
Hosts File
This file is used to map IP Addresses to a hostname.  The hosts file is checked...
Hub
A unintelligent device that that allows devices that are connected to it to communicate with each...
HyperText Markup Language
The coding language used to create Hypertext documents which are used on the world wide...
HyperText Transfer Protocol
The protocol used to transfer html files between a web server and a web browser.

Powered by WHMCompleteSolution