Portal Home > Knowledgebase > P


Packet
When data is sent through a network, it breaks that data up into small pieces called...
Packet Filter
Is a Firewall that inspects each packet that is sent to it and compares it to a preconfigured...
Packet Filtering
Is the process a Firewall uses to analyze the data that passes through and compare it to...
Password
A password is a string of characters that are used to protect information in some way. ...
Password attacks
A password attack is an attempt to obtain or decrypt a legitimate user's password. Hackers can...
Password Sniffing
Password sniffing is the use of a sniffer to capture passwords as they cross a network. The...
Patch
A patch provides additional, revised or updated code for an operating system or application....
Payload
Payload refers to the effects produced by a virus attack. It sometimes refers to a virus...
Peer-to-peer (P2P) networking
Peer-to-peer (P2P) networking is a distributed system of file sharing where any PC on the network...
Petabyte
2 to the 50th power (1,125,899,906,842,624) bytes. A petabyte is equal to 1,024 terrabytes.
PGP
PGP stands for Pretty Good Privacy. It is considered the strongest program for encrypting data...
Pharming
Pharming is the exploitation of a vulnerability in DNS server software that allows a hacker to...
Phishing
Phishing is a form of criminal activity using social engineering techniques through email or...
Phreaker
A person who attempts to gain unauthorized access and use of a telephone system or network. See...
Piggyback
To piggyback is to gain unauthorized access to a system by exploiting an authorized user's...
PING
A utility program that forwards data packets to check the quality of a link or verify the...
PLZ
Is computer slang for "Please".
Polymorphic virus
Polymorphic viruses create varied (though fully functional) copies of themselves as a way to...
POP3 Server
Is a server that you would connect to from your local computer in order to download and retrieve...
Porn Dialers
Software that gets installed on your computer that has the ability to make phone calls from your...
Port
The word Portcan have 3 definitions in Computer Terms. The first and most common definition, is...
POST
"POST" is an acronym for Power On Self-Test.  The POST process checks the basic system...
Program
A set of instructions that are contained in files and interpreted by the computer to tell it how...
Program infector
A program infector virus infects other program files once an infected application is executed and...
Protocol
A Protocol is a precise description and format of how two or more entities, whether they are...
Proxy Server
A proxy server is a application running on a computer connected to the Internet that allows other...
Pubstro
A computer that has been hacked and had a FTP Server installed.  This FTP server is used to...

Powered by WHMCompleteSolution