Solved

Word-list: hacking/cracking/serials/bittorrent/P2P content

Posted on 2006-11-30
14
812 Views
Last Modified: 2013-12-24
Hello,

I am looking for a list of words that are related to:
                 hacking/cracking/serials/bittorrent/P2P content

Any ideas?

Thanks!
0
Comment
Question by:hankknight
  • 11
  • 2
14 Comments
 
LVL 10

Expert Comment

by:magnetic_kisser
ID: 18053486
0
 
LVL 16

Author Comment

by:hankknight
ID: 18053548
Thanks for the link.  It is for general Internet terms and I didn't find many terms related to
hacking, cracking, serials, bittorrent and other P2P content.

I am trying to develop a script that will guesses if a page contains illegal links or content.  
That is why I want a blacklist of words.

Thanks!


0
 
LVL 10

Assisted Solution

by:magnetic_kisser
magnetic_kisser earned 450 total points
ID: 18053606
just copy this for u ....cant gave the ,link here sadly ........

Portscanners -- This program scans a host (Domain or IP) for any open ports.

Pingers (DoS) -- Floods a host with abunch of Echo Request packets, causing the host to crash or reset; depending on how fast you can send them, and how fast they can send them back. Im not a big fan of this.

Password Crackers -- Cracks passwords or encrypted passwd files. It either goes through every word in the dictionary, or it does a brute force attack (Every ASCII Combination).

Key Loggers -- This logs every key you type into a file (Including Password and usernames). Then it usually gets sent (By Email) To the hacker who is hacking you.

Worms -- A computer infestation that is like a virus but spreads through a network without a host program. These tend to spread real fast.

Virus's -- A computer infestation that replicates itself on an infected host program.

Trojans -- A computer infestation that pretends to be a harmless file and usually is attached to a regular program. Allot of the times, a trojan will open up a port, and allows a hacker to access your computer from theres and do many evil things. :}

Clients -- Connects to a host on a port you specify. Then lets you send commands to it. My favorite client is Putty, but you can use the windows one.

Email Bombers -- Bombs email with allot of junk. Filling up their storage so you can't receive any more email.

Forum Bombers -- Bombs forums with allot of junk. Filling up their sites storage.

Packet Sniffers -- Tells you exactly what you are sending in raw coding to a remote maching. Such as the syntax coding when you view a webpage.
0
 
LVL 10

Assisted Solution

by:magnetic_kisser
magnetic_kisser earned 450 total points
ID: 18053624
hankknight

i am trying to find it ...it was just the beginning :)  .........yeah the link contains computer terms .....i knew that this is what you dont want :)

wait dear ....will provide links.....!!
0
 
LVL 10

Assisted Solution

by:magnetic_kisser
magnetic_kisser earned 450 total points
ID: 18053660
here u are .....great list ....i am comming back with more ...stay tuned only on EE :)

http://www.pandasoftware.com/virus_info/glossary/
0
 
LVL 10

Assisted Solution

by:magnetic_kisser
magnetic_kisser earned 450 total points
ID: 18053945
0
 
LVL 10

Assisted Solution

by:magnetic_kisser
magnetic_kisser earned 450 total points
ID: 18054036
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 10

Accepted Solution

by:
magnetic_kisser earned 450 total points
ID: 18054135
0
 
LVL 10

Assisted Solution

by:magnetic_kisser
magnetic_kisser earned 450 total points
ID: 18054188
hankknight

is this ok ? ........basically every URL expert have to be very very careful in posting links to questions ....the problem is that many sites contain links to the terms which may result in downloading softwares which are prohibited ..

Well MY LINKZ CONTAINS NOTHING ....just for the administrators easiness :) i tell them this thing ...so they don't have to go to visit each site :)

tell me if anything is needed ....i think these are enough :)
0
 
LVL 10

Assisted Solution

by:magnetic_kisser
magnetic_kisser earned 450 total points
ID: 18054246
little knowledge on torrent
http://www.onelook.com/?w=torrent
0
 
LVL 11

Assisted Solution

by:neopolitan
neopolitan earned 50 total points
ID: 18056104
0
 
LVL 10

Assisted Solution

by:magnetic_kisser
magnetic_kisser earned 450 total points
ID: 18057262
neopolitan

i have seen these both but i dont think they have some good things !! ........well u did good to post these two here !! lets see what the asker wants !!
0
 
LVL 16

Author Comment

by:hankknight
ID: 18064153
Thank you, everyone.

I have posted a related question here:
http://www.experts-exchange.com/Miscellaneous/URLs/Q_22080761.html
0
 
LVL 10

Expert Comment

by:magnetic_kisser
ID: 18066922
Thankz a lot hank ........!!
i am looking at that one !!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Managing IT related issues 6 73
2v or 4v 4 57
how can I translate an audio video clip from Spanish to English? 4 30
Question to Pivot table 1 36
Do you have the problem that a lot of tasks are stacking up fairly quickly? A good way to reduce your big task list is to apply the 3 minute rule. Its fairly simple: if someone asks you to do a specific task, and you know for a fact that it will …
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
Articles on a wide range of technology and professional topics are available on Experts Exchange. These resources are written by members, for members, and can be written about any topic you feel passionate about. Learn how to best write an article t…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now