Doxing


Doxing is the process of gathering information about a person or business using online public sources such as social media profiles, reverse phone lookup and search engines. The information doxed may include a person’s full name, email address, address, telephone number, pictures and other personal details. Doxing typically leads to an anonymous person’s identity being revealed.

Read Also:

  • WiGig

    WiGig is a technology based on the IEEE 802.11ad specification that can support data transfer speeds of up to 7Gbps (Gigabits per second), which is ten times faster than the 802.11n WiFi standard. WiGig was originally developed by the Wireless Gigabit (WiGig) Alliance and is currently being refined by the Wi-Fi Alliance following a merger […]

  • Intel WiDi (Wireless Display)

    Short for Wireless Display, WiDi is a technology developed by Intel to enable computers and laptops to seamlessly work with monitors, TVs and other peripherals without the need for cables or wires. With Intel WiDi users can stream videos and movies, photos, music and apps from their computer or laptop to monitors or HDTVs that […]

  • The Silk Road

    Silk Road is the name of an online anonymous marketplace — or black market — website that trafficked illegal goods including drugs, guns, personal data and malware. To operate, Silk Road ran on Tor (also see “onion routing”), an Internet network that is designed to make it nearly impossible to locate the computers that are […]

  • Intel Skylake

    Skylake is the codename for Intel’s processor microarchitecture that serves as the successor to the Haswell and Broadwell architectures. As with Broadwell, Intel Skylake utilizes a 14nm (nanometer) die shrink fabrication process, and it serves as the “tock” in Intel’s alternating tick-tock model of releasing new processor families. The “tick” to Intel Skylake, codenamed Cannonlake, […]

  • Shellshock

    Shellshock is a bug that uses a vulnerability in the common Unix command execution shellbash (Bourne-Again SHell) to potentially enable hackers to take control of the machine and remotely execute arbitrary code directly into the system. Because it preys on the Unix bash shell, which is utilized by most other major desktop and mobile operating […]


Disclaimer: Doxing definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.