Evil twin is a type of Wi-Fi attack, similar in nature to Web site spoofing and e-mail phishing attacks. Here’s how an evil twin attack works:
A hacker sets its service identifier (SSID) to be the same as an access point at the local hotspot or corporate wireless network. The hacker disrupts or disables the legitimate AP by disconnecting it, directing a denial of service against it, or creating RF interference around it. Users lose their connections to the legitimate AP and re-connect to the “evil twin,” allowing the hacker to intercept all the traffic to that device. [Source: Wi-Fi Planet]
(1) 2 to the 60th power (1,152,921,504,606,846,976) bytes. An exabyte is equal to 1,024 petabytes. (2) When capitalized, the name of a manufacturer of mass storage devices.
A condition, often an error, that causes the program or microprocessor to branch to a different routine. The terms interrupt and exception are very close in meaning. Both can be used to refer to either hardware or software. The only real difference is that an exception usually indicates an error condition.
- exclusive OR
A Boolean operator that returns a value of TRUE only if both its operands have different values. Contrast with the inclusive OR operator, which returns a value of TRUE if either of its operands is TRUE. Whereas an inclusive OR can be translated “this, that, or both,” an exclusive OR means “this or that, but […]
In blogging terms an excerpt is a shortened description of your blog post. The excerpt is used to describe your blog post in RSS feeds and also in search results. See The History of Blogging in the Quick Reference section of
- Executable File
A file in a format that the computer can directly execute. Unlike source files, executable files cannot be read by humans. To transform a source file into an executable file, you need to pass it through a compiler or assembler. In DOS systems, executable files have either a.COM or.EXE extension and are called COM files […]