Doxing
Doxing is the process of gathering information about a person or business using online public sources such as social media profiles, reverse phone lookup and search engines. The information doxed may include a person’s full name, email address, address, telephone number, pictures and other personal details. Doxing typically leads to an anonymous person’s identity being revealed.
Read Also:
- WiGig
WiGig is a technology based on the IEEE 802.11ad specification that can support data transfer speeds of up to 7Gbps (Gigabits per second), which is ten times faster than the 802.11n WiFi standard. WiGig was originally developed by the Wireless Gigabit (WiGig) Alliance and is currently being refined by the Wi-Fi Alliance following a merger […]
- Intel WiDi (Wireless Display)
Short for Wireless Display, WiDi is a technology developed by Intel to enable computers and laptops to seamlessly work with monitors, TVs and other peripherals without the need for cables or wires. With Intel WiDi users can stream videos and movies, photos, music and apps from their computer or laptop to monitors or HDTVs that […]
- The Silk Road
Silk Road is the name of an online anonymous marketplace — or black market — website that trafficked illegal goods including drugs, guns, personal data and malware. To operate, Silk Road ran on Tor (also see “onion routing”), an Internet network that is designed to make it nearly impossible to locate the computers that are […]
- Intel Skylake
Skylake is the codename for Intel’s processor microarchitecture that serves as the successor to the Haswell and Broadwell architectures. As with Broadwell, Intel Skylake utilizes a 14nm (nanometer) die shrink fabrication process, and it serves as the “tock” in Intel’s alternating tick-tock model of releasing new processor families. The “tick” to Intel Skylake, codenamed Cannonlake, […]
- Shellshock
Shellshock is a bug that uses a vulnerability in the common Unix command execution shellbash (Bourne-Again SHell) to potentially enable hackers to take control of the machine and remotely execute arbitrary code directly into the system. Because it preys on the Unix bash shell, which is utilized by most other major desktop and mobile operating […]